Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1046003ybi; Thu, 30 May 2019 10:41:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqyjYM8d4vt1Kf5O6LOW7Q7ddXZ81mGYAMT+0V6geBdLM4cYvO0YYoRslFzq/jAo90ekcLjm X-Received: by 2002:a62:ea04:: with SMTP id t4mr4698601pfh.47.1559238117401; Thu, 30 May 2019 10:41:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559238117; cv=none; d=google.com; s=arc-20160816; b=kUYJDz1TRZo9neDt3g5Z5Tiv3F5szBdZzm2pyH3YuIxEAMmyL6ErhKabt0NxXM0A7V KRFw8ZFwvtVAzxVhJw4FTGar52wPnsp5HBuwcc1lT705LudMcMcLR7JatIuWO/cEM97+ eQRCjyTIVIid8nyjSPJLom74ilHB2UjdlgLGle+AQGgCUX1SHQv+LzbDLom7gws7TiPr VWnwhEkkrN58imcToXP294c5L3qCeK93IGnN20mnkk0CTbp96GFZMcliemcvKxq5ZTTm +g6rfPan5IMuwgMi5lofaGeByPdSoK6lgE7RTZHjm8V8FZWLBXPIPEmYDYQkdmTKInIz aRgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=bY/XPcgLvn4Ypjo45ZPhQOMepvkHQquQup5Hh2wq4zI=; b=d6kMXWln9RfesFJdt3ngSwHBo9PiuChvhIzpl/qGOcb4udLHgBv01n6uJqTPRhkfB5 1JAn/7WIP+wBG9o7Kzpjg4dvQDnbCRF9kY0Ju4o5QGSQVXTF3t4/o5Iap3GK1wWPc2DI OJRFKesWm2+9OHoHc7nTA55pIWA2QL+atRJUuysjRkLpK+lh5YLLZHwYSTIS+n2p6UKK p6l0B/2RS0xnnttkqy7Fo0M9SekYEgJTCduS2cV1D9N6BtGENilpOek4wu2cFoDT7cvn jHYtrbrQgbRCFVi2JoDA9Ry1cBjG+f/FSMRQxp5qNX9vXFv5ZXE/eM2/Dy9Ekz7jeDWD J7uQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 102si3898437plf.250.2019.05.30.10.41.33; Thu, 30 May 2019 10:41:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726550AbfE3Rlb (ORCPT + 99 others); Thu, 30 May 2019 13:41:31 -0400 Received: from p3plsmtpa06-02.prod.phx3.secureserver.net ([173.201.192.103]:35986 "EHLO p3plsmtpa06-02.prod.phx3.secureserver.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726307AbfE3Rla (ORCPT ); Thu, 30 May 2019 13:41:30 -0400 Received: from [192.168.0.67] ([24.218.182.144]) by :SMTPAUTH: with ESMTPSA id WP3Rh9Xstb5uOWP3RhJl1C; Thu, 30 May 2019 10:41:30 -0700 Subject: Re: [PATCH 0/9] Multiple network connections for a single NFS mount. To: Olga Kornievskaia Cc: NeilBrown , Chuck Lever , Schumaker Anna , Trond Myklebust , linux-nfs References: <155917564898.3988.6096672032831115016.stgit@noble.brown> <1df23ebc-ffe5-1a57-c40a-d5e9a45c8498@talpey.com> From: Tom Talpey Message-ID: <9b64b9d9-b7cf-c818-28e2-58b3a821d39d@talpey.com> Date: Thu, 30 May 2019 13:41:28 -0400 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-CMAE-Envelope: MS4wfCaGtFKeHr68geR4zP2Gn897LFsINAcADJoTJw0FZcC+QgMHJiut2ZCdIm/FW2zGJ4UH7IWsw3YriA6sJ22JIXoBpAWftcJCO+HRKpquNnrFE1lpmiQx 0GUeMBEz1OqetFFdpRy7gWpn0WW7eU6svQlycXmy0is0yMM0uRxWBxh1fC4AFjAXmznun6LgU0VK84RBqfePNeRMJ8YLSxdA4L1zr7ka051CQIG5Wy8JhqIn rtgte4lkj/t6jeZhKeQRqdlNPs3Orup97Gk01svxWwAiPGIxiaw5qulaF6LRpUY74D7OMKDoWMr/wjIvWV1dcGNZg9BZglVzwHZKQDNP4bA= Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On 5/30/2019 1:20 PM, Olga Kornievskaia wrote: > On Thu, May 30, 2019 at 1:05 PM Tom Talpey wrote: >> >> On 5/29/2019 8:41 PM, NeilBrown wrote: >>> I've also re-arrange the patches a bit, merged two, and remove the >>> restriction to TCP and NFSV4.x,x>=1. Discussions seemed to suggest >>> these restrictions were not needed, I can see no need. >> >> I believe the need is for the correctness of retries. Because NFSv2, >> NFSv3 and NFSv4.0 have no exactly-once semantics of their own, server >> duplicate request caches are important (although often imperfect). >> These caches use client XID's, source ports and addresses, sometimes >> in addition to other methods, to detect retry. Existing clients are >> careful to reconnect with the same source port, to ensure this. And >> existing servers won't change. > > Retries are already bound to the same connection so there shouldn't be > an issue of a retransmission coming from a different source port. So, there's no path redundancy? If any connection is lost and can't be reestablished, the requests on that connection will time out? I think a common configuration will be two NICs and two network paths, a so-called shotgun. Admins will be quite frustrated to discover it gives no additional robustness, and perhaps even less. Why not simply restrict this to the fully-correct, fully-functional NFSv4.1+ scenario, and not try to paper over the shortcomings? Tom. > >> Multiple connections will result in multiple source ports, and possibly >> multiple source addresses, meaning retried client requests may be >> accepted as new, rather than having any chance of being recognized as >> retries. >> >> NFSv4.1+ don't have this issue, but removing the restrictions would >> seem to break the downlevel mounts. >> >> Tom. >> > >