Re: NFS loop on 3.4.39

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



hmm, I got another log which i a little different:

16:01:48.478917 IP 172.20.4.10.3676268197 > 192.168.201.44.nfs: 272 
getattr fh 0,0/22
16:01:48.479352 IP 192.168.201.44.nfs > 172.20.4.10.3676268197: reply ok 
52 getattr ERROR: unk 10025
16:01:48.479394 IP 172.20.4.10.3693045413 > 192.168.201.44.nfs: 272 
getattr fh 0,0/22
16:01:48.479761 IP 192.168.201.44.nfs > 172.20.4.10.3693045413: reply ok 
52 getattr ERROR: unk 10025
16:01:48.479887 IP 172.20.4.10.3709822629 > 192.168.201.44.nfs: 272 
getattr fh 0,0/22
16:01:48.480316 IP 192.168.201.44.nfs > 172.20.4.10.3709822629: reply ok 
52 getattr ERROR: unk 10025
16:01:48.480415 IP 172.20.4.10.3726599845 > 192.168.201.44.nfs: 272 
getattr fh 0,0/22
16:01:48.480760 IP 192.168.201.44.nfs > 172.20.4.10.3726599845: reply ok 
52 getattr ERROR: unk 10025
16:01:48.480882 IP 172.20.4.10.3743377061 > 192.168.201.44.nfs: 272 
getattr fh 0,0/22
16:01:48.481554 IP 192.168.201.44.nfs > 172.20.4.10.3743377061: reply ok 
52 getattr ERROR: unk 10025
16:01:48.481652 IP 172.20.4.10.3760154277 > 192.168.201.44.nfs: 272 
getattr fh 0,0/22
16:01:48.482002 IP 192.168.201.44.nfs > 172.20.4.10.3760154277: reply ok 
52 getattr ERROR: unk 10025
16:01:48.482085 IP 172.20.4.10.3776931493 > 192.168.201.44.nfs: 272 
getattr fh 0,0/22
16:01:48.482452 IP 192.168.201.44.nfs > 172.20.4.10.3776931493: reply ok 
52 getattr ERROR: unk 10025
16:01:48.482537 IP 172.20.4.10.3793708709 > 192.168.201.44.nfs: 272 
getattr fh 0,0/22
16:01:48.482937 IP 192.168.201.44.nfs > 172.20.4.10.3793708709: reply ok 
52 getattr ERROR: unk 10025
16:01:48.483050 IP 172.20.4.10.3810485925 > 192.168.201.44.nfs: 272 
getattr fh 0,0/22
16:01:48.483399 IP 192.168.201.44.nfs > 172.20.4.10.3810485925: reply ok 
52 getattr ERROR: unk 10025
16:01:48.483439 IP 172.20.4.10.3827263141 > 192.168.201.44.nfs: 272 
getattr fh 0,0/22
16:01:48.483803 IP 192.168.201.44.nfs > 172.20.4.10.3827263141: reply ok 
52 getattr ERROR: unk 10025

This is with a somewhat older kernel though: 3.4.35

The NFS sever is running 3.4.39 in both cases.

Joakim Tjernlund/Transmode wrote on 2013/04/15 10:19:39:

> From: Joakim Tjernlund/Transmode
> To: linux-nfs@xxxxxxxxxxxxxxx, 
> Date: 2013/04/15 10:19
> Subject: NFS loop on 3.4.39
> 
> I get som NFS loop which generates lots of (from tcpdump):
> 9:48:43.156252 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack 
> 8406616, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], 
length 0
> 09:48:43.156258 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack 
> 8426888, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], 
length 0
> 09:48:43.156669 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack 
> 8445712, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], 
length 0
> 09:48:43.156675 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack 
> 8459880, win 32883, options [nop,nop,TS val 43795665 ecr 57419706], 
length 0
> 09:48:43.156679 IP 192.168.201.44.nfs > 172.20.4.10.2889942938: reply ok 
52 
> getattr ERROR: unk 10024
> 09:48:43.156704 IP 172.20.4.10.2923497370 > 192.168.201.44.nfs: 2892 
getattr fh 0,0/22
> 09:48:43.156712 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8462776:8467120, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156719 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8467120:8471464, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156725 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8471464:8475808, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156731 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8475808:8480152, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156745 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8480152:8484496, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156748 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8484496:8487392, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 2896
> 09:48:43.156751 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8487392:8491736, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156755 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8491736:8496080, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156758 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8496080:8500424, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156764 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8500424:8504768, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156767 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8504768:8509112, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156770 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8509112:8512008, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 2896
> 09:48:43.156773 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8512008:8516352, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156778 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8516352:8520696, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156956 IP 192.168.201.44.nfs > 172.20.4.10.2906720154: reply ok 
52 
> getattr ERROR: unk 10024
> 09:48:43.156969 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8520696:8525040, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156975 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8525040:8529384, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156980 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8529384:8533728, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156984 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8533728:8536624, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 2896
> 09:48:43.156988 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8536624:8540968, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156994 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8540968:8545312, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.156999 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8545312:8549656, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.157209 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack 
> 8464224, win 32872, options [nop,nop,TS val 43795665 ecr 57419706], 
length 0
> 09:48:43.157219 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8549656:8554000, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.157225 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8554000:8558344, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.157230 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [P.], seq 

> 8558344:8558424, ack 9577, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 80
> 09:48:43.157235 IP 172.20.4.10.2940274586 > 192.168.201.44.nfs: 532 
getattr fh 0,0/22
> 09:48:43.157460 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack 
> 8485944, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], 
length 0
> 09:48:43.157709 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack 
> 8504768, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], 
length 0
> 09:48:43.157715 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack 
> 8526488, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], 
length 0
> 09:48:43.158126 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack 
> 8543864, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], 
length 0
> 09:48:43.158133 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack 
> 8558960, win 32883, options [nop,nop,TS val 43795665 ecr 57419706], 
length 0
> 09:48:43.158138 IP 192.168.201.44.nfs > 172.20.4.10.2923497370: reply ok 
52 
> getattr ERROR: unk 10024
> 09:48:43.158143 IP 192.168.201.44.nfs > 172.20.4.10.2940274586: reply ok 
52 
> getattr ERROR: unk 10024
> 09:48:43.158149 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], ack 
9745, 
> win 23907, options [nop,nop,TS val 57419706 ecr 43795665], length 0
> 09:48:43.158174 IP 172.20.4.10.2957051802 > 192.168.201.44.nfs: 2892 
getattr fh 0,0/22
> 09:48:43.158192 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8561856:8566200, ack 9745, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.158197 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8566200:8570544, ack 9745, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.158204 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8570544:8574888, ack 9745, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.158210 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8574888:8579232, ack 9745, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.158216 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8579232:8583576, ack 9745, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.158222 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8583576:8586472, ack 9745, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 2896
> 09:48:43.158226 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8586472:8590816, ack 9745, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.158233 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8590816:8595160, ack 9745, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 09:48:43.158239 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq 
> 8595160:8599504, ack 9745, win 23907, options [nop,nop,TS val 57419706 
ecr 
> 43795665], length 4344
> 
> I wonder if this is a variant on:
> 
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/

> 
fs/nfs/nfs4proc.c?h=linux-3.6.y&id=9fa2b82e5592a7aa7a63b7f6a32c5aa9e580643a
> 
> which does seem to be in the 3.4 stable branch?
> 
>  Jocke
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux