From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.2 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6DCB4C4360C for ; Thu, 26 Sep 2019 19:55:58 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 497EE222C3 for ; Thu, 26 Sep 2019 19:55:58 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727988AbfIZTz5 (ORCPT ); Thu, 26 Sep 2019 15:55:57 -0400 Received: from fieldses.org ([173.255.197.46]:60856 "EHLO fieldses.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727794AbfIZTz5 (ORCPT ); Thu, 26 Sep 2019 15:55:57 -0400 Received: by fieldses.org (Postfix, from userid 2815) id 5847B1507; Thu, 26 Sep 2019 15:55:57 -0400 (EDT) Date: Thu, 26 Sep 2019 15:55:57 -0400 From: Bruce Fields To: Chuck Lever Cc: Trond Myklebust , Kevin Vasko , Linux NFS Mailing List Subject: Re: NFSv4 client locks up on larger writes with Kerberos enabled Message-ID: <20190926195557.GC2849@fieldses.org> References: <20190925164831.GA9366@fieldses.org> <57192382-86BE-4878-9AE0-B22833D56367@oracle.com> <20190925200723.GA11954@fieldses.org> <1BC54D7A-073E-40FD-9AA3-552F1E1BD214@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1BC54D7A-073E-40FD-9AA3-552F1E1BD214@oracle.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Thu, Sep 26, 2019 at 08:55:17AM -0700, Chuck Lever wrote: > > On Sep 25, 2019, at 1:07 PM, Bruce Fields wrote: > > In that case--I seem to remember there's a way to configure the size of > > the client's slot table, maybe lowering that (decreasing the number of > > rpc's allowed to be outstanding at a time) would work around the > > problem. > > > Should the client be doing something different to avoid or recover from > > overflows of the gss window? > > The client attempts to meter the request stream so that it stays > within the bounds of the GSS sequence number window. The stream > of requests is typically unordered coming out of the transmit > queue. > > There is some new code (since maybe v5.0?) that handles the > metering: gss_xmit_need_reencode(). I guess I was thinking he could write a small number (say 2 digits) into /sys/module/sunrpc/parameters/tcp_max_slot_table_entries (before mounting, I guess?) and see if the problem's reproducable. If not, that's a little more evidence that it's the gss sequence window. (And might be an adequate workaround for now.) --b.