linux-nfs.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Chuck Lever <chuck.lever@oracle.com>
To: Chuck Lever <chucklever@gmail.com>
Cc: Jeff Layton <jlayton@poochiereds.net>,
	bfields@fieldses.org, linux-nfs@vger.kernel.org
Subject: Re: [PATCH] svcrdma: set XPT_CONG_CTRL flag for bc xprt
Date: Sun, 26 Mar 2017 22:41:14 -0400	[thread overview]
Message-ID: <FBC1AD99-AF91-42B7-9C38-C68DA5454C94@oracle.com> (raw)
In-Reply-To: <62622BEB-E234-4035-94FE-0C34E00693AE@gmail.com>



> On Mar 26, 2017, at 10:38 PM, Chuck Lever <chucklever@gmail.com> wrote:
> 
> Hey Jeff-
> 
> 
>>> On Mar 26, 2017, at 9:21 PM, Jeff Layton <jlayton@poochiereds.net> wrote:
>>> 
>>> On Sun, 2017-03-26 at 19:27 -0400, Chuck Lever wrote:
>>> Same change as Kinglong Mee's fix for the TCP backchannel service.
>>> 
>> 
>> Good catch. I guess I didn't do a good job of hunting down all of the
>> transports where this needed to be set. I'll give them another pass
>> again tomorrow to make sure I didn't miss any others.
>> 
>>> Fixes: 5283b03ee5cd ("nfs/nfsd/sunrpc: enforce transport...")
>>> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
>>> ---
>>> Some (perhaps late) review comments on 5283b03ee5cd:
>>> 
>>> I have reservations about returning RPC_PROG_MISMATCH in this case.
>>> RPC_PROG_UNAVAIL is more sensible. But the use of UDP with NFSv4 is
>>> not an RPC-level error, thus reporting the problem here seems like a
>>> layering violation.
>>> 
>>> I'm not sure why an explicit check is needed: if the server isn't
>>> listening on UDP, wouldn't clients see a transport-level rejection
>>> (like ECONNREFUSED)?
>>> 
>> 
>> Sure, if the server isn't listening on UDP...
>> 
>> The point of that patch is to enforce not allowing v4 over UDP when the
>> server is listening on UDP to serve earlier versions.
>> 
>> As far as the error...From RFC 5531:
>> 
>>            PROG_UNAVAIL  = 1, /* remote hasn't exported program  */
>>            PROG_MISMATCH = 2, /* remote can't support version #  */
>> 
>> Consider the case where the server is listening on both TCP and UDP,
>> and is serving both v3 and v4. Someone tries to send a v4 RPC over UDP.
>> 
>> The RPC program in that case (nfs) is supported over UDP, but the
>> version (v4) is not. So I disagree here. PROG_MISMATCH seems like the
>> better fit to me.
> 
> Then the server should report the correct version range in the
> rejection. The RPC response I saw on the wire claimed that 4
> was the maximum supported version.

Of course, versions 2 and 3 do not make sense for
the backchannel. So I'm not sure what you would report
in that case.


>>> Are we certain that all client implementations (including
>>> backchannel clients) will do something useful when presented with
>>> such a rejection? At least in the backchannel case, the Linux server
>>> had no idea what to do with RPC_PROG_MISMATCH on the backchannel.
>>> The workload stopped dead, no error report anywhere.
>>> 
>> 
>> Ouch. I think this would get translated into EPROTONOSUPPORT in the
>> client code. That should have ended up with nfsd4_mark_cb_down being
>> called with that error?...but I think that function may be effectively
>> neutered:
>> 
>> static void warn_no_callback_path(struct nfs4_client *clp, int reason)
>> {
>>       dprintk("NFSD: warning: no callback path to client %.*s: error %d\n",
>>               (int)clp->cl_name.len, clp->cl_name.data, reason);
>> }
>> 
>> Note that it emits a dprintk instead of a printk. Should we promote
>> that to something more visible?
> 
> You don't want a warning if the client never provided a
> callback path. But if one was provided, and it disappears,
> that might be useful to know.
> 
> OTOH some might blanch at the log flood, should something
> else go wrong.
> 
> An error counter might be the least we can do, if not a
> one-shot pr_warn.
> 
> 
>>> net/sunrpc/xprtrdma/svc_rdma_transport.c |    1 +
>>> 1 file changed, 1 insertion(+)
>>> 
>>> diff --git a/net/sunrpc/xprtrdma/svc_rdma_transport.c b/net/sunrpc/xprtrdma/svc_rdma_transport.c
>>> index c13a5c3..fc8f14c 100644
>>> --- a/net/sunrpc/xprtrdma/svc_rdma_transport.c
>>> +++ b/net/sunrpc/xprtrdma/svc_rdma_transport.c
>>> @@ -127,6 +127,7 @@ static struct svc_xprt *svc_rdma_bc_create(struct svc_serv *serv,
>>>   xprt = &cma_xprt->sc_xprt;
>>> 
>>>   svc_xprt_init(net, &svc_rdma_bc_class, xprt, serv);
>>> +    set_bit(XPT_CONG_CTRL, &xprt->xpt_flags);
>>>   serv->sv_bc_xprt = xprt;
>>> 
>>>   dprintk("svcrdma: %s(%p)\n", __func__, xprt);
>>> 
>>> --
>>> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
>>> the body of a message to majordomo@vger.kernel.org
>>> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>> 
>> --
>> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
>> the body of a message to majordomo@vger.kernel.org
>> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> --
> To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html


  reply	other threads:[~2017-03-27  2:42 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-03-26 23:27 [PATCH] svcrdma: set XPT_CONG_CTRL flag for bc xprt Chuck Lever
2017-03-27  1:21 ` Jeff Layton
2017-03-27  2:38   ` Chuck Lever
2017-03-27  2:41     ` Chuck Lever [this message]
2017-03-27 11:07       ` Jeff Layton
2017-03-27 12:39         ` Jeff Layton
2017-03-29  1:16           ` J. Bruce Fields
2017-03-29 11:01             ` Jeff Layton
2017-03-29  1:22   ` J. Bruce Fields
2017-03-29 11:02     ` Jeff Layton
2017-03-29  1:27 ` J. Bruce Fields

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=FBC1AD99-AF91-42B7-9C38-C68DA5454C94@oracle.com \
    --to=chuck.lever@oracle.com \
    --cc=bfields@fieldses.org \
    --cc=chucklever@gmail.com \
    --cc=jlayton@poochiereds.net \
    --cc=linux-nfs@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).