[nfsv4] What does v4.2 look like?

Tom Haynes <tom.haynes@oracle.com> Tue, 20 July 2010 15:24 UTC

Return-Path: <tom.haynes@oracle.com>
X-Original-To: nfsv4@core3.amsl.com
Delivered-To: nfsv4@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B711B3A6887 for <nfsv4@core3.amsl.com>; Tue, 20 Jul 2010 08:24:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.818
X-Spam-Level:
X-Spam-Status: No, score=-5.818 tagged_above=-999 required=5 tests=[AWL=-0.512, BAYES_00=-2.599, MISSING_HEADERS=1.292, RCVD_IN_DNSWL_MED=-4, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MmfVX2pzx2mI for <nfsv4@core3.amsl.com>; Tue, 20 Jul 2010 08:24:53 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id AE0773A68B5 for <nfsv4@ietf.org>; Tue, 20 Jul 2010 08:24:53 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id o6KFP70d005314 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <nfsv4@ietf.org>; Tue, 20 Jul 2010 15:25:09 GMT
Received: from acsmt355.oracle.com (acsmt355.oracle.com [141.146.40.155]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id o6KDDq1v021410 for <nfsv4@ietf.org>; Tue, 20 Jul 2010 15:25:05 GMT
Received: from abhmt007.oracle.com by acsmt355.oracle.com with ESMTP id 442219451279639454; Tue, 20 Jul 2010 08:24:14 -0700
Received: from kinslayer.local (/198.202.202.21) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 20 Jul 2010 08:24:13 -0700
Message-ID: <4C45BF97.1050205@oracle.com>
Date: Tue, 20 Jul 2010 10:24:07 -0500
From: Tom Haynes <tom.haynes@oracle.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.10) Gecko/20100512 Thunderbird/3.0.5
MIME-Version: 1.0
CC: nfsv4@ietf.org
References: <BF3BB6D12298F54B89C8DCC1E4073D8001D44311@CORPUSMX50A.corp.emc.com> <20100719214218.GE29058@fieldses.org> <BF3BB6D12298F54B89C8DCC1E4073D8001D44429@CORPUSMX50A.corp.emc.com>
In-Reply-To: <BF3BB6D12298F54B89C8DCC1E4073D8001D44429@CORPUSMX50A.corp.emc.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Source-IP: acsmt355.oracle.com [141.146.40.155]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090201.4C45BFD2.0122:SCFMA4539814,ss=1,fgs=0
Subject: [nfsv4] What does v4.2 look like?
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/nfsv4>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Jul 2010 15:24:54 -0000

On 7/19/10 8:06 PM, Noveck_David@emc.com wrote:
>
> Note that this doesn't fully address the issue of EOS across sessions
> for non-idempotent requests and I think some v4.2 changes would be
> required, but v4.1 does allow different so_minor_id value for clustered
> servers, and it seems kind of rough to say you can only do this if you
> accept the possibility of data corruption.
>
>    

Without a clear picture of what v4.2 means, is this the type of thing we 
want to put in it?

I'm not asking if it is something we want to fix, but rather is v4.2 the 
right vehicle?

If I look at v4.2, I see it as a collection of small optional feature 
sets - pathless objects,
hole punching, space reservation, server to server copy, dedup, 
metastripe, access
check, etc. I could be wrong, but that seems to be what people are 
proposing.

I don't see it as fixing things we got subtly wrong in either 4.0 or 4.1.

Perhaps even releases introduce new functionality and odd releases are 
informational?
Even ones driven by design and odd ones driven by implementation experience?

And that raises another question, according to your slide deck:
http://www.ietf.org/proceedings/10mar/slides/nfsv4-9.pdf

We don't want another huge document. But at what point do we want a 
comprehensive
document that rolls up all of the smaller v4.x changes from v4.1? I.e., 
when does it make
sense to have one document to consult versus 10 other ones?