Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp3791144pxb; Mon, 21 Feb 2022 05:54:24 -0800 (PST) X-Google-Smtp-Source: ABdhPJxakvV63XdYW10kb8kPq4mw0kOtiUw2aSfuEYAvnriHu9pHQWfe71CjWu+xtk+LVvuV2ODD X-Received: by 2002:a17:90a:4891:b0:1b9:81c:8774 with SMTP id b17-20020a17090a489100b001b9081c8774mr21666970pjh.8.1645451663895; Mon, 21 Feb 2022 05:54:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1645451663; cv=none; d=google.com; s=arc-20160816; b=xUpmeNsIGBl0v+92nWTRFGKo227ZNPoTuw3cR4lNkfFDg0lpLubOWjGf+tvzwEYNwb o72IXYisRoa9gpoQZ9vPSuVMDVUyrHWQi59Kkq+aG+z6oByeRDSzOSVAPb4ZdCgaQau/ 1hb1OrpUlQ3aAP+O8rVfBsv/JKBtIIfFHko4dqHGeDlM7ZeluvAmTJeLY4Vmh4hYkJs8 eKf6ye5GTVOmAMx9u0l1Bbg2wv/IPOzadQPLqQP3tuyddWvWbaIERL9Fee2uhRfvlq4b UGyL8lLdMvdacPW9NhM8hcNKOjYanR55lcvAH+NbBIboDy9BJYrXst8Oe7I1swBB9++Y N4Ag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:subject :from:references:cc:to:content-language:user-agent:mime-version:date :message-id; bh=g6LsXhPe7bU4EobjM49wj3cf94Z7vCXDzLA7sDZsq4A=; b=NyFzG3CYxO0YAqWVAuftiI6/Ou/OBozkbwFOvsjku2gz+lrWTk9Hr8j45PAyvTefRa mAJ/5WD93PMxWXlmNKOI4FA5ESIFG543cxhi9kqP8LfxIgLAwGd88RHWboO3J5V5A2or sQGd82b0DNMxIZwY5w2BHejVg0tMqL2NOFHn3lgrpoXmQXJ8h+A94lgLUfQdmi4pCxTG EWW6Hweo2g6Io1Nw37+TV6DLxc1wG7etgCStlTlaCc67o6I9YtAT8IDfWQrLfpqvpdLi Rl1pdmc+BSVN2U4hn2NH7SCjG11bJzMjWiXqyFnKjsZDqmC+e8aj+2Cw3UjRn+h4z6/z s/XQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c17si9238346pfr.17.2022.02.21.05.53.56; Mon, 21 Feb 2022 05:54:23 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1352437AbiBUKIV (ORCPT + 99 others); Mon, 21 Feb 2022 05:08:21 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:55082 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1353878AbiBUKHD (ORCPT ); Mon, 21 Feb 2022 05:07:03 -0500 Received: from cc-smtpout1.netcologne.de (cc-smtpout1.netcologne.de [89.1.8.211]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CEA6154193 for ; Mon, 21 Feb 2022 01:31:50 -0800 (PST) Received: from cc-smtpin2.netcologne.de (cc-smtpin2.netcologne.de [89.1.8.202]) by cc-smtpout1.netcologne.de (Postfix) with ESMTP id F24D812895; Mon, 21 Feb 2022 10:31:48 +0100 (CET) Received: from nas2.garloff.de (xdsl-213-168-119-130.nc.de [213.168.119.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by cc-smtpin2.netcologne.de (Postfix) with ESMTPSA id 8698711F14; Mon, 21 Feb 2022 10:31:45 +0100 (CET) Received: from [192.168.155.203] (unknown [192.168.155.10]) by nas2.garloff.de (Postfix) with ESMTPSA id 5AB44B3B0027; Mon, 21 Feb 2022 10:31:36 +0100 (CET) Message-ID: Date: Mon, 21 Feb 2022 10:31:43 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Content-Language: en-US To: "Kornievskaia, Olga" Cc: "linux-nfs@vger.kernel.org" , "Schumaker, Anna" , Trond Myklebust References: <50bd4b4d-3730-4048-fcce-6c79dfe70acf@garloff.de> <8957291b-ecd1-931e-5d0c-7ef20c401e5d@garloff.de> From: Kurt Garloff Subject: Re: 6f283634 / 1976b2b3 breaks NFS (QNAP/Linux kNFSD) In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-NetCologne-Spam: L X-Rspamd-Queue-Id: 8698711F14 X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Hi Olga, On 21.02.22 02:19, Kornievskaia, Olga wrote: > On 2/20/22, 6:17 PM, "Kurt Garloff" wrote: > > Hi Olga, > > two updates: > > On 20.02.22 23:26, Kurt Garloff wrote: > > Hi Olga, > > > > your upstream commit 1976b2b3, applied to 5.15.24 as 6f283634 breaks NFS > > for me. > > > > This is while mounting many NFS filesystems from two NFS servers, one > > Qnap (nfs v4.1) and one linux 5.15.16 knfsd (nfs v4.2). > I have to correct myself. All volumes broken by 5.15.24 come from Qnap. > > The NFS mounts just would not succeed. This appears to happen to all > > Qnap mounts and one of the mounts from the linux knfsd. > This mount also cam from Qnap -- in my mind I had migrated it already, > but not in reality :-O > > I did some bisecting in 5.15.24 ... reverting 6f283634 and subsequent > > NFS/sunRPC patches from you and Xiyu, Anna did the trick to recover from > > this failure. > > To be precise: I reverted 4403233b 4b22aa42 5ca123c9 c5ae18fa be67be6a > > 6f283634 2df6a47a 0c5d3bfb 3cb5b317 58967a23 bbf647ec and 38ae9387 in > > 5.15.24. I started reenabling and 2df6aa647a is the last patch that > > still results a working NFS for me. > > Also, taking plain 5.15.24 and just reverting 6f283634 creates a > kernel that works well with Qnap NFS shares. > > Is it possible for you to provide a network trace? Yes. Is tcpdump what you'd like to see? wireshark's dumpcap? Any NFS specific tracing tools I should be using? One trace with a working kernel and one with the broken one? Best, -- Kurt Garloff Cologne, Germany