Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9D370C433EF for ; Tue, 30 Nov 2021 15:32:16 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234785AbhK3Pfe (ORCPT ); Tue, 30 Nov 2021 10:35:34 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42504 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234669AbhK3Pfd (ORCPT ); Tue, 30 Nov 2021 10:35:33 -0500 Received: from fieldses.org (fieldses.org [IPv6:2600:3c00:e000:2f7::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1F8B8C061574; Tue, 30 Nov 2021 07:32:12 -0800 (PST) Received: by fieldses.org (Postfix, from userid 2815) id E0E70A99; Tue, 30 Nov 2021 10:32:11 -0500 (EST) DKIM-Filter: OpenDKIM Filter v2.11.0 fieldses.org E0E70A99 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fieldses.org; s=default; t=1638286331; bh=qqABRgVwut/6j2ygnX0Ggz9doH/B2bLsnWU7YYW1h6Y=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=IgNLGS5Fw5qXpRl69BjETxRHp8DiPxHcWqns+ob44XNqqwW4g81k+htt++H248xqW +SzwLeBOHiiOe3Wgaeop46R2vqGpqjCzkFTh2WuxSMneiLyeWMDWyJzeatyLNI4JhQ agQeFcZx2nLyy3RyuKK93s1hupSA46GnlDubtQWs= Date: Tue, 30 Nov 2021 10:32:11 -0500 From: Bruce Fields To: dai.ngo@oracle.com Cc: Chuck Lever III , Linux NFS Mailing List , "linux-fsdevel@vger.kernel.org" Subject: Re: [PATCH RFC v5 0/2] nfsd: Initial implementation of NFSv4 Courteous Server Message-ID: <20211130153211.GB8837@fieldses.org> References: <20211129173058.GD24258@fieldses.org> <1285F7E2-5D5F-4971-9195-BA664CAFF65F@oracle.com> <22000fe0-9b17-3d88-1730-c8704417cb92@oracle.com> <6f5a060d-17f6-ee46-6546-1217ac5dfa9c@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <6f5a060d-17f6-ee46-6546-1217ac5dfa9c@oracle.com> User-Agent: Mutt/1.5.21 (2010-09-15) Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Mon, Nov 29, 2021 at 11:13:34PM -0800, dai.ngo@oracle.com wrote: > Just to be clear, the problem of pynfs with 4.0 is that the server takes > ~55 secs to expire 1026 4.0 courteous clients, which comes out to ~50ms > per client. This causes the test to time out in waiting for RPC reply of > the OPEN that triggers the conflicts. > > I don't know exactly where the time spent in the process of expiring a > client. But as Bruce mentioned, it could be related to the time to access > /var/lib/nfs to remove the client's persistent record. Could you try something like strace -r -$(pidof) -oTRACE and maybe we could take a look at TRACE? My hope would be that there'd be a clear set of syscalls whose time, multiplied by 1026, explains most of that 55 seconds. Then it might be worth checking whether there are any easy optimizations possible. --b.