<?xml version='1.0' encoding='utf-8'?> <!DOCTYPE rfcSYSTEM "rfc2629-xhtml.ent"> <?xml-stylesheet type="text/xsl" href="rfc2629.xslt"?>[ <!ENTITY nbsp " "> <!ENTITY zwsp "​"> <!ENTITY nbhy "‑"> <!ENTITY wj "⁠"> ]> <rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="std" docName="draft-ietf-nfsv4-delstid-08" number="9754" ipr="trust200902" obsoletes=""scripts="Common,Latin"updates="" sortRefs="true" submissionType="IETF" consensus="true" symRefs="true" tocDepth="3" tocInclude="true" version="3" xml:lang="en"> <front> <titleabbrev="Deleg Stateid"> Extending the Openingabbrev="Delegation of Stateids">Extensions for Opening and Delegating Files inNFSv4.2 </title>NFSv4.2</title> <seriesInfoname="Internet-Draft" value="draft-ietf-nfsv4-delstid-08"/>name="RFC" value="9754"/> <author fullname="Thomas Haynes" initials="T." surname="Haynes"> <organization abbrev="Hammerspace">Hammerspace</organization> <address> <email>loghyr@hammerspace.com</email> </address> </author> <author fullname="Trond Myklebust" initials="T." surname="Myklebust"> <organization abbrev="Hammerspace">Hammerspace</organization> <address> <email>trondmy@hammerspace.com</email> </address> </author> <dateyear="2024" month="October" day="02"/> <area>Transport</area> <workgroup>Network File System Version 4</workgroup>year="2025" month="March"/> <area>WIT</area> <workgroup>nfsv4</workgroup> <keyword>NFSv4</keyword> <abstract> <t> The Network File System v4 (NFSv4) allows a client to both open a file and be granted a delegation of that file. This delegation provides the client the right to authoritatively cache metadata on the file locally. This document presents several extensions for boththeopeningand delegating ofthe file and delegating it to the client. This document extends NFSv4.2 (seeRFC7863).RFC 7863). </t> </abstract><note removeInRFC="true"> <t> Discussion of this draft takes place on the NFSv4 working group mailing list (nfsv4@ietf.org), which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nfsv4/"/>. Working Group information can be found at <eref target="https://datatracker.ietf.org/wg/nfsv4/about/"/>. </t> </note></front> <middle> <section anchor="sec_intro" numbered="true"removeInRFC="false"toc="default"> <name>Introduction</name> <t> In the Network File Systemversion4version 4 (NFSv4), a client may be granted a delegation for a file (seeSection 1.8.4 of<xref target="RFC8881"format="default"section="1.8.4" sectionFormat="of"/>). This allows the client to act as the authority for the file'smetadatadata anddata.metadata. This document presents a number of extensionswhichthat enhance the functionality of opens and delegations. These allow the client to: </t> <ul spacing="normal"><li> detect<li>detect an offline file, which may require significant effort toobtain. </li> <li> determineobtain;</li> <li>determine which extensions of OPEN(see Section 18.16 of <xref target="RFC8881" format="default" sectionFormat="of"/>)flags are supported by theserver. </li> <li> during the OPEN procedure, retrieveserver;</li> <li>retrieve either the openstateid (see Section 8.2 of <xref target="RFC8881" format="default" sectionFormat="of"/>)or delegation stateid, but not bothsimultaneously. </li> <li> cachesimultaneously, during the OPEN procedure; and</li> <li>cache both the access and modify timestamps, thereby reducing the frequency with which the client must query the server for this information. </li> </ul> <t> Using the process detailed in <xref target="RFC8178" format="default" sectionFormat="of"/>, the revisions in this document become an extension of NFSv4.2 <xref target="RFC7862" format="default" sectionFormat="of"/>. They are built on top of theexternal data representationExternal Data Representation (XDR) <xref target="RFC4506" format="default" sectionFormat="of"/> generated from <xref target="RFC7863" format="default" sectionFormat="of"/>. </t> <section anchor="sec_defs" numbered="true"removeInRFC="false"toc="default"> <name>Definitions</name> <t>This document uses the following terminology:</t> <dl newline="false" spacing="normal"> <dt>offline file:</dt> <dd> A filewhichthat exists on a devicewhichthat is not connected to the server. There is typically a cost associated with bringing the file to an online status.HistoricallyHistorically, this would be a file on tapemediamedia, and the cost would have been finding and loading the tape. A more modern interpretation is that the file is in thecloudcloud, and the cost is a monetary one in downloading the file. </dd> <dt>proxy:</dt> <dd>ProxyingThe proxying of attributes occurs when a client has the authority, as granted by the appropriate delegation, to represent the attributes normally maintained by the server. For read attributes, this occurs when the client has either a read or writedelegationsdelegation for the file. For write attributes, this occurs when the client has a write delegation for the file. The client having this authority is the "proxy" for those attributes. </dd> </dl> <t>Further, the definitions of the following terms are referenced as follows:</t> <ul> <li>CB_GETATTR (<xref target="RFC8881" section="20.1" sectionFormat="of"/>)</li> <li>change (<xref target="RFC8881" section="5.8.1.4" sectionFormat="of"/>)</li> <li>CLOSE (<xref target="RFC8881" section="18.2" sectionFormat="of"/>)</li> <li>compound (<xref target="RFC8881" section="2.3" sectionFormat="of"/>)</li> <li>DELEGRETURN (<xref target="RFC8881" section="18.6" sectionFormat="of"/>)</li> <li>GETATTR (<xref target="RFC8881" section="18.7" sectionFormat="of"/>)</li> <li>LAYOUTGET (<xref target="RFC8881" section="18.43" sectionFormat="of"/>)</li> <li>LOCK (<xref target="RFC8881" section="18.10" sectionFormat="of"/>)</li> <li>NFS4ERR_DELAY (<xref target="RFC8881" section="15.1.1.3" sectionFormat="of"/>)</li> <li>OPEN (<xref target="RFC8881" section="18.16" sectionFormat="of"/>)</li> <li>open_delegation_type4 (<xref target="RFC8881" section="18.16.1" sectionFormat="of"/>)</li> <li>READ (<xref target="RFC8881" section="18.22" sectionFormat="of"/>)</li> <li>READDIR (<xref target="RFC8881" section="18.23" sectionFormat="of"/>)</li> <li>SETATTR (<xref target="RFC8881" section="18.30" sectionFormat="of"/>)</li> <li>stateid (<xref target="RFC8881" section="8.2" sectionFormat="of"/>)</li> <li>time_access (<xref target="RFC8881" section="5.8.2.37" sectionFormat="of"/>)</li> <li>time_metadata (<xref target="RFC8881" section="5.8.2.42" sectionFormat="of"/>)</li> <li>time_modify (<xref target="RFC8881" section="5.8.2.43" sectionFormat="of"/>)</li> <li>WRITE (<xref target="RFC8881" section="18.32" sectionFormat="of"/>)</li> </ul> </section> <section numbered="true"removeInRFC="false"toc="default"> <name>Requirements Language</name> <t> The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described in BCP 14 <xreftarget="RFC2119" format="default" sectionFormat="of"/>target="RFC2119"/> <xreftarget="RFC8174" format="default" sectionFormat="of"/>target="RFC8174"/> when, and only when, they appear in all capitals, as shown here. </t> </section> </section> <section anchor="sec_offline" numbered="true"removeInRFC="false"toc="default"> <name>Offline Files</name> <t> If a file is offline, then the server has immediate high-performance access to the file's attributes, but not to the file's content. The action of retrieving the data content is expensive, to the extent that the content should only be retrieved if it is going to be used. For example, a graphical file manager (such asOSX's Finder)Finder in Mac OS X) may want to access the beginning of the file to preview it forana user who is hovering their pointer over the file name and not accessing it otherwise. If the file is retrieved, it will most likelyeitherbe either immediately thrown away or returned. </t> <t> A compound(see Section 2.3 of <xref target="RFC8881" format="default" sectionFormat="of"/>)with a GETATTR(see Section 18.7 of <xref target="RFC8881" format="default" sectionFormat="of"/>)or READDIR(see Section 18.23 of <xref target="RFC8881" format="default" sectionFormat="of"/>)can report the file's attributes without bringing the file online. However, either an OPEN or a LAYOUTGET(see Section 18.43 of <xref target="RFC8881" format="default" sectionFormat="of"/>)might cause the file server to retrieve the archived data contents, bringing the file online. For non-parallel NFS(pNFS)systems (seeSection 12 of<xref target="RFC8881"format="default" sectionFormat="of"/>) ,section="12" sectionFormat="of"/>), the OPEN operation requires a filehandle to retrieve the data content. ForpNFSparallel NFS (pNFS) systems, the filehandle retrieved from an OPEN need not cause the data content to be retrieved.ButHowever, when the LAYOUTGET operation is processed, alayout type specificlayout-type-specific mapping will cause the data content to be retrieved from offline storage. </t> <t> If the client is not aware that the file is offline, it might inadvertently open the file to determine what type of file it is accessing. By interrogating the new attribute fattr4_offline, a client can predetermine the availability of the file, avoiding the need to open it at all. Being offline might also involve situations in which the file is archived in the cloud, i.e., there can be an expense in both retrieving the file to bring it online and in sending the file back to offline status. </t> <section anchor="ssec_offline_attr" numbered="true"removeInRFC="false"toc="default"> <name>XDR for the Offline Attribute</name> <sourcecode name=""type=""type="xdr" markers="true"><![CDATA[ /// /// typedef bool fattr4_offline; /// /// /// const FATTR4_OFFLINE = 83; ///]]> </sourcecode>]]></sourcecode> </section> </section> <section anchor="ssec_open_xor_xdr" numbered="true"removeInRFC="false"toc="default"> <name>Determining OPEN Feature Support</name> <t> <xref target="RFC8178"format="default"section="4.4.2" sectionFormat="of"/>(see Section 4.4.2)allows for extending a particular minor version of the NFSv4 protocol without requiring the definition of a new minor version. The client can probe the capabilities of the serverandand, based on the result, determine if both it and the server support optional features not previously specified as part of the minor version. </t> <t> The fattr4_open_arguments attribute is a new XDR extensionwhichthat provides helpful support when the OPEN procedure is extended in such a fashion. It models all of the parameters via bitmap4 data structures, which allows for the addition of a new flag to any of the OPENarguments (see Section 18.16.1 of <xref target="RFC8881" format="default" sectionFormat="of"/>).arguments. The scope of this attribute applies to all objects with a matching fsid. </t> <t> Two new flags are provided: </t> <ul spacing="normal"> <li> OPEN4_SHARE_ACCESS_WANT_OPEN_XOR_DELEGATION (see <xref target="sec_open_xor" format="default" sectionFormat="of"/>) </li> <li> OPEN4_SHARE_ACCESS_WANT_DELEG_TIMESTAMPS (see <xref target="sec_proxy" format="default" sectionFormat="of"/>) </li> </ul> <t> Subsequent extensions can use this framework when introducing new <bcp14>OPTIONAL</bcp14> functionality toOPEN,OPEN by creating a new flag for each <bcp14>OPTIONAL</bcp14> parameter. </t> <t> Since fattr4_open_arguments is a <bcp14>RECOMMENDED</bcp14> attribute, if the server informs the client via NFS4ERR_ATTRNOTSUPP that it does not support this new attribute, the client <bcp14>MUST</bcp14> take this to mean that the additional new <bcp14>OPTIONAL</bcp14> functionality to OPEN is also not supported. </t> <t> Some other concerns are how to process both currently <bcp14>REQUIRED</bcp14> flags and <bcp14>OPTIONAL</bcp14> flagswhichthat become <bcp14>REQUIRED</bcp14> in the future. The server <bcp14>MUST</bcp14> mark <bcp14>REQUIRED</bcp14> flags as being supported. Note that these flags <bcp14>MUST</bcp14> only change from <bcp14>OPTIONAL</bcp14> to <bcp14>REQUIRED</bcp14> when the NFSv4 minor version is incremented. </t> <section anchor="ssec_open_xdr" numbered="true"removeInRFC="false"toc="default"> <name>XDR for Open Arguments</name> <sourcecode name=""type=""type="xdr" markers="true"><![CDATA[ /// /// struct open_arguments4 { /// bitmap4 oa_share_access; /// bitmap4 oa_share_deny; /// bitmap4 oa_share_access_want; /// bitmap4 oa_open_claim; /// bitmap4 oa_create_mode; /// }; /// /// /// enum open_args_share_access4 { /// OPEN_ARGS_SHARE_ACCESS_READ = 1, /// OPEN_ARGS_SHARE_ACCESS_WRITE = 2, /// OPEN_ARGS_SHARE_ACCESS_BOTH = 3 /// }; /// /// /// enum open_args_share_deny4 { /// OPEN_ARGS_SHARE_DENY_NONE = 0, /// OPEN_ARGS_SHARE_DENY_READ = 1, /// OPEN_ARGS_SHARE_DENY_WRITE = 2, /// OPEN_ARGS_SHARE_DENY_BOTH = 3 /// }; /// /// /// enum open_args_share_access_want4 { /// OPEN_ARGS_SHARE_ACCESS_WANT_ANY_DELEG = 3, /// OPEN_ARGS_SHARE_ACCESS_WANT_NO_DELEG = 4, /// OPEN_ARGS_SHARE_ACCESS_WANT_CANCEL = 5, /// OPEN_ARGS_SHARE_ACCESS_WANT_SIGNAL_DELEG_WHEN_RESRC_AVAIL /// = 17, /// OPEN_ARGS_SHARE_ACCESS_WANT_PUSH_DELEG_WHEN_UNCONTENDED /// = 18, /// OPEN_ARGS_SHARE_ACCESS_WANT_DELEG_TIMESTAMPS = 20, /// OPEN_ARGS_SHARE_ACCESS_WANT_OPEN_XOR_DELEGATION = 21 /// }; /// /// /// enum open_args_open_claim4 { /// OPEN_ARGS_OPEN_CLAIM_NULL = 0, /// OPEN_ARGS_OPEN_CLAIM_PREVIOUS = 1, /// OPEN_ARGS_OPEN_CLAIM_DELEGATE_CUR = 2, /// OPEN_ARGS_OPEN_CLAIM_DELEGATE_PREV = 3, /// OPEN_ARGS_OPEN_CLAIM_FH = 4, /// OPEN_ARGS_OPEN_CLAIM_DELEG_CUR_FH = 5, /// OPEN_ARGS_OPEN_CLAIM_DELEG_PREV_FH = 6 /// }; /// /// /// enum open_args_createmode4 { /// OPEN_ARGS_CREATEMODE_UNCHECKED4 = 0, /// OPEN_ARGS_CREATE_MODE_GUARDED = 1, /// OPEN_ARGS_CREATEMODE_EXCLUSIVE4 = 2, /// OPEN_ARGS_CREATE_MODE_EXCLUSIVE4_1 = 3 /// }; /// /// /// typedef open_arguments4 fattr4_open_arguments; /// /// /// %/* /// % * Determine what OPEN supports. /// % */ /// const FATTR4_OPEN_ARGUMENTS = 86; /// /// /// const OPEN4_SHARE_ACCESS_WANT_OPEN_XOR_DELEGATION = 0x200000; /// /// /// const OPEN4_RESULT_NO_OPEN_STATEID = 0x00000010; ///]]> </sourcecode>]]></sourcecode> </section> </section> <section anchor="sec_open_xor" numbered="true"removeInRFC="false"toc="default"> <name>OPENgrants only one ofGrants Either an Open or a Delegation Stateid</name> <t> The OPEN(See Section 18.16 of <xref target="RFC8881" format="default" sectionFormat="of"/>)procedure returns an open stateid to the client to reference the state of the file. The client could also request a delegation stateid in the OPEN arguments. The file can be considered open for the client as long as the count of open and delegated stateids is greater than 0. Either type of stateid is sufficient to enable the server to treat the file as if it were open, which allowsREAD (See Section 18.25 of <xref target="RFC8881" format="default" sectionFormat="of"/>), WRITE (See Section 18.38 of <xref target="RFC8881" format="default" sectionFormat="of"/>), LOCK (See Section 18.12 of <xref target="RFC8881" format="default" sectionFormat="of"/>),READ, WRITE, LOCK, and LAYOUTGET(see Section 18.50 of <xref target="RFC8881" format="default" sectionFormat="of"/>)operations to proceed. If the client gets both an open and a delegation stateid as part of the OPEN, then it has to return them both to the server. A further consideration is that during each operation, the client can send a costlyGETATTR (See Section 18.7 of <xref target="RFC8881" format="default" sectionFormat="of"/>).GETATTR. </t> <t> If the client knows that the server supports the OPEN4_SHARE_ACCESS_WANT_OPEN_XOR_DELEGATION flag (as determined by an earlier GETATTR operationwhichthat queried for the fattr4_open_arguments attribute), then the client can supply that flag during the OPEN andonlyget either an open or a delegation stateid. </t> <t> The client is already prepared to not get a delegationstateidstateid, even if requested. In order to not send an open stateid, the server <bcp14>MUST</bcp14> indicate that fact with the result flag of OPEN4_RESULT_NO_OPEN_STATEID. The open stateid field,OPEN4resok.stateid (see Section 18.16.2 of <xref target="RFC8881" format="default" sectionFormat="of"/>),OPEN4resok.stateid, <bcp14>MUST</bcp14> be set to the specialall zeroall-zero stateid in this case. </t> <t> Note that the OPEN4_SHARE_ACCESS_WANT_OPEN_XOR_DELEGATION flag is a hint. The server might return both stateids. Consider the scenario in which the client opens a file for read-only (with OPEN4_SHARE_ACCESS_WANT_OPEN_XOR_DELEGATION set) andgetsonly gets an open stateid. If the client then opens the file for read-write (with OPEN4_SHARE_ACCESS_WANT_OPEN_XOR_DELEGATION set),thenthe serverhascan return one of the following three options: </t> <ol> <li>Only an open stateid with the correct seqid.</li> <li>Only a delegation stateid with the open stateid now having an incorrect seqid as it needs to be upgraded.</li> <li>Both an open stateid (which will be upgraded) and a delegation stateid.</li> </ol> <t> In this scenario, returning just a delegation stateid would hide information from the client. If the client already has an open stateid, then the server <bcp14>SHOULD</bcp14> ignore the OPEN4_SHARE_ACCESS_WANT_OPEN_XOR_DELEGATION flag and return both the open and delegation stateids. </t> <section anchor="delstid_analysis" numbered="true"removeInRFC="false"toc="default"> <name>Implementation Experience</name> <t> The CLOSE operation(see Section 18.2 of <xref target="RFC8881" format="default" sectionFormat="of"/>)neither explicitly nor implicitly releases any delegation stateids. This is not symmetrical with the OPEN operation, which can grant both an open and a delegation stateid. This specification could have tried to extend the CLOSE operation to release both stateids, but implementation experience shows that is more costly than the approachwhichthat has been proposed. </t> <t> Consider a small workload of creating a file with content.That takes 3This involves three synchronous operations and1one asynchronousoperationsoperation with existingimplementations. Theimplementations:</t> <ul spacing="normal"> <li>The first synchronousoneoperation has to OPEN thefile, thefile.</li> <li>The second synchronousoneoperation performs the WRITE to thefile, thefile.</li> <li>The third synchronousoneoperation has to CLOSE thefile, and the fourthfile.</li> <li>The asynchronousoneoperation uses DELEGRETURN(see Section 18.6 of <xref target="RFC8881" format="default" sectionFormat="of"/>)to return the delegationstateid. </t>stateid.</li> </ul> <sourcecode name=""type=""type="pseudocode" markers="true"><![CDATA[ SEQ PUTFH OPEN GETFH GETATTR SEQ PUTFH WRITE GETATTR SEQ PUTFH CLOSE ... SEQ PUTFH DELEGRETURN]]> </sourcecode>]]></sourcecode> <t> With the proposed approach of setting the OPEN_ARGS_SHARE_ACCESS_WANT_OPEN_XOR_DELEGATION flag during the OPEN, the number of operations is always3.three. The first two compounds are still synchronous, but the last is asynchronous.I.e.,That is, since the client no longer has to send a CLOSE operation, it can delay the DELEGRETURN until either the server requests it back via delegation recall or garbage collection causes the client to return the stateid. </t> <sourcecode name=""type=""type="pseudocode" markers="true"><![CDATA[ SEQ PUTFH OPEN(OPEN_ARGS_SHARE_ACCESS_WANT_OPEN_XOR_DELEGATION) GETFH GETATTR SEQ PUTFH WRITE GETATTR ... SEQ PUTFH DELEGRETURN]]> </sourcecode>]]></sourcecode> <t> This approach reduces the cost of synchronous operations by 33% and the total number of operations by 25%. Contrast thatagainstwith the alternative proposal of having CLOSE return both stateids, which would not reduce the number of synchronous operations. </t> </section> </section> <section anchor="sec_proxy" numbered="true"removeInRFC="false"toc="default"> <name>Proxying of Times</name> <t> When a client is granted a write delegation on a file, it becomes the authority for the file contents and associated attributes. If the server queries the client as to the state of the file via aCB_GETATTR (see Section 20.1 of <xref target="RFC8881" format="default" sectionFormat="of"/>), then,CB_GETATTR, then according to the unextended NFSv4 protocol, it can only determine the size of the file and the change attribute. In the case of the client holding the delegation, it has the current values of the access and modify times. There is no way that other clients can have access to these values.WhileTo notify the server of the proxied values, the client could send a compound of theform:form SEQ, PUTFH, SETATTR (time_modify | time_access),DELEGRETURN, to notify the server ofDELEGRETURN; however, theproxied values, thatSETATTR(see Section 18.30 of <xref target="RFC8881" format="default" sectionFormat="of"/>)operation would cause either or both of the change(see Section 5.8.1.4 of <xref target="RFC8881" format="default" sectionFormat="of"/>)attribute or time_metadata(see Section 5.8.2.42 of <xref target="RFC8881" format="default" sectionFormat="of"/>)attribute to be modified to the current time on the server. There is no current provision to obtain these values before delegation return using CB_GETATTR. As a result, itcan notcannot pass on these timesupto an application expecting POSIX compliance, as is often necessary for correct operation. </t> <t> With the addition of the newflag: OPEN4_SHARE_ACCESS_WANT_DELEG_TIMESTAMPS,OPEN4_SHARE_ACCESS_WANT_DELEG_TIMESTAMPS flag, the client and server can negotiate that the client will be the authority for thesevaluesvalues, and upon return of the delegation stateid via aDELEGRETURN (see section 18.6 of <xref target="RFC8881" format="default" sectionFormat="of"/>),DELEGRETURN, the times will be passed back to the server. If the server is queried by another client for either the size or the times, it will need to use a CB_GETATTR to query the clientwhichthat holds thedelegation (see Section 20.1 of <xref target="RFC8881" format="default" sectionFormat="of"/>).delegation. </t> <t> If a server informs the client via the fattr4_open_arguments attribute that it supports OPEN_ARGS_SHARE_ACCESS_WANT_DELEG_TIMESTAMPS and it returns a valid delegation stateid for an OPEN operationwhichthat sets the OPEN4_SHARE_ACCESS_WANT_DELEG_TIMESTAMPS flag, then it <bcp14>MUST</bcp14> query the client via a CB_GETATTR for the fattr4_time_deleg_access attribute (see <xref target="ssec_proxy_xdr"/>)attributeand the fattr4_time_deleg_modify attribute (see <xref target="ssec_proxy_xdr"/>).(The(Note that the change time can be derived from the modify time.) Further, whenita server gets a SETATTR with those attributesbeingset, then it <bcp14>MUST</bcp14> accept those changes in the fattr4_time_deleg_accessattributeand fattr4_time_deleg_modifyattribute changesattributes and derive the changetimetime, or it <bcp14>MUST</bcp14> reject the changes withNFS4ERR_DELAY (see Section 15.1.1.3 of <xref target="RFC8881" format="default" sectionFormat="of"/>).NFS4ERR_DELAY. </t> <t> When the server grants a delegation stateid, it <bcp14>MUST</bcp14> inform the client by setting the appropriate flag in the open_delegation_type4 response. The server <bcp14>MUST</bcp14> set OPEN_DELEGATE_READ_ATTRS_DELEG when it grants a read attribute delegation and <bcp14>MUST</bcp14> set OPEN_DELEGATE_WRITE_ATTRS_DELEG when it grants a write attribute delegation. </t> <t> These new attributes are invalid to be used with GETATTR, VERIFY, andNVERIFYNVERIFY, and they can only be used with CB_GETATTR and SETATTR by a client holding an appropriate delegation. The SETATTR <bcp14>SHOULD</bcp14>eitherbe either 1) in a separate compound before the one containing the DELEGRETURN orwhen2) in the samecompound,compound as an operation before the DELEGRETURN. Failure to properly sequence the operations may lead to race conditions. </t> <t> A key prerequisite of this approach is that the server and client are in time synchronization with each other. Note that while the base NFSv4.2 does not require such synchronization, the use of RPCSEC_GSS typically makes such a requirement. When the client presents either the fattr4_time_deleg_access or the fattr4_time_deleg_modifyattributesattribute to the server, the server <bcp14>MUST</bcp14> decide for both of them whether the time presentedis beforeis:</t> <ul> <li>before the corresponding time_access(see Section 5.8.2.37 of <xref target="RFC8881" format="default" sectionFormat="of"/>)attribute or time_modify(see Section 5.8.2.43 of <xref target="RFC8881" format="default" sectionFormat="of"/>)attribute on thefile or pastfile, or</li> <li>past the current servertime. Whentime.</li> </ul> <t>When the time presented is before the original time, then the update is ignored. When the time presented is in the future, the server can either clamp the new time to the currenttime,time orit mayreturn NFS4ERR_DELAY to the client, allowing it to retry. Note that if the clock skew is large, the delay approach would result in access to the file being denied until the clock skew is exceeded. </t> <t> A change in the access time <bcp14>MUST NOT</bcp14> advance the change time, also known as the time_metadataattribute (see Section 5.8.2.42 of <xref target="RFC8881" format="default" sectionFormat="of"/>), butattribute. However, a change in the modify time might advance the change time (and inturnturn, the changeattribute (See Section 5.8.1.4 of <xref target="RFC8881" format="default" sectionFormat="of"/>).attribute). If the modify time is greater than the change time and before the current time, then the change time is adjusted to the modify time and not the current time (as is most likely done on most SETATTR calls that change the metadata). If the modify time is in the future, it will be clamped to the current time. </t> <t> Note that each of the possibletimes, access,times (access, modify, andchange,change) are compared to the current time. They should all be compared against the same time value for the currenttime. I.e.,time (i.e., they do not retrieve a different value of the current time for eachcalculation.calculation). </t> <t> If the client sets the OPEN4_SHARE_ACCESS_WANT_DELEG_TIMESTAMPS flag in an OPEN operation, then it <bcp14>MUST</bcp14> support the fattr4_time_deleg_access and fattr4_time_deleg_modify attributesbothin both the CB_GETATTR and SETATTR operations. </t> <section anchor="ssec_proxy_use" numbered="true"removeInRFC="false"toc="default"> <name>Usecase:Case for NFSv3client proxy</name>Client Proxy</name> <t> Consideraan NFSv3 clientwhichthat wants to access data on a serverwhichthat only supports NFSv4.2. An implementation may introduce an NFSv3 server that functions as an NFSv4.2 client, serving as a gateway between the two otherwise incompatible systems. As NFSv3 is a stateless protocol, the state is not kept on the client, but rather on the NFSv3 server. As the NFSv3 server is already managing the state, it can proxy file delegations to avoid spurious GETATTRs.I.e.,That is, as the client queries the NFSv3 server for the attributes, they can be served without the NFSv3 server sending a GETATTR to the NFSv4.2 server. </t> </section> <section anchor="ssec_proxy_xdr" numbered="true"removeInRFC="false"toc="default"> <name>XDR for Proxying of Times</name> <sourcecode name=""type=""type="xdr" markers="true"><![CDATA[ /// /// /* /// * attributes for the delegation times being /// * cached and served by the "client" /// */ /// typedef nfstime4 fattr4_time_deleg_access; /// typedef nfstime4 fattr4_time_deleg_modify; /// /// /// %/* /// % * New RECOMMENDED Attribute for /// % * delegation caching of times /// % */ /// const FATTR4_TIME_DELEG_ACCESS = 84; /// const FATTR4_TIME_DELEG_MODIFY = 85; /// /// /// const OPEN4_SHARE_ACCESS_WANT_DELEG_TIMESTAMPS = 0x100000; ///]]> </sourcecode>/// enum open_delegation_type4 { /// OPEN_DELEGATE_NONE = 0, /// OPEN_DELEGATE_READ = 1, /// OPEN_DELEGATE_WRITE = 2, /// OPEN_DELEGATE_NONE_EXT = 3, /* new to v4.1 */ /// OPEN_DELEGATE_READ_ATTRS_DELEG = 4, /// OPEN_DELEGATE_WRITE_ATTRS_DELEG = 5 /// }; ]]></sourcecode> </section> </section> <section anchor="xdr_desc" numbered="true"removeInRFC="false"toc="default"> <name>Extraction of XDR</name> <t> This document contains theexternal data representation (XDR)XDR <xref target="RFC4506" format="default" sectionFormat="of"/> description of the new open flags for delegating the file to the client. The XDR description is embedded in this document in a way that makes it simple for the reader to extract into a ready-to-compile form. The reader can feed this document into the following shell script to produce themachine readablemachine-readable XDR description of the new flags: </t> <sourcecode name=""type=""type="shell" markers="true"><![CDATA[ #!/bin/sh grep '^ *///' $* | sed 's?^ */// ??' | sed 's?^ *///$??']]> </sourcecode>]]></sourcecode> <t> That is, if the above script is stored in a file called"extract.sh","extract.sh" and this document is in a file called "spec.txt", then the reader cando:do the following: </t> <sourcecode name=""type=""type="shell" markers="true"><![CDATA[ sh extract.sh < spec.txt > delstid_prot.x]]> </sourcecode>]]></sourcecode> <t> The effect of the script is to remove leadingwhiteblank space from each line, plus a sentinel sequence of "///". XDR descriptions with the sentinel sequence are embedded throughout the document. </t> <t> Note that the XDR code contained in this document depends on types from the NFSv4.2 nfs4_prot.x file (generated from <xref target="RFC7863" format="default" sectionFormat="of"/>). This includes both nfs types that end with a4, such4 (such asoffset4, length4, etc.,offset4 and length4) as well as more generic typessuch(such as uint32_t anduint64_t.uint64_t). </t> <t> While the XDR can be appended to that from <xref target="RFC7863" format="default" sectionFormat="of"/>, the various code snippets belong in their respective areas of that XDR. </t> </section> <section anchor="sec_security" numbered="true"removeInRFC="false"toc="default"> <name>Security Considerations</name> <t> Whilewe are extendingthis document extends some capabilities for client delegation, there are no new security concerns. The client cannot be queried by other clients as to the cached attributes. The client could report false data for the cached attributes, but it already has this ability via a SETATTRoperation (see Section 18.30 of <xref target="RFC8881" format="default" sectionFormat="of"/>).operation. </t> </section> <section anchor="sec_iana" numbered="true"removeInRFC="false"toc="default"> <name>IANA Considerations</name><t> There are<t>This document has no IANAconsiderations. </t>actions.</t> </section> </middle> <back> <references><name>References</name> <references><name>Normative References</name> <xi:includexmlns:xi="http://www.w3.org/2001/XInclude" href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/> <xi:includexmlns:xi="http://www.w3.org/2001/XInclude" href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4506.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4506.xml"/> <xi:includexmlns:xi="http://www.w3.org/2001/XInclude" href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7862.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7862.xml"/> <xi:includexmlns:xi="http://www.w3.org/2001/XInclude" href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7863.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7863.xml"/> <xi:includexmlns:xi="http://www.w3.org/2001/XInclude" href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/> <xi:includexmlns:xi="http://www.w3.org/2001/XInclude" href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8178.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8178.xml"/> <xi:includexmlns:xi="http://www.w3.org/2001/XInclude" href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8881.xml"/> </references>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8881.xml"/> </references> <sectionnumbered="true" removeInRFC="false"numbered="false" toc="default"> <name>Acknowledgments</name><t> Trond Myklebust, Tom Haynes, and David Flynn<t><contact fullname="Trond Myklebust"/>, <contact fullname="Tom Haynes"/>, and <contact fullname="David Flynn"/> all worked on the prototype atHammerspace. </t> <t> Dave Noveck, Chuck Lever, Rick Macklem, and Zaheduzzaman SarkerHammerspace.</t> <t><contact fullname="Dave Noveck"/>, <contact fullname="Chuck Lever"/>, <contact fullname="Rick Macklem"/>, and <contact fullname="Zaheduzzaman Sarker"/> provided reviews of thedocument. </t> <t> Jeff Laytondocument.</t> <t><contact fullname="Jeff Layton"/> provided experience from an implementation heauthored. </t>authored.</t> </section> </back> </rfc>