From owner-freebsd-bugs@freebsd.org Tue Apr 6 23:20:44 2021 Return-Path: Delivered-To: freebsd-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EF0895C1B3C for ; Tue, 6 Apr 2021 23:20:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4FFNmr6GVMz56rf for ; Tue, 6 Apr 2021 23:20:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id D71565C18EF; Tue, 6 Apr 2021 23:20:44 +0000 (UTC) Delivered-To: bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D6DAC5C1C96 for ; Tue, 6 Apr 2021 23:20:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4FFNmr5gRwz56k7 for ; Tue, 6 Apr 2021 23:20:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id B589014967 for ; Tue, 6 Apr 2021 23:20:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 136NKiRu033308 for ; Tue, 6 Apr 2021 23:20:44 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 136NKiNv033307 for bugs@FreeBSD.org; Tue, 6 Apr 2021 23:20:44 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 254840] NFSv4.1/4.2 client does not do a BindConnectionToSession for new TCP connections Date: Tue, 06 Apr 2021 23:20:44 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: Unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: rmacklem@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Apr 2021 23:20:45 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D254840 Bug ID: 254840 Summary: NFSv4.1/4.2 client does not do a BindConnectionToSession for new TCP connections Product: Base System Version: Unspecified Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: rmacklem@FreeBSD.org Created attachment 223883 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D223883&action= =3Dedit fix NFSv4.1/4.2 client to do a BindConnectionToSession to maintain the backchannel When the FreeBSD NFS client does a 4.1/4.2 mount and the nfscbd(8) daemon is running, it binds the TCP connection to both the fore (client->server RPCs) and back (server->client callback RPCs) via CreateSession. When the client finds the NFS server unresponsive, it creates a new TCP connection. It then does an RPC with a Sequence operation in it, binding the new connection to the fore channel, but not the back channel. --> callback RPCs can no longer work. The attachment patch modifies the client so that the krpc does a BindConnectionToSession RPC as the first RPC on the new connection, so that both the fore and back channels are bound, as the were for the original connection. Loss of a back channel/ability to do callback RPCs only affects delegations and pNFS. --> Until patched the workaround is to not run the nfscbd(8) daemon on the client so that callbacks are never enabled and the NFSv4.n server should never issue delegations to the client. --=20 You are receiving this mail because: You are the assignee for the bug.=