* [PATCH] NFSv4: handle EINVAL from EXCHANGE_ID better. @ 2018-03-15 23:29 NeilBrown 2018-03-15 23:44 ` [PATCH - v2] " NeilBrown 0 siblings, 1 reply; 16+ messages in thread From: NeilBrown @ 2018-03-15 23:29 UTC (permalink / raw) To: Trond Myklebust, Anna Schumaker; +Cc: Linux NFS Mailing list [-- Attachment #1: Type: text/plain, Size: 1423 bytes --] nfs4_proc_exchange_id() can return -EINVAL if the server reported NFS4INVAL (which I have seen in a packet trace), or nfs4_check_cl_exchange_flags() exchange flags detects a problem. Each of these mean that NFSv4.1 later cannot be use, but they should not prevent fallback to NFSv4.0. Currently this EINVAL error is returned by nfs4_proc_exchange_id() to nfs41_discover_server_trunking(), and thence to nfs4_discover_server_trunking(). nfs4_discover_server_trunking() doesn't understand EINVAL, so converts it to EIO which causes mount.nfs to think something is horribly wrong and to give up. It would be a more graceful failure if nfs4_discover_server_trunking() mapped -EINVAL to -EPROTONOSUPPORT - a failure to negotiate a client ID clearly shows that NFSv4.1 cannot be supported, but isn't as general a failure as EIO. Signed-off-by: NeilBrown <neilb@suse.com> --- fs/nfs/nfs4state.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/fs/nfs/nfs4state.c b/fs/nfs/nfs4state.c index 91a4d4eeb235..7e237bb9c699 100644 --- a/fs/nfs/nfs4state.c +++ b/fs/nfs/nfs4state.c @@ -2219,6 +2219,8 @@ int nfs4_discover_server_trunking(struct nfs_client *clp, clnt = clp->cl_rpcclient; goto again; + case -NFS4INVAL: + /* Server confused - assume this minor isn't supported */ case -NFS4ERR_MINOR_VERS_MISMATCH: status = -EPROTONOSUPPORT; break; -- 2.14.0.rc0.dirty [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply related [flat|nested] 16+ messages in thread
* [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-15 23:29 [PATCH] NFSv4: handle EINVAL from EXCHANGE_ID better NeilBrown @ 2018-03-15 23:44 ` NeilBrown 2018-03-16 9:31 ` Mkrtchyan, Tigran 2018-03-20 21:48 ` J. Bruce Fields 0 siblings, 2 replies; 16+ messages in thread From: NeilBrown @ 2018-03-15 23:44 UTC (permalink / raw) To: Trond Myklebust, Anna Schumaker; +Cc: Linux NFS Mailing list [-- Attachment #1: Type: text/plain, Size: 1515 bytes --] nfs4_proc_exchange_id() can return -EINVAL if the server reported NFS4INVAL (which I have seen in a packet trace), or nfs4_check_cl_exchange_flags() exchange flags detects a problem. Each of these mean that NFSv4.1 later cannot be use, but they should not prevent fallback to NFSv4.0. Currently this EINVAL error is returned by nfs4_proc_exchange_id() to nfs41_discover_server_trunking(), and thence to nfs4_discover_server_trunking(). nfs4_discover_server_trunking() doesn't understand EINVAL, so converts it to EIO which causes mount.nfs to think something is horribly wrong and to give up. It would be a more graceful failure if nfs4_discover_server_trunking() mapped -EINVAL to -EPROTONOSUPPORT - a failure to negotiate a client ID clearly shows that NFSv4.1 cannot be supported, but isn't as general a failure as EIO. Signed-off-by: NeilBrown <neilb@suse.com> --- Sorry - a bit too trigger-happy with that first version of the patch. NeilBrown fs/nfs/nfs4state.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/fs/nfs/nfs4state.c b/fs/nfs/nfs4state.c index 91a4d4eeb235..b988e460553d 100644 --- a/fs/nfs/nfs4state.c +++ b/fs/nfs/nfs4state.c @@ -2219,6 +2219,8 @@ int nfs4_discover_server_trunking(struct nfs_client *clp, clnt = clp->cl_rpcclient; goto again; + case -NFS4ERR_INVAL: + /* Server confused - assume this minor isn't supported */ case -NFS4ERR_MINOR_VERS_MISMATCH: status = -EPROTONOSUPPORT; break; -- 2.14.0.rc0.dirty [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply related [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-15 23:44 ` [PATCH - v2] " NeilBrown @ 2018-03-16 9:31 ` Mkrtchyan, Tigran 2018-03-16 12:10 ` Trond Myklebust 2018-03-20 0:09 ` NeilBrown 2018-03-20 21:48 ` J. Bruce Fields 1 sibling, 2 replies; 16+ messages in thread From: Mkrtchyan, Tigran @ 2018-03-16 9:31 UTC (permalink / raw) To: NeilBrown; +Cc: Trond Myklebust, Anna Schumaker, linux-nfs Hi Neil, according to rfc5661, NFS4ERR_INVAL is returned by the server if it thinks that client sends an invalid request (e.g. points to a client bug) or server misinterpret it (broken server). With your change instead of failing the mount, client will silently go for v4.0, even v4.1 mount was requested and produce undesirable behavior, e.g. proxy-io instead of pnfs. I fill prefer fail-fast instead of long debug sessions. On the other hand, I understand, that it's not always possible to fix server or clients in production environment and time-to-time workarounds are necessary. Tigran. ----- Original Message ----- > From: "NeilBrown" <neilb@suse.com> > To: "Trond Myklebust" <trond.myklebust@primarydata.com>, "Anna Schumaker" <anna.schumaker@netapp.com> > Cc: "linux-nfs" <linux-nfs@vger.kernel.org> > Sent: Friday, March 16, 2018 12:44:23 AM > Subject: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. > nfs4_proc_exchange_id() can return -EINVAL if the server > reported NFS4INVAL (which I have seen in a packet trace), > or nfs4_check_cl_exchange_flags() exchange flags detects > a problem. > Each of these mean that NFSv4.1 later cannot be use, but > they should not prevent fallback to NFSv4.0. > > Currently this EINVAL error is returned by nfs4_proc_exchange_id() to > nfs41_discover_server_trunking(), and thence to > nfs4_discover_server_trunking(). > nfs4_discover_server_trunking() doesn't understand EINVAL, so converts > it to EIO which causes mount.nfs to think something is horribly wrong > and to give up. > > It would be a more graceful failure if nfs4_discover_server_trunking() > mapped -EINVAL to -EPROTONOSUPPORT - a failure to negotiate a client > ID clearly shows that NFSv4.1 cannot be supported, but isn't as > general a failure as EIO. > > Signed-off-by: NeilBrown <neilb@suse.com> > --- > > Sorry - a bit too trigger-happy with that first version of the patch. > > NeilBrown > > fs/nfs/nfs4state.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/fs/nfs/nfs4state.c b/fs/nfs/nfs4state.c > index 91a4d4eeb235..b988e460553d 100644 > --- a/fs/nfs/nfs4state.c > +++ b/fs/nfs/nfs4state.c > @@ -2219,6 +2219,8 @@ int nfs4_discover_server_trunking(struct nfs_client *clp, > clnt = clp->cl_rpcclient; > goto again; > > + case -NFS4ERR_INVAL: > + /* Server confused - assume this minor isn't supported */ > case -NFS4ERR_MINOR_VERS_MISMATCH: > status = -EPROTONOSUPPORT; > break; > -- > 2.14.0.rc0.dirty ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-16 9:31 ` Mkrtchyan, Tigran @ 2018-03-16 12:10 ` Trond Myklebust 2018-03-20 0:32 ` NeilBrown 2018-03-20 0:09 ` NeilBrown 1 sibling, 1 reply; 16+ messages in thread From: Trond Myklebust @ 2018-03-16 12:10 UTC (permalink / raw) To: neilb, tigran.mkrtchyan; +Cc: anna.schumaker, linux-nfs T24gRnJpLCAyMDE4LTAzLTE2IGF0IDEwOjMxICswMTAwLCBNa3J0Y2h5YW4sIFRpZ3JhbiB3cm90 ZToNCj4gSGkgTmVpbCwNCj4gDQo+IGFjY29yZGluZyB0byByZmM1NjYxLCBORlM0RVJSX0lOVkFM IGlzIHJldHVybmVkIGJ5IHRoZSBzZXJ2ZXIgaWYgaXQNCj4gdGhpbmtzIHRoYXQgY2xpZW50IHNl bmRzIGFuIGludmFsaWQgcmVxdWVzdCAoZS5nLiBwb2ludHMgdG8gYSBjbGllbnQNCj4gYnVnKQ0K PiBvciBzZXJ2ZXIgbWlzaW50ZXJwcmV0IGl0IChicm9rZW4gc2VydmVyKS4NCj4gDQo+IFdpdGgg eW91ciBjaGFuZ2UgaW5zdGVhZCBvZiBmYWlsaW5nIHRoZSBtb3VudCwgY2xpZW50IHdpbGwgc2ls ZW50bHkNCj4gZ28gZm9yDQo+IHY0LjAsIGV2ZW4gdjQuMSBtb3VudCB3YXMgcmVxdWVzdGVkIGFu ZCBwcm9kdWNlIHVuZGVzaXJhYmxlIGJlaGF2aW9yLA0KPiBlLmcuDQo+IHByb3h5LWlvIGluc3Rl YWQgb2YgcG5mcy4gSSBmaWxsIHByZWZlciBmYWlsLWZhc3QgaW5zdGVhZCBvZiBsb25nDQo+IGRl YnVnDQo+IHNlc3Npb25zLg0KPiANCj4gT24gdGhlIG90aGVyIGhhbmQsIEkgdW5kZXJzdGFuZCwg dGhhdCBpdCdzIG5vdCBhbHdheXMgcG9zc2libGUgdG8gZml4DQo+IHNlcnZlcg0KPiBvciBjbGll bnRzIGluIHByb2R1Y3Rpb24gZW52aXJvbm1lbnQgYW5kIHRpbWUtdG8tdGltZSB3b3JrYXJvdW5k cyBhcmUNCj4gbmVjZXNzYXJ5Lg0KPiANCj4gDQoNCkknZCB0ZW5kIHRvIGFncmVlIHdpdGggVGln cmFuLiBIaWRpbmcgc2VydmVyIGJ1Z3MsIHNob3VsZCBub3QgYmUgYQ0KcHJpb3JpdHkgYW5kIHBh cnRpY3VsYXJseSBub3QgaW4gdGhpcyBjYXNlLCB3aGVyZSB0aGUgd29ya2Fyb3VuZCBpcw0Kc2lt cGxlOiBlaXRoZXIgdHVybiBvZmYgdmVyc2lvbiBuZWdvdGlhdGlvbiBhbHRvZ2V0aGVyLCBvciBl ZGl0DQovZXRjL25mc21vdW50LmNvbmYgdG8gbmVnb3RpYXRlIGEgZGlmZmVyZW50IHNldCBvZiB2 ZXJzaW9ucy4NCg0KV2hhdCB3ZSBtaWdodCB3YW50IHRvIGRvLCBpcyBtYWtlIGl0IGVhc2llciB0 byBhbGxvdyB0aGUgdXNlciB0byBkZXRlY3QNCnRoYXQgdGhpcyBpcyBpbmRlZWQgYSBzZXJ2ZXIg YnVnIGFuZCBpcyBub3QgYSBwcm9ibGVtIHdpdGggdGhlDQphcmd1bWVudHMgc3VwcGxpZWQgdG8g dGhlICJtb3VudCIgdXRpbGl0eS4gUGVyaGFwcyB3ZSBtaWdodCBoYXZlIHRoZQ0Ka2VybmVsIGxv ZyBzb21ldGhpbmcgaW4gdGhlIHN5c2xvZ3M/DQoNCkNoZWVycw0KICBUcm9uZA0KDQo+IFRpZ3Jh bi4NCj4gDQo+IA0KPiAtLS0tLSBPcmlnaW5hbCBNZXNzYWdlIC0tLS0tDQo+ID4gRnJvbTogIk5l aWxCcm93biIgPG5laWxiQHN1c2UuY29tPg0KPiA+IFRvOiAiVHJvbmQgTXlrbGVidXN0IiA8dHJv bmQubXlrbGVidXN0QHByaW1hcnlkYXRhLmNvbT4sICJBbm5hDQo+ID4gU2NodW1ha2VyIiA8YW5u YS5zY2h1bWFrZXJAbmV0YXBwLmNvbT4NCj4gPiBDYzogImxpbnV4LW5mcyIgPGxpbnV4LW5mc0B2 Z2VyLmtlcm5lbC5vcmc+DQo+ID4gU2VudDogRnJpZGF5LCBNYXJjaCAxNiwgMjAxOCAxMjo0NDoy MyBBTQ0KPiA+IFN1YmplY3Q6IFtQQVRDSCAtIHYyXSBORlN2NDogaGFuZGxlIEVJTlZBTCBmcm9t IEVYQ0hBTkdFX0lEIGJldHRlci4NCj4gPiBuZnM0X3Byb2NfZXhjaGFuZ2VfaWQoKSBjYW4gcmV0 dXJuIC1FSU5WQUwgaWYgdGhlIHNlcnZlcg0KPiA+IHJlcG9ydGVkIE5GUzRJTlZBTCAod2hpY2gg SSBoYXZlIHNlZW4gaW4gYSBwYWNrZXQgdHJhY2UpLA0KPiA+IG9yIG5mczRfY2hlY2tfY2xfZXhj aGFuZ2VfZmxhZ3MoKSBleGNoYW5nZSBmbGFncyBkZXRlY3RzDQo+ID4gYSBwcm9ibGVtLg0KPiA+ IEVhY2ggb2YgdGhlc2UgbWVhbiB0aGF0IE5GU3Y0LjEgbGF0ZXIgY2Fubm90IGJlIHVzZSwgYnV0 DQo+ID4gdGhleSBzaG91bGQgbm90IHByZXZlbnQgZmFsbGJhY2sgdG8gTkZTdjQuMC4NCj4gPiAN Cj4gPiBDdXJyZW50bHkgdGhpcyBFSU5WQUwgZXJyb3IgaXMgcmV0dXJuZWQgYnkgbmZzNF9wcm9j X2V4Y2hhbmdlX2lkKCkNCj4gPiB0bw0KPiA+IG5mczQxX2Rpc2NvdmVyX3NlcnZlcl90cnVua2lu ZygpLCBhbmQgdGhlbmNlIHRvDQo+ID4gbmZzNF9kaXNjb3Zlcl9zZXJ2ZXJfdHJ1bmtpbmcoKS4N Cj4gPiBuZnM0X2Rpc2NvdmVyX3NlcnZlcl90cnVua2luZygpIGRvZXNuJ3QgdW5kZXJzdGFuZCBF SU5WQUwsIHNvDQo+ID4gY29udmVydHMNCj4gPiBpdCB0byBFSU8gd2hpY2ggY2F1c2VzIG1vdW50 Lm5mcyB0byB0aGluayBzb21ldGhpbmcgaXMgaG9ycmlibHkNCj4gPiB3cm9uZw0KPiA+IGFuZCB0 byBnaXZlIHVwLg0KPiA+IA0KPiA+IEl0IHdvdWxkIGJlIGEgbW9yZSBncmFjZWZ1bCBmYWlsdXJl IGlmDQo+ID4gbmZzNF9kaXNjb3Zlcl9zZXJ2ZXJfdHJ1bmtpbmcoKQ0KPiA+IG1hcHBlZCAtRUlO VkFMIHRvIC1FUFJPVE9OT1NVUFBPUlQgLSBhIGZhaWx1cmUgdG8gbmVnb3RpYXRlIGENCj4gPiBj bGllbnQNCj4gPiBJRCBjbGVhcmx5IHNob3dzIHRoYXQgTkZTdjQuMSBjYW5ub3QgYmUgc3VwcG9y dGVkLCBidXQgaXNuJ3QgYXMNCj4gPiBnZW5lcmFsIGEgZmFpbHVyZSBhcyBFSU8uDQo+ID4gDQo+ ID4gU2lnbmVkLW9mZi1ieTogTmVpbEJyb3duIDxuZWlsYkBzdXNlLmNvbT4NCj4gPiAtLS0NCj4g PiANCj4gPiBTb3JyeSAtIGEgYml0IHRvbyB0cmlnZ2VyLWhhcHB5IHdpdGggdGhhdCBmaXJzdCB2 ZXJzaW9uIG9mIHRoZQ0KPiA+IHBhdGNoLg0KPiA+IA0KPiA+IE5laWxCcm93bg0KPiA+IA0KPiA+ IGZzL25mcy9uZnM0c3RhdGUuYyB8IDIgKysNCj4gPiAxIGZpbGUgY2hhbmdlZCwgMiBpbnNlcnRp b25zKCspDQo+ID4gDQo+ID4gZGlmZiAtLWdpdCBhL2ZzL25mcy9uZnM0c3RhdGUuYyBiL2ZzL25m cy9uZnM0c3RhdGUuYw0KPiA+IGluZGV4IDkxYTRkNGVlYjIzNS4uYjk4OGU0NjA1NTNkIDEwMDY0 NA0KPiA+IC0tLSBhL2ZzL25mcy9uZnM0c3RhdGUuYw0KPiA+ICsrKyBiL2ZzL25mcy9uZnM0c3Rh dGUuYw0KPiA+IEBAIC0yMjE5LDYgKzIyMTksOCBAQCBpbnQgbmZzNF9kaXNjb3Zlcl9zZXJ2ZXJf dHJ1bmtpbmcoc3RydWN0DQo+ID4gbmZzX2NsaWVudCAqY2xwLA0KPiA+IAkJY2xudCA9IGNscC0+ Y2xfcnBjY2xpZW50Ow0KPiA+IAkJZ290byBhZ2FpbjsNCj4gPiANCj4gPiArCWNhc2UgLU5GUzRF UlJfSU5WQUw6DQo+ID4gKwkJLyogU2VydmVyIGNvbmZ1c2VkIC0gYXNzdW1lIHRoaXMgbWlub3Ig aXNuJ3QNCj4gPiBzdXBwb3J0ZWQgKi8NCj4gPiAJY2FzZSAtTkZTNEVSUl9NSU5PUl9WRVJTX01J U01BVENIOg0KPiA+IAkJc3RhdHVzID0gLUVQUk9UT05PU1VQUE9SVDsNCj4gPiAJCWJyZWFrOw0K PiA+IC0tDQo+ID4gMi4xNC4wLnJjMC5kaXJ0eQ0KPiANCj4gLS0NCj4gVG8gdW5zdWJzY3JpYmUg ZnJvbSB0aGlzIGxpc3Q6IHNlbmQgdGhlIGxpbmUgInVuc3Vic2NyaWJlIGxpbnV4LW5mcyINCj4g aW4NCj4gdGhlIGJvZHkgb2YgYSBtZXNzYWdlIHRvIG1ham9yZG9tb0B2Z2VyLmtlcm5lbC5vcmcN Cj4gTW9yZSBtYWpvcmRvbW8gaW5mbyBhdCAgaHR0cDovL3ZnZXIua2VybmVsLm9yZy9tYWpvcmRv bW8taW5mby5odG1sDQo+IA0KLS0gDQpUcm9uZCBNeWtsZWJ1c3QNCkxpbnV4IE5GUyBjbGllbnQg bWFpbnRhaW5lciwgUHJpbWFyeURhdGENCnRyb25kLm15a2xlYnVzdEBwcmltYXJ5ZGF0YS5jb20N Cg== ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-16 12:10 ` Trond Myklebust @ 2018-03-20 0:32 ` NeilBrown 2018-03-20 14:14 ` Trond Myklebust 0 siblings, 1 reply; 16+ messages in thread From: NeilBrown @ 2018-03-20 0:32 UTC (permalink / raw) To: Trond Myklebust, tigran.mkrtchyan; +Cc: anna.schumaker, linux-nfs [-- Attachment #1: Type: text/plain, Size: 5960 bytes --] On Fri, Mar 16 2018, Trond Myklebust wrote: > On Fri, 2018-03-16 at 10:31 +0100, Mkrtchyan, Tigran wrote: >> Hi Neil, >> >> according to rfc5661, NFS4ERR_INVAL is returned by the server if it >> thinks that client sends an invalid request (e.g. points to a client >> bug) >> or server misinterpret it (broken server). >> >> With your change instead of failing the mount, client will silently >> go for >> v4.0, even v4.1 mount was requested and produce undesirable behavior, >> e.g. >> proxy-io instead of pnfs. I fill prefer fail-fast instead of long >> debug >> sessions. >> >> On the other hand, I understand, that it's not always possible to fix >> server >> or clients in production environment and time-to-time workarounds are >> necessary. >> >> > > I'd tend to agree with Tigran. Hiding server bugs, should not be a > priority and particularly not in this case, where the workaround is > simple: either turn off version negotiation altogether, or edit > /etc/nfsmount.conf to negotiate a different set of versions. Yes, it could be worked-around in nfsmount.conf, but manual configuration should be seen as an optimization or a last resort. If we can make things work without configuration, that provides the best experience. In this case, the kernel has strong evidence that the server isn't responding as expected, but it gives an unhelpful error message. At the very least, nfs4_discover_server_trunking() should not treat -NFS4ERR_INVAL as unexpect (because there is code in nfs4_check_cl_exchange_flags which explicitly generates it). If it just let this error through, instead of translating it to EIO, then the problem would go away. > > What we might want to do, is make it easier to allow the user to detect > that this is indeed a server bug and is not a problem with the > arguments supplied to the "mount" utility. Perhaps we might have the > kernel log something in the syslogs? Yes, logging a message might be useful. Most of the messages logged about bad servers are currently going through dprintk(), so they won't often be seen. Is that what we want?? Don't know... Anyway, you point that it "is not a problem with the arguments" is stop-on. If the client gets EINVAL from the server, then it shouldn't blindly report that back to the user as EINVAL means "Invalid argument" and the argements given to the server are probably not the argument given by the user. Following that line of reasoning, I think nfs4_check_cl_exchange_flag() should *not* return -NFS4ERR_INVAL, and _nfs4_proc_exchange_id() shouldn't pass NFS4ERR_INVAL through unchanged. So I propose the following version. Thanks, NeilBrown ------------------------8<--------------------------- From: NeilBrown <neilb@suse.com> Date: Tue, 20 Mar 2018 11:31:33 +1100 Subject: [PATCH] NFSv4: handle EINVAL from EXCHANGE_ID better. nfs4_proc_exchange_id() can return -EINVAL if the server reported NFS4INVAL (which I have seen in a packet trace), or nfs4_check_cl_exchange_flags() exchange flags detects a problem. Each of these mean that NFSv4.1 and later cannot be used, but they should not prevent fallback to NFSv4.0. Currently they do. Currently this EINVAL error is returned by nfs4_proc_exchange_id() to nfs41_discover_server_trunking(), and thence to nfs4_discover_server_trunking(). nfs4_discover_server_trunking() doesn't understand EINVAL, so converts it to EIO which causes mount.nfs to think something is horribly wrong and to give up. EINVAL is never a sensible error code here. It means "Invalid argument", but is being used when the problem is "Invalid response from the server". If we change these two circumstances to report EPROTONOSUPPORT to the caller (which seems a reasonable assessment when the server gives confusing responses), and if we enhance nfs4_discover_server_trunking() to treat -EPROTONOSUPPORT as an expected error to pass through, then the error reported to user-space will be more representative of the actual fault. A failure to negotiate a client ID clearly shows that NFSv4.1 cannot be supported, but isn't as general a failure as EIO. Signed-off-by: NeilBrown <neilb@suse.com> --- fs/nfs/nfs4proc.c | 18 +++++++++++++++--- fs/nfs/nfs4state.c | 1 + 2 files changed, 16 insertions(+), 3 deletions(-) diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c index 47f3c273245e..97757f646f13 100644 --- a/fs/nfs/nfs4proc.c +++ b/fs/nfs/nfs4proc.c @@ -7364,7 +7364,8 @@ static int nfs4_check_cl_exchange_flags(u32 flags) goto out_inval; return NFS_OK; out_inval: - return -NFS4ERR_INVAL; + dprintk("NFS: server returns invalid flags for EXCHANGE_ID\n"); + return -EPROTONOSUPPORT; } static bool @@ -7741,8 +7742,19 @@ static int _nfs4_proc_exchange_id(struct nfs_client *clp, struct rpc_cred *cred, int status; task = nfs4_run_exchange_id(clp, cred, sp4_how, NULL); - if (IS_ERR(task)) - return PTR_ERR(task); + if (IS_ERR(task)) { + status = PTR_ERR(task); + if (status == -NFS4ERR_INVAL) { + /* If the server think we did something invalid, it is certainly + * not the fault of our caller, so it would wrong to report + * this error back up. So in that case simply acknowledge that + * we don't seem able to support this protocol. + */ + dprintk("NFS: server return NFS4ERR_INVAL to EXCHANGE_ID\n"); + status = -EPROTONOSUPPORT; + } + return status; + } argp = task->tk_msg.rpc_argp; resp = task->tk_msg.rpc_resp; diff --git a/fs/nfs/nfs4state.c b/fs/nfs/nfs4state.c index 91a4d4eeb235..273c032089c4 100644 --- a/fs/nfs/nfs4state.c +++ b/fs/nfs/nfs4state.c @@ -2219,6 +2219,7 @@ int nfs4_discover_server_trunking(struct nfs_client *clp, clnt = clp->cl_rpcclient; goto again; + case -EPROTONOSUPPORT: case -NFS4ERR_MINOR_VERS_MISMATCH: status = -EPROTONOSUPPORT; break; -- 2.14.0.rc0.dirty [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply related [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-20 0:32 ` NeilBrown @ 2018-03-20 14:14 ` Trond Myklebust 2018-03-20 18:44 ` NeilBrown 0 siblings, 1 reply; 16+ messages in thread From: Trond Myklebust @ 2018-03-20 14:14 UTC (permalink / raw) To: neilb, tigran.mkrtchyan; +Cc: anna.schumaker, linux-nfs [-- Attachment #1: Type: text/plain, Size: 7061 bytes --] On Tue, 2018-03-20 at 11:32 +1100, NeilBrown wrote: > On Fri, Mar 16 2018, Trond Myklebust wrote: > > > On Fri, 2018-03-16 at 10:31 +0100, Mkrtchyan, Tigran wrote: > > > Hi Neil, > > > > > > according to rfc5661, NFS4ERR_INVAL is returned by the server if > > > it > > > thinks that client sends an invalid request (e.g. points to a > > > client > > > bug) > > > or server misinterpret it (broken server). > > > > > > With your change instead of failing the mount, client will > > > silently > > > go for > > > v4.0, even v4.1 mount was requested and produce undesirable > > > behavior, > > > e.g. > > > proxy-io instead of pnfs. I fill prefer fail-fast instead of long > > > debug > > > sessions. > > > > > > On the other hand, I understand, that it's not always possible to > > > fix > > > server > > > or clients in production environment and time-to-time workarounds > > > are > > > necessary. > > > > > > > > > > I'd tend to agree with Tigran. Hiding server bugs, should not be a > > priority and particularly not in this case, where the workaround is > > simple: either turn off version negotiation altogether, or edit > > /etc/nfsmount.conf to negotiate a different set of versions. > > Yes, it could be worked-around in nfsmount.conf, but manual > configuration should be seen as an optimization or a last > resort. If > we can make things work without configuration, that provides the best > experience. > In this case, the kernel has strong evidence that the server > isn't responding as expected, but it gives an unhelpful error > message. Server do not spontaneously break their ability to process NFSv4 operations and so this is not an issue that we need to worry about in ordinary operation. It should only ever be an issue when 1) An insufficiently tested and broken upgrade is applied to an existing server, in which case the main workaround should be to revert the upgrade until it can be fixed. 2) A completely new broken server is introduced to the system. > At the very least, nfs4_discover_server_trunking() should not treat > -NFS4ERR_INVAL as unexpect (because there is code in > nfs4_check_cl_exchange_flags which explicitly generates it). > If it just let this error through, instead of translating it to EIO, > then the problem would go away. The code in nfs4_check_cl_exchange_flags is there to check for explicit NFSv4.1 protocol violations. Is it broken? > > > > What we might want to do, is make it easier to allow the user to > > detect > > that this is indeed a server bug and is not a problem with the > > arguments supplied to the "mount" utility. Perhaps we might have > > the > > kernel log something in the syslogs? > > Yes, logging a message might be useful. Most of the messages logged > about bad servers are currently going through dprintk(), so they > won't > often be seen. Is that what we want?? Don't know... > > Anyway, you point that it "is not a problem with the arguments" is > stop-on. If the client gets EINVAL from the server, then it > shouldn't > blindly report that back to the user as EINVAL means "Invalid > argument" and the argements given to the server are probably not the > argument given by the user. > > Following that line of reasoning, I think > nfs4_check_cl_exchange_flag() > should *not* return -NFS4ERR_INVAL, and _nfs4_proc_exchange_id() > shouldn't pass NFS4ERR_INVAL through unchanged. > > So I propose the following version. > > Thanks, > NeilBrown > > ------------------------8<--------------------------- > From: NeilBrown <neilb@suse.com> > Date: Tue, 20 Mar 2018 11:31:33 +1100 > Subject: [PATCH] NFSv4: handle EINVAL from EXCHANGE_ID better. > > nfs4_proc_exchange_id() can return -EINVAL if the server > reported NFS4INVAL (which I have seen in a packet trace), > or nfs4_check_cl_exchange_flags() exchange flags detects > a problem. > Each of these mean that NFSv4.1 and later cannot be used, > but they should not prevent fallback to NFSv4.0. Currently > they do. > > Currently this EINVAL error is returned by > nfs4_proc_exchange_id() to nfs41_discover_server_trunking(), > and thence to nfs4_discover_server_trunking(). > nfs4_discover_server_trunking() doesn't understand EINVAL, > so converts it to EIO which causes mount.nfs to think > something is horribly wrong and to give up. > > EINVAL is never a sensible error code here. It means "Invalid > argument", but is being used when the problem is "Invalid response > from the server". If we change these two circumstances to report > EPROTONOSUPPORT to the caller (which seems a reasonable assessment > when the server gives confusing responses), and if we enhance > nfs4_discover_server_trunking() to treat -EPROTONOSUPPORT as an > expected error to pass through, then the error reported to user-space > will be more representative of the actual fault. > > A failure to negotiate a client ID clearly shows that NFSv4.1 cannot > be supported, but isn't as general a failure as EIO. > > Signed-off-by: NeilBrown <neilb@suse.com> > --- > fs/nfs/nfs4proc.c | 18 +++++++++++++++--- > fs/nfs/nfs4state.c | 1 + > 2 files changed, 16 insertions(+), 3 deletions(-) > > diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c > index 47f3c273245e..97757f646f13 100644 > --- a/fs/nfs/nfs4proc.c > +++ b/fs/nfs/nfs4proc.c > @@ -7364,7 +7364,8 @@ static int nfs4_check_cl_exchange_flags(u32 > flags) > goto out_inval; > return NFS_OK; > out_inval: > - return -NFS4ERR_INVAL; > + dprintk("NFS: server returns invalid flags for > EXCHANGE_ID\n"); > + return -EPROTONOSUPPORT; > } > > static bool > @@ -7741,8 +7742,19 @@ static int _nfs4_proc_exchange_id(struct > nfs_client *clp, struct rpc_cred *cred, > int status; > > task = nfs4_run_exchange_id(clp, cred, sp4_how, NULL); > - if (IS_ERR(task)) > - return PTR_ERR(task); > + if (IS_ERR(task)) { > + status = PTR_ERR(task); > + if (status == -NFS4ERR_INVAL) { > + /* If the server think we did something > invalid, it is certainly > + * not the fault of our caller, so it would > wrong to report > + * this error back up. So in that case > simply acknowledge that > + * we don't seem able to support this > protocol. > + */ > + dprintk("NFS: server return NFS4ERR_INVAL to > EXCHANGE_ID\n"); > + status = -EPROTONOSUPPORT; > + } > + return status; > + } > > argp = task->tk_msg.rpc_argp; > resp = task->tk_msg.rpc_resp; > diff --git a/fs/nfs/nfs4state.c b/fs/nfs/nfs4state.c > index 91a4d4eeb235..273c032089c4 100644 > --- a/fs/nfs/nfs4state.c > +++ b/fs/nfs/nfs4state.c > @@ -2219,6 +2219,7 @@ int nfs4_discover_server_trunking(struct > nfs_client *clp, > clnt = clp->cl_rpcclient; > goto again; > > + case -EPROTONOSUPPORT: > case -NFS4ERR_MINOR_VERS_MISMATCH: > status = -EPROTONOSUPPORT; > break; -- Trond Myklebust Linux NFS client maintainer, PrimaryData trond.myklebust@primarydata.com [-- Attachment #2: This is a digitally signed message part --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-20 14:14 ` Trond Myklebust @ 2018-03-20 18:44 ` NeilBrown 2018-03-20 19:43 ` Trond Myklebust 0 siblings, 1 reply; 16+ messages in thread From: NeilBrown @ 2018-03-20 18:44 UTC (permalink / raw) To: Trond Myklebust, tigran.mkrtchyan; +Cc: anna.schumaker, linux-nfs [-- Attachment #1: Type: text/plain, Size: 7606 bytes --] On Tue, Mar 20 2018, Trond Myklebust wrote: > On Tue, 2018-03-20 at 11:32 +1100, NeilBrown wrote: >> On Fri, Mar 16 2018, Trond Myklebust wrote: >> >> > On Fri, 2018-03-16 at 10:31 +0100, Mkrtchyan, Tigran wrote: >> > > Hi Neil, >> > > >> > > according to rfc5661, NFS4ERR_INVAL is returned by the server if >> > > it >> > > thinks that client sends an invalid request (e.g. points to a >> > > client >> > > bug) >> > > or server misinterpret it (broken server). >> > > >> > > With your change instead of failing the mount, client will >> > > silently >> > > go for >> > > v4.0, even v4.1 mount was requested and produce undesirable >> > > behavior, >> > > e.g. >> > > proxy-io instead of pnfs. I fill prefer fail-fast instead of long >> > > debug >> > > sessions. >> > > >> > > On the other hand, I understand, that it's not always possible to >> > > fix >> > > server >> > > or clients in production environment and time-to-time workarounds >> > > are >> > > necessary. >> > > >> > > >> > >> > I'd tend to agree with Tigran. Hiding server bugs, should not be a >> > priority and particularly not in this case, where the workaround is >> > simple: either turn off version negotiation altogether, or edit >> > /etc/nfsmount.conf to negotiate a different set of versions. >> >> Yes, it could be worked-around in nfsmount.conf, but manual >> configuration should be seen as an optimization or a last >> resort. If >> we can make things work without configuration, that provides the best >> experience. >> In this case, the kernel has strong evidence that the server >> isn't responding as expected, but it gives an unhelpful error >> message. > > Server do not spontaneously break their ability to process NFSv4 > operations and so this is not an issue that we need to worry about in > ordinary operation. It should only ever be an issue when > > 1) An insufficiently tested and broken upgrade is applied to an > existing server, in which case the main workaround should be to revert > the upgrade until it can be fixed. > 2) A completely new broken server is introduced to the system. 3) An upgrade to the client defaults to trying 4.2 first, then 4.1 and only then 4.0. Previous client defaulted to 4.0. > >> At the very least, nfs4_discover_server_trunking() should not treat >> -NFS4ERR_INVAL as unexpect (because there is code in >> nfs4_check_cl_exchange_flags which explicitly generates it). >> If it just let this error through, instead of translating it to EIO, >> then the problem would go away. > > The code in nfs4_check_cl_exchange_flags is there to check for > explicit NFSv4.1 protocol violations. Is it broken? It is broken in that it reports -EINVAL when no arguments were invalid. This gets translated to -EIO when there was no IO error. Thanks, NeilBrown > >> > >> > What we might want to do, is make it easier to allow the user to >> > detect >> > that this is indeed a server bug and is not a problem with the >> > arguments supplied to the "mount" utility. Perhaps we might have >> > the >> > kernel log something in the syslogs? >> >> Yes, logging a message might be useful. Most of the messages logged >> about bad servers are currently going through dprintk(), so they >> won't >> often be seen. Is that what we want?? Don't know... >> >> Anyway, you point that it "is not a problem with the arguments" is >> stop-on. If the client gets EINVAL from the server, then it >> shouldn't >> blindly report that back to the user as EINVAL means "Invalid >> argument" and the argements given to the server are probably not the >> argument given by the user. >> >> Following that line of reasoning, I think >> nfs4_check_cl_exchange_flag() >> should *not* return -NFS4ERR_INVAL, and _nfs4_proc_exchange_id() >> shouldn't pass NFS4ERR_INVAL through unchanged. >> >> So I propose the following version. >> >> Thanks, >> NeilBrown >> >> ------------------------8<--------------------------- >> From: NeilBrown <neilb@suse.com> >> Date: Tue, 20 Mar 2018 11:31:33 +1100 >> Subject: [PATCH] NFSv4: handle EINVAL from EXCHANGE_ID better. >> >> nfs4_proc_exchange_id() can return -EINVAL if the server >> reported NFS4INVAL (which I have seen in a packet trace), >> or nfs4_check_cl_exchange_flags() exchange flags detects >> a problem. >> Each of these mean that NFSv4.1 and later cannot be used, >> but they should not prevent fallback to NFSv4.0. Currently >> they do. >> >> Currently this EINVAL error is returned by >> nfs4_proc_exchange_id() to nfs41_discover_server_trunking(), >> and thence to nfs4_discover_server_trunking(). >> nfs4_discover_server_trunking() doesn't understand EINVAL, >> so converts it to EIO which causes mount.nfs to think >> something is horribly wrong and to give up. >> >> EINVAL is never a sensible error code here. It means "Invalid >> argument", but is being used when the problem is "Invalid response >> from the server". If we change these two circumstances to report >> EPROTONOSUPPORT to the caller (which seems a reasonable assessment >> when the server gives confusing responses), and if we enhance >> nfs4_discover_server_trunking() to treat -EPROTONOSUPPORT as an >> expected error to pass through, then the error reported to user-space >> will be more representative of the actual fault. >> >> A failure to negotiate a client ID clearly shows that NFSv4.1 cannot >> be supported, but isn't as general a failure as EIO. >> >> Signed-off-by: NeilBrown <neilb@suse.com> >> --- >> fs/nfs/nfs4proc.c | 18 +++++++++++++++--- >> fs/nfs/nfs4state.c | 1 + >> 2 files changed, 16 insertions(+), 3 deletions(-) >> >> diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c >> index 47f3c273245e..97757f646f13 100644 >> --- a/fs/nfs/nfs4proc.c >> +++ b/fs/nfs/nfs4proc.c >> @@ -7364,7 +7364,8 @@ static int nfs4_check_cl_exchange_flags(u32 >> flags) >> goto out_inval; >> return NFS_OK; >> out_inval: >> - return -NFS4ERR_INVAL; >> + dprintk("NFS: server returns invalid flags for >> EXCHANGE_ID\n"); >> + return -EPROTONOSUPPORT; >> } >> >> static bool >> @@ -7741,8 +7742,19 @@ static int _nfs4_proc_exchange_id(struct >> nfs_client *clp, struct rpc_cred *cred, >> int status; >> >> task = nfs4_run_exchange_id(clp, cred, sp4_how, NULL); >> - if (IS_ERR(task)) >> - return PTR_ERR(task); >> + if (IS_ERR(task)) { >> + status = PTR_ERR(task); >> + if (status == -NFS4ERR_INVAL) { >> + /* If the server think we did something >> invalid, it is certainly >> + * not the fault of our caller, so it would >> wrong to report >> + * this error back up. So in that case >> simply acknowledge that >> + * we don't seem able to support this >> protocol. >> + */ >> + dprintk("NFS: server return NFS4ERR_INVAL to >> EXCHANGE_ID\n"); >> + status = -EPROTONOSUPPORT; >> + } >> + return status; >> + } >> >> argp = task->tk_msg.rpc_argp; >> resp = task->tk_msg.rpc_resp; >> diff --git a/fs/nfs/nfs4state.c b/fs/nfs/nfs4state.c >> index 91a4d4eeb235..273c032089c4 100644 >> --- a/fs/nfs/nfs4state.c >> +++ b/fs/nfs/nfs4state.c >> @@ -2219,6 +2219,7 @@ int nfs4_discover_server_trunking(struct >> nfs_client *clp, >> clnt = clp->cl_rpcclient; >> goto again; >> >> + case -EPROTONOSUPPORT: >> case -NFS4ERR_MINOR_VERS_MISMATCH: >> status = -EPROTONOSUPPORT; >> break; > -- > Trond Myklebust > Linux NFS client maintainer, PrimaryData > trond.myklebust@primarydata.com [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-20 18:44 ` NeilBrown @ 2018-03-20 19:43 ` Trond Myklebust 2018-03-20 19:58 ` NeilBrown 0 siblings, 1 reply; 16+ messages in thread From: Trond Myklebust @ 2018-03-20 19:43 UTC (permalink / raw) To: neilb, tigran.mkrtchyan; +Cc: anna.schumaker, linux-nfs [-- Attachment #1: Type: text/plain, Size: 9251 bytes --] On Wed, 2018-03-21 at 05:44 +1100, NeilBrown wrote: > On Tue, Mar 20 2018, Trond Myklebust wrote: > > > On Tue, 2018-03-20 at 11:32 +1100, NeilBrown wrote: > > > On Fri, Mar 16 2018, Trond Myklebust wrote: > > > > > > > On Fri, 2018-03-16 at 10:31 +0100, Mkrtchyan, Tigran wrote: > > > > > Hi Neil, > > > > > > > > > > according to rfc5661, NFS4ERR_INVAL is returned by the server > > > > > if > > > > > it > > > > > thinks that client sends an invalid request (e.g. points to a > > > > > client > > > > > bug) > > > > > or server misinterpret it (broken server). > > > > > > > > > > With your change instead of failing the mount, client will > > > > > silently > > > > > go for > > > > > v4.0, even v4.1 mount was requested and produce undesirable > > > > > behavior, > > > > > e.g. > > > > > proxy-io instead of pnfs. I fill prefer fail-fast instead of > > > > > long > > > > > debug > > > > > sessions. > > > > > > > > > > On the other hand, I understand, that it's not always > > > > > possible to > > > > > fix > > > > > server > > > > > or clients in production environment and time-to-time > > > > > workarounds > > > > > are > > > > > necessary. > > > > > > > > > > > > > > > > > > I'd tend to agree with Tigran. Hiding server bugs, should not > > > > be a > > > > priority and particularly not in this case, where the > > > > workaround is > > > > simple: either turn off version negotiation altogether, or edit > > > > /etc/nfsmount.conf to negotiate a different set of versions. > > > > > > Yes, it could be worked-around in nfsmount.conf, but manual > > > configuration should be seen as an optimization or a last > > > resort. If > > > we can make things work without configuration, that provides the > > > best > > > experience. > > > In this case, the kernel has strong evidence that the server > > > isn't responding as expected, but it gives an unhelpful error > > > message. > > > > Server do not spontaneously break their ability to process NFSv4 > > operations and so this is not an issue that we need to worry about > > in > > ordinary operation. It should only ever be an issue when > > > > 1) An insufficiently tested and broken upgrade is applied to an > > existing server, in which case the main workaround should be to > > revert > > the upgrade until it can be fixed. > > 2) A completely new broken server is introduced to the system. > > 3) An upgrade to the client defaults to trying 4.2 first, then 4.1 > and > only then 4.0. Previous client defaulted to 4.0. I'm sorry, but this still does not sounds like a good case for "fix the kernel client". The kernel has no opinion on which NFS version you should try first in a mount attempt: that decision is made in userspace. If you upgraded the nfs-utils to something that now tries 4.2 first, then that is a user space policy issue. > > > > > At the very least, nfs4_discover_server_trunking() should not > > > treat > > > -NFS4ERR_INVAL as unexpect (because there is code in > > > nfs4_check_cl_exchange_flags which explicitly generates it). > > > If it just let this error through, instead of translating it to > > > EIO, > > > then the problem would go away. > > > > The code in nfs4_check_cl_exchange_flags is there to check for > > explicit NFSv4.1 protocol violations. Is it broken? > > It is broken in that it reports -EINVAL when no arguments were > invalid. > This gets translated to -EIO when there was no IO error. The purpose of that function is to ensure that the server is advertising itself as a bona fide NFSv4.1 or newer server, and to ensure that it is not replying to our EXCHANGE_ID request with some flag or service that we did not expect and that might cause us to break. IOW: it is there to check protocol compliance. As far as I can tell, it is doing that, and doing so correctly. > Thanks, > NeilBrown > > > > > > > > > > > > What we might want to do, is make it easier to allow the user > > > > to > > > > detect > > > > that this is indeed a server bug and is not a problem with the > > > > arguments supplied to the "mount" utility. Perhaps we might > > > > have > > > > the > > > > kernel log something in the syslogs? > > > > > > Yes, logging a message might be useful. Most of the messages > > > logged > > > about bad servers are currently going through dprintk(), so they > > > won't > > > often be seen. Is that what we want?? Don't know... > > > > > > Anyway, you point that it "is not a problem with the arguments" > > > is > > > stop-on. If the client gets EINVAL from the server, then it > > > shouldn't > > > blindly report that back to the user as EINVAL means "Invalid > > > argument" and the argements given to the server are probably not > > > the > > > argument given by the user. > > > > > > Following that line of reasoning, I think > > > nfs4_check_cl_exchange_flag() > > > should *not* return -NFS4ERR_INVAL, and _nfs4_proc_exchange_id() > > > shouldn't pass NFS4ERR_INVAL through unchanged. > > > > > > So I propose the following version. > > > > > > Thanks, > > > NeilBrown > > > > > > ------------------------8<--------------------------- > > > From: NeilBrown <neilb@suse.com> > > > Date: Tue, 20 Mar 2018 11:31:33 +1100 > > > Subject: [PATCH] NFSv4: handle EINVAL from EXCHANGE_ID better. > > > > > > nfs4_proc_exchange_id() can return -EINVAL if the server > > > reported NFS4INVAL (which I have seen in a packet trace), > > > or nfs4_check_cl_exchange_flags() exchange flags detects > > > a problem. > > > Each of these mean that NFSv4.1 and later cannot be used, > > > but they should not prevent fallback to NFSv4.0. Currently > > > they do. > > > > > > Currently this EINVAL error is returned by > > > nfs4_proc_exchange_id() to nfs41_discover_server_trunking(), > > > and thence to nfs4_discover_server_trunking(). > > > nfs4_discover_server_trunking() doesn't understand EINVAL, > > > so converts it to EIO which causes mount.nfs to think > > > something is horribly wrong and to give up. > > > > > > EINVAL is never a sensible error code here. It means "Invalid > > > argument", but is being used when the problem is "Invalid > > > response > > > from the server". If we change these two circumstances to report > > > EPROTONOSUPPORT to the caller (which seems a reasonable > > > assessment > > > when the server gives confusing responses), and if we enhance > > > nfs4_discover_server_trunking() to treat -EPROTONOSUPPORT as an > > > expected error to pass through, then the error reported to user- > > > space > > > will be more representative of the actual fault. > > > > > > A failure to negotiate a client ID clearly shows that NFSv4.1 > > > cannot > > > be supported, but isn't as general a failure as EIO. > > > > > > Signed-off-by: NeilBrown <neilb@suse.com> > > > --- > > > fs/nfs/nfs4proc.c | 18 +++++++++++++++--- > > > fs/nfs/nfs4state.c | 1 + > > > 2 files changed, 16 insertions(+), 3 deletions(-) > > > > > > diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c > > > index 47f3c273245e..97757f646f13 100644 > > > --- a/fs/nfs/nfs4proc.c > > > +++ b/fs/nfs/nfs4proc.c > > > @@ -7364,7 +7364,8 @@ static int nfs4_check_cl_exchange_flags(u32 > > > flags) > > > goto out_inval; > > > return NFS_OK; > > > out_inval: > > > - return -NFS4ERR_INVAL; > > > + dprintk("NFS: server returns invalid flags for > > > EXCHANGE_ID\n"); > > > + return -EPROTONOSUPPORT; > > > } > > > > > > static bool > > > @@ -7741,8 +7742,19 @@ static int _nfs4_proc_exchange_id(struct > > > nfs_client *clp, struct rpc_cred *cred, > > > int status; > > > > > > task = nfs4_run_exchange_id(clp, cred, sp4_how, NULL); > > > - if (IS_ERR(task)) > > > - return PTR_ERR(task); > > > + if (IS_ERR(task)) { > > > + status = PTR_ERR(task); > > > + if (status == -NFS4ERR_INVAL) { > > > + /* If the server think we did something > > > invalid, it is certainly > > > + * not the fault of our caller, so it > > > would > > > wrong to report > > > + * this error back up. So in that case > > > simply acknowledge that > > > + * we don't seem able to support this > > > protocol. > > > + */ > > > + dprintk("NFS: server return > > > NFS4ERR_INVAL to > > > EXCHANGE_ID\n"); > > > + status = -EPROTONOSUPPORT; > > > + } > > > + return status; > > > + } > > > > > > argp = task->tk_msg.rpc_argp; > > > resp = task->tk_msg.rpc_resp; > > > diff --git a/fs/nfs/nfs4state.c b/fs/nfs/nfs4state.c > > > index 91a4d4eeb235..273c032089c4 100644 > > > --- a/fs/nfs/nfs4state.c > > > +++ b/fs/nfs/nfs4state.c > > > @@ -2219,6 +2219,7 @@ int nfs4_discover_server_trunking(struct > > > nfs_client *clp, > > > clnt = clp->cl_rpcclient; > > > goto again; > > > > > > + case -EPROTONOSUPPORT: > > > case -NFS4ERR_MINOR_VERS_MISMATCH: > > > status = -EPROTONOSUPPORT; > > > break; > > > > -- > > Trond Myklebust > > Linux NFS client maintainer, PrimaryData > > trond.myklebust@primarydata.com -- Trond Myklebust Linux NFS client maintainer, PrimaryData trond.myklebust@primarydata.com [-- Attachment #2: This is a digitally signed message part --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-20 19:43 ` Trond Myklebust @ 2018-03-20 19:58 ` NeilBrown 2018-03-20 20:13 ` Trond Myklebust 0 siblings, 1 reply; 16+ messages in thread From: NeilBrown @ 2018-03-20 19:58 UTC (permalink / raw) To: Trond Myklebust, tigran.mkrtchyan; +Cc: anna.schumaker, linux-nfs [-- Attachment #1: Type: text/plain, Size: 10024 bytes --] On Tue, Mar 20 2018, Trond Myklebust wrote: > On Wed, 2018-03-21 at 05:44 +1100, NeilBrown wrote: >> On Tue, Mar 20 2018, Trond Myklebust wrote: >> >> > On Tue, 2018-03-20 at 11:32 +1100, NeilBrown wrote: >> > > On Fri, Mar 16 2018, Trond Myklebust wrote: >> > > >> > > > On Fri, 2018-03-16 at 10:31 +0100, Mkrtchyan, Tigran wrote: >> > > > > Hi Neil, >> > > > > >> > > > > according to rfc5661, NFS4ERR_INVAL is returned by the server >> > > > > if >> > > > > it >> > > > > thinks that client sends an invalid request (e.g. points to a >> > > > > client >> > > > > bug) >> > > > > or server misinterpret it (broken server). >> > > > > >> > > > > With your change instead of failing the mount, client will >> > > > > silently >> > > > > go for >> > > > > v4.0, even v4.1 mount was requested and produce undesirable >> > > > > behavior, >> > > > > e.g. >> > > > > proxy-io instead of pnfs. I fill prefer fail-fast instead of >> > > > > long >> > > > > debug >> > > > > sessions. >> > > > > >> > > > > On the other hand, I understand, that it's not always >> > > > > possible to >> > > > > fix >> > > > > server >> > > > > or clients in production environment and time-to-time >> > > > > workarounds >> > > > > are >> > > > > necessary. >> > > > > >> > > > > >> > > > >> > > > I'd tend to agree with Tigran. Hiding server bugs, should not >> > > > be a >> > > > priority and particularly not in this case, where the >> > > > workaround is >> > > > simple: either turn off version negotiation altogether, or edit >> > > > /etc/nfsmount.conf to negotiate a different set of versions. >> > > >> > > Yes, it could be worked-around in nfsmount.conf, but manual >> > > configuration should be seen as an optimization or a last >> > > resort. If >> > > we can make things work without configuration, that provides the >> > > best >> > > experience. >> > > In this case, the kernel has strong evidence that the server >> > > isn't responding as expected, but it gives an unhelpful error >> > > message. >> > >> > Server do not spontaneously break their ability to process NFSv4 >> > operations and so this is not an issue that we need to worry about >> > in >> > ordinary operation. It should only ever be an issue when >> > >> > 1) An insufficiently tested and broken upgrade is applied to an >> > existing server, in which case the main workaround should be to >> > revert >> > the upgrade until it can be fixed. >> > 2) A completely new broken server is introduced to the system. >> >> 3) An upgrade to the client defaults to trying 4.2 first, then 4.1 >> and >> only then 4.0. Previous client defaulted to 4.0. > > I'm sorry, but this still does not sounds like a good case for "fix the > kernel client". The kernel has no opinion on which NFS version you > should try first in a mount attempt: that decision is made in > userspace. Of course. But the kernel should still accurately report what it found. If it found that it cannot use that protocol, it should report "I cannot use that protocol". It shouldn't report "IO error". This allows user space to know what the status is and to make a correctly informed decision. > If you upgraded the nfs-utils to something that now tries 4.2 first, > then that is a user space policy issue. > >> > >> > > At the very least, nfs4_discover_server_trunking() should not >> > > treat >> > > -NFS4ERR_INVAL as unexpect (because there is code in >> > > nfs4_check_cl_exchange_flags which explicitly generates it). >> > > If it just let this error through, instead of translating it to >> > > EIO, >> > > then the problem would go away. >> > >> > The code in nfs4_check_cl_exchange_flags is there to check for >> > explicit NFSv4.1 protocol violations. Is it broken? >> >> It is broken in that it reports -EINVAL when no arguments were >> invalid. >> This gets translated to -EIO when there was no IO error. > > The purpose of that function is to ensure that the server is > advertising itself as a bona fide NFSv4.1 or newer server, and to > ensure that it is not replying to our EXCHANGE_ID request with some > flag or service that we did not expect and that might cause us to > break. > > IOW: it is there to check protocol compliance. As far as I can tell, it > is doing that, and doing so correctly. It is checking correctly, but it is not reporting "the protocol is not compliant". It is reporting "invalid argument". Thanks, NeilBrown > > >> Thanks, >> NeilBrown >> >> >> > >> > > > >> > > > What we might want to do, is make it easier to allow the user >> > > > to >> > > > detect >> > > > that this is indeed a server bug and is not a problem with the >> > > > arguments supplied to the "mount" utility. Perhaps we might >> > > > have >> > > > the >> > > > kernel log something in the syslogs? >> > > >> > > Yes, logging a message might be useful. Most of the messages >> > > logged >> > > about bad servers are currently going through dprintk(), so they >> > > won't >> > > often be seen. Is that what we want?? Don't know... >> > > >> > > Anyway, you point that it "is not a problem with the arguments" >> > > is >> > > stop-on. If the client gets EINVAL from the server, then it >> > > shouldn't >> > > blindly report that back to the user as EINVAL means "Invalid >> > > argument" and the argements given to the server are probably not >> > > the >> > > argument given by the user. >> > > >> > > Following that line of reasoning, I think >> > > nfs4_check_cl_exchange_flag() >> > > should *not* return -NFS4ERR_INVAL, and _nfs4_proc_exchange_id() >> > > shouldn't pass NFS4ERR_INVAL through unchanged. >> > > >> > > So I propose the following version. >> > > >> > > Thanks, >> > > NeilBrown >> > > >> > > ------------------------8<--------------------------- >> > > From: NeilBrown <neilb@suse.com> >> > > Date: Tue, 20 Mar 2018 11:31:33 +1100 >> > > Subject: [PATCH] NFSv4: handle EINVAL from EXCHANGE_ID better. >> > > >> > > nfs4_proc_exchange_id() can return -EINVAL if the server >> > > reported NFS4INVAL (which I have seen in a packet trace), >> > > or nfs4_check_cl_exchange_flags() exchange flags detects >> > > a problem. >> > > Each of these mean that NFSv4.1 and later cannot be used, >> > > but they should not prevent fallback to NFSv4.0. Currently >> > > they do. >> > > >> > > Currently this EINVAL error is returned by >> > > nfs4_proc_exchange_id() to nfs41_discover_server_trunking(), >> > > and thence to nfs4_discover_server_trunking(). >> > > nfs4_discover_server_trunking() doesn't understand EINVAL, >> > > so converts it to EIO which causes mount.nfs to think >> > > something is horribly wrong and to give up. >> > > >> > > EINVAL is never a sensible error code here. It means "Invalid >> > > argument", but is being used when the problem is "Invalid >> > > response >> > > from the server". If we change these two circumstances to report >> > > EPROTONOSUPPORT to the caller (which seems a reasonable >> > > assessment >> > > when the server gives confusing responses), and if we enhance >> > > nfs4_discover_server_trunking() to treat -EPROTONOSUPPORT as an >> > > expected error to pass through, then the error reported to user- >> > > space >> > > will be more representative of the actual fault. >> > > >> > > A failure to negotiate a client ID clearly shows that NFSv4.1 >> > > cannot >> > > be supported, but isn't as general a failure as EIO. >> > > >> > > Signed-off-by: NeilBrown <neilb@suse.com> >> > > --- >> > > fs/nfs/nfs4proc.c | 18 +++++++++++++++--- >> > > fs/nfs/nfs4state.c | 1 + >> > > 2 files changed, 16 insertions(+), 3 deletions(-) >> > > >> > > diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c >> > > index 47f3c273245e..97757f646f13 100644 >> > > --- a/fs/nfs/nfs4proc.c >> > > +++ b/fs/nfs/nfs4proc.c >> > > @@ -7364,7 +7364,8 @@ static int nfs4_check_cl_exchange_flags(u32 >> > > flags) >> > > goto out_inval; >> > > return NFS_OK; >> > > out_inval: >> > > - return -NFS4ERR_INVAL; >> > > + dprintk("NFS: server returns invalid flags for >> > > EXCHANGE_ID\n"); >> > > + return -EPROTONOSUPPORT; >> > > } >> > > >> > > static bool >> > > @@ -7741,8 +7742,19 @@ static int _nfs4_proc_exchange_id(struct >> > > nfs_client *clp, struct rpc_cred *cred, >> > > int status; >> > > >> > > task = nfs4_run_exchange_id(clp, cred, sp4_how, NULL); >> > > - if (IS_ERR(task)) >> > > - return PTR_ERR(task); >> > > + if (IS_ERR(task)) { >> > > + status = PTR_ERR(task); >> > > + if (status == -NFS4ERR_INVAL) { >> > > + /* If the server think we did something >> > > invalid, it is certainly >> > > + * not the fault of our caller, so it >> > > would >> > > wrong to report >> > > + * this error back up. So in that case >> > > simply acknowledge that >> > > + * we don't seem able to support this >> > > protocol. >> > > + */ >> > > + dprintk("NFS: server return >> > > NFS4ERR_INVAL to >> > > EXCHANGE_ID\n"); >> > > + status = -EPROTONOSUPPORT; >> > > + } >> > > + return status; >> > > + } >> > > >> > > argp = task->tk_msg.rpc_argp; >> > > resp = task->tk_msg.rpc_resp; >> > > diff --git a/fs/nfs/nfs4state.c b/fs/nfs/nfs4state.c >> > > index 91a4d4eeb235..273c032089c4 100644 >> > > --- a/fs/nfs/nfs4state.c >> > > +++ b/fs/nfs/nfs4state.c >> > > @@ -2219,6 +2219,7 @@ int nfs4_discover_server_trunking(struct >> > > nfs_client *clp, >> > > clnt = clp->cl_rpcclient; >> > > goto again; >> > > >> > > + case -EPROTONOSUPPORT: >> > > case -NFS4ERR_MINOR_VERS_MISMATCH: >> > > status = -EPROTONOSUPPORT; >> > > break; >> > >> > -- >> > Trond Myklebust >> > Linux NFS client maintainer, PrimaryData >> > trond.myklebust@primarydata.com > -- > Trond Myklebust > Linux NFS client maintainer, PrimaryData > trond.myklebust@primarydata.com [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-20 19:58 ` NeilBrown @ 2018-03-20 20:13 ` Trond Myklebust 2018-03-20 21:20 ` NeilBrown 0 siblings, 1 reply; 16+ messages in thread From: Trond Myklebust @ 2018-03-20 20:13 UTC (permalink / raw) To: neilb, tigran.mkrtchyan; +Cc: anna.schumaker, linux-nfs [-- Attachment #1: Type: text/plain, Size: 12015 bytes --] On Wed, 2018-03-21 at 06:58 +1100, NeilBrown wrote: > On Tue, Mar 20 2018, Trond Myklebust wrote: > > > On Wed, 2018-03-21 at 05:44 +1100, NeilBrown wrote: > > > On Tue, Mar 20 2018, Trond Myklebust wrote: > > > > > > > On Tue, 2018-03-20 at 11:32 +1100, NeilBrown wrote: > > > > > On Fri, Mar 16 2018, Trond Myklebust wrote: > > > > > > > > > > > On Fri, 2018-03-16 at 10:31 +0100, Mkrtchyan, Tigran wrote: > > > > > > > Hi Neil, > > > > > > > > > > > > > > according to rfc5661, NFS4ERR_INVAL is returned by the > > > > > > > server > > > > > > > if > > > > > > > it > > > > > > > thinks that client sends an invalid request (e.g. points > > > > > > > to a > > > > > > > client > > > > > > > bug) > > > > > > > or server misinterpret it (broken server). > > > > > > > > > > > > > > With your change instead of failing the mount, client > > > > > > > will > > > > > > > silently > > > > > > > go for > > > > > > > v4.0, even v4.1 mount was requested and produce > > > > > > > undesirable > > > > > > > behavior, > > > > > > > e.g. > > > > > > > proxy-io instead of pnfs. I fill prefer fail-fast instead > > > > > > > of > > > > > > > long > > > > > > > debug > > > > > > > sessions. > > > > > > > > > > > > > > On the other hand, I understand, that it's not always > > > > > > > possible to > > > > > > > fix > > > > > > > server > > > > > > > or clients in production environment and time-to-time > > > > > > > workarounds > > > > > > > are > > > > > > > necessary. > > > > > > > > > > > > > > > > > > > > > > > > > > I'd tend to agree with Tigran. Hiding server bugs, should > > > > > > not > > > > > > be a > > > > > > priority and particularly not in this case, where the > > > > > > workaround is > > > > > > simple: either turn off version negotiation altogether, or > > > > > > edit > > > > > > /etc/nfsmount.conf to negotiate a different set of > > > > > > versions. > > > > > > > > > > Yes, it could be worked-around in nfsmount.conf, but manual > > > > > configuration should be seen as an optimization or a last > > > > > resort. If > > > > > we can make things work without configuration, that provides > > > > > the > > > > > best > > > > > experience. > > > > > In this case, the kernel has strong evidence that the server > > > > > isn't responding as expected, but it gives an unhelpful error > > > > > message. > > > > > > > > Server do not spontaneously break their ability to process > > > > NFSv4 > > > > operations and so this is not an issue that we need to worry > > > > about > > > > in > > > > ordinary operation. It should only ever be an issue when > > > > > > > > 1) An insufficiently tested and broken upgrade is applied to an > > > > existing server, in which case the main workaround should be to > > > > revert > > > > the upgrade until it can be fixed. > > > > 2) A completely new broken server is introduced to the system. > > > > > > 3) An upgrade to the client defaults to trying 4.2 first, then > > > 4.1 > > > and > > > only then 4.0. Previous client defaulted to 4.0. > > > > I'm sorry, but this still does not sounds like a good case for "fix > > the > > kernel client". The kernel has no opinion on which NFS version you > > should try first in a mount attempt: that decision is made in > > userspace. > > Of course. But the kernel should still accurately report what it > found. If it found that it cannot use that protocol, it should > report > "I cannot use that protocol". It shouldn't report "IO error". EPROTONOSUPPORT means "that protocol is not supported". In the case you are arguing, the protocol is reported as being supported by both the client and the server, so that is not the issue. The existence of a server bug in the protocol implementation _is_ the issue. As I said, I have no problems changing what we report so that it is easier to debug. I do have a problem with a change that makes the failure silent, and thus makes the problem harder to debug. Bottom line: if the sysadmin has enabled NFSv4.2 on the server, and the userspace mount program is asking for NFSv4.2, then we should NOT be telling it to fail over silently to NFSv4.0. > This allows user space to know what the status is and to make a > correctly informed decision. > > > If you upgraded the nfs-utils to something that now tries 4.2 > > first, > > then that is a user space policy issue. > > > > > > > > > > > At the very least, nfs4_discover_server_trunking() should not > > > > > treat > > > > > -NFS4ERR_INVAL as unexpect (because there is code in > > > > > nfs4_check_cl_exchange_flags which explicitly generates it). > > > > > If it just let this error through, instead of translating it > > > > > to > > > > > EIO, > > > > > then the problem would go away. > > > > > > > > The code in nfs4_check_cl_exchange_flags is there to check for > > > > explicit NFSv4.1 protocol violations. Is it broken? > > > > > > It is broken in that it reports -EINVAL when no arguments were > > > invalid. > > > This gets translated to -EIO when there was no IO error. > > > > The purpose of that function is to ensure that the server is > > advertising itself as a bona fide NFSv4.1 or newer server, and to > > ensure that it is not replying to our EXCHANGE_ID request with some > > flag or service that we did not expect and that might cause us to > > break. > > > > IOW: it is there to check protocol compliance. As far as I can > > tell, it > > is doing that, and doing so correctly. > > It is checking correctly, but it is not reporting "the protocol is > not > compliant". It is reporting "invalid argument". > > Thanks, > NeilBrown > > > > > > > > > Thanks, > > > NeilBrown > > > > > > > > > > > > > > > > > > > > > > What we might want to do, is make it easier to allow the > > > > > > user > > > > > > to > > > > > > detect > > > > > > that this is indeed a server bug and is not a problem with > > > > > > the > > > > > > arguments supplied to the "mount" utility. Perhaps we might > > > > > > have > > > > > > the > > > > > > kernel log something in the syslogs? > > > > > > > > > > Yes, logging a message might be useful. Most of the messages > > > > > logged > > > > > about bad servers are currently going through dprintk(), so > > > > > they > > > > > won't > > > > > often be seen. Is that what we want?? Don't know... > > > > > > > > > > Anyway, you point that it "is not a problem with the > > > > > arguments" > > > > > is > > > > > stop-on. If the client gets EINVAL from the server, then it > > > > > shouldn't > > > > > blindly report that back to the user as EINVAL means "Invalid > > > > > argument" and the argements given to the server are probably > > > > > not > > > > > the > > > > > argument given by the user. > > > > > > > > > > Following that line of reasoning, I think > > > > > nfs4_check_cl_exchange_flag() > > > > > should *not* return -NFS4ERR_INVAL, and > > > > > _nfs4_proc_exchange_id() > > > > > shouldn't pass NFS4ERR_INVAL through unchanged. > > > > > > > > > > So I propose the following version. > > > > > > > > > > Thanks, > > > > > NeilBrown > > > > > > > > > > ------------------------8<--------------------------- > > > > > From: NeilBrown <neilb@suse.com> > > > > > Date: Tue, 20 Mar 2018 11:31:33 +1100 > > > > > Subject: [PATCH] NFSv4: handle EINVAL from EXCHANGE_ID > > > > > better. > > > > > > > > > > nfs4_proc_exchange_id() can return -EINVAL if the server > > > > > reported NFS4INVAL (which I have seen in a packet trace), > > > > > or nfs4_check_cl_exchange_flags() exchange flags detects > > > > > a problem. > > > > > Each of these mean that NFSv4.1 and later cannot be used, > > > > > but they should not prevent fallback to NFSv4.0. Currently > > > > > they do. > > > > > > > > > > Currently this EINVAL error is returned by > > > > > nfs4_proc_exchange_id() to nfs41_discover_server_trunking(), > > > > > and thence to nfs4_discover_server_trunking(). > > > > > nfs4_discover_server_trunking() doesn't understand EINVAL, > > > > > so converts it to EIO which causes mount.nfs to think > > > > > something is horribly wrong and to give up. > > > > > > > > > > EINVAL is never a sensible error code here. It means > > > > > "Invalid > > > > > argument", but is being used when the problem is "Invalid > > > > > response > > > > > from the server". If we change these two circumstances to > > > > > report > > > > > EPROTONOSUPPORT to the caller (which seems a reasonable > > > > > assessment > > > > > when the server gives confusing responses), and if we enhance > > > > > nfs4_discover_server_trunking() to treat -EPROTONOSUPPORT as > > > > > an > > > > > expected error to pass through, then the error reported to > > > > > user- > > > > > space > > > > > will be more representative of the actual fault. > > > > > > > > > > A failure to negotiate a client ID clearly shows that NFSv4.1 > > > > > cannot > > > > > be supported, but isn't as general a failure as EIO. > > > > > > > > > > Signed-off-by: NeilBrown <neilb@suse.com> > > > > > --- > > > > > fs/nfs/nfs4proc.c | 18 +++++++++++++++--- > > > > > fs/nfs/nfs4state.c | 1 + > > > > > 2 files changed, 16 insertions(+), 3 deletions(-) > > > > > > > > > > diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c > > > > > index 47f3c273245e..97757f646f13 100644 > > > > > --- a/fs/nfs/nfs4proc.c > > > > > +++ b/fs/nfs/nfs4proc.c > > > > > @@ -7364,7 +7364,8 @@ static int > > > > > nfs4_check_cl_exchange_flags(u32 > > > > > flags) > > > > > goto out_inval; > > > > > return NFS_OK; > > > > > out_inval: > > > > > - return -NFS4ERR_INVAL; > > > > > + dprintk("NFS: server returns invalid flags for > > > > > EXCHANGE_ID\n"); > > > > > + return -EPROTONOSUPPORT; > > > > > } > > > > > > > > > > static bool > > > > > @@ -7741,8 +7742,19 @@ static int > > > > > _nfs4_proc_exchange_id(struct > > > > > nfs_client *clp, struct rpc_cred *cred, > > > > > int status; > > > > > > > > > > task = nfs4_run_exchange_id(clp, cred, sp4_how, > > > > > NULL); > > > > > - if (IS_ERR(task)) > > > > > - return PTR_ERR(task); > > > > > + if (IS_ERR(task)) { > > > > > + status = PTR_ERR(task); > > > > > + if (status == -NFS4ERR_INVAL) { > > > > > + /* If the server think we did > > > > > something > > > > > invalid, it is certainly > > > > > + * not the fault of our caller, so > > > > > it > > > > > would > > > > > wrong to report > > > > > + * this error back up. So in that > > > > > case > > > > > simply acknowledge that > > > > > + * we don't seem able to support > > > > > this > > > > > protocol. > > > > > + */ > > > > > + dprintk("NFS: server return > > > > > NFS4ERR_INVAL to > > > > > EXCHANGE_ID\n"); > > > > > + status = -EPROTONOSUPPORT; > > > > > + } > > > > > + return status; > > > > > + } > > > > > > > > > > argp = task->tk_msg.rpc_argp; > > > > > resp = task->tk_msg.rpc_resp; > > > > > diff --git a/fs/nfs/nfs4state.c b/fs/nfs/nfs4state.c > > > > > index 91a4d4eeb235..273c032089c4 100644 > > > > > --- a/fs/nfs/nfs4state.c > > > > > +++ b/fs/nfs/nfs4state.c > > > > > @@ -2219,6 +2219,7 @@ int > > > > > nfs4_discover_server_trunking(struct > > > > > nfs_client *clp, > > > > > clnt = clp->cl_rpcclient; > > > > > goto again; > > > > > > > > > > + case -EPROTONOSUPPORT: > > > > > case -NFS4ERR_MINOR_VERS_MISMATCH: > > > > > status = -EPROTONOSUPPORT; > > > > > break; > > > > > > > > -- > > > > Trond Myklebust > > > > Linux NFS client maintainer, PrimaryData > > > > trond.myklebust@primarydata.com > > > > -- > > Trond Myklebust > > Linux NFS client maintainer, PrimaryData > > trond.myklebust@primarydata.com -- Trond Myklebust Linux NFS client maintainer, PrimaryData trond.myklebust@primarydata.com [-- Attachment #2: This is a digitally signed message part --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-20 20:13 ` Trond Myklebust @ 2018-03-20 21:20 ` NeilBrown 0 siblings, 0 replies; 16+ messages in thread From: NeilBrown @ 2018-03-20 21:20 UTC (permalink / raw) To: Trond Myklebust, tigran.mkrtchyan; +Cc: anna.schumaker, linux-nfs [-- Attachment #1: Type: text/plain, Size: 12891 bytes --] On Tue, Mar 20 2018, Trond Myklebust wrote: > On Wed, 2018-03-21 at 06:58 +1100, NeilBrown wrote: >> On Tue, Mar 20 2018, Trond Myklebust wrote: >> >> > On Wed, 2018-03-21 at 05:44 +1100, NeilBrown wrote: >> > > On Tue, Mar 20 2018, Trond Myklebust wrote: >> > > >> > > > On Tue, 2018-03-20 at 11:32 +1100, NeilBrown wrote: >> > > > > On Fri, Mar 16 2018, Trond Myklebust wrote: >> > > > > >> > > > > > On Fri, 2018-03-16 at 10:31 +0100, Mkrtchyan, Tigran wrote: >> > > > > > > Hi Neil, >> > > > > > > >> > > > > > > according to rfc5661, NFS4ERR_INVAL is returned by the >> > > > > > > server >> > > > > > > if >> > > > > > > it >> > > > > > > thinks that client sends an invalid request (e.g. points >> > > > > > > to a >> > > > > > > client >> > > > > > > bug) >> > > > > > > or server misinterpret it (broken server). >> > > > > > > >> > > > > > > With your change instead of failing the mount, client >> > > > > > > will >> > > > > > > silently >> > > > > > > go for >> > > > > > > v4.0, even v4.1 mount was requested and produce >> > > > > > > undesirable >> > > > > > > behavior, >> > > > > > > e.g. >> > > > > > > proxy-io instead of pnfs. I fill prefer fail-fast instead >> > > > > > > of >> > > > > > > long >> > > > > > > debug >> > > > > > > sessions. >> > > > > > > >> > > > > > > On the other hand, I understand, that it's not always >> > > > > > > possible to >> > > > > > > fix >> > > > > > > server >> > > > > > > or clients in production environment and time-to-time >> > > > > > > workarounds >> > > > > > > are >> > > > > > > necessary. >> > > > > > > >> > > > > > > >> > > > > > >> > > > > > I'd tend to agree with Tigran. Hiding server bugs, should >> > > > > > not >> > > > > > be a >> > > > > > priority and particularly not in this case, where the >> > > > > > workaround is >> > > > > > simple: either turn off version negotiation altogether, or >> > > > > > edit >> > > > > > /etc/nfsmount.conf to negotiate a different set of >> > > > > > versions. >> > > > > >> > > > > Yes, it could be worked-around in nfsmount.conf, but manual >> > > > > configuration should be seen as an optimization or a last >> > > > > resort. If >> > > > > we can make things work without configuration, that provides >> > > > > the >> > > > > best >> > > > > experience. >> > > > > In this case, the kernel has strong evidence that the server >> > > > > isn't responding as expected, but it gives an unhelpful error >> > > > > message. >> > > > >> > > > Server do not spontaneously break their ability to process >> > > > NFSv4 >> > > > operations and so this is not an issue that we need to worry >> > > > about >> > > > in >> > > > ordinary operation. It should only ever be an issue when >> > > > >> > > > 1) An insufficiently tested and broken upgrade is applied to an >> > > > existing server, in which case the main workaround should be to >> > > > revert >> > > > the upgrade until it can be fixed. >> > > > 2) A completely new broken server is introduced to the system. >> > > >> > > 3) An upgrade to the client defaults to trying 4.2 first, then >> > > 4.1 >> > > and >> > > only then 4.0. Previous client defaulted to 4.0. >> > >> > I'm sorry, but this still does not sounds like a good case for "fix >> > the >> > kernel client". The kernel has no opinion on which NFS version you >> > should try first in a mount attempt: that decision is made in >> > userspace. >> >> Of course. But the kernel should still accurately report what it >> found. If it found that it cannot use that protocol, it should >> report >> "I cannot use that protocol". It shouldn't report "IO error". > > EPROTONOSUPPORT means "that protocol is not supported". In the case you > are arguing, the protocol is reported as being supported by both the > client and the server, so that is not the issue. The existence of a > server bug in the protocol implementation _is_ the issue. I don't see how a server that fails the first transaction of a protocol can be said to "support" that protocol. > > As I said, I have no problems changing what we report so that it is > easier to debug. I do have a problem with a change that makes the > failure silent, and thus makes the problem harder to debug. > > Bottom line: if the sysadmin has enabled NFSv4.2 on the server, and the > userspace mount program is asking for NFSv4.2, then we should NOT be > telling it to fail over silently to NFSv4.0. It is NOT telling it to fail over. It is tell it that v4.2 doesn't work. How mount.nfs responds to that information is not the kernel's problem. Providing meaningful information is. But I can see that we aren't going anywhere so let's just not bother. It isn't that much cost for me to carry a tiny patch that you don't want. Thanks, NeilBrown > >> This allows user space to know what the status is and to make a >> correctly informed decision. >> >> > If you upgraded the nfs-utils to something that now tries 4.2 >> > first, >> > then that is a user space policy issue. >> > >> > > > >> > > > > At the very least, nfs4_discover_server_trunking() should not >> > > > > treat >> > > > > -NFS4ERR_INVAL as unexpect (because there is code in >> > > > > nfs4_check_cl_exchange_flags which explicitly generates it). >> > > > > If it just let this error through, instead of translating it >> > > > > to >> > > > > EIO, >> > > > > then the problem would go away. >> > > > >> > > > The code in nfs4_check_cl_exchange_flags is there to check for >> > > > explicit NFSv4.1 protocol violations. Is it broken? >> > > >> > > It is broken in that it reports -EINVAL when no arguments were >> > > invalid. >> > > This gets translated to -EIO when there was no IO error. >> > >> > The purpose of that function is to ensure that the server is >> > advertising itself as a bona fide NFSv4.1 or newer server, and to >> > ensure that it is not replying to our EXCHANGE_ID request with some >> > flag or service that we did not expect and that might cause us to >> > break. >> > >> > IOW: it is there to check protocol compliance. As far as I can >> > tell, it >> > is doing that, and doing so correctly. >> >> It is checking correctly, but it is not reporting "the protocol is >> not >> compliant". It is reporting "invalid argument". >> >> Thanks, >> NeilBrown >> >> >> > >> > >> > > Thanks, >> > > NeilBrown >> > > >> > > >> > > > >> > > > > > >> > > > > > What we might want to do, is make it easier to allow the >> > > > > > user >> > > > > > to >> > > > > > detect >> > > > > > that this is indeed a server bug and is not a problem with >> > > > > > the >> > > > > > arguments supplied to the "mount" utility. Perhaps we might >> > > > > > have >> > > > > > the >> > > > > > kernel log something in the syslogs? >> > > > > >> > > > > Yes, logging a message might be useful. Most of the messages >> > > > > logged >> > > > > about bad servers are currently going through dprintk(), so >> > > > > they >> > > > > won't >> > > > > often be seen. Is that what we want?? Don't know... >> > > > > >> > > > > Anyway, you point that it "is not a problem with the >> > > > > arguments" >> > > > > is >> > > > > stop-on. If the client gets EINVAL from the server, then it >> > > > > shouldn't >> > > > > blindly report that back to the user as EINVAL means "Invalid >> > > > > argument" and the argements given to the server are probably >> > > > > not >> > > > > the >> > > > > argument given by the user. >> > > > > >> > > > > Following that line of reasoning, I think >> > > > > nfs4_check_cl_exchange_flag() >> > > > > should *not* return -NFS4ERR_INVAL, and >> > > > > _nfs4_proc_exchange_id() >> > > > > shouldn't pass NFS4ERR_INVAL through unchanged. >> > > > > >> > > > > So I propose the following version. >> > > > > >> > > > > Thanks, >> > > > > NeilBrown >> > > > > >> > > > > ------------------------8<--------------------------- >> > > > > From: NeilBrown <neilb@suse.com> >> > > > > Date: Tue, 20 Mar 2018 11:31:33 +1100 >> > > > > Subject: [PATCH] NFSv4: handle EINVAL from EXCHANGE_ID >> > > > > better. >> > > > > >> > > > > nfs4_proc_exchange_id() can return -EINVAL if the server >> > > > > reported NFS4INVAL (which I have seen in a packet trace), >> > > > > or nfs4_check_cl_exchange_flags() exchange flags detects >> > > > > a problem. >> > > > > Each of these mean that NFSv4.1 and later cannot be used, >> > > > > but they should not prevent fallback to NFSv4.0. Currently >> > > > > they do. >> > > > > >> > > > > Currently this EINVAL error is returned by >> > > > > nfs4_proc_exchange_id() to nfs41_discover_server_trunking(), >> > > > > and thence to nfs4_discover_server_trunking(). >> > > > > nfs4_discover_server_trunking() doesn't understand EINVAL, >> > > > > so converts it to EIO which causes mount.nfs to think >> > > > > something is horribly wrong and to give up. >> > > > > >> > > > > EINVAL is never a sensible error code here. It means >> > > > > "Invalid >> > > > > argument", but is being used when the problem is "Invalid >> > > > > response >> > > > > from the server". If we change these two circumstances to >> > > > > report >> > > > > EPROTONOSUPPORT to the caller (which seems a reasonable >> > > > > assessment >> > > > > when the server gives confusing responses), and if we enhance >> > > > > nfs4_discover_server_trunking() to treat -EPROTONOSUPPORT as >> > > > > an >> > > > > expected error to pass through, then the error reported to >> > > > > user- >> > > > > space >> > > > > will be more representative of the actual fault. >> > > > > >> > > > > A failure to negotiate a client ID clearly shows that NFSv4.1 >> > > > > cannot >> > > > > be supported, but isn't as general a failure as EIO. >> > > > > >> > > > > Signed-off-by: NeilBrown <neilb@suse.com> >> > > > > --- >> > > > > fs/nfs/nfs4proc.c | 18 +++++++++++++++--- >> > > > > fs/nfs/nfs4state.c | 1 + >> > > > > 2 files changed, 16 insertions(+), 3 deletions(-) >> > > > > >> > > > > diff --git a/fs/nfs/nfs4proc.c b/fs/nfs/nfs4proc.c >> > > > > index 47f3c273245e..97757f646f13 100644 >> > > > > --- a/fs/nfs/nfs4proc.c >> > > > > +++ b/fs/nfs/nfs4proc.c >> > > > > @@ -7364,7 +7364,8 @@ static int >> > > > > nfs4_check_cl_exchange_flags(u32 >> > > > > flags) >> > > > > goto out_inval; >> > > > > return NFS_OK; >> > > > > out_inval: >> > > > > - return -NFS4ERR_INVAL; >> > > > > + dprintk("NFS: server returns invalid flags for >> > > > > EXCHANGE_ID\n"); >> > > > > + return -EPROTONOSUPPORT; >> > > > > } >> > > > > >> > > > > static bool >> > > > > @@ -7741,8 +7742,19 @@ static int >> > > > > _nfs4_proc_exchange_id(struct >> > > > > nfs_client *clp, struct rpc_cred *cred, >> > > > > int status; >> > > > > >> > > > > task = nfs4_run_exchange_id(clp, cred, sp4_how, >> > > > > NULL); >> > > > > - if (IS_ERR(task)) >> > > > > - return PTR_ERR(task); >> > > > > + if (IS_ERR(task)) { >> > > > > + status = PTR_ERR(task); >> > > > > + if (status == -NFS4ERR_INVAL) { >> > > > > + /* If the server think we did >> > > > > something >> > > > > invalid, it is certainly >> > > > > + * not the fault of our caller, so >> > > > > it >> > > > > would >> > > > > wrong to report >> > > > > + * this error back up. So in that >> > > > > case >> > > > > simply acknowledge that >> > > > > + * we don't seem able to support >> > > > > this >> > > > > protocol. >> > > > > + */ >> > > > > + dprintk("NFS: server return >> > > > > NFS4ERR_INVAL to >> > > > > EXCHANGE_ID\n"); >> > > > > + status = -EPROTONOSUPPORT; >> > > > > + } >> > > > > + return status; >> > > > > + } >> > > > > >> > > > > argp = task->tk_msg.rpc_argp; >> > > > > resp = task->tk_msg.rpc_resp; >> > > > > diff --git a/fs/nfs/nfs4state.c b/fs/nfs/nfs4state.c >> > > > > index 91a4d4eeb235..273c032089c4 100644 >> > > > > --- a/fs/nfs/nfs4state.c >> > > > > +++ b/fs/nfs/nfs4state.c >> > > > > @@ -2219,6 +2219,7 @@ int >> > > > > nfs4_discover_server_trunking(struct >> > > > > nfs_client *clp, >> > > > > clnt = clp->cl_rpcclient; >> > > > > goto again; >> > > > > >> > > > > + case -EPROTONOSUPPORT: >> > > > > case -NFS4ERR_MINOR_VERS_MISMATCH: >> > > > > status = -EPROTONOSUPPORT; >> > > > > break; >> > > > >> > > > -- >> > > > Trond Myklebust >> > > > Linux NFS client maintainer, PrimaryData >> > > > trond.myklebust@primarydata.com >> > >> > -- >> > Trond Myklebust >> > Linux NFS client maintainer, PrimaryData >> > trond.myklebust@primarydata.com > -- > Trond Myklebust > Linux NFS client maintainer, PrimaryData > trond.myklebust@primarydata.com [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-16 9:31 ` Mkrtchyan, Tigran 2018-03-16 12:10 ` Trond Myklebust @ 2018-03-20 0:09 ` NeilBrown 1 sibling, 0 replies; 16+ messages in thread From: NeilBrown @ 2018-03-20 0:09 UTC (permalink / raw) To: Mkrtchyan, Tigran; +Cc: Trond Myklebust, Anna Schumaker, linux-nfs [-- Attachment #1: Type: text/plain, Size: 3481 bytes --] On Fri, Mar 16 2018, Mkrtchyan, Tigran wrote: > Hi Neil, > > according to rfc5661, NFS4ERR_INVAL is returned by the server if it > thinks that client sends an invalid request (e.g. points to a client bug) > or server misinterpret it (broken server). Agreed. > > With your change instead of failing the mount, client will silently go for > v4.0, even v4.1 mount was requested and produce undesirable behavior, e.g. > proxy-io instead of pnfs. I fill prefer fail-fast instead of long debug > sessions. I don't quite agree. With my change, the client will behave exactly the same way as if the server explicitly didn't support v4.1 So if you explicitly ask for v4.1, you will get a fail-fast. If you ask for "mount with whatever protocol seems to work" (the default), then you will get a protocol that works - not 4.1 in this case. > > On the other hand, I understand, that it's not always possible to fix server > or clients in production environment and time-to-time workarounds are > necessary. Yes. We are not overly eager to work-around broken implementations, but my memory is that we do it when it brings measurable benefits without unreasonable compromises. In this can I am suggesting that change that results in a user-visible error of EPROTONOSUPPORT instead of EIO - in a case where the server doesn't respond to out v4.1 in the way we think it should. I don't think there is any compromise there. Thanks, NeilBrown > > > Tigran. > > > ----- Original Message ----- >> From: "NeilBrown" <neilb@suse.com> >> To: "Trond Myklebust" <trond.myklebust@primarydata.com>, "Anna Schumaker" <anna.schumaker@netapp.com> >> Cc: "linux-nfs" <linux-nfs@vger.kernel.org> >> Sent: Friday, March 16, 2018 12:44:23 AM >> Subject: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. > >> nfs4_proc_exchange_id() can return -EINVAL if the server >> reported NFS4INVAL (which I have seen in a packet trace), >> or nfs4_check_cl_exchange_flags() exchange flags detects >> a problem. >> Each of these mean that NFSv4.1 later cannot be use, but >> they should not prevent fallback to NFSv4.0. >> >> Currently this EINVAL error is returned by nfs4_proc_exchange_id() to >> nfs41_discover_server_trunking(), and thence to >> nfs4_discover_server_trunking(). >> nfs4_discover_server_trunking() doesn't understand EINVAL, so converts >> it to EIO which causes mount.nfs to think something is horribly wrong >> and to give up. >> >> It would be a more graceful failure if nfs4_discover_server_trunking() >> mapped -EINVAL to -EPROTONOSUPPORT - a failure to negotiate a client >> ID clearly shows that NFSv4.1 cannot be supported, but isn't as >> general a failure as EIO. >> >> Signed-off-by: NeilBrown <neilb@suse.com> >> --- >> >> Sorry - a bit too trigger-happy with that first version of the patch. >> >> NeilBrown >> >> fs/nfs/nfs4state.c | 2 ++ >> 1 file changed, 2 insertions(+) >> >> diff --git a/fs/nfs/nfs4state.c b/fs/nfs/nfs4state.c >> index 91a4d4eeb235..b988e460553d 100644 >> --- a/fs/nfs/nfs4state.c >> +++ b/fs/nfs/nfs4state.c >> @@ -2219,6 +2219,8 @@ int nfs4_discover_server_trunking(struct nfs_client *clp, >> clnt = clp->cl_rpcclient; >> goto again; >> >> + case -NFS4ERR_INVAL: >> + /* Server confused - assume this minor isn't supported */ >> case -NFS4ERR_MINOR_VERS_MISMATCH: >> status = -EPROTONOSUPPORT; >> break; >> -- >> 2.14.0.rc0.dirty [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-15 23:44 ` [PATCH - v2] " NeilBrown 2018-03-16 9:31 ` Mkrtchyan, Tigran @ 2018-03-20 21:48 ` J. Bruce Fields 2018-03-20 22:12 ` NeilBrown 2018-04-03 0:41 ` NeilBrown 1 sibling, 2 replies; 16+ messages in thread From: J. Bruce Fields @ 2018-03-20 21:48 UTC (permalink / raw) To: NeilBrown; +Cc: Trond Myklebust, Anna Schumaker, Linux NFS Mailing list On Fri, Mar 16, 2018 at 10:44:23AM +1100, NeilBrown wrote: > > nfs4_proc_exchange_id() can return -EINVAL if the server > reported NFS4INVAL (which I have seen in a packet trace), Can you say which server this was? (One we can fix?) --b. ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-20 21:48 ` J. Bruce Fields @ 2018-03-20 22:12 ` NeilBrown 2018-04-03 0:41 ` NeilBrown 1 sibling, 0 replies; 16+ messages in thread From: NeilBrown @ 2018-03-20 22:12 UTC (permalink / raw) To: J. Bruce Fields; +Cc: Trond Myklebust, Anna Schumaker, Linux NFS Mailing list [-- Attachment #1: Type: text/plain, Size: 505 bytes --] On Tue, Mar 20 2018, J. Bruce Fields wrote: > On Fri, Mar 16, 2018 at 10:44:23AM +1100, NeilBrown wrote: >> >> nfs4_proc_exchange_id() can return -EINVAL if the server >> reported NFS4INVAL (which I have seen in a packet trace), > > Can you say which server this was? (One we can fix?) Unfortunately not - all I know is that it is a bit old and isn't SUSE (which doen't really narrow it down at all). I've asked for more details and will pass on anything I discover. Thanks, NeilBrown [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-03-20 21:48 ` J. Bruce Fields 2018-03-20 22:12 ` NeilBrown @ 2018-04-03 0:41 ` NeilBrown 2018-04-03 16:02 ` J. Bruce Fields 1 sibling, 1 reply; 16+ messages in thread From: NeilBrown @ 2018-04-03 0:41 UTC (permalink / raw) To: J. Bruce Fields; +Cc: Trond Myklebust, Anna Schumaker, Linux NFS Mailing list [-- Attachment #1: Type: text/plain, Size: 838 bytes --] On Tue, Mar 20 2018, J. Bruce Fields wrote: > On Fri, Mar 16, 2018 at 10:44:23AM +1100, NeilBrown wrote: >> >> nfs4_proc_exchange_id() can return -EINVAL if the server >> reported NFS4INVAL (which I have seen in a packet trace), > > Can you say which server this was? (One we can fix?) It was Linux 2.6.32 (on armv5), and presumably anything before Commit: 357f54d6b382 ("NFS fix the setting of exchange id flag") which landed in 2.6.38. These servers return NFS4ERR_INVAL when EXCHGID4_FLAG_BIND_PRINC_STATEID is set in the exchange_id flags, which Linux has done since Commit: 4f0b429df104 ("NFSv4.1: Enable state protection") in 3.11. Maybe NFS should retry without that flag if it gets EINVAL?? Or it could just say that NFSv4.1 isn't supported. I still don't think EIO is justified. Thanks, NeilBrown [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: [PATCH - v2] NFSv4: handle EINVAL from EXCHANGE_ID better. 2018-04-03 0:41 ` NeilBrown @ 2018-04-03 16:02 ` J. Bruce Fields 0 siblings, 0 replies; 16+ messages in thread From: J. Bruce Fields @ 2018-04-03 16:02 UTC (permalink / raw) To: NeilBrown; +Cc: Trond Myklebust, Anna Schumaker, Linux NFS Mailing list On Tue, Apr 03, 2018 at 10:41:56AM +1000, NeilBrown wrote: > On Tue, Mar 20 2018, J. Bruce Fields wrote: > > > On Fri, Mar 16, 2018 at 10:44:23AM +1100, NeilBrown wrote: > >> > >> nfs4_proc_exchange_id() can return -EINVAL if the server > >> reported NFS4INVAL (which I have seen in a packet trace), > > > > Can you say which server this was? (One we can fix?) > > It was Linux 2.6.32 (on armv5), and presumably anything before > Commit: 357f54d6b382 ("NFS fix the setting of exchange id flag") > which landed in 2.6.38. The kernel defaulted to keeping 4.1 off at that point, probably for good reason--that default didn't change for another 4 or 5 years. I suspect this is only the first of multiple 4.1 bugs you'd run into in a server of that vintage. So the solution is probably just to keep 4.1 off. --b. > > These servers return NFS4ERR_INVAL when EXCHGID4_FLAG_BIND_PRINC_STATEID > is set in the exchange_id flags, which Linux has done since > Commit: 4f0b429df104 ("NFSv4.1: Enable state protection") > in 3.11. > > Maybe NFS should retry without that flag if it gets EINVAL?? Or it could > just say that NFSv4.1 isn't supported. I still don't think EIO is justified. > > Thanks, > NeilBrown ^ permalink raw reply [flat|nested] 16+ messages in thread
end of thread, other threads:[~2018-04-03 16:02 UTC | newest] Thread overview: 16+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2018-03-15 23:29 [PATCH] NFSv4: handle EINVAL from EXCHANGE_ID better NeilBrown 2018-03-15 23:44 ` [PATCH - v2] " NeilBrown 2018-03-16 9:31 ` Mkrtchyan, Tigran 2018-03-16 12:10 ` Trond Myklebust 2018-03-20 0:32 ` NeilBrown 2018-03-20 14:14 ` Trond Myklebust 2018-03-20 18:44 ` NeilBrown 2018-03-20 19:43 ` Trond Myklebust 2018-03-20 19:58 ` NeilBrown 2018-03-20 20:13 ` Trond Myklebust 2018-03-20 21:20 ` NeilBrown 2018-03-20 0:09 ` NeilBrown 2018-03-20 21:48 ` J. Bruce Fields 2018-03-20 22:12 ` NeilBrown 2018-04-03 0:41 ` NeilBrown 2018-04-03 16:02 ` J. Bruce Fields
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.