Re: [nfsv4] Notes regarding discussion of directory scalabiliy issues

Rick Macklem <rmacklem@uoguelph.ca> Fri, 03 July 2020 17:09 UTC

Return-Path: <rmacklem@uoguelph.ca>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5FFD03A0A29 for <nfsv4@ietfa.amsl.com>; Fri, 3 Jul 2020 10:09:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=uoguelph.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8MavAweH9MUB for <nfsv4@ietfa.amsl.com>; Fri, 3 Jul 2020 10:09:26 -0700 (PDT)
Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670047.outbound.protection.outlook.com [40.107.67.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A588D3A0A1E for <nfsv4@ietf.org>; Fri, 3 Jul 2020 10:09:26 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PF9225ECE+Jp2uR+vOyf5nBJLGqPeRzlama5NPloG4jnS1yRi8ruMU3MFgkwfQhf9e1f514gp3l+7xwRPcJm3UGsd2usbKvVCdEnNBthJrQUaZ7ZNoiWatoiT5EAC4Xh8pGLrJcGXtU1iDCMq4YE2f4HvyUCqyk24AdmyoR+ldl+NQoxmnVvdHal/YGWPEZLgqqV+6RQMHd51HTqLbxMpHQmm2E52dpNin0QwoiX1Pj/YIRTFJEYv+KFb/tEjv8AZ54jBBk2gOPzz0sBF9KKODvJmNGk2WrzhddbddG9BJu5B61ZPzHDsMqycNcLbI+l92ak+ejwArT62AW61qq1+w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3cmYWSoXidOhfy4JSN6hkoJ7kGtrAkD+pEYEgeRYB18=; b=KJTLrS6/nAWlkkZ2ZNCdPLpmb6LJ0zurixWle3cKL+8jsb/IKxFYJG/qr4sXVTSPrJQDgsKoyh1eHWAyrlcm1mzFckxPIMerEKNHgg+zXXc01aJmcxAhiWQa6LXcWt1lxmW4CkWzhj/s1zlgrsNSWQ9WmBiahwChkx5jvUtQbQw7c5g954w6XBOhggqs4Atu8mioYaoaf9mrDfysr5tXN1l3tVKPd05tz+MNs1pGHVKiL3dSSPTaStQQl0kB6b7gUiokU20+WPfbok2SHBctnJzIwpLhIKJSHXiX99+oGJD4XP3x3vdqMP3LU994K6c90rxTpjtEWSQf61GFJMn5xA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uoguelph.ca; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3cmYWSoXidOhfy4JSN6hkoJ7kGtrAkD+pEYEgeRYB18=; b=v7hEnd3ENuz+g5vA8mZA4reewKvB0+sjBH8aJsk1bJxyVYCiqKuTA81+/Rs/kOCF9qaPdHV61dELitmJTHtv9aQWg+DdjUPMvHDZA6a7FAgQhVjuunTxn0mfhabkGtC33bNE1ANf2OplnXlS+ER3kEV0wRpZ3yNITm1T3dHdY4xgUtkimxx+zBvneZrZj991uH8/n6NOjbWR7BnBghq4pzXYZE/iqqf/KDWn72TJEEslUewJL8g/Nz1sLDeqmRXlgt63z558ZMl8ZNOB73l+p0z1M6ALK6EjZSLm+y0/xMVwZlFhpyyIFdkxhmnPnm3h4Z91NPAlAO50JIdVfJ+VqA==
Received: from QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:c00:38::14) by YQXPR01MB3973.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:c00:45::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3153.20; Fri, 3 Jul 2020 17:09:24 +0000
Received: from QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM ([fe80::60f3:4ca2:8a4a:1e91]) by QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM ([fe80::60f3:4ca2:8a4a:1e91%7]) with mapi id 15.20.3153.024; Fri, 3 Jul 2020 17:09:24 +0000
From: Rick Macklem <rmacklem@uoguelph.ca>
To: David Noveck <davenoveck@gmail.com>
CC: Trond Myklebust <trondmy@hammerspace.com>, NFSv4 <nfsv4@ietf.org>
Thread-Topic: [nfsv4] Notes regarding discussion of directory scalabiliy issues
Thread-Index: AQHWTturJpknuX+EYESd2ig3Ds4JHqjxKBOAgALrPICAAPM3TIAAqWUAgABa1vQ=
Date: Fri, 03 Jul 2020 17:09:24 +0000
Message-ID: <QB1PR01MB336438533FDE0C39CA5F2CA2DD6A0@QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM>
References: <CADaq8jev+tUs=mrGDMnZMpfmQXL=KLwDKW5S-CbBLpL-54RJTA@mail.gmail.com> <3fc0af37d7d870eeb6ab854a75d6eeb5aae61a0d.camel@hammerspace.com> <CADaq8jcb5BLiE49SyS3wxbbDmz88GJNWeLgeh5XU4oGkdBuJmw@mail.gmail.com> <5d9b4f697ec698a7f07e8168f56826dbb52e234b.camel@hammerspace.com> <CADaq8jenX2Su1MpMGpcvMuJncoDU+JMnMmdXaED9eYXiKrnGcA@mail.gmail.com> <QB1PR01MB3364D6132B8D515B7766A606DD6A0@QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM>, <CADaq8jdSYD5n6roZ8gZh7RHS3A0SapFuPb9s2Aq05W++d32wEA@mail.gmail.com>
In-Reply-To: <CADaq8jdSYD5n6roZ8gZh7RHS3A0SapFuPb9s2Aq05W++d32wEA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=uoguelph.ca;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 60cbc88b-e4bc-4bb7-0b08-08d81f73d629
x-ms-traffictypediagnostic: YQXPR01MB3973:
x-microsoft-antispam-prvs: <YQXPR01MB397340B7D1FFC5CD4E2A7F6DDD6A0@YQXPR01MB3973.CANPRD01.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:1360;
x-forefront-prvs: 045315E1EE
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: vgmWXnmR+tlGDkkGeFGPHoqSuQK+dlWZE0RRES3LJ2D8noIcxfi9HRjv2YBb88SnSkstnEwUCwHPRYPupTJF+y3EujGfrg1KZhn33h4vlggm4MiM907NTcsQt9XUGPRvCu0Ihn0hZhZBecX4dMRo2doc3sr3tHXRsLfnFnfUy+zWMTagy1mkReYcWZahDKmCSpxmE9POvGaFvv63NEf9CGgEffB8NpLcTTGvbkSH7uDfLjBlZhWymNHjEF/uEXpdcu4Iy6FR9xgOXRUBsaBCqA1gMsdCtjiRV0IqFauNhB2aaHu7c7Qe8b9ythNT10pSadmkfDeDbrOcGoNxo/h/77uFeb9Ev/cNNHOOfiWqtsqGsm9usX7JliPe1L9LC1zFuHzcoCzAWHJhazouNG7QMg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFTY:; SFS:(136003)(39860400002)(396003)(376002)(366004)(346002)(8676002)(55016002)(71200400001)(186003)(91956017)(966005)(66946007)(7696005)(76116006)(478600001)(30864003)(54906003)(52536014)(5660300002)(786003)(316002)(9686003)(2906002)(86362001)(8936002)(4326008)(66476007)(6506007)(53546011)(64756008)(6916009)(66556008)(83380400001)(33656002)(66446008); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: uoguelph.ca
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 60cbc88b-e4bc-4bb7-0b08-08d81f73d629
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jul 2020 17:09:24.6749 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: GSqQnvsFa3q7943pLfGE4/Arini/vJ6MAa96eOH2n4sMvsaxhwCK3DygRbJbFZmMRmIiPynRseqCUs67ckjeWw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQXPR01MB3973
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/T8k3ff6iSf7gfID5o_TZ_4Zu01g>
Subject: Re: [nfsv4] Notes regarding discussion of directory scalabiliy issues
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jul 2020 17:09:29 -0000

David Noveck wrote:
>Rick Macklem  wrote:
>>Well, I'll throw out a simple suggestion w.r.t. directory cookies.
>
>I'm also working on a suggestion about helping clients maintain directory cookies. >Slides will be presented 7/9.
>
>
>>What if the cookies generated by the server were required to have the
>>following properties:
>
>I don't think we can add new requirements for directory cookies.  Requirements for >the granting or retention of directory delegations are possible but I'd like  to >derive them from inherent aspects of the existing notification scheme. Adding >wholly new requirements on an existing feature is not possible.
>
>- Monotonically increasing numeric values.
- Without the monotonically increasing values for cookies, the client side
  implementation becomes more difficult. To insert entries efficiently, it would
  have to find the extant entry that a new entry follows. To do this is going to
  require some sort of data structure that maintains the ordering of the entries
  and allows for efficient search based on a "random" cookie.
  --> Too difficult for client implementors --> Never gets implemented.

>Not possible to add this requirment. Also don't see the need/value of this.  In my >view, the existing directory notification scheme provides adequate information for >subscribed clients to maintain the structure of cached directories being modified, >including cookie values.
Ok, so if it cannot be a requirement, what about an optional property?
- Add a new read-only, per-file system attribute that is a Boolean that states
  whether or not the directory cookies generated by the server have the property.
  --> Then the client can choose whether or not to try and use directory
         delegations based on that.

>- Sparse enough that new entries can be created with numeric values
>  between them.
As worded, this is just a suggestion for server implementors.
The optional property would be invariance of extant cookies and monotonically
increased ordering maintained.

>Again, a new requirement, with no clear justification.
Justification, as above.

>- Guaranteed to not change and remain valid (and referring to the same entry)
>  despite additions/deletions. (Until a deletion callback is received by the client.)
>
>Should also be allowed if the directory delegation is recalled.
Yes. 

>I'm unclear about the callbacks you are proposing. Normally, notification callbacks >are not sent to the client making the change. It might be possible to change that >in a v4.2 extension but it adds to operation latency and creates sequencing >difficulties ☹️
I'll admit I had not read it in a long time and my recollection was similar.
I just re-read it and it states that the client doing the addition/deletion gets
the CB_NOTIFY. Here's the snippet:
   If the client holding the delegation makes any changes in the
   directory that cause files or sub-directories to be added or removed,
   the server will notify that client of the resulting change(s).  If
   the client holding the delegation is making attribute or cookie
   verifier changes only, the server does not need to send notifications
   to that client.  The server will send the following information for
   each operation:

I was mistaken and thought the CB_NOTIFY did not go to the client that did
the addition/deletion.
Since the CB_NOTIFY does go to the client doing the addition/deletion, I
think the 4.1 CB_NOTIFY is sufficient.

>I considered returning the necessary info in a bunch of new ops but the whole >thing got waaay too complicated.  I think the best choice would be a >GET_NOTIFICATION op to be issued after the CREATE, OPEN, LINK, REMOVE, >RENAME.
>
As above, the client doing the addition/deletion does get the CB_NOTIFY.

>>For example, for a simple case of a UFS file system on a server, the UFS
>>directory consists of blocks of directory entries.
>>- When an entry is added, it goes in a gap within the directory or grows a
>>   new block at the end (if I vaguely recall this correctly;-).
>>- When an entry is removed, the entry is erased without moving other
>>   entries.
>>For this example, the directory offset cookie can simply be the byte offset
>>of the entry.
>>(I haven't looked at other file systems, but hopefully offset cookies with the
>> above properties can be created for most of them?)
>
>Possibly, but given the need for this, I'm not inclined to rely on hope.
If the server cannot do it, the new read-only attribute would be false and
(at least the FreeBSD client) would choose not to get directory delegations.

>When an entry is added/deleted, the server issues a callback to the client
>with the new directory cookie offset (and the directory entry for the add case).
>
>I'd prefer that the same information that is returned as in the existing directory >notification scheme, which allows you to maintain directory order and cookies, >without tieing one to the other.
I was just being lazy. I hadn't read the section of RFC5661 in a long time and
didn't remember the terminology. (I didn't mean to imply "new callbacks" were
needed.) There was the issue w.r.t the client doing the addition/deletion
getting a callback (which it appears it does).


>>The client can maintain this structure in any number of ways (and it could be
>>fun figuring out what works well), but a trivial version could be:
>>- The reply to a readdir is kept as a list head (with the directory offset of the
>>   first entry) and a linked list of the entries in order, with their cookie.
>>  (Remember that the cookies are in the same ordering as the entries
Well, I do this for fun. If it isn't fun, I won't be doing it. (I know someone
doing this as a retirement hobby is weird, but since vendors do not
invest in clients much...)

>Not in my scheme.
>
>>- The next readdir reply creates the next head/list.
>>
>>readdir() just works through each list, following each head in order.
>>telldir() returns the cookie for the entry.
>>seekdir() just finds the correct list and then searches down that list for a match.
>>
>>The remove/add entry callbacks just insert/delete entrie(s) in the appropriate
>>list.
>>(I'd probably keep these lists in the kernel client under the VFS for FreeBSD,
>> as malloc'd data structures, but that is simply an implementation choice.)
>>
>>You would require the monotonically increasing property for directory
>>delegations to be issued. (Without that you don't know where to insert
>>additions.)
>>
>The insert notification gives you enough information to do this without the >monotonically increasing property.
That is true, but then why hasn't anyone implemented it?
(Yes, I was "misusing" the term require. I'm not a spec. writer, as you can easily tell.)

>>You would also require that extant directory entry cookies
>>remain valid and unchanged when additions/deletions occur.
>>(Note that removing an entry and then adding an entry at the same offset
>> is allowed under POSIX telldir()/seekdir() as I understand it.)
>
>I think the requirement goes away when the delegation does.
Yes, although it practice, assuming the client(s) are getting the notifications,
I only see them returning a directory delegation after a closedir() and if the
number of CB_NOTIFYs is large or the caching storage needs to be free'd.

>>This avoids any need for the client to synthesize cookies and just use the ones
>>returned by the server, I think?
>
>Yes
>
>>Just a simple idea that may be worth considering?
>>(If this has already been discussed,
>
>Don't think it has.
>
>>I apologize for not seeing it.)
>
>Even if it had, no apology would be necessary
I should have re-read the appropriate sections of RFC5661 before the last post.

rick


rick

________________________________________
From: nfsv4 <nfsv4-bounces@ietf.org<mailto:nfsv4-bounces@ietf.org>> on behalf of David Noveck <davenoveck@gmail.com<mailto:davenoveck@gmail.com>>
Sent: Thursday, July 2, 2020 6:06 AM
To: Trond Myklebust
Cc: nfsv4@ietf.org<mailto:nfsv4@ietf.org>
Subject: Re: [nfsv4] Notes regarding discussion of directory scalabiliy issues

CAUTION: This email originated from outside of the University of Guelph. Do not click links or open attachments unless you recognize the sender and know the content is safe. If in doubt, forward suspicious emails to IThelp@uoguelph.ca<mailto:IThelp@uoguelph.ca>



On Tuesday, June 30, 2020, Trond Myklebust <trondmy@hammerspace.com<mailto:trondmy@hammerspace.com><mailto:trondmy@hammerspace.com<mailto:trondmy@hammerspace.com>>> wrote:
On Tue, 2020-06-30 at 08:40 -0400, David Noveck wrote:
Thanks for your helpful comments.

On Mon, Jun 29, 2020 at 2:43 PM Trond Myklebust <trondmy@hammerspace.com<mailto:trondmy@hammerspace.com><mailto:trondmy@hammerspace.com<mailto:trondmy@hammerspace.com>>> wrote:
Like it or not, the readdir cookie is an attribute of the directory.


If the protocol treated them as such, then the attribute notifications feature could provide updates to the client.   Given that it doesn't, we could add a cookie update feature to directory notification feaure as a v4.2 extension to the protocol.  However, I'm reluctant to start work on the necessary protocol additions until we are sure they are needed to provide better directory cacheability.

Actually, they are attributes of directory streams.   The difference is not all that important given that client implementations are unlikely to be aware of the specific steam associated with any particular request.  However, there are a few cases in which the difference is important in determining whether various approaches to client handling of cookies might or might not work, and will be important in the discussion below:

  *   Two requests made on different clients necessarily are made on distinct streams.
  *   Two requests made on different instances of the same client (with an intervening restart/reboot) also have to arise on different streams.

If I want to support the POSIX telldir() and seekdir() operations ( https://pubs.opengroup.org/onlinepubs/9699919799/functions/seekdir.html ), then I need to ensure that when the application calls seekdir(), I return to the exact same cursor location in the stream that I was at when I called telldir().


Agreed.

Without a server side cookie on which to anchor my telldir() cookies,


Every client has these available but it is not clear to me useful such anchoring is.   I think the flexibility that each client has to assign cookies to streams it is responsible for is valuable and could be compromised if anchoring to the server cookies is made the focus of the implementation.

then all I have is a list of filenames that can and will change every time a file is created, deleted or renamed.


Clearly it will change.  However, the directory notifications feature makes some assumptions, currently implicit about how the list will change.   Once these are made explicit, the wg could decide that server/fs pairs incapable of staying within these reasonable restrictions (if they are, in fact, reasonable), cannot support the directory notifications feature.

Both the length and ordering of that list may change whenever the directory is modified,


Clearly the length will change, but the reasonable expectation is that creating a file will increase the length by one and deleting one will decrease it by one.   I don't see the value of supporting directory notifications on server fs that do something else.

With regard ro ordering,  suppose the spec allows an fs to shuffle the directory order every time a change is made, but I'm unaware of any actual file systems that do this.   Do we need to support directory notifications for such fs's?


touch foo; touch bar; ln foo baz; rm foo; mv baz foo

There... Most filesystems will end up reordering 'foo' and 'bar' in the directory stream given the above sequence of commands. How does the client figure out what happened if the above sequence of commands is performed on the server?
Now let's say that is a directory of a million files, and something like the above is made to happen regularly. How do I maintain a stable list of synthetic cookies on the client?

I think you are right about there being cases in which it is impossible, but we either disagree or are simply talking past one another about other cases.

If the caching client is making the directory changes, then I agree this cannot be done and you are stuck having to refetch potentially large directories to deal with new READDIR requests☹️

Where we might disagree is the case in which another client is making the change.  In that case directory notifications would allow you to avoid repeated READDIR ops, whether you are providing the user synthetic or server-based cookies.

My talk on directory caching will discuss the possibility of v4.2 extensions to address the same-client directory caching issue, as well as possible clarifications regarding directory delegation/notification in v4.1.


meaning that a naive implementation


OK.   I'll plead guilty to one misdemeanor count of directory naivety.

of synthetic cookies as an offset is not compatible with the telldir()/seekdir() requirements.


It's not clear to me how this incompatibility would manifest itself.  I think I need to understand what would break.

To make matters worse, the list size is for all intents and purposes unbounded, because there is no hard limit on the size of a directory. That makes it also impossible to create a cached mapping between a synthetic cookie and a filename; such a mapping would be unbounded both in size and in duration (since we don't know a priori how long the application will keep the directory open, or for that matter, which exact set of cookies it may have cached).


Such a mapping would, in essence, be part of the cached directory.   So, if it is too big to keep in client memory,then it is too big to cache and you might as well decide not to cache it.

I expect there is an issue that is a worry in the case in which a reasonably sized directory  grows over time to be too big to cache while an open directory stream retains some directory cookies which might be incompatible with the client dropping  caching of directories and switching to server-based cookies.😖
I feel it is reasonable to treat this situation as one might a cookie-verifier failure, particularly if this is the only worrisome failure mode.   However, this possibility means that I would not ask clients to implement such local cookies. To enable that, we would have to make explicit the same sort of reasonableness requirement for cookie changes that we have already discussed for ordering changes.  RFC7530 already alludes to the need to avoid spurious cookie invalidations although not in as explicit or strict way as we would need to support directory notifications:

   As there is no way for the client to indicate that a cookie value,

   once received, will not be subsequently used, server implementations

   should avoid schemes that allocate memory corresponding to a returned

   cookie.  Such allocation can be avoided if the server bases cookie

   values on a value such as the offset within the directory where the

   scan is to be resumed.


   Cookies generated by such techniques should be designed to remain

   valid despite modification of the associated directory.  If a server

   were to invalidate a cookie because of a directory modification,

   READDIRs of large directories might never finish.


So in order to make this work the client would basically have to create its own B-tree and persist it in storage somewhere.


I don't see the need to make this persistent.  If the client restarts, all directory streams have ceased to exist and we know  a posteriori  that there are no outstanding directory cookies to which the client would have to respond.
<mailto:nfsv4@ietf.org<mailto:nfsv4@ietf.org>>

--

--

Trond Myklebust
Linux NFS client maintainer, Hammerspace
trond.myklebust@hammerspace.com<mailto:trond.myklebust@hammerspace.com><mailto:trond.myklebust@primarydata.com<mailto:trond.myklebust@primarydata.com>>