* [PATCH 0/2] Two short fixes for sm-notify
@ 2010-03-15 17:51 Chuck Lever
[not found] ` <20100315174453.2586.40876.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org>
0 siblings, 1 reply; 13+ messages in thread
From: Chuck Lever @ 2010-03-15 17:51 UTC (permalink / raw)
To: steved; +Cc: linux-nfs
Hi Steve-
These address two minor shortcomings when sending SM_NOTIFY requests
during reboot recovery. Please consider these for the next nfs-utils
release.
---
Chuck Lever (2):
sm-notify: Send fully-qualified and unqualified mon_names
sm-notify: Use my_name when sending SM_NOTIFY requests
utils/statd/sm-notify.c | 62 ++++++++++++++++++++++++++++++++++++---------
utils/statd/sm-notify.man | 28 +++++++++-----------
utils/statd/statd.man | 14 +---------
3 files changed, 64 insertions(+), 40 deletions(-)
--
Chuck Lever
^ permalink raw reply [flat|nested] 13+ messages in thread[parent not found: <20100315174453.2586.40876.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org>]
* [PATCH 1/2] sm-notify: Use my_name when sending SM_NOTIFY requests [not found] ` <20100315174453.2586.40876.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org> @ 2010-03-15 17:51 ` Chuck Lever [not found] ` <20100315175137.2586.71894.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org> 2010-03-15 17:51 ` [PATCH 2/2] sm-notify: Send fully-qualified and unqualified mon_names Chuck Lever ` (2 subsequent siblings) 3 siblings, 1 reply; 13+ messages in thread From: Chuck Lever @ 2010-03-15 17:51 UTC (permalink / raw) To: steved; +Cc: linux-nfs The mon_name argument of an SM_NOTIFY request is a string that identifies the rebooting host. sm-notify should send the my_name provided by the local lockd at the time the remote was monitored, rather than cocking up a mon_name argument based on the present return value of gethostname(3). If the local system's hostname happened to change after the last reboot, then the string returned by gethostname(3) will not be recognized by the remote. Thus the remote will never initiate lock recovery for the original named host, possibly leaving stale locks. The existing behavior of using the -v command line option as the mon_name argument is preserved, but we now prevent sending an IP presentation address, as some non-Linux implementations don't recognize addresses as valid mon_names. Signed-off-by: Chuck Lever <chuck.lever@oracle.com> --- utils/statd/sm-notify.c | 41 ++++++++++++++++++++++++++++++++--------- utils/statd/sm-notify.man | 28 +++++++++++++--------------- utils/statd/statd.man | 14 ++------------ 3 files changed, 47 insertions(+), 36 deletions(-) diff --git a/utils/statd/sm-notify.c b/utils/statd/sm-notify.c index 3259a3e..2d14668 100644 --- a/utils/statd/sm-notify.c +++ b/utils/statd/sm-notify.c @@ -54,7 +54,7 @@ struct nsm_host { uint32_t xid; }; -static char nsm_hostname[256]; +static char nsm_hostname[SM_MAXSTRLEN + 1]; static int nsm_state; static int nsm_family = AF_INET; static int opt_debug = 0; @@ -412,12 +412,33 @@ usage: fprintf(stderr, } } - if (opt_srcaddr) { - strncpy(nsm_hostname, opt_srcaddr, sizeof(nsm_hostname)-1); - } else - if (gethostname(nsm_hostname, sizeof(nsm_hostname)) < 0) { - xlog(L_ERROR, "Failed to obtain name of local host: %m"); - exit(1); + if (opt_srcaddr != NULL) { + struct addrinfo *ai = NULL; + struct addrinfo hint = { + .ai_family = AF_UNSPEC, + .ai_flags = AI_NUMERICHOST, + }; + + if (getaddrinfo(opt_srcaddr, NULL, &hint, &ai)) + /* not a presentation address - use it */ + strncpy(nsm_hostname, opt_srcaddr, sizeof(nsm_hostname)); + else { + /* was a presentation address - look it up in + * /etc/hosts, so it can be used for my_name */ + int error; + + freeaddrinfo(ai); + hint.ai_flags = AI_CANONNAME; + error = getaddrinfo(opt_srcaddr, NULL, &hint, &ai); + if (error != 0) { + xlog(L_ERROR, "Bind address %s is unusable: %s", + opt_srcaddr, gai_strerror(error)); + exit(1); + } + strncpy(nsm_hostname, ai->ai_canonname, + sizeof(nsm_hostname)); + freeaddrinfo(ai); + } } (void)nsm_retire_monitored_hosts(); @@ -535,6 +556,8 @@ notify(const int sock) static int notify_host(int sock, struct nsm_host *host) { + const char *my_name = (opt_srcaddr != NULL ? + nsm_hostname : host->my_name); struct sockaddr *sap; socklen_t salen; @@ -580,8 +603,8 @@ notify_host(int sock, struct nsm_host *host) host->xid = nsm_xmit_rpcbind(sock, sap, SM_PROG, SM_VERS); else host->xid = nsm_xmit_notify(sock, sap, salen, - SM_PROG, nsm_hostname, nsm_state); - + SM_PROG, my_name, nsm_state); + return 0; } diff --git a/utils/statd/sm-notify.man b/utils/statd/sm-notify.man index 163713e..7a1cbfa 100644 --- a/utils/statd/sm-notify.man +++ b/utils/statd/sm-notify.man @@ -97,11 +97,9 @@ It uses the string as the destination. To identify which host has rebooted, the .B sm-notify -command normally sends the results of -.BR gethostname (3) -as the +command normally sends .I my_name -string. +string recorded when that remote was monitored. The remote .B rpc.statd matches incoming SM_NOTIFY requests using this string, @@ -202,15 +200,22 @@ argument to use when sending SM_NOTIFY requests. If this option is not specified, .B sm-notify uses a wildcard address as the transport bind address, -and uses the results of -.BR gethostname (3) -as the +and uses the +.I my_name +recorded when the remote was monitored as the .I mon_name -argument. +argument when sending SM_NOTIFY requests. .IP The .I ipaddr form can be expressed as either an IPv4 or an IPv6 presentation address. +If the +.I ipaddr +form is used, the +.B sm-notify +command converts this address to a hostname for use as the +.I mon_name +argument when sending SM_NOTIFY requests. .IP This option can be useful in multi-homed configurations where the remote requires notification from a specific network address. @@ -252,13 +257,6 @@ consistent The hostname the client uses to mount the server should match the server's .I mon_name in SM_NOTIFY requests it sends -.IP -The use of network addresses as a -.I mon_name -or a -.I my_name -string should be avoided when -interoperating with non-Linux NFS implementations. .PP Unmounting an NFS file system does not necessarily stop either the NFS client or server from monitoring each other. diff --git a/utils/statd/statd.man b/utils/statd/statd.man index ffc5e95..ca00e24 100644 --- a/utils/statd/statd.man +++ b/utils/statd/statd.man @@ -100,11 +100,9 @@ It uses the string as the destination. To identify which host has rebooted, the .B sm-notify -command normally sends the results of -.BR gethostname (3) -as the +command sends the .I my_name -string. +string recorded when that remote was monitored. The remote .B rpc.statd matches incoming SM_NOTIFY requests using this string, @@ -292,7 +290,6 @@ man pages. .SH ADDITIONAL NOTES Lock recovery after a reboot is critical to maintaining data integrity and preventing unnecessary application hangs. -.PP To help .B rpc.statd match SM_NOTIFY requests to NLM requests, a number of best practices @@ -309,13 +306,6 @@ consistent The hostname the client uses to mount the server should match the server's .I mon_name in SM_NOTIFY requests it sends -.IP -The use of network addresses as a -.I mon_name -or a -.I my_name -string should be avoided when -interoperating with non-Linux NFS implementations. .PP Unmounting an NFS file system does not necessarily stop either the NFS client or server from monitoring each other. ^ permalink raw reply related [flat|nested] 13+ messages in thread
[parent not found: <20100315175137.2586.71894.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org>]
* Re: [PATCH 1/2] sm-notify: Use my_name when sending SM_NOTIFY requests [not found] ` <20100315175137.2586.71894.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org> @ 2010-03-15 22:25 ` Jeff Layton [not found] ` <20100315182535.2aacdadb-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 0 siblings, 1 reply; 13+ messages in thread From: Jeff Layton @ 2010-03-15 22:25 UTC (permalink / raw) To: Chuck Lever; +Cc: steved, linux-nfs On Mon, 15 Mar 2010 13:51:37 -0400 Chuck Lever <chuck.lever@oracle.com> wrote: > The mon_name argument of an SM_NOTIFY request is a string that > identifies the rebooting host. > > sm-notify should send the my_name provided by the local lockd at the > time the remote was monitored, rather than cocking up a mon_name > argument based on the present return value of gethostname(3). If the > local system's hostname happened to change after the last reboot, then > the string returned by gethostname(3) will not be recognized by the > remote. Thus the remote will never initiate lock recovery for the > original named host, possibly leaving stale locks. > > The existing behavior of using the -v command line option as the > mon_name argument is preserved, but we now prevent sending an IP > presentation address, as some non-Linux implementations don't > recognize addresses as valid mon_names. > > Signed-off-by: Chuck Lever <chuck.lever@oracle.com> > --- > > utils/statd/sm-notify.c | 41 ++++++++++++++++++++++++++++++++--------- > utils/statd/sm-notify.man | 28 +++++++++++++--------------- > utils/statd/statd.man | 14 ++------------ > 3 files changed, 47 insertions(+), 36 deletions(-) > > diff --git a/utils/statd/sm-notify.c b/utils/statd/sm-notify.c > index 3259a3e..2d14668 100644 > --- a/utils/statd/sm-notify.c > +++ b/utils/statd/sm-notify.c > @@ -54,7 +54,7 @@ struct nsm_host { > uint32_t xid; > }; > > -static char nsm_hostname[256]; > +static char nsm_hostname[SM_MAXSTRLEN + 1]; > static int nsm_state; > static int nsm_family = AF_INET; > static int opt_debug = 0; > @@ -412,12 +412,33 @@ usage: fprintf(stderr, > } > } > > - if (opt_srcaddr) { > - strncpy(nsm_hostname, opt_srcaddr, sizeof(nsm_hostname)-1); > - } else > - if (gethostname(nsm_hostname, sizeof(nsm_hostname)) < 0) { > - xlog(L_ERROR, "Failed to obtain name of local host: %m"); > - exit(1); > + if (opt_srcaddr != NULL) { > + struct addrinfo *ai = NULL; > + struct addrinfo hint = { > + .ai_family = AF_UNSPEC, > + .ai_flags = AI_NUMERICHOST, > + }; > + > + if (getaddrinfo(opt_srcaddr, NULL, &hint, &ai)) > + /* not a presentation address - use it */ > + strncpy(nsm_hostname, opt_srcaddr, sizeof(nsm_hostname)); > + else { > + /* was a presentation address - look it up in > + * /etc/hosts, so it can be used for my_name */ > + int error; > + > + freeaddrinfo(ai); > + hint.ai_flags = AI_CANONNAME; > + error = getaddrinfo(opt_srcaddr, NULL, &hint, &ai); > + if (error != 0) { > + xlog(L_ERROR, "Bind address %s is unusable: %s", > + opt_srcaddr, gai_strerror(error)); > + exit(1); > + } > + strncpy(nsm_hostname, ai->ai_canonname, > + sizeof(nsm_hostname)); > + freeaddrinfo(ai); > + } >From what I can tell, lockd always uses the utsname()->nodename for the "caller" field. Am I correct that that's what the server generally expects to get from the client for my_name on a NSM notification? If so, wouldn't the above patch pretty much ensure that the kernel and statd are sending different info here? > } > > (void)nsm_retire_monitored_hosts(); > @@ -535,6 +556,8 @@ notify(const int sock) > static int > notify_host(int sock, struct nsm_host *host) > { > + const char *my_name = (opt_srcaddr != NULL ? > + nsm_hostname : host->my_name); > struct sockaddr *sap; > socklen_t salen; > > @@ -580,8 +603,8 @@ notify_host(int sock, struct nsm_host *host) > host->xid = nsm_xmit_rpcbind(sock, sap, SM_PROG, SM_VERS); > else > host->xid = nsm_xmit_notify(sock, sap, salen, > - SM_PROG, nsm_hostname, nsm_state); > - > + SM_PROG, my_name, nsm_state); > + > return 0; > } > > diff --git a/utils/statd/sm-notify.man b/utils/statd/sm-notify.man > index 163713e..7a1cbfa 100644 > --- a/utils/statd/sm-notify.man > +++ b/utils/statd/sm-notify.man > @@ -97,11 +97,9 @@ It uses the > string as the destination. > To identify which host has rebooted, the > .B sm-notify > -command normally sends the results of > -.BR gethostname (3) > -as the > +command normally sends > .I my_name > -string. > +string recorded when that remote was monitored. > The remote > .B rpc.statd > matches incoming SM_NOTIFY requests using this string, > @@ -202,15 +200,22 @@ argument to use when sending SM_NOTIFY requests. > If this option is not specified, > .B sm-notify > uses a wildcard address as the transport bind address, > -and uses the results of > -.BR gethostname (3) > -as the > +and uses the > +.I my_name > +recorded when the remote was monitored as the > .I mon_name > -argument. > +argument when sending SM_NOTIFY requests. > .IP > The > .I ipaddr > form can be expressed as either an IPv4 or an IPv6 presentation address. > +If the > +.I ipaddr > +form is used, the > +.B sm-notify > +command converts this address to a hostname for use as the > +.I mon_name > +argument when sending SM_NOTIFY requests. > .IP > This option can be useful in multi-homed configurations where > the remote requires notification from a specific network address. > @@ -252,13 +257,6 @@ consistent > The hostname the client uses to mount the server should match the server's > .I mon_name > in SM_NOTIFY requests it sends > -.IP > -The use of network addresses as a > -.I mon_name > -or a > -.I my_name > -string should be avoided when > -interoperating with non-Linux NFS implementations. > .PP > Unmounting an NFS file system does not necessarily stop > either the NFS client or server from monitoring each other. > diff --git a/utils/statd/statd.man b/utils/statd/statd.man > index ffc5e95..ca00e24 100644 > --- a/utils/statd/statd.man > +++ b/utils/statd/statd.man > @@ -100,11 +100,9 @@ It uses the > string as the destination. > To identify which host has rebooted, the > .B sm-notify > -command normally sends the results of > -.BR gethostname (3) > -as the > +command sends the > .I my_name > -string. > +string recorded when that remote was monitored. > The remote > .B rpc.statd > matches incoming SM_NOTIFY requests using this string, > @@ -292,7 +290,6 @@ man pages. > .SH ADDITIONAL NOTES > Lock recovery after a reboot is critical to maintaining data integrity > and preventing unnecessary application hangs. > -.PP > To help > .B rpc.statd > match SM_NOTIFY requests to NLM requests, a number of best practices > @@ -309,13 +306,6 @@ consistent > The hostname the client uses to mount the server should match the server's > .I mon_name > in SM_NOTIFY requests it sends > -.IP > -The use of network addresses as a > -.I mon_name > -or a > -.I my_name > -string should be avoided when > -interoperating with non-Linux NFS implementations. > .PP > Unmounting an NFS file system does not necessarily stop > either the NFS client or server from monitoring each other. > > -- > To unsubscribe from this list: send the line "unsubscribe linux-nfs" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html > -- Jeff Layton <jlayton@poochiereds.net> ^ permalink raw reply [flat|nested] 13+ messages in thread
[parent not found: <20100315182535.2aacdadb-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org>]
* Re: [PATCH 1/2] sm-notify: Use my_name when sending SM_NOTIFY requests [not found] ` <20100315182535.2aacdadb-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> @ 2010-03-16 4:12 ` Chuck Lever 2010-03-16 11:20 ` Jeff Layton 0 siblings, 1 reply; 13+ messages in thread From: Chuck Lever @ 2010-03-16 4:12 UTC (permalink / raw) To: Jeff Layton; +Cc: steved, linux-nfs On 03/15/2010 06:25 PM, Jeff Layton wrote: > On Mon, 15 Mar 2010 13:51:37 -0400 > Chuck Lever<chuck.lever@oracle.com> wrote: > >> The mon_name argument of an SM_NOTIFY request is a string that >> identifies the rebooting host. >> >> sm-notify should send the my_name provided by the local lockd at the >> time the remote was monitored, rather than cocking up a mon_name >> argument based on the present return value of gethostname(3). If the >> local system's hostname happened to change after the last reboot, then >> the string returned by gethostname(3) will not be recognized by the >> remote. Thus the remote will never initiate lock recovery for the >> original named host, possibly leaving stale locks. >> >> The existing behavior of using the -v command line option as the >> mon_name argument is preserved, but we now prevent sending an IP >> presentation address, as some non-Linux implementations don't >> recognize addresses as valid mon_names. >> >> Signed-off-by: Chuck Lever<chuck.lever@oracle.com> >> --- >> >> utils/statd/sm-notify.c | 41 ++++++++++++++++++++++++++++++++--------- >> utils/statd/sm-notify.man | 28 +++++++++++++--------------- >> utils/statd/statd.man | 14 ++------------ >> 3 files changed, 47 insertions(+), 36 deletions(-) >> >> diff --git a/utils/statd/sm-notify.c b/utils/statd/sm-notify.c >> index 3259a3e..2d14668 100644 >> --- a/utils/statd/sm-notify.c >> +++ b/utils/statd/sm-notify.c >> @@ -54,7 +54,7 @@ struct nsm_host { >> uint32_t xid; >> }; >> >> -static char nsm_hostname[256]; >> +static char nsm_hostname[SM_MAXSTRLEN + 1]; >> static int nsm_state; >> static int nsm_family = AF_INET; >> static int opt_debug = 0; >> @@ -412,12 +412,33 @@ usage: fprintf(stderr, >> } >> } >> >> - if (opt_srcaddr) { >> - strncpy(nsm_hostname, opt_srcaddr, sizeof(nsm_hostname)-1); >> - } else >> - if (gethostname(nsm_hostname, sizeof(nsm_hostname))< 0) { >> - xlog(L_ERROR, "Failed to obtain name of local host: %m"); >> - exit(1); >> + if (opt_srcaddr != NULL) { >> + struct addrinfo *ai = NULL; >> + struct addrinfo hint = { >> + .ai_family = AF_UNSPEC, >> + .ai_flags = AI_NUMERICHOST, >> + }; >> + >> + if (getaddrinfo(opt_srcaddr, NULL,&hint,&ai)) >> + /* not a presentation address - use it */ >> + strncpy(nsm_hostname, opt_srcaddr, sizeof(nsm_hostname)); >> + else { >> + /* was a presentation address - look it up in >> + * /etc/hosts, so it can be used for my_name */ >> + int error; >> + >> + freeaddrinfo(ai); >> + hint.ai_flags = AI_CANONNAME; >> + error = getaddrinfo(opt_srcaddr, NULL,&hint,&ai); >> + if (error != 0) { >> + xlog(L_ERROR, "Bind address %s is unusable: %s", >> + opt_srcaddr, gai_strerror(error)); >> + exit(1); >> + } >> + strncpy(nsm_hostname, ai->ai_canonname, >> + sizeof(nsm_hostname)); >> + freeaddrinfo(ai); >> + } > > From what I can tell, lockd always uses the utsname()->nodename for the > "caller" field. Am I correct that that's what the server generally > expects to get from the client for my_name on a NSM notification? Yes. > If so, wouldn't the above patch pretty much ensure that the kernel and > statd are sending different info here? No, it guarantees they send the same info. lockd sends the same "caller" string to statd in an SM_MON request with the "my_name" argument. Statd records that value in the monitor record for this peer. That value is what I'm telling sm-notify to use here, rather than using gethostname(3)... precisely because the return value of gethostname(3) during this boot is not always the same as the value of utsname()->nodename during the previous boot. >> } >> >> (void)nsm_retire_monitored_hosts(); >> @@ -535,6 +556,8 @@ notify(const int sock) >> static int >> notify_host(int sock, struct nsm_host *host) >> { >> + const char *my_name = (opt_srcaddr != NULL ? >> + nsm_hostname : host->my_name); >> struct sockaddr *sap; >> socklen_t salen; >> >> @@ -580,8 +603,8 @@ notify_host(int sock, struct nsm_host *host) >> host->xid = nsm_xmit_rpcbind(sock, sap, SM_PROG, SM_VERS); >> else >> host->xid = nsm_xmit_notify(sock, sap, salen, >> - SM_PROG, nsm_hostname, nsm_state); >> - >> + SM_PROG, my_name, nsm_state); >> + >> return 0; >> } >> >> diff --git a/utils/statd/sm-notify.man b/utils/statd/sm-notify.man >> index 163713e..7a1cbfa 100644 >> --- a/utils/statd/sm-notify.man >> +++ b/utils/statd/sm-notify.man >> @@ -97,11 +97,9 @@ It uses the >> string as the destination. >> To identify which host has rebooted, the >> .B sm-notify >> -command normally sends the results of >> -.BR gethostname (3) >> -as the >> +command normally sends >> .I my_name >> -string. >> +string recorded when that remote was monitored. >> The remote >> .B rpc.statd >> matches incoming SM_NOTIFY requests using this string, >> @@ -202,15 +200,22 @@ argument to use when sending SM_NOTIFY requests. >> If this option is not specified, >> .B sm-notify >> uses a wildcard address as the transport bind address, >> -and uses the results of >> -.BR gethostname (3) >> -as the >> +and uses the >> +.I my_name >> +recorded when the remote was monitored as the >> .I mon_name >> -argument. >> +argument when sending SM_NOTIFY requests. >> .IP >> The >> .I ipaddr >> form can be expressed as either an IPv4 or an IPv6 presentation address. >> +If the >> +.I ipaddr >> +form is used, the >> +.B sm-notify >> +command converts this address to a hostname for use as the >> +.I mon_name >> +argument when sending SM_NOTIFY requests. >> .IP >> This option can be useful in multi-homed configurations where >> the remote requires notification from a specific network address. >> @@ -252,13 +257,6 @@ consistent >> The hostname the client uses to mount the server should match the server's >> .I mon_name >> in SM_NOTIFY requests it sends >> -.IP >> -The use of network addresses as a >> -.I mon_name >> -or a >> -.I my_name >> -string should be avoided when >> -interoperating with non-Linux NFS implementations. >> .PP >> Unmounting an NFS file system does not necessarily stop >> either the NFS client or server from monitoring each other. >> diff --git a/utils/statd/statd.man b/utils/statd/statd.man >> index ffc5e95..ca00e24 100644 >> --- a/utils/statd/statd.man >> +++ b/utils/statd/statd.man >> @@ -100,11 +100,9 @@ It uses the >> string as the destination. >> To identify which host has rebooted, the >> .B sm-notify >> -command normally sends the results of >> -.BR gethostname (3) >> -as the >> +command sends the >> .I my_name >> -string. >> +string recorded when that remote was monitored. >> The remote >> .B rpc.statd >> matches incoming SM_NOTIFY requests using this string, >> @@ -292,7 +290,6 @@ man pages. >> .SH ADDITIONAL NOTES >> Lock recovery after a reboot is critical to maintaining data integrity >> and preventing unnecessary application hangs. >> -.PP >> To help >> .B rpc.statd >> match SM_NOTIFY requests to NLM requests, a number of best practices >> @@ -309,13 +306,6 @@ consistent >> The hostname the client uses to mount the server should match the server's >> .I mon_name >> in SM_NOTIFY requests it sends >> -.IP >> -The use of network addresses as a >> -.I mon_name >> -or a >> -.I my_name >> -string should be avoided when >> -interoperating with non-Linux NFS implementations. >> .PP >> Unmounting an NFS file system does not necessarily stop >> either the NFS client or server from monitoring each other. >> >> -- >> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in >> the body of a message to majordomo@vger.kernel.org >> More majordomo info at http://vger.kernel.org/majordomo-info.html >> > > -- chuck[dot]lever[at]oracle[dot]com ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH 1/2] sm-notify: Use my_name when sending SM_NOTIFY requests 2010-03-16 4:12 ` Chuck Lever @ 2010-03-16 11:20 ` Jeff Layton 0 siblings, 0 replies; 13+ messages in thread From: Jeff Layton @ 2010-03-16 11:20 UTC (permalink / raw) To: Chuck Lever; +Cc: steved, linux-nfs On Tue, 16 Mar 2010 00:12:01 -0400 Chuck Lever <chuck.lever@oracle.com> wrote: > On 03/15/2010 06:25 PM, Jeff Layton wrote: > > On Mon, 15 Mar 2010 13:51:37 -0400 > > Chuck Lever<chuck.lever@oracle.com> wrote: > > > >> The mon_name argument of an SM_NOTIFY request is a string that > >> identifies the rebooting host. > >> > >> sm-notify should send the my_name provided by the local lockd at the > >> time the remote was monitored, rather than cocking up a mon_name > >> argument based on the present return value of gethostname(3). If the > >> local system's hostname happened to change after the last reboot, then > >> the string returned by gethostname(3) will not be recognized by the > >> remote. Thus the remote will never initiate lock recovery for the > >> original named host, possibly leaving stale locks. > >> > >> The existing behavior of using the -v command line option as the > >> mon_name argument is preserved, but we now prevent sending an IP > >> presentation address, as some non-Linux implementations don't > >> recognize addresses as valid mon_names. > >> > >> Signed-off-by: Chuck Lever<chuck.lever@oracle.com> > >> --- > >> > >> utils/statd/sm-notify.c | 41 ++++++++++++++++++++++++++++++++--------- > >> utils/statd/sm-notify.man | 28 +++++++++++++--------------- > >> utils/statd/statd.man | 14 ++------------ > >> 3 files changed, 47 insertions(+), 36 deletions(-) > >> > >> diff --git a/utils/statd/sm-notify.c b/utils/statd/sm-notify.c > >> index 3259a3e..2d14668 100644 > >> --- a/utils/statd/sm-notify.c > >> +++ b/utils/statd/sm-notify.c > >> @@ -54,7 +54,7 @@ struct nsm_host { > >> uint32_t xid; > >> }; > >> > >> -static char nsm_hostname[256]; > >> +static char nsm_hostname[SM_MAXSTRLEN + 1]; > >> static int nsm_state; > >> static int nsm_family = AF_INET; > >> static int opt_debug = 0; > >> @@ -412,12 +412,33 @@ usage: fprintf(stderr, > >> } > >> } > >> > >> - if (opt_srcaddr) { > >> - strncpy(nsm_hostname, opt_srcaddr, sizeof(nsm_hostname)-1); > >> - } else > >> - if (gethostname(nsm_hostname, sizeof(nsm_hostname))< 0) { > >> - xlog(L_ERROR, "Failed to obtain name of local host: %m"); > >> - exit(1); > >> + if (opt_srcaddr != NULL) { > >> + struct addrinfo *ai = NULL; > >> + struct addrinfo hint = { > >> + .ai_family = AF_UNSPEC, > >> + .ai_flags = AI_NUMERICHOST, > >> + }; > >> + > >> + if (getaddrinfo(opt_srcaddr, NULL,&hint,&ai)) > >> + /* not a presentation address - use it */ > >> + strncpy(nsm_hostname, opt_srcaddr, sizeof(nsm_hostname)); > >> + else { > >> + /* was a presentation address - look it up in > >> + * /etc/hosts, so it can be used for my_name */ > >> + int error; > >> + > >> + freeaddrinfo(ai); > >> + hint.ai_flags = AI_CANONNAME; > >> + error = getaddrinfo(opt_srcaddr, NULL,&hint,&ai); > >> + if (error != 0) { > >> + xlog(L_ERROR, "Bind address %s is unusable: %s", > >> + opt_srcaddr, gai_strerror(error)); > >> + exit(1); > >> + } > >> + strncpy(nsm_hostname, ai->ai_canonname, > >> + sizeof(nsm_hostname)); > >> + freeaddrinfo(ai); > >> + } > > > > From what I can tell, lockd always uses the utsname()->nodename for the > > "caller" field. Am I correct that that's what the server generally > > expects to get from the client for my_name on a NSM notification? > > Yes. > > > If so, wouldn't the above patch pretty much ensure that the kernel and > > statd are sending different info here? > > No, it guarantees they send the same info. > > lockd sends the same "caller" string to statd in an SM_MON request with > the "my_name" argument. Statd records that value in the monitor record > for this peer. > > That value is what I'm telling sm-notify to use here, rather than using > gethostname(3)... precisely because the return value of gethostname(3) > during this boot is not always the same as the value of > utsname()->nodename during the previous boot. > > >> } > >> > >> (void)nsm_retire_monitored_hosts(); > >> @@ -535,6 +556,8 @@ notify(const int sock) > >> static int > >> notify_host(int sock, struct nsm_host *host) > >> { > >> + const char *my_name = (opt_srcaddr != NULL ? > >> + nsm_hostname : host->my_name); > >> struct sockaddr *sap; > >> socklen_t salen; > >> > >> @@ -580,8 +603,8 @@ notify_host(int sock, struct nsm_host *host) > >> host->xid = nsm_xmit_rpcbind(sock, sap, SM_PROG, SM_VERS); > >> else > >> host->xid = nsm_xmit_notify(sock, sap, salen, > >> - SM_PROG, nsm_hostname, nsm_state); > >> - > >> + SM_PROG, my_name, nsm_state); > >> + > >> return 0; > >> } > >> > >> diff --git a/utils/statd/sm-notify.man b/utils/statd/sm-notify.man > >> index 163713e..7a1cbfa 100644 > >> --- a/utils/statd/sm-notify.man > >> +++ b/utils/statd/sm-notify.man > >> @@ -97,11 +97,9 @@ It uses the > >> string as the destination. > >> To identify which host has rebooted, the > >> .B sm-notify > >> -command normally sends the results of > >> -.BR gethostname (3) > >> -as the > >> +command normally sends > >> .I my_name > >> -string. > >> +string recorded when that remote was monitored. > >> The remote > >> .B rpc.statd > >> matches incoming SM_NOTIFY requests using this string, > >> @@ -202,15 +200,22 @@ argument to use when sending SM_NOTIFY requests. > >> If this option is not specified, > >> .B sm-notify > >> uses a wildcard address as the transport bind address, > >> -and uses the results of > >> -.BR gethostname (3) > >> -as the > >> +and uses the > >> +.I my_name > >> +recorded when the remote was monitored as the > >> .I mon_name > >> -argument. > >> +argument when sending SM_NOTIFY requests. > >> .IP > >> The > >> .I ipaddr > >> form can be expressed as either an IPv4 or an IPv6 presentation address. > >> +If the > >> +.I ipaddr > >> +form is used, the > >> +.B sm-notify > >> +command converts this address to a hostname for use as the > >> +.I mon_name > >> +argument when sending SM_NOTIFY requests. > >> .IP > >> This option can be useful in multi-homed configurations where > >> the remote requires notification from a specific network address. > >> @@ -252,13 +257,6 @@ consistent > >> The hostname the client uses to mount the server should match the server's > >> .I mon_name > >> in SM_NOTIFY requests it sends > >> -.IP > >> -The use of network addresses as a > >> -.I mon_name > >> -or a > >> -.I my_name > >> -string should be avoided when > >> -interoperating with non-Linux NFS implementations. > >> .PP > >> Unmounting an NFS file system does not necessarily stop > >> either the NFS client or server from monitoring each other. > >> diff --git a/utils/statd/statd.man b/utils/statd/statd.man > >> index ffc5e95..ca00e24 100644 > >> --- a/utils/statd/statd.man > >> +++ b/utils/statd/statd.man > >> @@ -100,11 +100,9 @@ It uses the > >> string as the destination. > >> To identify which host has rebooted, the > >> .B sm-notify > >> -command normally sends the results of > >> -.BR gethostname (3) > >> -as the > >> +command sends the > >> .I my_name > >> -string. > >> +string recorded when that remote was monitored. > >> The remote > >> .B rpc.statd > >> matches incoming SM_NOTIFY requests using this string, > >> @@ -292,7 +290,6 @@ man pages. > >> .SH ADDITIONAL NOTES > >> Lock recovery after a reboot is critical to maintaining data integrity > >> and preventing unnecessary application hangs. > >> -.PP > >> To help > >> .B rpc.statd > >> match SM_NOTIFY requests to NLM requests, a number of best practices > >> @@ -309,13 +306,6 @@ consistent > >> The hostname the client uses to mount the server should match the server's > >> .I mon_name > >> in SM_NOTIFY requests it sends > >> -.IP > >> -The use of network addresses as a > >> -.I mon_name > >> -or a > >> -.I my_name > >> -string should be avoided when > >> -interoperating with non-Linux NFS implementations. > >> .PP > >> Unmounting an NFS file system does not necessarily stop > >> either the NFS client or server from monitoring each other. > >> > >> -- > >> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in > >> the body of a message to majordomo@vger.kernel.org > >> More majordomo info at http://vger.kernel.org/majordomo-info.html > >> > > > > > > Thanks, that makes sense. This patch looks sane to me, but I think it does sort of point out that using '-v' is heavily reliant on being able to reverse-resolve that address to the nodename of the server. Ahh well, not much we can do about that but warn people off from using that option unless they know what they're doing... Reviewed-by: Jeff Layton <jlayton@redhat.com> ^ permalink raw reply [flat|nested] 13+ messages in thread
* [PATCH 2/2] sm-notify: Send fully-qualified and unqualified mon_names [not found] ` <20100315174453.2586.40876.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org> 2010-03-15 17:51 ` [PATCH 1/2] sm-notify: Use my_name when sending SM_NOTIFY requests Chuck Lever @ 2010-03-15 17:51 ` Chuck Lever [not found] ` <20100315175145.2586.1215.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org> 2010-03-17 10:53 ` [PATCH 0/2] Two short fixes for sm-notify Steve Dickson 2010-03-19 20:05 ` Steve Dickson 3 siblings, 1 reply; 13+ messages in thread From: Chuck Lever @ 2010-03-15 17:51 UTC (permalink / raw) To: steved; +Cc: linux-nfs During any file locking interaction between an NFS client and server, the client tells the server what hostname it will use as the mon_name argument of the SM_NOTIFY request sent by the client when it reboots. This is the "caller_name" argument of an NLMPROC_LOCK request. The server, however, never tells the client what mon_name argument it will use when sending an SM_NOTIFY request. In order to recognize the server, clients usually guess what mon_name the server might send, by using the server hostname provided by the user on the mount command line. Frequently, the user provides an unqualified server name on the mount command. The server might then call the client back with a fully qualified domain name, which might not match in some cases. Solaris, and perhaps other implementations, attempt to mitigate this problem by sending two SM_NOTIFY requests to each peer: one with an unqualified mon_name argument, and one with a fully qualified mon_name. Implement such a scheme for sm-notify. Since my_name is almost always the fully-qualified hostname associated with the local system, just wiping the left-most '.' in the my_name argument and sending another SM_NOTIFY is nearly always sufficient. Signed-off-by: Chuck Lever <chuck.lever@oracle.com> --- utils/statd/sm-notify.c | 21 +++++++++++++++++---- 1 files changed, 17 insertions(+), 4 deletions(-) diff --git a/utils/statd/sm-notify.c b/utils/statd/sm-notify.c index 2d14668..437e37a 100644 --- a/utils/statd/sm-notify.c +++ b/utils/statd/sm-notify.c @@ -634,15 +634,28 @@ recv_rpcbind_reply(struct sockaddr *sap, struct nsm_host *host, XDR *xdr) } /* - * Successful NOTIFY call. Server returns void, so nothing - * we need to do here. + * Successful NOTIFY call. Server returns void. + * + * Try sending another SM_NOTIFY with an unqualified "my_name" + * argument. Reuse the port number. If "my_name" is already + * unqualified, we're done. */ static void recv_notify_reply(struct nsm_host *host) { - xlog(D_GENERAL, "Host %s notified successfully", host->name); + char *dot = strchr(host->my_name, '.'); - smn_forget_host(host); + if (dot != NULL) { + *dot = '\0'; + host->send_next = time(NULL); + host->xid = 0; + if (host->timeout >= NSM_MAX_TIMEOUT / 4) + host->timeout = NSM_MAX_TIMEOUT / 4; + insert_host(host); + } else { + xlog(D_GENERAL, "Host %s notified successfully", host->name); + smn_forget_host(host); + } } /* ^ permalink raw reply related [flat|nested] 13+ messages in thread
[parent not found: <20100315175145.2586.1215.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org>]
* Re: [PATCH 2/2] sm-notify: Send fully-qualified and unqualified mon_names [not found] ` <20100315175145.2586.1215.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org> @ 2010-03-15 22:30 ` Jeff Layton 2010-03-17 10:36 ` Steve Dickson 1 sibling, 0 replies; 13+ messages in thread From: Jeff Layton @ 2010-03-15 22:30 UTC (permalink / raw) To: Chuck Lever; +Cc: steved, linux-nfs On Mon, 15 Mar 2010 13:51:45 -0400 Chuck Lever <chuck.lever@oracle.com> wrote: > During any file locking interaction between an NFS client and server, > the client tells the server what hostname it will use as the mon_name > argument of the SM_NOTIFY request sent by the client when it reboots. > This is the "caller_name" argument of an NLMPROC_LOCK request. > > The server, however, never tells the client what mon_name argument > it will use when sending an SM_NOTIFY request. In order to recognize > the server, clients usually guess what mon_name the server might > send, by using the server hostname provided by the user on the mount > command line. > > Frequently, the user provides an unqualified server name on the mount > command. The server might then call the client back with a fully > qualified domain name, which might not match in some cases. > > Solaris, and perhaps other implementations, attempt to mitigate this > problem by sending two SM_NOTIFY requests to each peer: one with an > unqualified mon_name argument, and one with a fully qualified mon_name. > > Implement such a scheme for sm-notify. > > Since my_name is almost always the fully-qualified hostname associated > with the local system, just wiping the left-most '.' in the my_name > argument and sending another SM_NOTIFY is nearly always sufficient. > > Signed-off-by: Chuck Lever <chuck.lever@oracle.com> Looks reasonable, and we tested a similar or identical patch prior to Connectathon and during it. Reviewed-by: Jeff Layton <jlayton@redhat.com> > --- > > utils/statd/sm-notify.c | 21 +++++++++++++++++---- > 1 files changed, 17 insertions(+), 4 deletions(-) > > diff --git a/utils/statd/sm-notify.c b/utils/statd/sm-notify.c > index 2d14668..437e37a 100644 > --- a/utils/statd/sm-notify.c > +++ b/utils/statd/sm-notify.c > @@ -634,15 +634,28 @@ recv_rpcbind_reply(struct sockaddr *sap, struct nsm_host *host, XDR *xdr) > } > > /* > - * Successful NOTIFY call. Server returns void, so nothing > - * we need to do here. > + * Successful NOTIFY call. Server returns void. > + * > + * Try sending another SM_NOTIFY with an unqualified "my_name" > + * argument. Reuse the port number. If "my_name" is already > + * unqualified, we're done. > */ > static void > recv_notify_reply(struct nsm_host *host) > { > - xlog(D_GENERAL, "Host %s notified successfully", host->name); > + char *dot = strchr(host->my_name, '.'); > > - smn_forget_host(host); > + if (dot != NULL) { > + *dot = '\0'; > + host->send_next = time(NULL); > + host->xid = 0; > + if (host->timeout >= NSM_MAX_TIMEOUT / 4) > + host->timeout = NSM_MAX_TIMEOUT / 4; > + insert_host(host); > + } else { > + xlog(D_GENERAL, "Host %s notified successfully", host->name); > + smn_forget_host(host); > + } > } > > /* > ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH 2/2] sm-notify: Send fully-qualified and unqualified mon_names [not found] ` <20100315175145.2586.1215.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org> 2010-03-15 22:30 ` Jeff Layton @ 2010-03-17 10:36 ` Steve Dickson [not found] ` <4BA0B0A4.6020705-AfCzQyP5zfLQT0dZR+AlfA@public.gmane.org> 1 sibling, 1 reply; 13+ messages in thread From: Steve Dickson @ 2010-03-17 10:36 UTC (permalink / raw) To: Chuck Lever; +Cc: linux-nfs On 03/15/2010 01:51 PM, Chuck Lever wrote: > During any file locking interaction between an NFS client and server, > the client tells the server what hostname it will use as the mon_name > argument of the SM_NOTIFY request sent by the client when it reboots. > This is the "caller_name" argument of an NLMPROC_LOCK request. > > The server, however, never tells the client what mon_name argument > it will use when sending an SM_NOTIFY request. In order to recognize > the server, clients usually guess what mon_name the server might > send, by using the server hostname provided by the user on the mount > command line. > > Frequently, the user provides an unqualified server name on the mount > command. The server might then call the client back with a fully > qualified domain name, which might not match in some cases. > > Solaris, and perhaps other implementations, attempt to mitigate this > problem by sending two SM_NOTIFY requests to each peer: one with an > unqualified mon_name argument, and one with a fully qualified mon_name. > > Implement such a scheme for sm-notify. > > Since my_name is almost always the fully-qualified hostname associated > with the local system, just wiping the left-most '.' in the my_name > argument and sending another SM_NOTIFY is nearly always sufficient. > > Signed-off-by: Chuck Lever <chuck.lever@oracle.com> > --- > > utils/statd/sm-notify.c | 21 +++++++++++++++++---- > 1 files changed, 17 insertions(+), 4 deletions(-) > > diff --git a/utils/statd/sm-notify.c b/utils/statd/sm-notify.c > index 2d14668..437e37a 100644 > --- a/utils/statd/sm-notify.c > +++ b/utils/statd/sm-notify.c > @@ -634,15 +634,28 @@ recv_rpcbind_reply(struct sockaddr *sap, struct nsm_host *host, XDR *xdr) > } > > /* > - * Successful NOTIFY call. Server returns void, so nothing > - * we need to do here. > + * Successful NOTIFY call. Server returns void. > + * > + * Try sending another SM_NOTIFY with an unqualified "my_name" > + * argument. Reuse the port number. If "my_name" is already > + * unqualified, we're done. > */ > static void > recv_notify_reply(struct nsm_host *host) > { > - xlog(D_GENERAL, "Host %s notified successfully", host->name); > + char *dot = strchr(host->my_name, '.'); > > - smn_forget_host(host); > + if (dot != NULL) { > + *dot = '\0'; > + host->send_next = time(NULL); > + host->xid = 0; > + if (host->timeout >= NSM_MAX_TIMEOUT / 4) > + host->timeout = NSM_MAX_TIMEOUT / 4; > + insert_host(host); What happens when host->my_name now resolves to host in a different domain? Will this mean we now will be sending SM_NOTIFYs to random hosts? Also, what happens when host->my_name does not resolve to anything? Looking at notify(), it appears the unqualified my_name will stay on the hosts list, because notify_host() will fail since the smn_lookup() fails and will always set host->ai = NULL. Unless I am missing something, this will cause notify() to increment hp->retries and insert the hp pointer back on the host list. I don't see how that cycle will broken.... steved. ^ permalink raw reply [flat|nested] 13+ messages in thread
[parent not found: <4BA0B0A4.6020705-AfCzQyP5zfLQT0dZR+AlfA@public.gmane.org>]
* Re: [PATCH 2/2] sm-notify: Send fully-qualified and unqualified mon_names [not found] ` <4BA0B0A4.6020705-AfCzQyP5zfLQT0dZR+AlfA@public.gmane.org> @ 2010-03-17 14:39 ` Chuck Lever 2010-03-19 20:03 ` Steve Dickson 0 siblings, 1 reply; 13+ messages in thread From: Chuck Lever @ 2010-03-17 14:39 UTC (permalink / raw) To: Steve Dickson; +Cc: linux-nfs On 03/17/2010 06:36 AM, Steve Dickson wrote: > On 03/15/2010 01:51 PM, Chuck Lever wrote: >> During any file locking interaction between an NFS client and server, >> the client tells the server what hostname it will use as the mon_name >> argument of the SM_NOTIFY request sent by the client when it reboots. >> This is the "caller_name" argument of an NLMPROC_LOCK request. >> >> The server, however, never tells the client what mon_name argument >> it will use when sending an SM_NOTIFY request. In order to recognize >> the server, clients usually guess what mon_name the server might >> send, by using the server hostname provided by the user on the mount >> command line. >> >> Frequently, the user provides an unqualified server name on the mount >> command. The server might then call the client back with a fully >> qualified domain name, which might not match in some cases. >> >> Solaris, and perhaps other implementations, attempt to mitigate this >> problem by sending two SM_NOTIFY requests to each peer: one with an >> unqualified mon_name argument, and one with a fully qualified mon_name. >> >> Implement such a scheme for sm-notify. >> >> Since my_name is almost always the fully-qualified hostname associated >> with the local system, just wiping the left-most '.' in the my_name >> argument and sending another SM_NOTIFY is nearly always sufficient. >> >> Signed-off-by: Chuck Lever<chuck.lever@oracle.com> >> --- >> >> utils/statd/sm-notify.c | 21 +++++++++++++++++---- >> 1 files changed, 17 insertions(+), 4 deletions(-) >> >> diff --git a/utils/statd/sm-notify.c b/utils/statd/sm-notify.c >> index 2d14668..437e37a 100644 >> --- a/utils/statd/sm-notify.c >> +++ b/utils/statd/sm-notify.c >> @@ -634,15 +634,28 @@ recv_rpcbind_reply(struct sockaddr *sap, struct nsm_host *host, XDR *xdr) >> } >> >> /* >> - * Successful NOTIFY call. Server returns void, so nothing >> - * we need to do here. >> + * Successful NOTIFY call. Server returns void. >> + * >> + * Try sending another SM_NOTIFY with an unqualified "my_name" >> + * argument. Reuse the port number. If "my_name" is already >> + * unqualified, we're done. >> */ >> static void >> recv_notify_reply(struct nsm_host *host) >> { >> - xlog(D_GENERAL, "Host %s notified successfully", host->name); >> + char *dot = strchr(host->my_name, '.'); >> >> - smn_forget_host(host); >> + if (dot != NULL) { >> + *dot = '\0'; >> + host->send_next = time(NULL); >> + host->xid = 0; >> + if (host->timeout>= NSM_MAX_TIMEOUT / 4) >> + host->timeout = NSM_MAX_TIMEOUT / 4; >> + insert_host(host); > What happens when host->my_name now resolves to host in a > different domain? Will this mean we now will be sending SM_NOTIFYs > to random hosts? > Also, what happens when host->my_name does not resolve to anything? > Looking at notify(), it appears the unqualified my_name will stay > on the hosts list, because notify_host() will fail since the > smn_lookup() fails and will always set host->ai = NULL. Unless > I am missing something, this will cause notify() to increment > hp->retries and insert the hp pointer back on the host list. > I don't see how that cycle will broken.... host->my_name isn't used to generate the recipient's address, host->name is. host->my_name is the _argument_ of an SM_NOTIFY request. That argument is used as a search key by the remote, but sm-notify does not use this string for DNS resolution. Grep for "my_name" in sm-notify.c to confirm this. -- chuck[dot]lever[at]oracle[dot]com ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH 2/2] sm-notify: Send fully-qualified and unqualified mon_names 2010-03-17 14:39 ` Chuck Lever @ 2010-03-19 20:03 ` Steve Dickson 0 siblings, 0 replies; 13+ messages in thread From: Steve Dickson @ 2010-03-19 20:03 UTC (permalink / raw) To: Chuck Lever; +Cc: linux-nfs Hey Chuck, My apologizes for the delayed response... On 03/17/2010 10:39 AM, Chuck Lever wrote: > On 03/17/2010 06:36 AM, Steve Dickson wrote: >>> /* >>> - * Successful NOTIFY call. Server returns void, so nothing >>> - * we need to do here. >>> + * Successful NOTIFY call. Server returns void. >>> + * >>> + * Try sending another SM_NOTIFY with an unqualified "my_name" >>> + * argument. Reuse the port number. If "my_name" is already >>> + * unqualified, we're done. >>> */ >>> static void >>> recv_notify_reply(struct nsm_host *host) >>> { >>> - xlog(D_GENERAL, "Host %s notified successfully", host->name); >>> + char *dot = strchr(host->my_name, '.'); >>> >>> - smn_forget_host(host); >>> + if (dot != NULL) { >>> + *dot = '\0'; >>> + host->send_next = time(NULL); >>> + host->xid = 0; >>> + if (host->timeout>= NSM_MAX_TIMEOUT / 4) >>> + host->timeout = NSM_MAX_TIMEOUT / 4; >>> + insert_host(host); >> What happens when host->my_name now resolves to host in a >> different domain? Will this mean we now will be sending SM_NOTIFYs >> to random hosts? > >> Also, what happens when host->my_name does not resolve to anything? >> Looking at notify(), it appears the unqualified my_name will stay >> on the hosts list, because notify_host() will fail since the >> smn_lookup() fails and will always set host->ai = NULL. Unless >> I am missing something, this will cause notify() to increment >> hp->retries and insert the hp pointer back on the host list. >> I don't see how that cycle will broken.... > > host->my_name isn't used to generate the recipient's address, host->name > is. > > host->my_name is the _argument_ of an SM_NOTIFY request. That argument > is used as a search key by the remote, but sm-notify does not use this > string for DNS resolution. Ok.. I see that now... thanks... steved. ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH 0/2] Two short fixes for sm-notify [not found] ` <20100315174453.2586.40876.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org> 2010-03-15 17:51 ` [PATCH 1/2] sm-notify: Use my_name when sending SM_NOTIFY requests Chuck Lever 2010-03-15 17:51 ` [PATCH 2/2] sm-notify: Send fully-qualified and unqualified mon_names Chuck Lever @ 2010-03-17 10:53 ` Steve Dickson [not found] ` <4BA0B48E.8030504-AfCzQyP5zfLQT0dZR+AlfA@public.gmane.org> 2010-03-19 20:05 ` Steve Dickson 3 siblings, 1 reply; 13+ messages in thread From: Steve Dickson @ 2010-03-17 10:53 UTC (permalink / raw) To: Chuck Lever; +Cc: linux-nfs On 03/15/2010 01:51 PM, Chuck Lever wrote: > Hi Steve- > > These address two minor shortcomings when sending SM_NOTIFY requests > during reboot recovery. Please consider these for the next nfs-utils > release. > Just curious... Where these the outcome of reported problem or was this something you happen to notice. steved. ^ permalink raw reply [flat|nested] 13+ messages in thread
[parent not found: <4BA0B48E.8030504-AfCzQyP5zfLQT0dZR+AlfA@public.gmane.org>]
* Re: [PATCH 0/2] Two short fixes for sm-notify [not found] ` <4BA0B48E.8030504-AfCzQyP5zfLQT0dZR+AlfA@public.gmane.org> @ 2010-03-17 14:29 ` Chuck Lever 0 siblings, 0 replies; 13+ messages in thread From: Chuck Lever @ 2010-03-17 14:29 UTC (permalink / raw) To: Steve Dickson; +Cc: linux-nfs On 03/17/2010 06:53 AM, Steve Dickson wrote: > > > On 03/15/2010 01:51 PM, Chuck Lever wrote: >> Hi Steve- >> >> These address two minor shortcomings when sending SM_NOTIFY requests >> during reboot recovery. Please consider these for the next nfs-utils >> release. >> > Just curious... Where these the outcome of reported problem or was this > something you happen to notice. These are recommendations from Tom Talpey's Connectathon talk a few years back. A few other implementations already do similar things. -- chuck[dot]lever[at]oracle[dot]com ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH 0/2] Two short fixes for sm-notify [not found] ` <20100315174453.2586.40876.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org> ` (2 preceding siblings ...) 2010-03-17 10:53 ` [PATCH 0/2] Two short fixes for sm-notify Steve Dickson @ 2010-03-19 20:05 ` Steve Dickson 3 siblings, 0 replies; 13+ messages in thread From: Steve Dickson @ 2010-03-19 20:05 UTC (permalink / raw) To: Chuck Lever; +Cc: linux-nfs On 03/15/2010 01:51 PM, Chuck Lever wrote: > Hi Steve- > > These address two minor shortcomings when sending SM_NOTIFY requests > during reboot recovery. Please consider these for the next nfs-utils > release. > > --- > > Chuck Lever (2): > sm-notify: Send fully-qualified and unqualified mon_names > sm-notify: Use my_name when sending SM_NOTIFY requests > > > utils/statd/sm-notify.c | 62 ++++++++++++++++++++++++++++++++++++--------- > utils/statd/sm-notify.man | 28 +++++++++----------- > utils/statd/statd.man | 14 +--------- > 3 files changed, 64 insertions(+), 40 deletions(-) > Both patches committed... steved. ^ permalink raw reply [flat|nested] 13+ messages in thread
end of thread, other threads:[~2010-03-19 20:05 UTC | newest]
Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-03-15 17:51 [PATCH 0/2] Two short fixes for sm-notify Chuck Lever
[not found] ` <20100315174453.2586.40876.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org>
2010-03-15 17:51 ` [PATCH 1/2] sm-notify: Use my_name when sending SM_NOTIFY requests Chuck Lever
[not found] ` <20100315175137.2586.71894.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org>
2010-03-15 22:25 ` Jeff Layton
[not found] ` <20100315182535.2aacdadb-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org>
2010-03-16 4:12 ` Chuck Lever
2010-03-16 11:20 ` Jeff Layton
2010-03-15 17:51 ` [PATCH 2/2] sm-notify: Send fully-qualified and unqualified mon_names Chuck Lever
[not found] ` <20100315175145.2586.1215.stgit-bi+AKbBUZKY6gyzm1THtWbp2dZbC/Bob@public.gmane.org>
2010-03-15 22:30 ` Jeff Layton
2010-03-17 10:36 ` Steve Dickson
[not found] ` <4BA0B0A4.6020705-AfCzQyP5zfLQT0dZR+AlfA@public.gmane.org>
2010-03-17 14:39 ` Chuck Lever
2010-03-19 20:03 ` Steve Dickson
2010-03-17 10:53 ` [PATCH 0/2] Two short fixes for sm-notify Steve Dickson
[not found] ` <4BA0B48E.8030504-AfCzQyP5zfLQT0dZR+AlfA@public.gmane.org>
2010-03-17 14:29 ` Chuck Lever
2010-03-19 20:05 ` Steve Dickson
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox