From owner-freebsd-net@freebsd.org Wed Jan 11 22:39:44 2017 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A1C1FCABE00 for ; Wed, 11 Jan 2017 22:39:44 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0057.outbound.protection.outlook.com [104.47.34.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "Microsoft IT SSL SHA2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 52A58174F for ; Wed, 11 Jan 2017 22:39:43 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from YTXPR01MB0189.CANPRD01.PROD.OUTLOOK.COM (10.165.218.133) by YTXPR01MB0189.CANPRD01.PROD.OUTLOOK.COM (10.165.218.133) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.845.12; Wed, 11 Jan 2017 22:39:42 +0000 Received: from YTXPR01MB0189.CANPRD01.PROD.OUTLOOK.COM ([10.165.218.133]) by YTXPR01MB0189.CANPRD01.PROD.OUTLOOK.COM ([10.165.218.133]) with mapi id 15.01.0845.013; Wed, 11 Jan 2017 22:39:42 +0000 From: Rick Macklem To: Slawa Olhovchenkov , "freebsd-net@freebsd.org" Subject: Re: NFSv4 stuck Thread-Topic: NFSv4 stuck Thread-Index: AQHSbFpEjAFIf9ZbxU6pF+N5/AhAH6Ez3cvb Date: Wed, 11 Jan 2017 22:39:42 +0000 Message-ID: References: <20170111220818.GD30374@zxy.spb.ru> In-Reply-To: <20170111220818.GD30374@zxy.spb.ru> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=rmacklem@uoguelph.ca; x-ms-office365-filtering-correlation-id: d833aa65-f02f-4192-8080-08d43a72bc7b x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:YTXPR01MB0189; x-microsoft-exchange-diagnostics: 1; YTXPR01MB0189; 7:TpiFBrrltFe+Bhk712sfucfIrJ/K5S5O1+Kn/BlESS2PHqV9JydA1+TqdfCfsBpM9sXDSUAUdTzduTI0aYtEEMIOyAwXZTzGhst0XvHTGePncNwnUyJGMmO9nY3iG7bd7r0nrhPHHhBJ+9wK/hYoSaHVCDbVfnBYVOCPn5wQkSZ1HIJnRO4xshCiMU+UiNPJ4a2QAnhF6QIuFJ/qG3oxXkQMf+Rt07HPGuJxX5pu9thQEzCqGAA1pbvR/fK+Vseux+T1QHAKSDi63jYcX25LZ+Y0OAQ/aQyX0A6G88wDPdrIMcZXJw0fnpIftiEaEf+t3kr3PB6ZwPiF56lF9C1079ngIeKqy1J8+OIw9BeXiuThnzrkaqdkl8BYYZOvS0OlzeQnwFA3orF2kXCj/YLNZv3cYd+QF8am0yyKJvyBHUJAaeCdAbcHlVzvuQbiAdViRU2Ek8Qn0KeZr7DS4molvw== x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(158342451672863)(75325880899374); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040375)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6041248)(20161123562025)(20161123555025)(20161123564025)(20161123560025)(6072148); SRVR:YTXPR01MB0189; BCL:0; PCL:0; RULEID:; SRVR:YTXPR01MB0189; x-forefront-prvs: 01842C458A x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(7916002)(39450400003)(377454003)(189002)(199003)(102836003)(7696004)(101416001)(2900100001)(92566002)(81156014)(81166006)(8936002)(8676002)(7116003)(5660300001)(50986999)(76176999)(54356999)(3660700001)(4477795004)(33656002)(97736004)(5001770100001)(2906002)(74316002)(68736007)(9686003)(86362001)(305945005)(107886002)(6436002)(3280700002)(189998001)(6506006)(122556002)(38730400001)(74482002)(2501003)(77096006)(106116001)(229853002)(105586002)(6306002)(106356001)(55016002)(2950100002); DIR:OUT; SFP:1101; SCL:1; SRVR:YTXPR01MB0189; H:YTXPR01MB0189.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Jan 2017 22:39:42.8044 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-Transport-CrossTenantHeadersStamped: YTXPR01MB0189 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 11 Jan 2017 22:39:44 -0000 "umount -f" is your only chance. However, if there is already a non-forced dismount stuck, it won't work because the non-forced dismount will have the mounted-on vnode locked. Btw, the processes waiting on "rpccon" are trying to make a new TCP connection to the server. Are you sure the client can talk to the server over your net? rick ________________________________________ From: owner-freebsd-net@freebsd.org on beha= lf of Slawa Olhovchenkov Sent: Wednesday, January 11, 2017 5:08:18 PM To: freebsd-net@freebsd.org Subject: NFSv4 stuck I am have NFSv4 mount dir and some time got stucked after access. Mounted by automount: # cat /etc/nfs.map /NFS -nfsv4,intr,soft,sec=3Dkrb5i,gssname=3Dhost stat:/ # mount -v map -hosts on /net (autofs, fsid 01ff00cfcf000000) map nfs.map on /NFS (autofs, fsid 02ff00cfcf000000) map nfs.map on /NFS (autofs, fsid 03ff00cfcf000000) map nfs.map on /NFS (autofs, fsid 04ff00cfcf000000) map nfs.map on /NFS (autofs, fsid 05ff00cfcf000000) stat:/ on /NFS (nfs, nfsv4acls, automounted, fsid 0aff003a3a000000) # procstat -a | grep -e rpc -e gss -e nfs 840 1 840 840 0 1 root select FreeBSD ELF64 rpcbind 956 1 956 956 0 1 root pause FreeBSD ELF64 nfsuserd 957 956 956 956 0 1 root sbwait FreeBSD ELF64 nfsuserd 958 956 956 956 0 1 root select FreeBSD ELF64 nfsuserd 960 956 956 956 0 1 root select FreeBSD ELF64 nfsuserd 961 956 956 956 0 1 root sbwait FreeBSD ELF64 nfsuserd 969 1 969 969 0 1 root select FreeBSD ELF64 rpc.stat= d 972 1 972 972 0 1 root rpcsvc FreeBSD ELF64 rpc.lock= d 10629 1098 10629 10629 0 1 root gssstate FreeBSD ELF64 sshd 10687 10652 10687 10647 10647 1 admin gssstate FreeBSD ELF64 csh 14521 1098 14521 14521 0 1 root gssstate FreeBSD ELF64 sshd 14924 14896 14924 14892 14892 1 admin nfs FreeBSD ELF64 automoun= t 45455 45454 45455 45455 45455 1 slw gssstate FreeBSD ELF64 tcsh 63495 63481 42791 42791 0 1 root rpccon FreeBSD ELF64 find 79451 0 0 0 0 1 - rpccon - nfscl 79452 79450 79452 79452 79452 1 slw rpccon FreeBSD ELF64 tcsh How to unlock system w/o reboot? automount -u don't work _______________________________________________ freebsd-net@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org"