Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp1209845rwb; Fri, 13 Jan 2023 09:12:47 -0800 (PST) X-Google-Smtp-Source: AMrXdXsXoe0sXz4qWV2R0kRCwpUE1s4cfcyxF55Hoxwi3h+fF5XbeFDAp82nFPVYwTmV3i5Vo70t X-Received: by 2002:a17:90b:158e:b0:223:b1e4:146 with SMTP id lc14-20020a17090b158e00b00223b1e40146mr79377570pjb.37.1673629966937; Fri, 13 Jan 2023 09:12:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673629966; cv=none; d=google.com; s=arc-20160816; b=kp4ELLTgpUfrx7REuracaIjoqH40oI50ftO5We4NX5TnpPK/ZmDR8CdilOGN1RTVwg 9ybUDCX6GAz7ksMe6zvf/OhDU0snHwGRsA4ikavWdjLqS9pMv8hiLYkWtb2cX9f6oR2F +qs9calHwRer/fB9HoSgiNRaIcddPssxTrRJ+DaVqFdHEDSXdvqLODp57t1S2D+8IT/3 wLhsjRiN2F0vgZ49FqZIutGK8fIVEJKj2jm6+Y44aZC1EpgKz16nSowFfVSTRN+FQk/E P8b+lYBLvZCO79uBfil6D+QU6t2hOXTCegEU8FBWe/yBoJAB1QrAOdoJANb1u51Htkn1 PPYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:references:in-reply-to:cc:subject:to:from:date; bh=8/546iKLwwq7jUm/hocATAAzsCaIQEewDt8f90NO9eo=; b=etLXcttSCRMTJeR9iN5JvWHEaaRM801eyNx9dQSYXIjzVlXwIMU98ax6JYasYaOuaQ J7EW9v077RObTyiwssTIa0VDvEH3oz6ULjurIizIjXe/SSh5+F73IvFCrfTjvJ4VFVRS yGYF5AyRk10EGgEEd2PCqOBZ2CwY18LbhMR66I5uW/I/+mc76e3y6vlZrEF5kENSrQ/n Xr+ZJQBoFUwJtrs/imkkPxaFudnSbG2rBJJDJGRgopV9N+L2WfpJwPO+RmT1rZ5xmmZB uY3FvOBY1frZ8PlOITTNxdTuK4gI04B1gAM4h71UaYdCQi7FW6F3pd6MnGCSdw7yUflX 5yuA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b13-20020a6541cd000000b004768f1dd47csi20898745pgq.791.2023.01.13.09.12.17; Fri, 13 Jan 2023 09:12:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229469AbjAMRA4 (ORCPT + 99 others); Fri, 13 Jan 2023 12:00:56 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46704 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229613AbjAMRAt (ORCPT ); Fri, 13 Jan 2023 12:00:49 -0500 Received: from out20-50.mail.aliyun.com (out20-50.mail.aliyun.com [115.124.20.50]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F095841A6A for ; Fri, 13 Jan 2023 09:00:39 -0800 (PST) X-Alimail-AntiSpam: AC=CONTINUE;BC=0.05891162|-1;CH=green;DM=|CONTINUE|false|;DS=CONTINUE|ham_regular_dialog|0.0254068-0.000303933-0.974289;FP=0|0|0|0|0|-1|-1|-1;HT=ay29a033018047199;MF=wangyugui@e16-tech.com;NM=1;PH=DS;RN=2;RT=2;SR=0;TI=SMTPD_---.QryFXa5_1673629230; Received: from 192.168.2.112(mailfrom:wangyugui@e16-tech.com fp:SMTPD_---.QryFXa5_1673629230) by smtp.aliyun-inc.com; Sat, 14 Jan 2023 01:00:31 +0800 Date: Sat, 14 Jan 2023 01:00:31 +0800 From: Wang Yugui To: Chuck Lever III Subject: Re: a dead lock of 'umount.nfs4 /nfs/scratch -l' Cc: Linux NFS Mailing List In-Reply-To: <5B9215E4-99FF-4C52-901F-8D909DD165BD@oracle.com> References: <20230112173046.82E4.409509F4@e16-tech.com> <5B9215E4-99FF-4C52-901F-8D909DD165BD@oracle.com> Message-Id: <20230114010030.D461.409509F4@e16-tech.com> MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit X-Mailer: Becky! ver. 2.81.04 [en] X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_MSPIKE_H2, SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Hi, > > On Jan 12, 2023, at 4:30 AM, Wang Yugui wrote: > > > > Hi, > > > >> Hi, > >> > >>> Hi, > >>> > >>> We noticed a dead lock of 'umount.nfs4 /nfs/scratch -l' > >> > >> reproducer: > >> > >> mount /dev/sda1 /mnt/test/ > >> mount /dev/sda2 /mnt/scratch/ > >> systemctl restart nfs-server.service > >> mount.nfs4 127.0.0.1:/mnt/test/ /nfs/test/ > >> mount.nfs4 127.0.0.1:/mnt/scratch/ /nfs/scratch/ > >> systemctl stop nfs-server.service > >> umount -l /nfs/scratch #OK > >> umount -l /nfs/test #dead lock > >> > >> Best Regards > >> Wang Yugui (wangyugui@e16-tech.com) > >> 2023/01/11 > >> > >>> kernel: 6.1.5-rc1 > > > > This problem happen on kernel 6.2.0-rc3+(upstream) too. > > Can you clarify: > > - By "deadlock" do you mean the system becomes unresponsive, or that > just the mount is stuck? Just the 'mount -l' is stuck. 'Ctrl +C' can stop the 'mount -l', and then the mount point disapear. > - Can you reproduce in a non-loopback scenario: a separate client and > server? Yes. It happened on separate nfs client and server too. tested kernel version: 5.15.85, 6.1.5, 6.2.0-rc3+(upstream) Best Regards Wang Yugui (wangyugui@e16-tech.com) 2023/01/14