Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1980640rwl; Thu, 6 Apr 2023 04:18:49 -0700 (PDT) X-Google-Smtp-Source: AKy350a/DOl94yPRp6KA6svu0z83lkl36eYBUi6KzaDDixrludVYQIueGF2PUBpDYIyZLs/esz/I X-Received: by 2002:a05:6a20:1a95:b0:d8:d0e5:df90 with SMTP id ci21-20020a056a201a9500b000d8d0e5df90mr2259502pzb.44.1680779929484; Thu, 06 Apr 2023 04:18:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680779929; cv=none; d=google.com; s=arc-20160816; b=ev7zxvtZV0/Pzy7/GJPwN0wLG+Y/CcDKwM0BG8nzaWICtgCnkiGH5hF/V5Ax9CAG4L yM9XD9Xjy/AWx5MWCuNTsl2EUakwBxaetJU8vQe9Gy1L3GbN/Sd9BAtrqgGZbiru4GQ3 bGDptkk3pfxG+YU6oIJUicO1AvWPzx4imzeGMgzbc9OgsWkveV7PiexCotqKc4S+gCI4 iXpa0SGE9s2vNqlzuWneeHyyMK+mKzOae0g4nfUtDu82HYqZyVY8vsEdwnG2so8zad0J ly1Z//7dqb2T88GLKDQChWyeDUueCgBIj8cbWCgLoHJVQ9sl+3OjUvmVFGoykyTnPYs4 Np2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:reply-to :message-id:subject:to:from:date:dkim-signature; bh=BMwSwDW3tf+m9f404UNj2blP0nPh4eBGgEkKy/aaiBc=; b=bukMKhSX2JpZg7qHsnNxirWD3J2xE8o/YJLQlbit5g5TSbjfwDoNYeQBOGkl0T7qe/ h+JcZ5Cl1vS3K5qdOhZs0+iE+QlxMdaoaKGPKMcdi72L9zShY4yG6DIMpc+62WOrfB95 fIff641nzg3QEU6bmtTSgQA+pOgL3mEwmXdvcGp6t4c9w57+ZaGnEBa3mnNyMiIa/Fbz cy8SmPkMT0t3nrgqBld1yOYf/dR5hn+BiM3wu9H9SgVAFfRP+4B63es0XtlGTudcfeG5 CQ0Kwa4hd3qfQohnG++rXfZwTIMFmvcYbQRZPlP0Xjde3OCpIc1/brAPX4fRpJg3/1u1 4RJw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@phys.ethz.ch header.s=2023 header.b=CRW2oB3w; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=phys.ethz.ch Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c2-20020aa79522000000b0062dbafd7a3esi1190926pfp.100.2023.04.06.04.18.27; Thu, 06 Apr 2023 04:18:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@phys.ethz.ch header.s=2023 header.b=CRW2oB3w; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=phys.ethz.ch Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237513AbjDFLQ6 (ORCPT + 99 others); Thu, 6 Apr 2023 07:16:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46310 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236782AbjDFLQ5 (ORCPT ); Thu, 6 Apr 2023 07:16:57 -0400 X-Greylist: delayed 450 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Thu, 06 Apr 2023 04:16:52 PDT Received: from phd-imap.ethz.ch (phd-imap.ethz.ch [129.132.80.51]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 553A97EEA for ; Thu, 6 Apr 2023 04:16:52 -0700 (PDT) Received: from localhost (192-168-127-49.net4.ethz.ch [192.168.127.49]) by phd-imap.ethz.ch (Postfix) with ESMTP id 4Psf0028vVz31 for ; Thu, 6 Apr 2023 13:09:20 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=phys.ethz.ch; s=2023; t=1680779360; bh=BMwSwDW3tf+m9f404UNj2blP0nPh4eBGgEkKy/aaiBc=; h=Date:From:To:Subject:Reply-To:From; b=CRW2oB3wgEkWt7TfOMaTWeJjAMJThnttNw8VO28nX3tw7Y+vpzZtqel58lvXZT1/u ljaNIkD1AzAsqn9GDDk9ZWhOxqwfaE3LqhsV90/WvioDJRwTKI6wQyDWUmlvluHX4S TLdLK3O9+bKSbJQOnxTPBhP/W9EGDWtuDDckZ9FJiYJm1ZehwUwiq+06qAwdT7lR9f Xdk08Si5SZkXhWhLtb+qbHGxP08bevDGoQGAu3BcxQTn59oUMoSPKRfVKUDxdXzYw4 vSch+aYhaxyJznC/s6d/7urhX6k9eh+V3897ANBmRES8K4fxaiB/Q8ukYbCkJGBHAB HbzzwyIRwE7jQ== X-Virus-Scanned: Debian amavisd-new at phys.ethz.ch Received: from phd-mxin.ethz.ch ([192.168.127.53]) by localhost (phd-mailscan.ethz.ch [192.168.127.49]) (amavisd-new, port 10024) with LMTP id bQCg_9jtf8Go for ; Thu, 6 Apr 2023 13:09:20 +0200 (CEST) Received: from phys.ethz.ch (mothership.ethz.ch [192.33.96.20]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: daduke@phd-mxin.ethz.ch) by phd-mxin.ethz.ch (Postfix) with ESMTPSA id 4Psf001KQYz9x for ; Thu, 6 Apr 2023 13:09:20 +0200 (CEST) Date: Thu, 6 Apr 2023 13:09:19 +0200 From: Christian Herzog To: linux-nfs@vger.kernel.org Subject: file server freezes with all nfsds stuck in D state after upgrade to Debian bookworm Message-ID: Reply-To: Christian Herzog MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=-0.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE, SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Dear all, for our researchers we are running file servers in the hundreds-of-TiB to low-PiB range that export via NFS and SMB. Storage is iSCSI-over-Infiniband LUNs LVM'ed into individual XFS file systems. With Ubuntu 18.04 nearing EOL, we prepared an upgrade to Debian bookworm and tests went well. About a week after one of the upgrades, we ran into the first occurence of our problem: all of a sudden, all nfsds enter the D state and are not recoverable. However, the underlying file systems seem fine and can be read and written to. The only way out appears to be to reboot the server. The only clues are the frozen nfsds and strack traces like [<0>] rq_qos_wait+0xbc/0x130 [<0>] wbt_wait+0xa2/0x110 [<0>] __rq_qos_throttle+0x20/0x40 [<0>] blk_mq_submit_bio+0x2d3/0x580 [<0>] submit_bio_noacct_nocheck+0xf7/0x2c0 [<0>] iomap_submit_ioend+0x4b/0x80 [<0>] iomap_do_writepage+0x4b4/0x820 [<0>] write_cache_pages+0x180/0x4c0 [<0>] iomap_writepages+0x1c/0x40 [<0>] xfs_vm_writepages+0x79/0xb0 [xfs] [<0>] do_writepages+0xbd/0x1c0 [<0>] filemap_fdatawrite_wbc+0x5f/0x80 [<0>] __filemap_fdatawrite_range+0x58/0x80 [<0>] file_write_and_wait_range+0x41/0x90 [<0>] xfs_file_fsync+0x5a/0x2a0 [xfs] [<0>] nfsd_commit+0x93/0x190 [nfsd] [<0>] nfsd4_commit+0x5e/0x90 [nfsd] [<0>] nfsd4_proc_compound+0x352/0x660 [nfsd] [<0>] nfsd_dispatch+0x167/0x280 [nfsd] [<0>] svc_process_common+0x286/0x5e0 [sunrpc] [<0>] svc_process+0xad/0x100 [sunrpc] [<0>] nfsd+0xd5/0x190 [nfsd] [<0>] kthread+0xe6/0x110 [<0>] ret_from_fork+0x1f/0x30 (we've also seen nfsd3). It's very sporadic, we have no idea what's triggering it and it has now happened 4 times on one server and once on a second. Needless to say, these are production systems, so we have a window of a few minutes for debugging before people start yelling. We've thrown everything we could at our test setup but so far haven't been able to trigger it. Any pointers would be highly appreciated. thanks and best regards, -Christian cat /etc/os-release PRETTY_NAME="Debian GNU/Linux 12 (bookworm)" uname -vr 6.1.0-7-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.20-1 (2023-03-19) apt list --installed '*nfs*' libnfsidmap1/testing,now 1:2.6.2-4 amd64 [installed,automatic] nfs-common/testing,now 1:2.6.2-4 amd64 [installed] nfs-kernel-server/testing,now 1:2.6.2-4 amd64 [installed] nfsconf -d [exportd] debug = all [exportfs] debug = all [general] pipefs-directory = /run/rpc_pipefs [lockd] port = 32769 udp-port = 32769 [mountd] debug = all manage-gids = True port = 892 [nfsd] debug = all port = 2049 threads = 48 [nfsdcld] debug = all [nfsdcltrack] debug = all [sm-notify] debug = all outgoing-port = 846 [statd] debug = all outgoing-port = 2020 port = 662 -- Dr. Christian Herzog support: +41 44 633 26 68 Head, IT Services Group, HPT H 8 voice: +41 44 633 39 50 Department of Physics, ETH Zurich 8093 Zurich, Switzerland http://isg.phys.ethz.ch/