Re: [Gen-art] Gen-art LC review of draft-ietf-nfsv4-rfc3530bis-33

Tom Haynes <thomas.haynes@primarydata.com> Fri, 14 November 2014 23:06 UTC

Return-Path: <thomas.haynes@primarydata.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 110C51AD378 for <gen-art@ietfa.amsl.com>; Fri, 14 Nov 2014 15:06:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, J_CHICKENPOX_14=0.6, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kd8lVSQJ-8nc for <gen-art@ietfa.amsl.com>; Fri, 14 Nov 2014 15:05:59 -0800 (PST)
Received: from mail-pa0-f49.google.com (mail-pa0-f49.google.com [209.85.220.49]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 711881AD376 for <gen-art@ietf.org>; Fri, 14 Nov 2014 15:05:58 -0800 (PST)
Received: by mail-pa0-f49.google.com with SMTP id lj1so18155559pab.8 for <gen-art@ietf.org>; Fri, 14 Nov 2014 15:05:58 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=vLD61buBnug+uDCAPBHxPj8CnA9bRYEx94dyk045vWg=; b=TMw1/M+izCnnni/AMtMk/MgLD0rlpu8Y+KUNnJe1WG67s1of/YxS+q77BEFrGsODFY DHNWYg5s5M7LzGZ7JADOwrmLm8LWXjN9D+7w5QlbsEhHgmXb1JoqW2K9FZcTVvuXQJ8J 61K+Jy9jP6FMd1BZjk5UVycIw77GpwF5v9wYLf9YKFFco7WoWOXcpnYw1dx6en6PIXkX VrpbX4wS4VlOhmQnjAQfNhDvQVaiUxBaquUXzGYU1NdZWEu2pPzcsggLkOkSHIuuQKOH mXYM64Bd+2ZZ0piJAJEXhh5hGAjJSiaLikVD5fgHx+nxgzAXGSGkeRGxmE2SaQkWQi+H qh3Q==
X-Gm-Message-State: ALoCoQljjqtqzmvg5jFMq1ddRWHaXRzvvdKie6T0EDUr957doxiK/jrRsWOsCRax91rEiwR0Icrx
X-Received: by 10.70.33.73 with SMTP id p9mr13169673pdi.103.1416006358000; Fri, 14 Nov 2014 15:05:58 -0800 (PST)
Received: from [10.30.8.37] ([50.242.95.105]) by mx.google.com with ESMTPSA id bp12sm27005120pdb.12.2014.11.14.15.05.56 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 14 Nov 2014 15:05:57 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_EF780DE0-4943-4F58-9382-B76A53922495"
Mime-Version: 1.0 (Mac OS X Mail 8.0 \(1990.1\))
From: Tom Haynes <thomas.haynes@primarydata.com>
In-Reply-To: <5465143D.6020604@dial.pipex.com>
Date: Fri, 14 Nov 2014 15:05:55 -0800
Message-Id: <47860B2D-1977-4062-9775-10463F7030B9@primarydata.com>
References: <54627625.9050909@dial.pipex.com> <7E1914F4-413F-4F7E-BE9A-C941FBDD422B@primarydata.com> <5465143D.6020604@dial.pipex.com>
To: Elwyn Davies <elwynd@dial.pipex.com>
X-Mailer: Apple Mail (2.1990.1)
Archived-At: http://mailarchive.ietf.org/arch/msg/gen-art/Zu61t7AHLGBSlX_fORCKNAWAuTM
Cc: General area reviewing team <gen-art@ietf.org>, "draft-ietf-nfsv4-rfc3530bis.all@tools.ietf.org" <draft-ietf-nfsv4-rfc3530bis.all@tools.ietf.org>
Subject: Re: [Gen-art] Gen-art LC review of draft-ietf-nfsv4-rfc3530bis-33
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Nov 2014 23:06:16 -0000

Hi Elwyn,

Here is my first set of responses - there are still some open items.

Thanks,
Tom

> On Nov 13, 2014, at 12:27 PM, Elwyn Davies <elwynd@dial.pipex.com <mailto:elwynd@dial.pipex.com>> wrote:
> 
> Hi, Tom.
> 
> Some comments inline - I have deleted the various things that are agreed.
> 
> Regards,
> E;lwyn
> 
> On 12/11/14 22:11, Tom Haynes wrote:
>> Hi Elwyn,
>> 
>> Before I forget, thanks for the review.
> .. and your prompt response. :-)
>> 
>> I have replied inline for the changes I have made or have a question on.
>> 
>> Tom
>> 
>>> On Nov 11, 2014, at 12:48 PM, Elwyn Davies <elwynd@dial.pipex.com <mailto:elwynd@dial.pipex.com>
>>> <mailto:elwynd@dial.pipex.com <mailto:elwynd@dial.pipex.com>>> wrote:
>>> 
>>> I am the assigned Gen-ART reviewer for this draft. For background on
>>> Gen-ART, please see the FAQ at
>>> 
>>> <http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq <http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>>.
>>> 
>>> Please resolve these comments along with any other Last Call comments
>>> you may receive.
>>> 
>>> Document: draft-ietf-nfsv4-rfc3530bis-33.txt
>>> Reviewer: Elwyn Davies
>>> Review Date: 2014-11-06
>>> IETF LC End Date: 2014-10-06
>>> IESG Telechat date: 2014-12-04
>>> 
>>> Summary:
>>> Much more ready than last time I reviewed this draft!  There are a few
>>> issues at the borderline between editorial and minor plus quite a lot
>>> of editorial nits.
>>> 
>>> Major Issues:
>>> 
>>> Minor Issues:
>>> s8.8.1:  I suspect that this section should have been deleted when
>>> s7.7 was deleted between v26 and v27.  The references to various
>>> server class attributes (handle class, change class, etc) are orphaned
>>> with no definitions of these items
>> 
>> I’m fine with deleting this section.
>> 
> OK
>> 
>> 
>> 
>>> 
>>> -----------------------------------------
>>> 
>>> Handling of wrap around of seqid4 variables:
>> 
>> David will reply with to the seqid4 issues.
> OK

David has made all of the necessary changes to section 9.

I.e., I think he just applied all of your suggested changes.



>> 
>>> ============================================
>>> The specification of how variables/fields of type seqid4 are
>>> incremented and compared, dealing with wrap around is very messy.
>>> Currently there are two separate descriptions of handling wrap around
>>> when a seqid4 variable is incremented through NFS4_UINT32_MAX (which
>>> turns out to be the all ones binary pattern.  The descriptions are
>>> slightly different but not incompatible.
>>> The following text appears in s9.1.6
>>>>  Since the sequence number is represented with an unsigned 32-bit
>>>>  integer, the arithmetic involved with the sequence number is mod
>>>>  2^32.  Note that when the seqid wraps, it SHOULD bypass zero and use
>>>>  one as the next seqid value.  For an example of modulo arithmetic
>>>>  involving sequence numbers see [RFC0793].
>>> and s9.1.3.2 has:
>>>>  This pattern continues until the seqid is incremented past
>>>>  NFS4_UINT32_MAX, and one (not zero) SHOULD be the next seqid value.
>>>>  The purpose of the incrementing of the seqid is to allow the server
>>>>  to communicate to the client the order in which operations that
>>>>  modified locking state associated with a stateid have been processed.
>>>> 
>>>>  In making comparisons between seqids, both by the client in
>>>>  determining the order of operations and by the server in determining
>>>>  whether the NFS4ERR_OLD_STATEID is to be returned, the possibility of
>>>>  the seqid being swapped around past the NFS4_UINT32_MAX value needs
>>>>  to be taken into account.
>>>> 
>>> The definition of the seqid4 type in s2.1 doesn't mention this sort of
>>> constraint.
>>> 
>>> Incrementing of seqid4 type fields is mentioned in a number of
>>> sections along with special values (including 0):
>>> s9.1.3.1, bullet 1 (also bullet 2):
>>>>               Such stateids are subject
>>>>     to change (with consequent incrementing of the stateid's seqid) in
>>>>     response to OPENs that result in upgrade and OPEN_DOWNGRADE
>>>>     operations.
>>> 
>>> s9.1.3.3: Refers to special values of seqid (all zeroes, all ones)
>>> 
>>> s9.1.3.4, two bullets before last bullet have:
>>>>  o  If the "seqid" field is not zero, and it is greater than the
>>>>     current sequence value corresponding the current "other" field,
>>>>     return NFS4ERR_BAD_STATEID.draft-ietf-nfsv4-rfc3530bis
>>>> 
>>>>  o  If the "seqid" field is less than the current sequence value
>>>>     corresponding the current "other" field, return
>>>>     NFS4ERR_OLD_STATEID.
>>>> 
>>> 
>>> s9.11, last para:
>>>>  The "seqid" value in the returned stateid
>>>>  MUST be incremented, even in situations in which there is no change
>>>>  to the access and deny bits for the file.
>>> 
>>> s15.8.5, para 3 before last:
>>>>  In this case, the
>>>>  stateid returned as an "other" field that matches that of the
>>>>  previous open while the "seqid" field is incremented to reflect the
>>>>  change status due to the new open.
>>>> 
>>> It would be much cleaner if the texts from s9.1.3.2 and s9.1.6 were
>>> merged, probably into a section just after 2.1 (say s2.1.1) together
>>> draft-ietf-nfsv4-rfc3530biswith mention of the special values.  If
>>> this is done, s2.1.1 can then be referenced wherever a seqid is
>>> mentioned as being incremented.
>>> 
>>> Also, I cannot see why the current texts use SHOULD.  I am pretty
>>> certain that skipping 0 and going to 1 from NFS4_UINT32_MAX is a MUST.
>>> If it isn't a MUST, what alternative scheme will make the wrap around
>>> work without both client and server knowing what scheme is being used?
>>> This is at least partly implied by the definition of NFS4ERR_BAD_SEQID
>>> in s13.1.8.2 which indicates that both ends have a common idea of what
>>> the next expected number ought to be..
>>> 
>>> -----------------------------------
>>> 
>>> change_info4:  Wrap around in before and after fields.
>>> ======================================================
>>> I assume that it is deemed that using a 64 bit number as changeid4
>>> should obviate the need for dealing with wrap around.  However I don't
>>> think there is any advice on starting values for the change values -
>>> some strategies (e.g., random values) could result in change
>>> indicators starting uncomfortably close to the maximum value and
>>> running up against wrap around.  A brief note on this would be desirable.
> (see s10.4.3 which talks about adding 1 to a change_info4 value.)
>>> 
>>> —————————————————
>> 
>> 
>> <— to here —>
>> 
>> 
>>> 
>>> s10.7: Informing the server that a file is being memory mapped.
>>> Is there a mechanism? If not should there be (e.g., a flag on OPEN)?
>> 
>> 
>> I stumbled on this as well, until I noticed this:
>> 
>>    o  If there is an application on the server that has memory mapped a
>>       file that a client is also accessing, the client may not be able
>>       to get a consistent value of the change attribute to determine
>>       whether its cache is stale or not.
>> 
>> I.e., the server only knows about locally memory mapped files.
> 
> Perhaps better expressed as the server *doesn't* know about locally memory mapped files if they are being accessed behind the server's back through the underlying file system.  There would be some very limited point to having a mechanism (flag on open, as suggested) that allowed a client to inform the server that a file was being memory mapped, but this would of course require OS support but could give a way of overcoming the issue recorded at the end of bullet 3 in s10.7:
>>      Depending on the
>>      nature of the client's memory management system, this weak
>>      obligation may not be possible.  A client MAY return stale
>>      information in CB_GETATTR whenever the file is memory mapped.
> 
> Probably not worth worrying about.


Agreed - thanks.


>> 
>> 
>> 
>>> 
>>> -----------------------------------
>>> 
>>> s15.2.3, paras 4 and 7: The last sentence in para 7 that implies
>>> NFS4ERR_MINOR_VERSION_MISMATCH takes priority over all others appears
>>> to be incompatible with the second XDR decoding strategy in para 4.
>>> If decoding of the operation array is interleaved with performing the
>>> requested operations then it seems possible that the COMPOUND may be
>>> terminated by an earlier error before the offending operation 2 is
>>> reached, so that it would never be decoded.  Further, I don't
>>> understand why operation 2 is singled out for special discussion here,
>>> other than maybe to say that it is available for future use.
>> 
>> I think it is just because it is reserved for future use with minor
>> versioning.
>> 
>> I.e., other operations having values might also be bad, but if they do,
>> we can assume it is because they are not involved with minor versioning.
>> 
>> 
>>> How does it differ from any other value that is not supported by the
>>> minorversion implemented by the server?  Why should the base version
>>> be singled out for special treatment?
> Having checked out what is signed off in RFC 5661 for v4.1 and proposed for v4.2 in the current draft, and given the demise of most of s11, wouldn't it be easier just to make operation 2 reserved for ever?  I can't see that a distinguished op 2 is ever that important.


Need to let this sink in...

Okay, there is no way that we can use this operation for NFSv4.0. The text clearly
states that we MUST return NFS4ERR_OP_ILLEGAL if the minor version is 0.

And while 5661 is worded better for using this, I think that ship has sailed.

So if we squish together the two paragraphs, I think this works:

        Note that operations, 0 (zero), 1 (one), and 2 (two) are not defined
        for the COMPOUND procedure. It is possible that the server receives a request that
        contains an operation that is less than the first legal
        operation (OP_ACCESS) or greater than the last legal operation
        (OP_RELEASE_LOCKOWNER).
        In this case, the server's response will encode the opcode
        OP_ILLEGAL rather than the illegal opcode of the request. The
        status field in the ILLEGAL return results will set to
        NFS4ERR_OP_ILLEGAL.  The COMPOUND procedure's return results
        will also be NFS4ERR_OP_ILLEGAL.

> 
>>> 
>>> Nits/editorial comments:
>>> ========================
>>> 
>> 
>>> 
>> 
> 
>>> 
>>> s5.3:  I think it would be worth being explicit as to whether hard
>>> links can be created between named attribute fileobjects either (1)
>>> for named attributes of the same fileobject and/or (2) for two
>>> different fileobjects on the same file system.  Is it also the case
>>> that if the basic file system supports hard links (link_support ==
>>> TRUE) then it will necessarily support hard links between named
>>> attributes?  As I understand it, the named attribute system in NFSv4
>>> was modelled on Solaris v9+ and the extended attribute system in Linux
>>> would probably not support hard links (I haven't tried them (yet))
>>> even if the Solaris version does.... Later... I see from s13.1.4.14
>>> (NFS4ERR_XDEV) that hard links between different named attribute
>>> directories are NOT allowed.  It would be good to make this explicit
>>> here in s5.3.  This still leaves the question of whether hard links
>>> are allowed in a single named attribute directory.  I can't see a lot
>>> of use for this capability but it should be explicitly allowed or
>>> disallowed as appropriate.
>> 
>> This is not addressed in 3530, but it is in 5661 (section 18.9.3), which
>> is equivalent to 15.29.5 in 3530bis:
>> 
>> Shepler, et al.              Standards Track                  [Page 425]
>> ^L
>> RFC 5661                         NFSv4.1                    January 2010
>> 
>> 
>>    On some servers, "." and ".." are illegal values for newname and the
>>    error NFS4ERR_BADNAME will be returned if they are specified.
>> 
>>    When the current filehandle designates a named attribute directory
>>    and the object to be linked (the saved filehandle) is not a named
>>    attribute for the same object, the error NFS4ERR_XDEV MUST be
>>    returned.  When the saved filehandle designates a named attribute and
>>    the current filehandle is not the appropriate named attribute
>>    directory, the error NFS4ERR_XDEV MUST also be returned.
>> 
>> I.e., it implies that if the current filehandle is the appropriate named
>> attribute
>> directory, the LINK is okay.
>> 
>> We could either explicitly state in Section 5.3 that hard links are
>> legal here or
>> change the LINK IMPLEMENTATION Section to follow that of 5661.
>> 
>> I am partial to syncing the two sections. Any concern?
> No.  That seems entirely sensible.

Done.


>> 
>> 
>>> 
>>> s6.1:
>>>>     *  Setting only the mode attribute should provide reasonable
>>>>        security.  For example, setting a mode of 000 should be enough
>>>>        to ensure that future opens for read or write by any principal
>>>>        fail, regardless of a previously existing or inherited ACL.
>>> I think this may only apply to non-privileged principals - root can
>>> still read/write *ix files with mode 0.  Tie in with last para of
>>> s6.3.1.1.
>> 
>> 
>> Which is why this is a “should” and not a “SHOULD” or a “MUST”?
>> 
>>> 
>>> s6.4.3:  It is (still) not clear (at least, to me) how inheritance is
>>> supposed to apply to named attribute directories.  The named attribute
>>> directory has the file object to which it applies as its 'parent'
>>> rather than an ordinary directory.  Presumably inheritance would apply
>>> from the named attribute directory to the named attributes created in
>>> it - but are ACLs always supported on named attributes and the named
>>> attribute directory if they are suported on ordinary files and
>>> directories?
>> 
>> 
>> David??
>> 
>>> 
>>> s7.8, para 1:  I am unable to parse the 3rd sentence in this para:
>>>>  However, with the support of multiple security mechanisms
>>>>  and the ability to negotiate the appropriate use of these mechanisms,
>>>>  the server is unable to properly determine if a client will be able
>>>>  to authenticate itself.
>>> 
>>> 
>> 
>> 
>> And the authors of 5661 seem to agree. It is also S7.8 in that document.
>> 
>> What the sentence means is that since the server has no way to determine
>> how the client will authenticate in the presence of multiple security
>> mechanisms,
>> it should as 5661 states:
>> 
>>    Because NFSv4 clients possess the ability to change the security
>>    mechanisms used, after determining what is allowed, by using SECINFO
>>    and SECINFO_NONAME, the server SHOULD NOT present a different view of
>>    the namespace based on the security mechanism being used by a client.
>>    Instead, it should present a consistent view and return
>>    NFS4ERR_WRONGSEC if an attempt is made to access data with an
>>    inappropriate security mechanism.
>> 
>> I’d be willing to pull Section 7.8 from 5661 back to 3530bis - besides using
>> security policy as a term, it appears easier to read. :-)
> 
> I agree.  Notes for the 5661 version
> - Remove ref to SECINFO_NONAME from para 1
> - s/the entire the pseudo file system/the entire pseudo file system/ in next to last para.

Done and thanks for the warnings!


>> 
>> 
>> 
>>> 
>>> s8.5:
>>>>  If a single location entry designates multiple server IP addresses,
>>>>  the client cannot assume that these addresses are multiple paths to
>>>>  the same server.  In most cases, they will be, but the client MUST
>>>>  verify that before acting on that assumption.
>>> Is there some means in NFSv4 to do this?  I couldn't see that there
>>> was.  I guess one could use Reverse DNS.  If an out-of-band
>>> verification is needed, this should be made explicit.
>> 
>> The client could access each IP address and examine the resulting
>> ClientID from each.
>> 
>> But even then, I think that is not sufficient.  David?
>> 
> 
>>> 
>>> s9.1.5, para 2 and elsewhere in s9; also s10.4.1:
>>>> If no state is established by the client, either
>>>>  byte-range lock or share reservation, a stateid of all bits 0 is
>>>>  used.
>>> Does this differ from the 'anonymous stateid' defined in s9.1.3.3?  If
>>> not it would be better to refer to it by this title.  There are a
>>> number of other places in s9 where the expressions like 'stateid of
>>> all 0s/1s' are used.  It would be more consistent to use the
>>> 'anonymous' and 'READ bypass' titles set up in s9.1.3.3 in all cases.
>> 
>> 
>> David...
>> 
>>> 
>>> s9.6.3.1, 3rd bullet: s/haled as courtesy/haled as a courtesy/
>> 
>> also s/haled/held/
> 
> ... and there I was thinking you had used a nice archaic form... :-)
>> 
>> 
>>> 
>>> s9.8, para 5:
>>>> The client may accomplish this task by
>>>>  issuing an I/O request, either a pending I/O or a zero-length read,
>>>>  specifying the stateid associated with the lock in question.
>>> How do you issue a "pending I/O request”??
>> 
>> 
>> I think the intent is one that was pending or if none were pending, fake
>> it with a zero-length read.
> Perhaps, NEW:
>    The client may accomplish this task by
>    issuing an I/O request; if there is no relevant I/O pending,
>    a zero-length read specifying the stateid associated with the lock
>    in question can be synthesised to trigger the renewal.
> 


ok

> 
>>> 
>>> s10.2.1, para 9:
>>>>  Note that the requirement stated above is not meant to imply that
>>>>  when the client is no longer obliged, as required above, to retain
>>>>  delegation information, that it should necessarily dispose of it.
>>>>  Some specific cases are:
>>> I think this para is referring to the server rather than the client:
>>> s/client/server/.
>> 
>> Dave, can you look at this one?
>> 
>> http://www.ietf.org/mail-archive/web/nfsv4/current/msg10668.html <http://www.ietf.org/mail-archive/web/nfsv4/current/msg10668.html>
>> 
> 
>>> s12.4: Has the dreaded BOM ever been encountered in the UTF-8 strings
>>> created by NFSv5 servers or clients?
>>>  Therefore, the mask returned enumerating which access rights can be
>>>  determined will have the ACCESS4_DELETE value set to 0.
>> 
>> David?
>> 
>>> 
>>> s15.2.5:
>>>>  The client SHOULD NOT construct a COMPOUND which mixes operations for
>>>>  different client IDs.
>>> Is this advisory on the grounds that it makes recovery difficult - in
>>> which case s/SHOULD NOT/should not/ - or something that might result
>>> in the server throwing an error - in which case please point to some
>>> discussion of why this is not legal. Later... this is also considered
>>> in s15.18.6, last para.  So there is one set of circumstances when it
>>> will screw up - but there are others where it is not problematical.
>>> Perhaps this can be explained more clearly.
>>> 
>> 
>> 
>> Are these not the same?
> Yes, the requirement on the client is indeed the same.  The ordering of the text in s15.2.5 seemed to indicate that changing the Client ID might make recovery from resource availability problems more difficult but s15.18.6  makes it clear this isn't the reason.  What triggered my comment was that the (earlier) s15.2.5 version has no explanation of why it is problematical.  A pointer to s15.18.6 in s15.2.5 would help alleviate the problem but is not a total solution.




>> 
>> Further, the client SHOULD
>>    NOT construct a COMPOUND which mixes operations for different client
>>    IDs.
>> 
>> 
>> David, are there migration scenarios where the client might be
>> presenting different client IDs?
> 
> Effectively OPEN with a successful OPEN_DELEGATE_WRITE creates transient state in the server for the duration of the enclosing COMPOUND procedure, essentially contravening the statement in the last para of s4.3:
>> Note that the COMPOUND procedure does not provide atomicity.
> 
> The first question is are there any other circumstances that generate transient state in a similar way or is this the only example?
> 
> Later... after some considerable thinking about what is going on here.
> 
> Presumably the basic problem here is that if the the client is single threaded or otherwise would get its knickers twisted if it issued a GETATTR for a file on which it held a write delegation thus having its internal state for the file locked when the CB_GETATTR arrived.  This is clearly potentially deadlock time!
> 
> Given that the client has the write delegation, it shouldn't need to call GETATTR except in the one initial circumstance documented.
> 
> It seems to me that the server could ALWAYS suppress the CB_GETATTR if the clientid is set for the client that owns the write delegation, and the client could be instructed that it MUST NOT call GETATTR on a file for which it has a write delegation other than in the one special circumstance (or maybe unless it knows the clientid is set correctly).
> 
> Is my analysis right?  If so I think this area can be made clearer (and possibly more robust).
> 
> 


I think the original authors were very cautious - the use of SHOULD NOT instead of MUST NOT.

David, do you recall why 3530 was originally this way?

(Yes, I am trying to buy some time here. :-)


>> 
>> 
>> 
>>> 
>>> s15.18.6, para 9:
>>>> If the component provided to OPEN resolves to something other than a
>>>>  regular file
>>> Worth pointing out this includes named attribute files.
>> 
>> 
>> Do you mean:
>> 
>>    If the component provided to OPEN resolves to something other than a
>>    regular file (or a named attribute)
> Yes.
> 

ok


>> 
>>> 
>>> s15.26.4/s15.26.5: What happens if the directory has been modified
>>> (entries added or deleted) between calls of READDIR intended to
>>> retrieve segments of the directory information?  Related to this,
>>> presumably no ordering of entries is implied in the returned
>>> information - it would be desirable to state this.
>> 
>> 
>> This is where the cookieverf is supposed to come in.
>> 
>> In most implementations, the cookie needs to be persistent, which indeed
>> means an ordering of the information.
> 
> AFAICS the text doesn't tie the cookieverf to the change attribute of the directory.  Presumably this is what is intended - it would certainly mean that changes would be picked up and READDIR would have to start from the beginning again.
>> 

Asking an expert...