Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp235173pxt; Wed, 4 Aug 2021 21:15:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyL8J+mBlWu0HPVg8TAQBNJ+3pDMeJFF7ciY+u6DAKWvmf0WpRA4ACSJGAO+hTcAnAGLPCI X-Received: by 2002:a5d:80d1:: with SMTP id h17mr1633589ior.71.1628136947122; Wed, 04 Aug 2021 21:15:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628136947; cv=none; d=google.com; s=arc-20160816; b=qJ/ZY/Bv4y9jwt0iFTPBI/1nwbjcAoDjQ/0q14+ZUmhs92gdiueDkO6cg14iapt0pw oO7OrXSEkbSdqHwbPa7wYWoQzahePQKE2p/C8gKkHgaXEEVj37xtQsRLwUbi65oQPpC/ 8kv1ZY1U1ufNU/Jo6oGW3ae+thR4OHqywQ87s1X2YNTYiYvztQtB+oaqTP18fl9VWEpA 0+MKVsCQ1tSLJpsAWT/Ipm0rZilKPoHl//kwyTn6aSPaohxWrGikvAMqAnHgk2cGcSm5 UPx/APTmAu/JL5pb9AU55leGMPrb2/AIMm0tK3ZS4a+NFkLh5432T9be3UI2U/hTP7us 68Qw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:thread-index:thread-topic :content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:to:from:date:dkim-signature:dkim-filter; bh=rFTMcCQq9VbQc0T/27T13QByavd3E0ghZ+HhXYiz1b4=; b=hKNhAVL3zT0vVXYkx+q/59SyKMafKDKgRrONoeiVzWGvNa9S9SNYVF/+GiTvfXFuM6 C9zXG4C7GvH5dGgwuqx+BWY74FqR6oKk7k6k96nzGPrA2BbCcbusNGyUXtWecvLSlBTl 9GhchmbU1g1t1vUntdnYxm1E/V+aYgqPDFyHVSvssm3HH1PzapNEO3+7je4MmBJouwNv 78RAzHKGs3yMqBet493y6ESbh8Jg5xNoWqlmDn3gzU/4xKhKrZBEMW4q3WCV5xKBtCuU eIhTEmm/ZXFVkAyG4DaPw+lll1x792pQapva4fenAzr2S0Gqjzd3zhKhU+Dsvm3vfxbj yeRw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@raptorengineering.com header.s=B8E824E6-0BE2-11E6-931D-288C65937AAD header.b=skOUg6oo; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=raptorengineering.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x11si2480245ion.51.2021.08.04.21.15.28; Wed, 04 Aug 2021 21:15:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@raptorengineering.com header.s=B8E824E6-0BE2-11E6-931D-288C65937AAD header.b=skOUg6oo; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=raptorengineering.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236345AbhHEAhf (ORCPT + 99 others); Wed, 4 Aug 2021 20:37:35 -0400 Received: from mail.rptsys.com ([23.155.224.45]:56306 "EHLO mail.rptsys.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234461AbhHEAhe (ORCPT ); Wed, 4 Aug 2021 20:37:34 -0400 Received: from localhost (localhost [127.0.0.1]) by mail.rptsys.com (Postfix) with ESMTP id 3206737B2A7E7E for ; Wed, 4 Aug 2021 19:37:21 -0500 (CDT) Received: from mail.rptsys.com ([127.0.0.1]) by localhost (vali.starlink.edu [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id cUZq-OHaIERh for ; Wed, 4 Aug 2021 19:37:20 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by mail.rptsys.com (Postfix) with ESMTP id A5E4E37B2A7E7B for ; Wed, 4 Aug 2021 19:37:20 -0500 (CDT) DKIM-Filter: OpenDKIM Filter v2.10.3 mail.rptsys.com A5E4E37B2A7E7B DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=raptorengineering.com; s=B8E824E6-0BE2-11E6-931D-288C65937AAD; t=1628123840; bh=rFTMcCQq9VbQc0T/27T13QByavd3E0ghZ+HhXYiz1b4=; h=Date:From:To:Message-ID:MIME-Version; b=skOUg6ooFP10WKvFSx+mmDTtktBmv63xYUwuFpYaJQeg8JoCUZBuZ0IAcohDPLs2e LQoN/NVUiGUDQPBQG+zSE1AFAP3VdgtU1WPM4Ty//dDJ7NOhC4IDVd9lE7ez1MHwMB ks+jQqvAsJ3T7FlK32qA1J5KuQhODRcP32nht3rk= X-Virus-Scanned: amavisd-new at rptsys.com Received: from mail.rptsys.com ([127.0.0.1]) by localhost (vali.starlink.edu [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 1r29NYEvDsCS for ; Wed, 4 Aug 2021 19:37:20 -0500 (CDT) Received: from vali.starlink.edu (unknown [192.168.3.2]) by mail.rptsys.com (Postfix) with ESMTP id 82DA937B2A7E78 for ; Wed, 4 Aug 2021 19:37:20 -0500 (CDT) Date: Wed, 4 Aug 2021 19:37:19 -0500 (CDT) From: Timothy Pearson To: linux-nfs Message-ID: <361337129.54635.1628123839436.JavaMail.zimbra@raptorengineeringinc.com> In-Reply-To: <1851673341.49012.1628121856011.JavaMail.zimbra@raptorengineeringinc.com> References: <985631970.48634.1628121620017.JavaMail.zimbra@raptorengineeringinc.com> <1851673341.49012.1628121856011.JavaMail.zimbra@raptorengineeringinc.com> Subject: Re: Callback slot table overflowed MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Mailer: Zimbra 8.5.0_GA_3042 (ZimbraWebClient - GC83 (Linux)/8.5.0_GA_3042) Thread-Topic: Callback slot table overflowed Thread-Index: pWASFVTGcuTitVsqm6vgvEReZrSGHqraViLp7esZBoM= Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On further investigation, the working server had already been rolled back to 4.19.0. Apparently the issue was insurmountable in 5.x. It should be simple enough to set up a test environment out of production for 5.x, if you have any debug tips / would like to see any debug options compiled in. Thanks! ----- Original Message ----- > From: "Timothy Pearson" > To: "linux-nfs" > Sent: Wednesday, August 4, 2021 7:04:16 PM > Subject: Re: Callback slot table overflowed > Other information that may be helpful: > > All clients are using TCP > arm64 clients are unaffected by the bug > The armel clients use very small (4k) rsize/wsize buffers > Prior to the upgrade from Debian Stretch, everything was working perfectly > > ----- Original Message ----- >> From: "Timothy Pearson" >> To: "linux-nfs" >> Sent: Wednesday, August 4, 2021 7:00:20 PM >> Subject: Callback slot table overflowed > >> All, >> >> We've hit an odd issue after upgrading a main NFS server from Debian Stretch to >> Debian Buster. In both cases the 5.13.4 kernel was used, however after the >> upgrade none of our ARM thin clients can mount their root filesystems -- early >> in the boot process I/O errors are returned immediately following "Callback >> slot table overflowed" in the client dmesg. >> >> I am unable to find any useful information on this "Callback slot table >> overflowed" message, and have no idea why it is only impacting our ARM (armel) >> clients. Both 4.14 and 5.3 on the client side show the issue, other client >> kernel versions were not tested. >> >> Curiously, increasing the rsize/wsize values to 65536 or higher reduces (but >> does not eliminate) the number of callback overflow messages. >> >> The server is a ppc64el 64k page host, and none of our pcc64el or amd64 thin >> clients are experiencing any problems. Nothing of interest appears in the >> server message log. >> >> Any troubleshooting hints would be most welcome. >> > > Thank you!