On Sun, 2011-11-13 at 13:06 -0500, Matthew Treinish wrote: > On Sun, Nov 13, 2011 at 02:54:00PM +1100, NeilBrown wrote: > > On Sat, 12 Nov 2011 09:49:53 -0500 Christoph Hellwig <hch@xxxxxxxxxxxxx> > > wrote: > > > > > On Fri, Nov 11, 2011 at 07:13:29PM -0500, Trond Myklebust wrote: > > > > On Fri, 2011-11-11 at 18:04 -0500, Matthew Treinish wrote: > > > > > This patch series implements client side support for volatile file handle > > > > > recovery (RFC 3530 section 4.2 and 4.3) with walk back using the dcache. To > > > > > test the client you either need a server that supports volatile file handles or > > > > > you can hard code the server to output NFS4ERR_FHEXPIRED instead of > > > > > NFSERR_STALE. (See the last patch in the series) > > > > > > > > WHY do we want to support this kind of "feature"? As you said, the RFC > > > > doesn't actually help in figuring out how this crap is supposed to work > > > > in practice, so why do we even consider starting to give a damn? > > > > > > *nod*. Pretending we handle it seems fairly dangerous. I'd much prefer > > > outright rejecting it. > > > > Hence the suggested mount option. > > > > A server might not be able to provide stable file handles, but can ensure > > that files don't get renamed - for these filesystems, the name is a > > reliable stable handle for the file (it just doesn't fit in the NFSv4 file > > handle structure). > > > > So if you know the filesystem will only return FHEXPIRED for filehandles > > belonging to files that cannot be renamed, then it is perfectly reasonable to > > repeat the name lookup to re-access the file after the server forgets about > > an old filehandle. The mount option is how you communicate this knowledge, > > because the RFC doesn't provide a way to communicate it. > > > This was one of 2 reasons for implementing this, and we actually run into this with > certain z/OS systems, because the z/OS NFS server currently uses FHEXPIRED in this way. So you're both basically saying that 'we know that this is a bad idea, so let's punt it to the users and assume they will know those few exceptions when it is safe to use'? In that case, are you planning on documenting what constitutes safe usage? So far, I've seen nothing either in the discussion here or in the changelogs that explains precisely when you can safely enable this mount option. Note that just disabling renames is, as I stated yesterday, not a sufficient condition. You pretty much need a read-only filesystem situation, in which case you can easily devise persistent filehandle solutions that work just as well. > The other thought was that this could be used for migration/replication > between file synced servers. So, if we wanted to switch/move to another server where > the file names were the same but all the inode numbers were different you could use > this to refresh the invalid file handles on the new server. This runs into the rename problem. How do you guarantee that the files haven't been renamed before the migration event occurred? How does the client identify that the file is the same one when it looks it up on the new server? Trond -- Trond Myklebust Linux NFS client maintainer NetApp Trond.Myklebust@xxxxxxxxxx www.netapp.com -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html