Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp256865pxx; Mon, 26 Oct 2020 07:58:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy2y1na8nMYndVV17Tbk57hID0o0bTIHOFpdpQElgq768046XaYvvuqr+lUbRiU+pVWOO57 X-Received: by 2002:a05:6402:1c04:: with SMTP id ck4mr16369806edb.274.1603724310528; Mon, 26 Oct 2020 07:58:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603724310; cv=none; d=google.com; s=arc-20160816; b=fTyprwWaHK4RFuqqV2JG/cvwv41Egm+v5z+f/Hhk7h70De4u8pOy6rskaKQdzVWeLP R1L6/5sxRahIcV+sxJJ2HVtwpZ1hTLfXeUSjM2X0GP+JFxkxvovFdkD8A9b0Zj1DN2ZQ QYMDNwZEeDVNHD7H8fCpxlT7N/fsF4YEMJbqhba9QlpGaa7W4hW6ss89fPJJzHcVSIY+ mC91rfb2dzzJMGyrOBSSaHRDNavEeW0oc8o7Hlb5Jb5Vr/v7k+IhumfFAg8hiTBOhkDg XpEw6HTbm5BqS3wJ3QR9o5BuyxC7OHjUcQXDzg7xMHXrG+uMjo96e3HHEEaYnenykZO1 RQ0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=38UodOOkD2o5csrEG6X190Is4klL3khz5B3PmOaFvow=; b=PAL/awCkQrK00aVGOQETw2/xAyir0X7LCC4xsOnnU5D3HbdLt7FjsdWfsxRqkL0tlE kBRMmAcMJeq5PNhFyThVKYQehcfI7MTbstdlgcVB8S9UGpEScRkfrxUz1ReMhzwLUbH0 wb/6Q0sytCjMJQXgpOVUQToked7ClAwb+t9NJnWyZRFj8y/RKQ+zsuZ9S9wHxyGisANw rsgOpgTUclrxAzB1/Y2qSqhzugnEfMN/0jErfNmJnZcUTwFZmUrfasKrk0jROqEGap4M iTL+2k8itkL5kd8usxE3IzznqZtCUBTQMPnSeUBLzM7eTUrnClfDWZOOOoYWN1y9F7pm E8zg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=udima.es Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c23si7175113eja.144.2020.10.26.07.58.06; Mon, 26 Oct 2020 07:58:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=udima.es Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1782175AbgJZO4k (ORCPT + 99 others); Mon, 26 Oct 2020 10:56:40 -0400 Received: from etc.inittab.org ([51.254.149.154]:45474 "EHLO etc.inittab.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1782332AbgJZOyo (ORCPT ); Mon, 26 Oct 2020 10:54:44 -0400 Received: from var.inittab.org (249.171.116.91.static.reverse-mundo-r.com [91.116.171.249]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) (Authenticated sender: smtp_auth_agi@correo-e.org) by etc.inittab.org (Postfix) with ESMTPSA id C453EA10BA; Mon, 26 Oct 2020 15:54:42 +0100 (CET) Received: by var.inittab.org (Postfix, from userid 1000) id F2F65404E9; Mon, 26 Oct 2020 15:54:41 +0100 (CET) Date: Mon, 26 Oct 2020 15:54:41 +0100 From: Alberto Gonzalez Iniesta To: Chuck Lever Cc: Bruce Fields , Linux NFS Mailing List , Miguel Rodriguez , Isaac Marco Blancas Subject: Re: Random IO errors on nfs clients running linux > 4.20 Message-ID: <20201026145441.GO74269@var.inittab.org> References: <20200429171527.GG2531021@var.inittab.org> <20200430173200.GE29491@fieldses.org> <20200909092900.GO189595@var.inittab.org> <20200909134727.GA3894@fieldses.org> <20201026134216.GK74269@var.inittab.org> <40FDCE82-5895-4184-BAB3-AC221326EB34@oracle.com> <20201026144358.GM74269@var.inittab.org> <8A4C335B-446F-4385-BA7C-643911FF9498@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <8A4C335B-446F-4385-BA7C-643911FF9498@oracle.com> Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Mon, Oct 26, 2020 at 10:46:05AM -0400, Chuck Lever wrote: > > > > On Oct 26, 2020, at 10:43 AM, Alberto Gonzalez Iniesta wrote: > > > > On Mon, Oct 26, 2020 at 09:58:17AM -0400, Chuck Lever wrote: > >>>> So all I notice from this one is the readdir EIO came from call_decode. > >>>> I suspect that means it failed in the xdr decoding. Looks like xdr > >>>> decoding of the actual directory data (which is the complicated part) is > >>>> done later, so this means it failed decoding the header or verifier, > >>>> which is a little odd: > >>>> > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016276] RPC: 3284 call_decode result -5 > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016281] nfs41_sequence_process: Error 1 free the slot > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016286] RPC: wake_up_first(00000000d3f50f4d "ForeChannel Slot table") > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016288] nfs4_free_slot: slotid 0 highest_used_slotid 4294967295 > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016290] RPC: 3284 return 0, status -5 > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016291] RPC: 3284 release task > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016295] RPC: freeing buffer of size 4144 at 00000000a3649daf > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016298] RPC: 3284 release request 0000000079df89b2 > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016300] RPC: wake_up_first(00000000c5ee49ee "xprt_backlog") > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016302] RPC: rpc_release_client(00000000b930c343) > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016304] RPC: 3284 freeing task > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016309] _nfs4_proc_readdir: returns -5 > >>>>> Sep 8 16:03:23 portatil264 kernel: [15033.016318] NFS: readdir(departamentos/innovacion) returns -5 > >>> > >>> Hi, Bruce et al. > >>> > >>> Is there anything we can do to help debugging/fixing this? It's still > >>> biting our users with a +4.20.x kernel. > >> > >> Alberto, can you share a snippet of a raw network capture that shows > >> the READDIR Reply that fails to decode? > > > > Hi, Chuck. > > > > Thanks for your reply. We're using "sec=krb5p", which makes the network > > capture useless :-( > > You can plug keytabs into Wireshark to enable it to decrypt the traffic. > Cool, I'll look into that then. Thanks! -- Alberto Gonz?lez Iniesta | Universidad a Distancia alberto.gonzalez@udima.es | de Madrid