Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4470111pxj; Tue, 8 Jun 2021 15:23:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwmTJznuXVvdZ6cPqPqhu+e5AdsTUmV667wavGCMIpY9ibqIDXe/xYsXd4yf5y398/PmBwO X-Received: by 2002:a17:907:948f:: with SMTP id dm15mr22313395ejc.476.1623190998205; Tue, 08 Jun 2021 15:23:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623190998; cv=none; d=google.com; s=arc-20160816; b=FJflnj4KCrRD4XtNpenH5lF6zpARDNDcmB96pbLJMK6MygSi5yc4XlNWaeXo2IYzCv J8N6Z0GRmgJBlYAYn9C2hJ3SYy7iLFjtmhI/+dBU/vuVkiCxcNLeOQ8Vou77Z7IsCFmx 9b93KWIL/40fUyTzJyiklaOctJX4SnwB97SmWjGl3OWORiUjuX4vCW17MuMMhr4EeDUZ aKclNHHPQ8iP1KhT7xUZgXTOwM5S0iaONtzaATF4ai9XeVzplXGk63aNjUsztYRjLXu3 tPj8/WFSi0LT6SlbTjWUGPD1sYurvbS+s84SHpxexeTUwnBaQmdU7ZK5NKJ5w4PbS6p1 /sBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Tws9NwdZvQW6BKo9r/IUCeh/1Mvxb/Duv9JfIwq/0Gk=; b=KTRXTVV6+tWCt+BX+ztU0AGLroRIKxQF/vbiRXTfaYl/RKOGTFjh3bEpWTkGXXaccJ Wf2lusb4cgIAPCEBzOwco864bJXbRlpKxmdro7Yj8F49kuAPguI+L4ajCt+KXv5c+4TE AWhl8tGUaCdzL99VWwR/Ys9Yuvalzvb569aTRIXS5pwHXjedHj8CqJAE8pewXN6Dm82k 74+ak6nAoVeHKjUrvR5a0T8fZjQst8nBdDNryUkjhbjDW8BwGa3aaVLdrJUwC3kjlcyu NR23d2mmVrFaJpey5EEfLkt6OM7Hft5Nbrx9Kpu35svJcoYiphZABGw8v5YaqlTWJ8vO DylQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="UovFo/cm"; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bh7si669638ejb.383.2021.06.08.15.22.42; Tue, 08 Jun 2021 15:23:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="UovFo/cm"; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229845AbhFHWVv (ORCPT + 99 others); Tue, 8 Jun 2021 18:21:51 -0400 Received: from mail-ed1-f50.google.com ([209.85.208.50]:39654 "EHLO mail-ed1-f50.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229548AbhFHWVv (ORCPT ); Tue, 8 Jun 2021 18:21:51 -0400 Received: by mail-ed1-f50.google.com with SMTP id dj8so26342233edb.6 for ; Tue, 08 Jun 2021 15:19:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Tws9NwdZvQW6BKo9r/IUCeh/1Mvxb/Duv9JfIwq/0Gk=; b=UovFo/cmSDH/2ZLo//Ql/F5Fm/c9YgNq598r24k87A0+DGcdkRfAk2j9ahLizwa9ph Z7dd7kkbCHD2g0twK4Orhe+tgTX3N3PA/vIDXJutf9BioFVNCMiwcooM12mqvil2vbWy 0748nTrXebLq1GFd2u1eZ5DFf7wJJC9yzO3FXywoVBscuCILZsi/gZ58xDDo5PpCxgqR WIedL1ThkFDag3lVkk2HNK353ZLvWdSTJc2TFBjuPuAWIU1Sk8DiNwMubW546jzGmn6z gjzKxIHE4EmziPnuKF2R5Ig0l7HNT8BlABzf0azWINOMnq5/WUtaedkPcAAEC6cV9kdL Cg7w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Tws9NwdZvQW6BKo9r/IUCeh/1Mvxb/Duv9JfIwq/0Gk=; b=b2sPRj3JX4AFUYwY8X3Kuwd+h2LZq8DxVZzBU9KBvbaU7+Rrimz+A8WVlpT3qzOr9z 44mHoO/33+ceb03VpCz+XE9jD7r6XE2t45YddaeajOfOG6ldXClFwF8ECPO1cWfP6sCq sHM2TMzV+/BPDab0WEUXG3cizVSMzF4uh8A9F+9mbVd2W6wfqGXEqYXCk+FkbNAj5vf4 CRpX54jbQWXgTbMtJKSF0fM3DJF5Zkd+HuyUhV00/N1aW10t99HxzFo7F0kWZQe+P+yY OCMJYUHrJsXl+WZ3C8CcrOUEU1phRMiZiy7EhMGCzr/+r7eHvNkP7vQRoW9fPY3S0/il aBMw== X-Gm-Message-State: AOAM532KMAFBwvytaMTjhhrRGBhSQc3PeUQgACVQO6yiPGxbY2w8WJPs +yW0EBrcp7Q9Omt2SmbjrSyB/+gFXL9aL58ljeI= X-Received: by 2002:a50:afe4:: with SMTP id h91mr27461120edd.28.1623190725858; Tue, 08 Jun 2021 15:18:45 -0700 (PDT) MIME-Version: 1.0 References: <20210608184527.87018-1-olga.kornievskaia@gmail.com> <29835A59-A523-49FD-8D28-06CDC2F0E94C@oracle.com> <4c73319e5b826a8f3c9a29b085c42e181150d08c.camel@hammerspace.com> In-Reply-To: <4c73319e5b826a8f3c9a29b085c42e181150d08c.camel@hammerspace.com> From: Olga Kornievskaia Date: Tue, 8 Jun 2021 18:18:34 -0400 Message-ID: Subject: Re: [PATCH 1/1] NFSv4.1+ add trunking when server trunking detected To: Trond Myklebust Cc: "chuck.lever@oracle.com" , "linux-nfs@vger.kernel.org" , "anna.schumaker@netapp.com" Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Tue, Jun 8, 2021 at 6:13 PM Trond Myklebust wrote: > > On Tue, 2021-06-08 at 17:40 -0400, Olga Kornievskaia wrote: > > On Tue, Jun 8, 2021 at 5:06 PM Chuck Lever III < > > chuck.lever@oracle.com> wrote: > > > > > > > > > > > > > On Jun 8, 2021, at 4:56 PM, Olga Kornievskaia < > > > > olga.kornievskaia@gmail.com> wrote: > > > > > > > > On Tue, Jun 8, 2021 at 4:41 PM Chuck Lever III < > > > > chuck.lever@oracle.com> wrote: > > > > > > > > > > > > > > > > > > > > > On Jun 8, 2021, at 2:45 PM, Olga Kornievskaia < > > > > > > olga.kornievskaia@gmail.com> wrote: > > > > > > > > > > > > From: Olga Kornievskaia > > > > > > > > > > > > After trunking is discovered in > > > > > > nfs4_discover_server_trunking(), > > > > > > add the transport to the old client structure before > > > > > > destroying > > > > > > the new client structure (along with its transport). > > > > > > > > > > > > Signed-off-by: Olga Kornievskaia > > > > > > --- > > > > > > fs/nfs/nfs4client.c | 40 > > > > > > ++++++++++++++++++++++++++++++++++++++++ > > > > > > 1 file changed, 40 insertions(+) > > > > > > > > > > > > diff --git a/fs/nfs/nfs4client.c b/fs/nfs/nfs4client.c > > > > > > index 42719384e25f..984c851844d8 100644 > > > > > > --- a/fs/nfs/nfs4client.c > > > > > > +++ b/fs/nfs/nfs4client.c > > > > > > @@ -361,6 +361,44 @@ static int > > > > > > nfs4_init_client_minor_version(struct nfs_client *clp) > > > > > > return nfs4_init_callback(clp); > > > > > > } > > > > > > > > > > > > +static void nfs4_add_trunk(struct nfs_client *clp, struct > > > > > > nfs_client *old) > > > > > > +{ > > > > > > + struct sockaddr_storage clp_addr, old_addr; > > > > > > + struct sockaddr *clp_sap = (struct sockaddr > > > > > > *)&clp_addr; > > > > > > + struct sockaddr *old_sap = (struct sockaddr > > > > > > *)&old_addr; > > > > > > + size_t clp_salen, old_salen; > > > > > > + struct xprt_create xprt_args = { > > > > > > + .ident = old->cl_proto, > > > > > > + .net = old->cl_net, > > > > > > + .servername = old->cl_hostname, > > > > > > + }; > > > > > > + struct nfs4_add_xprt_data xprtdata = { > > > > > > + .clp = old, > > > > > > + }; > > > > > > + struct rpc_add_xprt_test rpcdata = { > > > > > > + .add_xprt_test = old->cl_mvops->session_trunk, > > > > > > + .data = &xprtdata, > > > > > > + }; > > > > > > + > > > > > > + if (clp->cl_proto != old->cl_proto) > > > > > > + return; > > > > > > + clp_salen = rpc_peeraddr(clp->cl_rpcclient, clp_sap, > > > > > > sizeof(clp_addr)); > > > > > > + old_salen = rpc_peeraddr(old->cl_rpcclient, old_sap, > > > > > > sizeof(old_addr)); > > > > > > + > > > > > > + if (clp_addr.ss_family != old_addr.ss_family) > > > > > > + return; > > > > > > + > > > > > > + xprt_args.dstaddr = clp_sap; > > > > > > + xprt_args.addrlen = clp_salen; > > > > > > + > > > > > > + xprtdata.cred = nfs4_get_clid_cred(old); > > > > > > + rpc_clnt_add_xprt(old->cl_rpcclient, &xprt_args, > > > > > > + rpc_clnt_setup_test_and_add_xprt, > > > > > > &rpcdata); > > > > > > > > > > Is there an upper bound on the number of transports that > > > > > are added to the NFS client's switch? > > > > > > > > I don't believe any limits exist right now. Why should there be a > > > > limit? Are you saying that the client should limit trunking? > > > > While > > > > this is not what's happening here, but say FS_LOCATION returned > > > > 100 > > > > ips for the server. Are you saying the client should be limiting > > > > how > > > > many trunkable connections it would be establishing and picking > > > > just a > > > > few addresses to try? What's happening with this patch is that > > > > say > > > > there are 100mounts to 100 ips (each representing the same server > > > > or > > > > trunkable server(s)), without this patch a single connection is > > > > kept, > > > > with this patch we'll have 100 connections. > > > > > > The patch description needs to make this behavior more clear. It > > > needs to explain "why" -- the body of the patch already explains > > > "what". Can you include your last sentence in the description as > > > a use case? > > > > I sure can. > > > > > As for the behavior... Seems to me that there are going to be only > > > infinitesimal gains after the first few connections, and after > > > that, it's going to be a lot for both sides to manage for no real > > > gain. I think you do want to cap the total number of connections > > > at a reasonable number, even in the FS_LOCATIONS case. > > > > Do you want to cap it at 16 like we do for nconnect? I'm ok with that > > for now. > > > > I don't understand why a setup where there X NICs on each side > > (client/server) and X mounts are done, there won't be throughput of > > close to X * throughput of a single NIC. > > That still does not make the patch acceptable. There are already server > vendors seeing problems with supporting nconnect for various reasons. Why are there servers presenting multiple IP addresses and returning the same server identity if they can not support trunking? That seems to be going against the spec? > There needs to be a way to ensure that we can keep the current client > behaviour without requiring changes to server DNS entries, etc. Ok, how about we introduce a mount option, "enable_trunking", and if that's present we would not collapse transports? > > > > > > > > + > > > > > > + if (xprtdata.cred) > > > > > > + put_cred(xprtdata.cred); > > > > > > +} > > > > > > + > > > > > > /** > > > > > > * nfs4_init_client - Initialise an NFS4 client record > > > > > > * > > > > > > @@ -434,6 +472,8 @@ struct nfs_client > > > > > > *nfs4_init_client(struct nfs_client *clp, > > > > > > * won't try to use it. > > > > > > */ > > > > > > nfs_mark_client_ready(clp, -EPERM); > > > > > > + if (old->cl_mvops->session_trunk) > > > > > > + nfs4_add_trunk(clp, old); > > > > > > } > > > > > > clear_bit(NFS_CS_TSM_POSSIBLE, &clp->cl_flags); > > > > > > nfs_put_client(clp); > > > > > > -- > > > > > > 2.27.0 > > > > > > > > > > > > > > > > -- > > > > > Chuck Lever > > > > > > -- > > > Chuck Lever > > > > > > > > > > > -- > Trond Myklebust > Linux NFS client maintainer, Hammerspace > trond.myklebust@hammerspace.com > >