X-Received: by 2002:a17:90a:c7c5:b0:1bc:85e6:ae6c with SMTP id gf5-20020a17090ac7c500b001bc85e6ae6cmr11833916pjb.144.1645716954175; Thu, 24 Feb 2022 07:35:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1645716954; cv=none; d=google.com; s=arc-20160816; b=ruPIytSsLKkSXOgNd3qaTmnGWyeHtlgj/eQmVQsn/yEHwUjbA9oc+60DXh+sCOq35/ a4NNdVDcTpmpCqIRNPw7GcnOtKnEmbpfrI4G3GyaXltSdK0TlOqriWHDumzkZ+IQhrJL s8lyquT5kkQFhTDFWbg7hGxmshcCSyJh6X1TfLfovHtUu2Ds3lRzubQbrR0Gy5I1KbI/ EdsvbuVG4dORGoEpGMn2ADnO061nC2495wIWduhbhFZ4ZZCeVRXpsPOKk3ou1n7CCk67 yBZZjLhWtyfWzXSesrXrjux55ggd1zVmAj/2EXDLF51mem9il9HPxOXRzoI+IiyJ7yue ySlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:subject :from:references:cc:to:content-language:user-agent:mime-version:date :message-id; bh=rU9d/aJ6mAFtxJEdIKAl1FgiYMT5bgU6lG8rWYVKtxg=; b=a5ZMqoFxcde0dAkq3Q70QNpX5LkeRR997YixyjxBNUzTdi3fZ085N9ToLSS/Hbi97f GLDKCL7lOnHTAFFx64L/tUSvOL38XZ01tQxaIMsHyeQ0If/9PQPVWU8KJ8SBCYSx6AAH OI75E4ahgO+EUBN8qGDi8p0dRsKsOEkZ2yQoiJn8kQTsleTF6ixjwWX9MhGYAmpKryPF 0jB4LN7htOYef6i/7VIu/txKgKIDxLgWcwawtlu431g8aGwSY3aRVLpZ1WFx+oAJo5sb QBN95dfjj32fSQNMJXXA154GT/TytxRIMtEIcMAHVn7P2+xYHmF2MPGBKC6HVzdia43W TrIg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mz7-20020a17090b378700b001bafa897aa4si5326130pjb.85.2022.02.24.07.35.30; Thu, 24 Feb 2022 07:35:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235291AbiBXNnU (ORCPT + 99 others); Thu, 24 Feb 2022 08:43:20 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41968 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233007AbiBXNnT (ORCPT ); Thu, 24 Feb 2022 08:43:19 -0500 Received: from cc-smtpout2.netcologne.de (cc-smtpout2.netcologne.de [89.1.8.212]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 776E0175836 for ; Thu, 24 Feb 2022 05:42:49 -0800 (PST) Received: from cc-smtpin3.netcologne.de (cc-smtpin3.netcologne.de [89.1.8.203]) by cc-smtpout2.netcologne.de (Postfix) with ESMTP id 85450127B4; Thu, 24 Feb 2022 14:42:46 +0100 (CET) Received: from nas2.garloff.de (xdsl-89-0-167-237.nc.de [89.0.167.237]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by cc-smtpin3.netcologne.de (Postfix) with ESMTPSA id BC5FC11E9E; Thu, 24 Feb 2022 14:42:42 +0100 (CET) Received: from [192.168.155.203] (unknown [192.168.155.10]) by nas2.garloff.de (Postfix) with ESMTPSA id 5C55BB3B131A; Thu, 24 Feb 2022 14:42:33 +0100 (CET) Message-ID: Date: Thu, 24 Feb 2022 14:42:41 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Content-Language: en-US To: Olga Kornievskaia , Trond Myklebust , Anna Schumaker Cc: linux-nfs References: <20220223174041.77887-1-olga.kornievskaia@gmail.com> From: Kurt Garloff Subject: Re: [PATCH v1] NFSv4.1 provide mount option to toggle trunking discovery In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-NetCologne-Spam: L X-Rspamd-Queue-Id: BC5FC11E9E X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Hi Olga, thanks! I can confirm that after applying your patch (against 5.15.24), passing the mount option notrunkdiscovery to NFS mount does indeed make the NFS mounts from the Qnap server (with knfsd from 3.4.6 kernel) work again. Sorry to say, but I don't think this is the final solution yet: * The option notrunkdiscovery is not tolerated by older kernels,   so there is no way to pass a setting that works with <= 5.15.23   and the kernels with your latest patch. This is a problem for   me who keeps automount maps in LDAP. * From a user perspective, the 5.15.24+/5.6.10+/5.17-rc behavior   is still a regression, as the Qnap NFS mounts all break. With   your patch, there is a way to recover, but it needs to be well   documented and then be found by an admin who then needs to do   the right change. Not acceptable for -stable IMVHO and according   to Greg's explanations not for mainline either. I see a number of possibilities to resolve this: (0) We pretend it's not a problem that's serious enough to take     action (and ensure that we do document this new option well). (1) We revert the patch that does FS_LOCATIONS discovery.     Assuming that FS_LOCATIONS does provide a useful feature, this     would not be our preferred solution, I guess ... (2) We prevent NFS v4.1 servers to use FS_LOCATIONS (like my patch     implements) and additionally allow for the opt-out with     notrunkdiscovery mount option. This fixes the known regression     with Qnap knfsd (without requiring user intervention) and still     allows for FS_LOCATIONS to be useful with NFSv4.2 servers that     support this. The disadvantage is that we won't use the feature     on NFSv4.1 servers which might support this feature perfectly     (and there's no opt-in possibility). And the risk is that there     might be NFSv4.2 servers out there that also misreport     FS_LOCATIONS support and still need manual intervention (which     at least is possible with notrunkdiscovery). (3) We make this feature an opt-in thing and require users to     pass trunkdiscovery to take advantage of the feature.     This has zero risk of breakage (unless we screw up the patch),     but always requires user intervention to take advantage of     the FS_LOCATIONS feature. (4) Identify a way to recover from the mount with FS_LOCATIONS     against the broken server, so instead of hanging we do just     turn this off if we find it not to work. Disadavantage is that     this adds complexity and might stall the mounting for a while     until the recovery worked. The complexity bears the risk for     us screwing up. I personally find solutions 2 -- 4 acceptable. If the experts see (4) as simple enough, it might be worth a try. Otherwise (2) or (3) would seem the way to go from my perspective. Thanks! -- Kurt Garloff Cologne, Germany