Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp429574pxa; Tue, 4 Aug 2020 08:52:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxTNxVkmOnZehzo71tpaKkBKeF7MQFXMFmTBtANq75TWn9ZWaz7MDS8cTBiOLfWk7xQ0LwC X-Received: by 2002:a17:906:24d0:: with SMTP id f16mr21532328ejb.325.1596556330175; Tue, 04 Aug 2020 08:52:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596556330; cv=none; d=google.com; s=arc-20160816; b=QC8nfGfR05COf3mkTfYdVDC7rpDLv6ytJmnwyVF8fEGU7bAXeSZfjhlYixNuWPZ81b p+ZPhU80tgIfBswaGs5UaghWCqFvTe9fFz0F5SuoZ2oGGx3k0S30zOJB/FdU+h1d6LJx XXvpSZ5XaZQPygqQyi6+pfU9uVPT0Xx5Q6u50YCV/94+asLn4sI0sLAn/3av0NsVEkjz uO+Ag8zmKLyWFuY6rqF8i+UBOnf/qANomADvFbTt0rHfR6I8pEcAhRhk7OWioakd+M0Z oSEut47sMm+CZ+L6dKo7HJPIEAI/xeG2DNesILpJVoIBY/SiDMxegefQJLqygYUPjYVT M9hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=jHDS9bf7RFpMb+GwfTaX1m92VFIXjyeZVooEY3/b60s=; b=WPNrFseJTtOf8cfRZXXJKp9gPIJVqRLjypyTywqqnyYs/JIWeJesroM0hkrA97gojM nhgliooa3UZmuBtG4UqKF1PsGfclE4GIQ2VchVivZ37hsqC0ee0uqnpGITbALEdT8FmU cm3qCWmqRoTvGtfTI063s0o0nC1ficNriaG4Q+KfQLomc6piiwR/7JoEf2YOh4n1kgYU vxZEVR1gk69WqBgq4g2KuGux/rRQA79bpGwRq/Yyt590/s4dYv47m5sVgErY3gg9VZBW OOC4PyKuGcTLWsunWBSFONQwGmp7S63sHVlLeMwXbppfAh1DyH4STDiIzt6fkYvQsQQI wUqQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=rothenpieler.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c34si8555338edd.267.2020.08.04.08.51.47; Tue, 04 Aug 2020 08:52:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=rothenpieler.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728371AbgHDPuu (ORCPT + 99 others); Tue, 4 Aug 2020 11:50:50 -0400 Received: from btbn.de ([5.9.118.179]:37822 "EHLO btbn.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725924AbgHDPuq (ORCPT ); Tue, 4 Aug 2020 11:50:46 -0400 Received: from [IPv6:2001:16b8:64d7:4500:fc3b:cfd2:151e:7636] (200116b864d74500fc3bcfd2151e7636.dip.versatel-1u1.de [IPv6:2001:16b8:64d7:4500:fc3b:cfd2:151e:7636]) by btbn.de (Postfix) with ESMTPSA id A18424EC20; Tue, 4 Aug 2020 17:50:44 +0200 (CEST) Subject: Re: NFS over RDMA issues on Linux 5.4 To: Chuck Lever Cc: Leon Romanovsky , Linux NFS Mailing List , linux-rdma References: <8a1087d3-9add-dfe1-da0c-edab74fcca51@rothenpieler.org> <20200804093635.GA4432@unreal> <92a5a932-b843-eed3-555e-7557ccc1f308@rothenpieler.org> <20200804122557.GB4432@unreal> <20200804134642.GC4432@unreal> <45BA86D8-52A3-407E-83BE-27343C0182C5@oracle.com> <7c7418cb-7f7a-5de3-2025-7bde5cd5ac2a@rothenpieler.org> <4751E7F5-AAB1-4602-B926-9BB08E1D213D@oracle.com> From: Timo Rothenpieler Message-ID: <074fb120-1807-3d83-f34e-400e05cbce27@rothenpieler.org> Date: Tue, 4 Aug 2020 17:50:44 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.11.0 MIME-Version: 1.0 In-Reply-To: <4751E7F5-AAB1-4602-B926-9BB08E1D213D@oracle.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On 04.08.2020 17:46, Chuck Lever wrote: > > >> On Aug 4, 2020, at 11:39 AM, Timo Rothenpieler wrote: >> >> On 04.08.2020 17:34, Chuck Lever wrote: >>> I see a LOC_LEN_ERR on a Receive. Leon, doesn't that mean the server's >>> Send was too large? >>> Timo, what filesystem are you sharing on your NFS server? The thing that >>> comes to mind is https://bugzilla.kernel.org/show_bug.cgi?id=198053 >> >> The filesystem on the server is indeed a zfs-on-linux (version 0.8.4), just as in that bug report. >> >> Should I try to apply the proposed fix you posted on that bug report on the client (and server?). > > If you are hitting that bug, the server is the problem. The client > should work fine once the server is fixed. (I'm not happy about > the client's looping behavior either, but that will go away once > the server behaves). > > I'm not hopeful that the fix applies cleanly to v4.19, but it > might. Another option would be upgrading your NFS server. It's running on 5.4.54 and the patch applies with no fuzz whatsoever: > patching file fs/nfsd/nfs4xdr.c > Hunk #1 succeeded at 3530 (offset 9 lines). > Hunk #2 succeeded at 3556 (offset 9 lines). > patching file include/linux/sunrpc/svc.h > patching file include/linux/sunrpc/svc_rdma.h > Hunk #2 succeeded at 172 (offset 1 line). > Hunk #3 succeeded at 192 (offset 1 line). > patching file include/linux/sunrpc/svc_xprt.h > patching file net/sunrpc/svc.c > Hunk #1 succeeded at 1635 (offset -2 lines). > patching file net/sunrpc/svcsock.c > Hunk #2 succeeded at 660 (offset 2 lines). > Hunk #3 succeeded at 1181 (offset 4 lines). > patching file net/sunrpc/xprtrdma/svc_rdma_recvfrom.c > Hunk #1 succeeded at 193 (offset 2 lines). > patching file net/sunrpc/xprtrdma/svc_rdma_rw.c > Hunk #1 succeeded at 481 (offset -3 lines). > Hunk #2 succeeded at 500 (offset -3 lines). > Hunk #3 succeeded at 510 (offset -3 lines). > Hunk #4 succeeded at 524 (offset -3 lines). > Hunk #5 succeeded at 538 (offset -3 lines). > Hunk #6 succeeded at 578 (offset -3 lines). > patching file net/sunrpc/xprtrdma/svc_rdma_sendto.c > Hunk #1 succeeded at 856 (offset -15 lines). > Hunk #2 succeeded at 891 with fuzz 2 (offset -22 lines). > patching file net/sunrpc/xprtrdma/svc_rdma_transport.c > Hunk #1 succeeded at 81 (offset -1 lines). I will deploy the patch to both server and client and report back.