Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp1416948pxb; Wed, 6 Apr 2022 18:19:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx09KqR//+aLorLjcbOxubwD0oUlHu9Ibc9LW43LU6zdX8lUIug/1PzBab/9TPR/k693PxJ X-Received: by 2002:a05:6a00:ad0:b0:4f7:a357:6899 with SMTP id c16-20020a056a000ad000b004f7a3576899mr11717175pfl.80.1649294388282; Wed, 06 Apr 2022 18:19:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649294388; cv=none; d=google.com; s=arc-20160816; b=mlhq6DWufCuq2uymxwM4XRhEpkkWFM1NO8Qd3znoYt82p/nXpYQ14H+B5cIxveLtSV 70K7kxChWXbgR5vXenT4DwAdGaQZ3Jf5iKcCqpov83gGqVFdg7QHmyaoVU8zMQZk6Gk8 GZTS7JwG4Ci/YUumohIkr6fhruNns6IxpXf1XWuYhAikCw0yotQ/YXhkTNy9iZ9Uny5m SBm7x7v9PdmYELBUo0Ij/Co7ZI/uLowzRad/ynn5Siuol/lxnzgR7axRBSGe0YZ4BU6m yzzwFqKF3VCnwmoRKsZz00vTDx2exDRXqqRBg6e15iqFJVE+8KGKhsFxw2MN0hrlbl1Y X9fA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=yf4A8fR9fzMG62oW1MFS6lAiezcmVTJnTGtgY1sO/Gs=; b=ZY54kK71+jUPKuDelTf0GNdYkD/aG5L7qmF1Ga/unt86sOT7a+j6kD8dktoF6VGkDQ /ETlRWZrFMGZq9zUNJ7Zx+FEAZ+thW5huVeQdI5oRp6gCQpjoCgBQDsoZNbHotrgitHC p2c2e5vc206g+XNqUAMNhXh2wsKVS0EQOx4kDiQ2q8NoR/tadUASOLatG6yzLRPXcKNb lk42+jU5x7LMPzihR8h6qErQdS7zPGrbJ0CoEnajpcPgw3hDT0TXnnsYRSfEby0CREhj 3ihOFoJHXsqtPMlJVXkjXrc805Zth9FGCgdyu4hBfrkLz/BHATihPX46kcjbiDc5tR/R qmpg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v5-20020a170902e8c500b00153b2d164aasi6314552plg.178.2022.04.06.18.19.32; Wed, 06 Apr 2022 18:19:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229568AbiDGAQy (ORCPT + 99 others); Wed, 6 Apr 2022 20:16:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41408 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229491AbiDGAQx (ORCPT ); Wed, 6 Apr 2022 20:16:53 -0400 Received: from mail105.syd.optusnet.com.au (mail105.syd.optusnet.com.au [211.29.132.249]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 27291129; Wed, 6 Apr 2022 17:14:56 -0700 (PDT) Received: from dread.disaster.area (pa49-186-233-190.pa.vic.optusnet.com.au [49.186.233.190]) by mail105.syd.optusnet.com.au (Postfix) with ESMTPS id EF2C510E56D1; Thu, 7 Apr 2022 10:14:54 +1000 (AEST) Received: from dave by dread.disaster.area with local (Exim 4.92.3) (envelope-from ) id 1ncFnZ-00EeE5-KV; Thu, 07 Apr 2022 10:14:53 +1000 Date: Thu, 7 Apr 2022 10:14:53 +1000 From: Dave Chinner To: "J. Bruce Fields" Cc: Chuck Lever , linux-nfs@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: sporadic hangs on generic/186 Message-ID: <20220407001453.GE1609613@dread.disaster.area> References: <20220406195424.GA1242@fieldses.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220406195424.GA1242@fieldses.org> X-Optus-CM-Score: 0 X-Optus-CM-Analysis: v=2.4 cv=VuxAv86n c=1 sm=1 tr=0 ts=624e2cff a=bHAvQTfMiaNt/bo4vVGwyA==:117 a=bHAvQTfMiaNt/bo4vVGwyA==:17 a=kj9zAlcOel0A:10 a=z0gMJWrwH1QA:10 a=7-415B0cAAAA:8 a=sKvHfXEZqrtYHvUw-VQA:9 a=CjuIK1q_8ugA:10 a=biEYGPWJfzWAr4FL6Ov7:22 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_NONE, SPF_HELO_PASS,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Wed, Apr 06, 2022 at 03:54:24PM -0400, J. Bruce Fields wrote: > In the last couple days I've started getting hangs on xfstests > generic/186 on upstream. I also notice the test completes after 10+ > hours (usually it takes about 5 minutes). Sometimes this is accompanied > by "nfs: RPC call returned error 12" on the client. #define ENOMEM 12 /* Out of memory */ So either the client or the server is running out of memory somewhere? > Test description is: > > # Ensuring that copy on write in buffered mode works when free space > # is heavily fragmented. > # - Create two files > # - Reflink the odd blocks of the first file into a third file. > # - Reflink the even blocks of the second file into the third file. > # - Try to fragment the free space by allocating a huge file and > # punching out every other block. > # - CoW across the halfway mark. > # - Check that the files are now different where we say they're > # different. It's using clone_file_range and hole punch, so I'm assuming that this is nfsv4 client side testing? In which case, the behaviour is going to be largely dependent on the server side implementation of these functions? Does reverting the client or the server to an older kernel resolve the issue? Cheers, Dave. -- Dave Chinner david@fromorbit.com