Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp902107ybl; Wed, 28 Aug 2019 07:01:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqyzngl4j5O7o6CCyx0H97P/j1fk8mO7gCD91MmMw2xA6hAlm7GR6OWBqRnacpaDMq6Ohz9x X-Received: by 2002:a63:5550:: with SMTP id f16mr3731667pgm.426.1567000862270; Wed, 28 Aug 2019 07:01:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567000862; cv=none; d=google.com; s=arc-20160816; b=NlyhRgv/vVk6IUB0vL8q/8GFz6mv1xP2yET/fzdUE2d+elvyND9R5QhderIpZ91Rrg qqDOwIqbBcFXfiCXI0Dwwel3cba/Kcg+P2qKW4LFtXve8VX4dk3jTuWzBb895I+sv/Hk Z4kjql0/gpRA23RPOGKf8Fol+Xhm0tte3IXF0m1N1jigcaXobvGcUg9AZfb/pxUYjkJb mxe9EvDkNLlxMyqCsDd9WudBs3RxBqz27s0uBVQ0nIhP30E/bHjInUcLmEp6fZ+Z5fkH ZQGWeKbGVZzKCTn8+K6CtIEgl77jphEEloiclnVL7jxB2EOzHyXR1WMV+4K66oUWYGJU mCrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=8MgZcTOet4/9mJXp/0VE9y3hc/yS2UMs0q7HN0nV8uk=; b=MsC5Wr9csQFcSE+MzCS0NorBKS75Rgr90v8zKBR1zvMYMgcN53lhs9B7Q+4NIEzTaK Ou+g6wA2J6tPl0NsCyGmQBShAUvD7L9fCGF07ljaZlHYlXEH/65K1VYxcF4VhoQgFwaR KmJYSSbL8y8K/2CneoJDLk1tICSl/JouDR6+Cui+ZxAoOHGTvlS1ZhA0rkql7E/zm52p 1epPuFEi1+3rTt+og/viWVBbvFJ+aHVoEgk/2YgMVAL6mCRnuz8FPryLPN/vKSLQIAXI ohuVUb/J4NDlKvAcaGcCgrxyyan393A0r4YDjGWULSZu6VtbF0fwsHLCV2Fv5DWDCw6N VJFQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j5si2120332pgm.427.2019.08.28.07.00.47; Wed, 28 Aug 2019 07:01:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726368AbfH1OAq (ORCPT + 99 others); Wed, 28 Aug 2019 10:00:46 -0400 Received: from mx1.redhat.com ([209.132.183.28]:53790 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726315AbfH1OAq (ORCPT ); Wed, 28 Aug 2019 10:00:46 -0400 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B29758980EA; Wed, 28 Aug 2019 14:00:45 +0000 (UTC) Received: from parsley.fieldses.org (ovpn-125-160.rdu2.redhat.com [10.10.125.160]) by smtp.corp.redhat.com (Postfix) with ESMTP id 4C6736012C; Wed, 28 Aug 2019 14:00:45 +0000 (UTC) Received: by parsley.fieldses.org (Postfix, from userid 2815) id 370F518046C; Wed, 28 Aug 2019 10:00:44 -0400 (EDT) Date: Wed, 28 Aug 2019 10:00:44 -0400 From: "J. Bruce Fields" To: Chuck Lever Cc: Jeff Layton , Bruce Fields , Trond Myklebust , Linux NFS Mailing List Subject: Re: [PATCH 0/3] Handling NFSv3 I/O errors in knfsd Message-ID: <20190828140044.GA14249@parsley.fieldses.org> References: <20190826205156.GA27834@fieldses.org> <61F77AD6-BD02-4322-B944-0DC263EB9BD8@oracle.com> <20190827145819.GB9804@fieldses.org> <20190827145912.GC9804@fieldses.org> <1ee75165d548b336f5724b6d655aa2545b9270c3.camel@hammerspace.com> <20190828134839.GA26492@fieldses.org> <45582F32-69C7-4DC8-A608-E45038A44D42@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <45582F32-69C7-4DC8-A608-E45038A44D42@oracle.com> User-Agent: Mutt/1.12.1 (2019-06-15) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.6.2 (mx1.redhat.com [10.5.110.67]); Wed, 28 Aug 2019 14:00:45 +0000 (UTC) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Wed, Aug 28, 2019 at 09:57:25AM -0400, Chuck Lever wrote: > > > > On Aug 28, 2019, at 9:51 AM, Jeff Layton wrote: > > > > On Wed, 2019-08-28 at 09:48 -0400, bfields@fieldses.org wrote: > >> On Tue, Aug 27, 2019 at 03:15:35PM +0000, Trond Myklebust wrote: > >>> I'm open to other suggestions, but I'm having trouble finding one that > >>> can scale correctly (i.e. not require per-client tracking), prevent > >>> silent corruption (by causing clients to miss errors), while not > >>> relying on optional features that may not be implemented by all NFSv3 > >>> clients (e.g. per-file write verifiers are not implemented by *BSD). > >>> > >>> That said, it seems to me that to do nothing should not be an option, > >>> as that would imply tolerating silent corruption of file data. > >> > >> So should we increment the boot verifier every time we discover an error > >> on an asynchronous write? > >> > > > > I think so. Otherwise, only one client will ever see that error. > > +1 > > I'm not familiar with the details of how the Linux NFS server > implements the boot verifier: Will a verifier bump be effective > for all file systems that server exports? Yes. It will be per network namespace, but that's the only limit. > If so, is that an acceptable cost? It means clients will resend all their uncommitted writes. That could certainly make write errors more expensive. But maybe you've already got bigger problems if you've got a full or failing disk? --b.