From nobody Sat Jul 16 12:06:02 2022 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4LlS1T0BVRz4TPWP for ; Sat, 16 Jul 2022 12:18:21 +0000 (UTC) (envelope-from pmc@citylink.dinoex.sub.org) Received: from uucp.dinoex.org (uucp.dinoex.org [IPv6:2a0b:f840::12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "uucp.dinoex.sub.de", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4LlS1R3xCrz3F8Y for ; Sat, 16 Jul 2022 12:18:19 +0000 (UTC) (envelope-from pmc@citylink.dinoex.sub.org) Received: from uucp.dinoex.org (uucp.dinoex.org [IPv6:2a0b:f840:0:0:0:0:0:12]) by uucp.dinoex.org (8.17.1/8.17.1) with ESMTPS id 26GCI41G065911 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO) for ; Sat, 16 Jul 2022 14:18:05 +0200 (CEST) (envelope-from pmc@citylink.dinoex.sub.org) X-MDaemon-Deliver-To: Received: (from uucp@localhost) by uucp.dinoex.org (8.17.1/8.17.1/Submit) with UUCP id 26GCI4i9065910 for freebsd-stable@freebsd.org; Sat, 16 Jul 2022 14:18:04 +0200 (CEST) (envelope-from pmc@citylink.dinoex.sub.org) Received: from gate.intra.daemon.contact (gate-e [192.168.98.2]) by citylink.dinoex.sub.de (8.16.1/8.16.1) with ESMTP id 26GC6vPE006023 for ; Sat, 16 Jul 2022 14:06:57 +0200 (CEST) (envelope-from peter@gate.intra.daemon.contact) Received: from gate.intra.daemon.contact (gate-e [192.168.98.2]) by gate.intra.daemon.contact (8.16.1/8.16.1) with ESMTPS id 26GC6244005913 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO) for ; Sat, 16 Jul 2022 14:06:02 +0200 (CEST) (envelope-from peter@gate.intra.daemon.contact) Received: (from peter@localhost) by gate.intra.daemon.contact (8.16.1/8.16.1/Submit) id 26GC62pj005912 for freebsd-stable@freebsd.org; Sat, 16 Jul 2022 14:06:02 +0200 (CEST) (envelope-from peter) Date: Sat, 16 Jul 2022 14:06:02 +0200 From: Peter To: freebsd-stable@freebsd.org Subject: nfs stalls client: nfsrv_cache_session: no session Message-ID: List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Milter: Spamilter (Reciever: uucp.dinoex.org; Sender-ip: 0:0:2a0b:f840::; Sender-helo: uucp.dinoex.org;) X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (uucp.dinoex.org [IPv6:2a0b:f840:0:0:0:0:0:12]); Sat, 16 Jul 2022 14:18:07 +0200 (CEST) X-Rspamd-Queue-Id: 4LlS1R3xCrz3F8Y X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of pmc@citylink.dinoex.sub.org designates 2a0b:f840::12 as permitted sender) smtp.mailfrom=pmc@citylink.dinoex.sub.org X-Spamd-Result: default: False [-3.30 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; DMARC_NA(0.00)[sub.org]; ARC_NA(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; TO_DN_NONE(0.00)[]; RCVD_COUNT_FIVE(0.00)[5]; ASN(0.00)[asn:205376, ipnet:2a0b:f840::/32, country:DE]; FROM_HAS_DN(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCVD_TLS_LAST(0.00)[] X-ThisMailContainsUnwantedMimeParts: N Hija, I have a problem with NFSv4: The configuration: Server Rel. 13.1-RC2 nfs_server_enable="YES" nfs_server_flags="-u -t --minthreads 2 --maxthreads 20 -h ..." mountd_enable="YES" mountd_flags="-S -p 803 -h ..." rpc_lockd_enable="YES" rpc_lockd_flags="-h ..." rpc_statd_enable="YES" rpc_statd_flags="-h ..." rpcbind_enable="YES" rpcbind_flags="-h ..." nfsv4_server_enable="YES" sysctl vfs.nfs.enable_uidtostring=1 sysctl vfs.nfsd.enable_stringtouid=1 Client bhyve Rel. 13.1-RELEASE on the same system nfs_client_enable="YES" nfs_access_cache="600" nfs_bufpackets="32" nfscbd_enable="YES" Mount-options: nfsv4,readahead=1,rw,async Access to the share suddenly stalled. Server reports this in messages, every second: nfsrv_cache_session: no session IPaddr=192.168... Restarting nfsd and mountd didn't help, only now the client started to also report in messages, every second: nfs server 192.168...:/var/sysup/mnt/tmp.6.56160: is alive again Mounting the same share anew to a different place works fine. The network babble is this, every second: NFS request xid 1678997001 212 getattr fh 0,6/2 NFS reply xid 1678997001 reply ok 52 getattr ERROR: unk 10052 Forensics: I tried to build openoffice on that share, a couple of times. So there was a bit of traffic, and some things may have overflown. There seems to be no way to recover, only crashing the client.