Received: by 2002:a05:7412:2a8c:b0:e2:908c:2ebd with SMTP id u12csp2579934rdh; Wed, 27 Sep 2023 06:57:39 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEU84Se/w8N8wUKhmICBoM0qifyNoA2Gkp/5GSfjuVYPH47xUdbP94f2wgomFZiSB+monuM X-Received: by 2002:a05:6a20:1451:b0:15c:7223:7bb1 with SMTP id a17-20020a056a20145100b0015c72237bb1mr2581048pzi.20.1695823058780; Wed, 27 Sep 2023 06:57:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695823058; cv=none; d=google.com; s=arc-20160816; b=uM7AmRRy0OxLymZIydmGzlHD4Z8kGHntL8EkIkF08qmMp0xsEu6xmrNpKMks86DR8F fFglROAkaasu4nV5G9uzMaVAKDqG8AqqKJvVAG+6p3WZWNGeyOmyqhu0k9CNs+dBB8dJ IxKekmZpfoIuaR7QdQzh7D8f0vVYU8n2x3gveqVy8xauzzba5xdaf8gUfCtbC3EgmBAo B7g4As+SXNqrKQoFl9yjaK2v5xGQ1flPjSyWm/5fCPTjFWOe2kJEbtzEK+17L8FLpta/ aZuSb61+RlQzlu2hksxrxF9Ap8lt5YKy89h8CrjQTDZv74nXDvbCWROxX6oUQLfzzsU1 OHgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:to:content-language:subject:reply-to:user-agent :mime-version:date:message-id; bh=2eaqE1V3tLmFbL/kGpEl+N4IiRbxnRx/DO6FppyYni0=; fh=bA84+YsCjmEH0g9wSTvy9GDQ8kXA7VEfCGMuH1u8tu4=; b=mIK2h3u8vBmofmBSxsJdxsnj6lEJKE3x9QLCEZab6nfm3zr2X8CaKXbJSHEp+m4j6w l6QJFmvsiHpbPCmrh3uJlPxxpgps+ox2xsyJC7X8mOemtsoJnVdexP+1NSyOVkgbmTPM vO+OIiDFrTdxgMMWhKxB4tfgNMLE4ZSc5x9Zd2tL195Qeo4JL7cRYnXEHp778DubUuL/ FziHHojckEZ/VCwjcmOSkR6K90p4BKUhzKModtJ5IG3qNoDHAawpz7UX4dr2UuTlBQ+P rd8Vzsny9/cuD4A+SKMf17B0h17pDetgPMvVtSoImZb0HzTRkuMOZvMdbDS34kfxLBQU 69Wg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id kw15-20020a170902f90f00b001c6223663b3si6627851plb.369.2023.09.27.06.57.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Sep 2023 06:57:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 32E65805EB33; Wed, 27 Sep 2023 06:30:26 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231929AbjI0NaY (ORCPT + 99 others); Wed, 27 Sep 2023 09:30:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55966 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231907AbjI0NaY (ORCPT ); Wed, 27 Sep 2023 09:30:24 -0400 Received: from wp530.webpack.hosteurope.de (wp530.webpack.hosteurope.de [80.237.130.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7B72F180 for ; Wed, 27 Sep 2023 06:30:22 -0700 (PDT) Received: from [2a02:8108:8980:2478:8cde:aa2c:f324:937e]; authenticated by wp530.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) id 1qlUcP-0007o8-2A; Wed, 27 Sep 2023 15:30:21 +0200 Message-ID: Date: Wed, 27 Sep 2023 15:30:20 +0200 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Reply-To: Linux regressions mailing list Subject: Re: Data corruption with 5.10.x client -> 6.5.x server Content-Language: en-US, de-DE To: =?UTF-8?Q?Mantas_Mikul=C4=97nas?= , linux-nfs@vger.kernel.org, Linux kernel regressions list References: From: "Linux regression tracking #adding (Thorsten Leemhuis)" In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-bounce-key: webpack.hosteurope.de;regressions@leemhuis.info;1695821422;19f02558; X-HE-SMSGID: 1qlUcP-0007o8-2A X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Wed, 27 Sep 2023 06:30:26 -0700 (PDT) [CCing the regression list, as it should be in the loop for regressions: https://docs.kernel.org/admin-guide/reporting-regressions.html] [TLDR: I'm adding this report to the list of tracked Linux kernel regressions; the text you find below is based on a few templates paragraphs you might have encountered already in similar form. See link in footer if these mails annoy you.] On 24.09.23 15:07, Mantas Mikulėnas wrote: > I've recently upgraded my home NFS server from 6.4.12 to 6.5.4 (running > Arch Linux x86_64). > > Now, when I'm accessing the server over NFSv4.2 from a client that's > running 5.10.0 (32-bit x86, Debian 11), if the mount is using sec=krb5i > or sec=krb5p, trying to read a file that's <= 4092 bytes in size will > return all-zero data. (That is, `hexdump -C file` shows "00 00 00...") > Files that are 4093 bytes or larger seem to be unaffected. > > Only sec=krb5i/krb5p are affected by this – plain sec=krb5 (or sec=sys > for that matter) seems to work without any problems. > > Newer clients (like 6.1.x or 6.4.x) don't seem to have any issues, it's > only 5.10.0 that does... though it might also be that the client is > 32-bit, but the same client did work previously when the server was > running older kernels, so I still suspect 6.5.x on the server being the > problem. > > Upgrading to 6.6.0-rc2 on the server hasn't changed anything. > The server is using Btrfs but I've tested with tmpfs as well. Thanks for the report. To be sure the issue doesn't fall through the cracks unnoticed, I'm adding it to regzbot, the Linux kernel regression tracking bot: #regzbot ^introduced 703d7521555504b3a316b105b4806d641 #regzbot title nfs: Data corruption with 5.10.x client -> 6.5.x server #regzbot ignore-activity This isn't a regression? This issue or a fix for it are already discussed somewhere else? It was fixed already? You want to clarify when the regression started to happen? Or point out I got the title or something else totally wrong? Then just reply and tell me -- ideally while also telling regzbot about it, as explained by the page listed in the footer of this mail. Developers: When fixing the issue, remember to add 'Link:' tags pointing to the report (the parent of this mail). See page linked in footer for details. Ciao, Thorsten (wearing his 'the Linux kernel's regression tracker' hat) -- Everything you wanna know about Linux kernel regression tracking: https://linux-regtracking.leemhuis.info/about/#tldr That page also explains what to do if mails like this annoy you.