Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp891270pxt; Fri, 6 Aug 2021 17:09:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzAd6QhpKE8vnjUaAZhfasp+aZeq90ZZGwvzW/i1MyTuhIlRhw+2b8FhsEBW/0tjkZVJmaM X-Received: by 2002:a6b:7311:: with SMTP id e17mr348723ioh.127.1628294941452; Fri, 06 Aug 2021 17:09:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628294941; cv=none; d=google.com; s=arc-20160816; b=lIkdHcTo+NVG/saYalOa+N7mznRxeI6MYSnqpMheyEY27Oeo3a68vzLjvsgJ0BRsLX xUgtulT8x/ppM3wS3bdaEuZC3+t1EGUAVhvB7u68aO54B5gJdwllTL/x/L8LHacMay5C Rn2u/DROCxlbz8rSUgeiFa7uYBIh9TKbR98PZThu2PG+3nPWyskeQ5iuf4IF9A+tLjY9 yhZayVIC3QPQfhDb6jiPnl+uOG+wnLNA3/lASPns8yMaZUZL2YbeNGwvjQqffavA648i ThClRVVmS5a7/VoYn9pzzSo2Z/TClTzYAU1ug7YeVMeYBGPDIvYywZSSvrfqP/XhGo/g H8UA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=IJDq2ID9kCT3+YUR399sOMxSIhNNDGZE4HwI3Oa4c7U=; b=L04xMVkmZso4q1sl7Xa7eIpXzbNLsNdQxrYGBx1EwdGSfEoF+RkfksbepFmINmtqgL 9JJScZ/PnyWNM4JHcw37Su5TCZnsg5SRJEH7z+DBd2n0BtvBwXDLA5l8I8TOShVuDX3j auqyD+Pkd72Zr1oLSlyaqJW4hoMe/LWMu3F/mpkGjX/2oU5xbUBbQMIMNKw8E+F1LLpV Hh7/7k6X/z9TRgtC9EhKZH0kCy+br46C6J4uiLIE7gofQgbn3VxVgm03aAlgIAPyuRnm WHsSzjGZ+ZfzzCoAs2GOzti2zczhSjfzpeiYcj8UdItgf3QeO6QCjjpQjcTUg8BZlxJ7 9rsA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@umich.edu header.s=google-2016-06-03 header.b=VyuVkm1J; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=umich.edu Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c126si3556033iof.49.2021.08.06.17.08.49; Fri, 06 Aug 2021 17:09:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@umich.edu header.s=google-2016-06-03 header.b=VyuVkm1J; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=umich.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244135AbhHFTxs (ORCPT + 99 others); Fri, 6 Aug 2021 15:53:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46668 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232086AbhHFTxr (ORCPT ); Fri, 6 Aug 2021 15:53:47 -0400 Received: from mail-ej1-x636.google.com (mail-ej1-x636.google.com [IPv6:2a00:1450:4864:20::636]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8CF85C0613CF for ; Fri, 6 Aug 2021 12:53:31 -0700 (PDT) Received: by mail-ej1-x636.google.com with SMTP id hs10so16952821ejc.0 for ; Fri, 06 Aug 2021 12:53:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umich.edu; s=google-2016-06-03; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=IJDq2ID9kCT3+YUR399sOMxSIhNNDGZE4HwI3Oa4c7U=; b=VyuVkm1JxRxFBjbte2PamVHal/Y31Ntl1DUTFZ7WFYD8/XVjSjL3TRreFxe9T732hM 9FBppZWISSHlrQppVlWSg6jgDP/tT5Rodd1IqDknzwiZxm2GreVtUiQ9vEFGDvTTgwxw CH2zb+FV6kdOI9kP/hI50rzx7s61WOUyb1e6R97BKRQ62xp2FqTbSRtcmfeqyjue8M0Z Lmsv1ffigQwzaqArpZAL1xjQRNkCarceOARpWJXwOC+R1Z76tNhdYUPsloHSYma5SmmI s/aZvPJmP9MimX+8CXJUzA4pndlA+vX7Mho11uQ3uNay//6J9VAo6xR0+ZyPIVPHf5yx z1cg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=IJDq2ID9kCT3+YUR399sOMxSIhNNDGZE4HwI3Oa4c7U=; b=pJEUO1JPLZXbu8vuidD+tWU6EQVcO7VdouZWnffEy9hkI+X4EU5PvKvVhBLXXPb10G X++VfHtlsb05aWWNtbmdxKOvk2E6XOtJzlICoYXmXYsWY/fT9Ic7qRnYeDAGuxpHi/SD rBvhS9jeiWQ/1bFmstWNXyv6xC0DWC0CPkFWW1xOiWoajCkabN2qgU7XeJI3O6SzJqcK mTbO8Uyl+Kp5SE8lK2tk4bfe09kf/8xqJLrhK/qz4VGadl2P4Te83n4s43vAQ7YHcGFU XsNKuAAhNvoKiEyhlJ/EGCfCRWUtzX4ZfZ7HQX1+X9EaO3H4gawg8ZDlWvVJ+v8GzuBd x79A== X-Gm-Message-State: AOAM532cqxGivOmiVrIwFPulrja9+4+Cg2vVIRVRjgOwTjpi9sn52kIM 0ED2JntGdVUkPpDuJ8+bFyOmByPCBEd5sQvUbWETUAVZLVk= X-Received: by 2002:a17:906:b7d2:: with SMTP id fy18mr11622508ejb.0.1628279610098; Fri, 06 Aug 2021 12:53:30 -0700 (PDT) MIME-Version: 1.0 References: <985631970.48634.1628121620017.JavaMail.zimbra@raptorengineeringinc.com> <1851673341.49012.1628121856011.JavaMail.zimbra@raptorengineeringinc.com> <361337129.54635.1628123839436.JavaMail.zimbra@raptorengineeringinc.com> In-Reply-To: <361337129.54635.1628123839436.JavaMail.zimbra@raptorengineeringinc.com> From: Olga Kornievskaia Date: Fri, 6 Aug 2021 15:53:19 -0400 Message-ID: Subject: Re: Callback slot table overflowed To: Timothy Pearson Cc: linux-nfs Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Thu, Aug 5, 2021 at 12:15 AM Timothy Pearson wrote: > > On further investigation, the working server had already been rolled back to 4.19.0. Apparently the issue was insurmountable in 5.x. > > It should be simple enough to set up a test environment out of production for 5.x, if you have any debug tips / would like to see any debug options compiled in. > > Thanks! > > ----- Original Message ----- > > From: "Timothy Pearson" > > To: "linux-nfs" > > Sent: Wednesday, August 4, 2021 7:04:16 PM > > Subject: Re: Callback slot table overflowed > > > Other information that may be helpful: > > > > All clients are using TCP > > arm64 clients are unaffected by the bug > > The armel clients use very small (4k) rsize/wsize buffers > > Prior to the upgrade from Debian Stretch, everything was working perfectly > > > > ----- Original Message ----- > >> From: "Timothy Pearson" > >> To: "linux-nfs" > >> Sent: Wednesday, August 4, 2021 7:00:20 PM > >> Subject: Callback slot table overflowed > > > >> All, > >> > >> We've hit an odd issue after upgrading a main NFS server from Debian Stretch to > >> Debian Buster. In both cases the 5.13.4 kernel was used, however after the > >> upgrade none of our ARM thin clients can mount their root filesystems -- early > >> in the boot process I/O errors are returned immediately following "Callback > >> slot table overflowed" in the client dmesg. > >> > >> I am unable to find any useful information on this "Callback slot table > >> overflowed" message, and have no idea why it is only impacting our ARM (armel) > >> clients. Both 4.14 and 5.3 on the client side show the issue, other client > >> kernel versions were not tested. > >> > >> Curiously, increasing the rsize/wsize values to 65536 or higher reduces (but > >> does not eliminate) the number of callback overflow messages. > >> > >> The server is a ppc64el 64k page host, and none of our pcc64el or amd64 thin > >> clients are experiencing any problems. Nothing of interest appears in the > >> server message log. > >> > >> Any troubleshooting hints would be most welcome. A network trace would be useful. 5.3 should have this patch "SUNRPC: Fix up backchannel slot table accounting". I believe "callback slot table overflowed" is hit when the server sent more reqs than client can handle (ie doesn't have a free slot to handle the request). A network trace would show that. However you said this happens when the client is trying to mount and besides cb_null requests I'm not sure what could be happening. > >> > > > Thank you!