Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp1820991ybn; Thu, 26 Sep 2019 02:44:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqwQFWW9FO4AwGmOku4ZR6+UxpsuiiAiQAm5YlwAAOvxSxUCtKE8I1teBsZBtMagIQdFQeqL X-Received: by 2002:a50:8961:: with SMTP id f30mr2450664edf.144.1569491055441; Thu, 26 Sep 2019 02:44:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569491055; cv=none; d=google.com; s=arc-20160816; b=e2mz6QpMLdvEQqPqny7DbCVxFXqLy+mVpk8cI9jvvtCXyv1IAdQNM/LmpcOAAZuSRX NHEKeicMQeaiw5cpAucu3YgyGo3elB+b1+YWovqCkUoa+mt+m239v+qc218lPph3tXbh E8yQLQWhdXDpzuiZU75roMIcHSKq9z4FPkEDopWHQk1z9ebpXZ/Hl9pAHEr4fvPfR8PC ReXE0jTrhvtYmZnDEx6KAyR0Z1djW2iM2txWVU96RITbEy9RmEOUuLx/WSu24OVTFsB+ 067ltvZQaOcmSSz4qIsrF4JTZ2xZZ8YH4gf8DI3WFcGtYfMqIkUplwZIRTC74I/jiOXR TP7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:from:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:date; bh=bFSIWvtmvKkc6vmTx7TTD0SejWjjDOJhq+Va51ujXRQ=; b=Yaks3CcW0YSY2y5h4j5oKDywzWIN5dDo5ZZaJOp2opPklalOj7f0t/S4UvkofUTOeV taqXcGl37XTIf479dRisyU+O+2HI+nGoorPO0ZXuNUD5R05jXwpUGTWq2I1AoTkyYJJJ IHfw7YSg3wJ36RoY7jtwhm7JWNRnGlpnvgC9IXWLXZgaspIZNphKmVOHe+5g6ekNVmnD IUTqPTwjyMUgtYRlsQfqwpJSl2hJHG3DtYvuOA6KWPDTdSIJ7/gvBJeGDiPIOMq6jFx1 rAmBstHzzFKZRziRlLO6Xar1uP9Ojup4b6AplfMaFPPWomeJrzwGZsoqzvSqCk/pir0L pZrA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u16si710853ejx.179.2019.09.26.02.43.48; Thu, 26 Sep 2019 02:44:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732938AbfIYQsb (ORCPT + 99 others); Wed, 25 Sep 2019 12:48:31 -0400 Received: from fieldses.org ([173.255.197.46]:60650 "EHLO fieldses.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731087AbfIYQsb (ORCPT ); Wed, 25 Sep 2019 12:48:31 -0400 Received: by fieldses.org (Postfix, from userid 2815) id 3786C1510; Wed, 25 Sep 2019 12:48:31 -0400 (EDT) Date: Wed, 25 Sep 2019 12:48:31 -0400 To: Kevin Vasko Cc: linux-nfs@vger.kernel.org Subject: Re: NFSv4 client locks up on larger writes with Kerberos enabled Message-ID: <20190925164831.GA9366@fieldses.org> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) From: bfields@fieldses.org (J. Bruce Fields) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Wed, Sep 18, 2019 at 06:36:13PM -0500, Kevin Vasko wrote: > We have a new Dell EMC Unity 300 acting as NAS Server that is > presenting a NFSv4 NFS Share. Our clients are mostly Ubuntu 18.04.3 > but issue is also present on CentOS 7.6 systems. We have been > struggling with this issue for over a week now and not sure how to > resolve it. > > > > We are having trouble with NFS Clients completing their writes to the > Dell EMC Unity 300 NFS Server when Kerberos is enabled on the NFS > Share. I created the NFS Share on the U300, associated it with our > FreeIPA (Kerberos/LDAP server) and everything shows successful. Troubleshooting ideas off the top of my head: It might be worth trying some other client versions if it's not hard. It'd be interesting to know what's happening on the network.... Unfortunately big krb5p writes won't be fun to try to capture and examine. Maybe some network or rpc-level statistics would help show if there are an unusual number of retries or failures. --b.