behlendorf1@llnl.gov
2007-Jan-16 16:33 UTC
[Lustre-devel] [Bug 11332] lnet_try_match_md(): match X length Y too big: Z left, Z allowed
Please don''t reply to lustre-devel. Instead, comment in Bugzilla by using the following link: https://bugzilla.lustre.org/show_bug.cgi?id=11332 Recently this same issue has been observed from a ubglio node talking to a lscratcha server. Both of these nodes were running lustre-1.4.6.95-17.2llnl which sort of destroys the theory it was being caused by new clients talking to old servers. It also makes me very suspicious that this bug is lurking in the new 1.4.8 code and we just haven''t caught it yet.
behlendorf1@llnl.gov
2007-Jan-16 16:35 UTC
[Lustre-devel] [Bug 11332] lnet_try_match_md(): match X length Y too big: Z left, Z allowed
Please don''t reply to lustre-devel. Instead, comment in Bugzilla by using the following link: https://bugzilla.lustre.org/show_bug.cgi?id=11332 Created an attachment (id=9349) Please don''t reply to lustre-devel. Instead, comment in Bugzilla by using the following link: --> (https://bugzilla.lustre.org/attachment.cgi?id=9349&action=view) Hack to avoid issue for now Just for the records here''s is the ugly ugly hack we''ve applied for now until we can get to the bottom of why these larger than expected RPCs are being generated.
behlendorf1@llnl.gov
2007-Jan-30 13:09 UTC
[Lustre-devel] [Bug 11332] lnet_try_match_md(): match X length Y too big: Z left, Z allowed
Please don''t reply to lustre-devel. Instead, comment in Bugzilla by using the following link: https://bugzilla.lustre.org/show_bug.cgi?id=11332 Created an attachment (id=9456) Please don''t reply to lustre-devel. Instead, comment in Bugzilla by using the following link: --> (https://bugzilla.lustre.org/attachment.cgi?id=9456&action=view) Client dk log (with attached hack applied)