Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1589754pxb; Tue, 8 Feb 2022 23:19:41 -0800 (PST) X-Google-Smtp-Source: ABdhPJzGsHdKXqMnE+GgYfIIb8jn+w/Dzfa5ODB1JntZ8DTElDOqJd2XTfpBDUceNl0Ote0GDJ3P X-Received: by 2002:a17:90a:2f01:: with SMTP id s1mr1974190pjd.8.1644391181243; Tue, 08 Feb 2022 23:19:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644391181; cv=none; d=google.com; s=arc-20160816; b=sPI6dDUg05jCiZseOTtq1OlvOhR0uXm64u8qUQyTAGxauK+9sBKDxOfnU0+dGyMawa NXAFakrJIVYPOH6v98cALeK5Dqu2MYpfP5KmpEqBNiphiKL2WIfwra4MwnUTJNTRIw1b /w57+TCGkXyjpey6wI2AnP5kYbqTQ1zujKp9a8GFiI/3LLJyCqm1C3Rq4FHcq46vzOap 5Et78zHaDSDMPTfRf1PwolIIlO3JYjvKgaP+Avp+I1DPnmY8bFlaBS1+QOa1sJFme45r AHvjlXxvHwkmPRQIkoOsvCDQoNosqzn/aZnJHrDKVStKFUlErsFa/SIi5NGkrH3EORDe gAJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=xG2PTqPQIy4xTSQWDcoSwjnaM4ib/qNpiBdxqfrXLqg=; b=SUxLhsCGjKj6nBo7tvZwm7rUBY0MliANs3IOxEht67PKXExltJohoLn+xNZV+xiTlO wT5mgw6F8VuF3io3OJa90/XeV4ohjvMZCuVRxq1CI1f0R+2xxaJWW2Dvm8GJwOtKzJCo u6yieZauAgIxdNlDfIemeAec9UzwnzEccC+cCz8vnrXJWZYOazYBNG6eTNK5eqVNLRoI UvT+wfHKzNxjlzUgSfO3d8wVJXDbZIBlPuzvO7ZWD0mfc3xTCDRxdKzgyPaRslS/aDPD Jvx1Gz10o/Cre0T8Sn4kYfU6Eqx8LbJsB98VrjFBeqkU1tBcsfMk5961iwes98VMGKWN ovGw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@dneg.com header.s=google header.b=Hv+yz2rA; spf=softfail (google.com: domain of transitioning linux-nfs-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=dneg.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id s14si15124282pgr.704.2022.02.08.23.19.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 08 Feb 2022 23:19:41 -0800 (PST) Received-SPF: softfail (google.com: domain of transitioning linux-nfs-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@dneg.com header.s=google header.b=Hv+yz2rA; spf=softfail (google.com: domain of transitioning linux-nfs-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=dneg.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5F04FE065947; Tue, 8 Feb 2022 22:34:07 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229744AbiBGPeK (ORCPT + 99 others); Mon, 7 Feb 2022 10:34:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43804 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237887AbiBGPWU (ORCPT ); Mon, 7 Feb 2022 10:22:20 -0500 Received: from mail-ed1-x52e.google.com (mail-ed1-x52e.google.com [IPv6:2a00:1450:4864:20::52e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4B9BAC0401C1 for ; Mon, 7 Feb 2022 07:22:19 -0800 (PST) Received: by mail-ed1-x52e.google.com with SMTP id u18so30481774edt.6 for ; Mon, 07 Feb 2022 07:22:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dneg.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=xG2PTqPQIy4xTSQWDcoSwjnaM4ib/qNpiBdxqfrXLqg=; b=Hv+yz2rAxKtkqAj9+u+PcpBNokTp9G6v/qNQvdnOe206TtHMpCV1g11s+RXa9X+dXH HFCByqJNwy9gb+oiCPyWX59ssBvIi0zk9tqMa4Yytt0nLYlHOQPAspaLV4l+dC1An1am ohyZW9QkJaFucKvdpLShxEGPrDPowlxM1NTAtfGqkLO/1FGMxo7d9nLCHAplriFxDDhy M2CLTYMRhEDo0DXQBV82CWizjiSy+YKYXyT/nORSQS4M8sSC9geydvDsxirqiM6+19s+ 75DcK7VIYo/qtpCuxxnHn2LAhwMo1JMeOklvYEMHTgPj+6Rm+qnqdXuC3Nd+SdRx9OOS yJNg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=xG2PTqPQIy4xTSQWDcoSwjnaM4ib/qNpiBdxqfrXLqg=; b=x20A4XhB0uOgcm8HsdrXSPI+7Tn+W6rBY1flDSANq0A2SabXr4caxKJv9VcOtFN8RE wu7I6n0y5yV+Lm9XTJT8oZg9uH5C2iuwcAnniksFYu8q/ikTj3xWwp3J+Xz0q3sdmcf9 ReGj1EXVmb2WNCstj/C2oUGVopLSQ+7WfyXaMLlTL87h3Xx6QGs8j5lz46pB4lE8MOw0 VcGzLmj95rr1ylATSF7SPO48pG9FX7BooFRY3npBmYkiUZo0JXSuSoUkpeFqs6fqQz+k 5Dnbz3LH/JZgGq/BlknNuMgM/2VWNSn2n+N0y/K8MMAzPjzLHUix13MZVMasLorhwOfs 2qMw== X-Gm-Message-State: AOAM530BMsF1Hvlbr41M9v6z5dc9s9nAGYPlIOcwyMeI+YTbjV+ZuLQw FJUZ9y1/1UZGrnVZ8knNLHBOSRv+easgqCMXzAUGJqHgIChWMbeU X-Received: by 2002:a05:6402:3594:: with SMTP id y20mr15073616edc.386.1644247337859; Mon, 07 Feb 2022 07:22:17 -0800 (PST) MIME-Version: 1.0 References: <20220107171755.GD26961@fieldses.org> <20220110145210.GA18213@fieldses.org> <20220110172106.GC18213@fieldses.org> <20220123224238.GA9255@fieldses.org> In-Reply-To: From: Daire Byrne Date: Mon, 7 Feb 2022 15:21:41 +0000 Message-ID: Subject: Re: nconnect & repeating BIND_CONN_TO_SESSION? To: "J. Bruce Fields" Cc: linux-nfs Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-7.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI,SPF_HELO_PASS,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Trond kindly posted a patch to fix the noresvport mount issue with v4.2 and recent kernels. I tested it quickly and verified ports greater than 1024 were being used as expected, but it seems the same issue persists. It still feels like it's related to the total number of server + nconnect pairings. So I can have 20 servers mounted with nconnect=4 or 10 servers mounted with nconnect=8 but any combination that increases the total connection on the client past that and at least one of the servers ends up in a state such that it's just sending a bind_conn_to_session with every operation. I'll see if I can discern anything from any packet capture (as suggested earlier by Rick), but it's hard to reproduce exactly in time and on demand. My theory is that maybe there is a timeout on the callback and that adding more connections is just adding more load/throughput and making a timeout more likely. My workaround atm is to simply use NFSv3 instead of NFSv4 which might be a better choice for this kind of workload anyway. Daire On Mon, 24 Jan 2022 at 12:33, Daire Byrne wrote: > > On Sun, 23 Jan 2022 at 22:42, J. Bruce Fields wrote: > > > I suspect it's just more recent kernels that has lost the ability to > > > use v4+noresvport > > > > Yes, thanks for checking that. Let us know if you narrow down the > > kernel any more. > > https://bugzilla.kernel.org/show_bug.cgi?id=215526 > > I think it stopped working somewhere between v5.11 and v5.12. I'll try > and bisect it this week. > > Daire