Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp2905493pxb; Mon, 17 Jan 2022 08:02:18 -0800 (PST) X-Google-Smtp-Source: ABdhPJwLOe5mJRhkzsCsMheES2zMZTzDw5JIy9mf4r3wqfXSRjmUMjL5rHSiQZoo1hTCqGWv/UMs X-Received: by 2002:a62:2f07:0:b0:4bc:9f9e:b404 with SMTP id v7-20020a622f07000000b004bc9f9eb404mr21745175pfv.75.1642435338517; Mon, 17 Jan 2022 08:02:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642435338; cv=none; d=google.com; s=arc-20160816; b=02O901Xl/kHV86AfyqMdSZueKL9JW8RWRIFDznK4PCbaV2ynfZxn+/JP5W2OFsJUhx 9Xw++hi/S7d9Zo+gIUcW4Q+5A8wkp7wnmF8mWuf8lA///MhivEBTQqYvdX6JVCX6lbPG 2+k//sVG0V8iJuD1etXD80IjSwd4lB4aoCnFI+rSNZDt/M86gaRnFtmXDC6Uhg4SUHGs YB4XAUbCm//Qo0Jcof0Sn4HNNOSURCTsvsCy5ypCoItwabfFqRkZhzkZ7/9gcbFx4RfX A+I9uHGVBR+NGCoSG8xqpNUMwD21q1MzTapMVa6BGvjaIA5pwEwVr1Zw4imythoRHLox GECA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=Qo6kLv1z9YGG6eFcOb+KorIMwqB01XGw4MDPld+V/5U=; b=hXJoJRijwqxy83stVLddPd/y+PmvJAZyoaJUUyygXhUBNyFr1/fAkeXnO+AxAug7T4 keHs51nySwxS7L5NhYz0UJTbbda474hET/kMNQo3HqQywT80ZvrvwGOQ7ieLwsBHKm9G k9ONvZPl81ShsP8JemYiz/92e3Q/FjwRLdXr5bU8W8bQsEJH9AY4tcpQEFQDOf4R98PX FFxIYoE4/IhYwXIA4gOvcCsa/j1vxm0Q8dIBt8RvZ8LUdwqOPg4qMT51a1DvZvIKX1py LVnbKqGx4GzLR+bXInjRrX+qxoR9k6dFAyG5EDcn0d9gXPP4eJoXOyC/Q099M7t5c4SX B3RA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a8si15225387pgw.663.2022.01.17.08.01.52; Mon, 17 Jan 2022 08:02:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237624AbiAQHo5 (ORCPT + 99 others); Mon, 17 Jan 2022 02:44:57 -0500 Received: from server.atrad.com.au ([150.101.241.2]:35508 "EHLO server.atrad.com.au" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237622AbiAQHo5 (ORCPT ); Mon, 17 Jan 2022 02:44:57 -0500 Received: from marvin.atrad.com.au (IDENT:1008@marvin.atrad.com.au [192.168.0.2]) by server.atrad.com.au (8.17.1/8.17.1) with ESMTPS id 20H7iUcD019965 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Mon, 17 Jan 2022 18:14:32 +1030 Date: Mon, 17 Jan 2022 18:14:30 +1030 From: Jonathan Woithe To: Chuck Lever III Cc: Bruce Fields , Linux NFS Mailing List Subject: Re: [Bug report] Recurring oops, 5.15.x, possibly during or soon after client mount Message-ID: <20220117074430.GA22026@marvin.atrad.com.au> References: <20220114103901.GA22009@marvin.atrad.com.au> <20220115081420.GB8808@marvin.atrad.com.au> <927EED04-840E-4DA6-B2B1-B604A7577B4E@oracle.com> <20220115212336.GB30050@marvin.atrad.com.au> <20220116220627.GA19813@marvin.atrad.com.au> <1E71316C-9EE8-4C71-ADA1-71E2910CA070@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1E71316C-9EE8-4C71-ADA1-71E2910CA070@oracle.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-MIMEDefang-action: accept X-Scanned-By: MIMEDefang 2.86 on 192.168.0.1 Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Hi Chuck On Sun, Jan 16, 2022 at 10:30:43PM +0000, Chuck Lever III wrote: > > On Jan 16, 2022, at 5:06 PM, Jonathan Woithe wrote: > > > > On Sun, Jan 16, 2022 at 07:53:36AM +1030, Jonathan Woithe wrote: > >> On Sat, Jan 15, 2022 at 07:46:06PM +0000, Chuck Lever III wrote: > >>>> On Jan 15, 2022, at 3:14 AM, Jonathan Woithe wrote: > >>>> On Fri, Jan 14, 2022 at 03:18:01PM +0000, Chuck Lever III wrote: > >>>>>> Recently we migrated an NFS server from a 32-bit environment running > >>>>>> kernel 4.14.128 to a 64-bit 5.15.x kernel. The NFS configuration remained > >>>>>> unchanged between the two systems. > >>>>>> > >>>>>> On two separate occasions since the upgrade (5 Jan under 5.15.10, 14 Jan > >>>>>> under 5.15.12) the kernel has oopsed at around the time that an NFS client > >>>>>> machine is turned on for the day. On both occasions the call trace was > >>>>>> essentially identical. The full oops sequence is at the end of this email. > >>>>>> The oops was not observed when running the 4.14.128 kernel. > >>>>>> > >>>>>> Is there anything more I can provide to help track down the cause of the > >>>>>> oops? > >>>>> > >>>>> A possible culprit is 7f024fcd5c97 ("Keep read and write fds with each > >>>>> nlm_file"), which was introduced in or around v5.15. You could try a > >>>>> simple test and back the server down to v5.14.y to see if the problem > >>>>> persists. > > > > FYI I have now put the kernel.org 5.14.21 kernel on the affected system and > > booted it. Since the oops has taken between 1 and 2 weeks to be triggered > > in the past, we may have to wait a few weeks to be certain of an outcome. > > If there's anything else you need from me in the interim please ask. > > If you identify a particular client that triggers the issue, it would be > helpful to know: > > - The client's kernel version > - What was running on the client before it was shut down > - Whether the application and client shut down was clean I have been able to identify the client involved. It was the same client on both occasions. That client is running the 4.4.14 kernel. Unfortunately I have no way to determine what was running on the client when it was shut down. However, the logs to tell me that the client was NOT cleanly shut down prior to both oopses being triggered on the server with the next boot. These are the only times when the client wasn't shut down cleanly; the client WAS shut down cleanly on every other day since 23 December (when the server was moved to the 5.15.x kernel). It is therefore possible that the server oops was triggered only when the client was not shut down cleanly. I will ask the user if they remember anything happening differently on the days of the server oops. My suspicion is that there wasn't anything, and that the power to the bench which supplies the client was turned off accidently before shutting the computer down. We have a new staff member who knows the correct procedure, but maybe they forgot on a couple of occasions. If this is the case the PC is unlikely to have had much running at the time of the shutdown. The xfce4 desktop is perhaps a given. Other possibilities are firefox, thunderbird and libreoffce. With the server running 5.14.21, I did a reset of the client (that is, unclean shutdown) just before I left this evening. The server did not oops when the client was rebooted a minute or so later. I will see if I can repeat the test with 5.15.12 tomorrow morning before others get in if you think that will be helpful in light of the above observations. Regards jonathan