Hi Bruce and Jeff: Testing intensive workloads with NFSv3 and NFSv4.0 on NFS/RDMA with krb5i or krb5p results in a pretty quick workload failure. Closer examination shows that the client is able to overrun the GSS sequence window with some regularity. When that happens, the server drops the connection. However, when the client retransmits requests with lost replies, they never hit in the DRC, and that results in unexpected failures of non- idempotent requests. The retransmitted XIDs are found in the DRC, but the retransmitted request has a different checksum than the original. We're hitting the "mismatch" case in nfsd_cache_key_cmp for these requests. I tracked down the problem to the way the DRC computes the length of the part of the buffer it wants to checksum. nfsd_cache_csum uses head.iov_len + page_len and then caps that at RC_CSUMLEN. That works fine for krb5 and sys, but the GSS unwrap functions (integ_unwrap_data and priv_unwrap_data) don't appear to update head.iov_len properly. So nfsd_cache_csum's length computation is significantly larger than the clear-text message, and that allows stale parts of the xdr_buf to be included in the checksum. Using xdr_buf_subsegment() at the end of integ_unwrap_data sets the xdr_buf lengths properly and fixes the situation for krb5i. I don't see a similar solution for priv_unwrap_data: there's no MIC len available, and priv_len is not the actual length of the clear-text message. Moreover, the comment in fix_priv_head() is disturbing. I don't see anywhere where the relationship between the buf's head/len and how svc_defer works is authoritatively documented. It's not clear exactly how priv_unwrap_data is supposed to accommodate svc_defer, or whether integ_unwrap_data also needs to accommodate it. So I can't tell if the GSS unwrap functions are wrong or if there's a more accurate way to compute the message length in nfsd_cache_csum. I suspect both could use some improvement, but I'm not certain exactly what that might be. -- Chuck Lever