From nobody Mon May 02 14:40:05 2022 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 427861ABEA26 for ; Mon, 2 May 2022 14:40:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4KsQjd71zvz4T2y for ; Mon, 2 May 2022 14:40:05 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id CDF1736C1 for ; Mon, 2 May 2022 14:40:05 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 242Ee5iV096757 for ; Mon, 2 May 2022 14:40:05 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 242Ee5Ua096756 for bugs@FreeBSD.org; Mon, 2 May 2022 14:40:05 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 263728] NFSv4.1/4.2 server erroneously always clears slot 0 for the callback session Date: Mon, 02 May 2022 14:40:05 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: Unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: rmacklem@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: rmacklem@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_status assigned_to attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1651502406; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=s7Q0SX8skdLPrBLT0ziI2aaIlj8FokoYDCko4Um7c7k=; b=QqLYQeMkokxsFkWjTM7jamFx0BG07mBKRVs5TLluvhzzmq8mbDJAkMVJ52T6QNozTDGc4s iKun+Zf1GlfgPU6+UFI2dbLDpYgCdfW16AHNCchW2hhmo8NojvPzNk8FaHX1VydIzxR1uj VSl3kQr+YSgBAikYg3/hTRC6ngXSsInhgz26uEFGYl06c8PQTX8z614cyr6pb66gH9OD2R WpvUYje4XF8Ops6RF8vqyqPuW1UAyZUOsF4DogNvH0AbKfKltTipDTMer/UJYyicn1HBGO BBaD8BR+RY/herkLcVFvnpomBNcxzrn/j7LwefUUgeZAuPN8P7NZr0lUH6NJHA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1651502406; a=rsa-sha256; cv=none; b=vSDmgqMZ25oCv4qwG6lbtI4SZx0hJO1bfCwVvMa/ROnOFQnuE/EOzCGh4jT6T30C1Xr5FI xGOVc2PoWNYD2Y6Uj1UbISDAisXX+zetj0/qDO9+QfUm4a/YMZedNbVHnoji6De3UoCQ+H 3xDpaQnHtGSKChNq63wpXg5Ct0QzmVzyZNaLFYku5p2aoaqhSTFa4Zn3k63cQ4jXIykNVO /oWJ/VNliNpONz7nIdo69KAg3zeWjnln67hbz4sk7daw3EkLt08JSvrqrGH0oSw2ghe3YB gX68H5GEAXGOwj2PIRE9eutzF+g6X3IVCYzQSLa8kf1+Mj5yGPSfgKJZ/2Dhcw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D263728 Rick Macklem changed: What |Removed |Added ---------------------------------------------------------------------------- Status|New |Open Assignee|bugs@FreeBSD.org |rmacklem@FreeBSD.org --- Comment #1 from Rick Macklem --- Created attachment 233671 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D233671&action= =3Dedit Fixes the NFSv4.1/4.2 to clear the correct callback session slot The NFSv4.1/4.2 server erroneously always frees session slot zero for callbacks. This only affects 4.1/4.2 mounts if the server has delegations enabled or is a pNFS configuration. Even for those cases, the effect is mainly to only use slot 0 for callbacks, serializing all of them. There is a slight chance that callbacks will fail if the client performs them in a different order than received on the TCP connection. This patch fixes the problem. Found during a recent IETF NFSv4 testing event. --=20 You are receiving this mail because: You are the assignee for the bug.=