From: Jeff Layton <jlayton@primarydata.com>
To: bfields@fieldses.org
Cc: linux-nfs@vger.kernel.org
Subject: [PATCH v4 017/100] nfsd: make deny mode enforcement more efficient and close races in it
Date: Tue, 8 Jul 2014 14:03:05 -0400 [thread overview]
Message-ID: <1404842668-22521-18-git-send-email-jlayton@primarydata.com> (raw)
In-Reply-To: <1404842668-22521-1-git-send-email-jlayton@primarydata.com>
The current enforcement of deny modes is both inefficient and scattered
across several places, which makes it hard to guarantee atomicity. The
inefficiency is a problem now, and the lack of atomicity will mean races
once the client_mutex is removed.
First, we address the inefficiency. We have to track deny modes on a
per-stateid basis to ensure that open downgrades are sane, but when the
server goes to enforce them it has to walk the entire list of stateids
and check against each one.
Instead of doing that, maintain a per-nfs4_file deny mode. When a file
is opened, we simply set any deny bits in that mode that were specified
in the OPEN call. We can then use that unified deny mode to do a simple
check to see whether there are any conflicts without needing to walk the
entire stateid list.
The only time we'll need to walk the entire list of stateids is when a
stateid that has a deny mode on it is being released, or one is having
its deny mode downgraded. In that case, we must walk the entire list and
recalculate the fi_share_deny field. Since deny modes are pretty rare
today, this should be very rare under normal workloads.
To address the potential for races once the client_mutex is removed,
protect fi_share_deny with the fi_lock. In nfs4_get_vfs_file, check to
make sure that any deny mode we want to apply won't conflict with
existing access. If that's ok, then have nfs4_file_get_access check that
new access to the file won't conflict with existing deny modes.
If that also passes, then get file access references, set the correct
access and deny bits in the stateid, and update the fi_share_deny field.
If opening the file or truncating it fails, then unwind the whole mess
and return the appropriate error.
Signed-off-by: Jeff Layton <jlayton@primarydata.com>
---
fs/nfsd/nfs4state.c | 208 +++++++++++++++++++++++++++++++++++-----------------
fs/nfsd/state.h | 1 +
2 files changed, 140 insertions(+), 69 deletions(-)
diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c
index bd24337a8763..6afeb7d39f9d 100644
--- a/fs/nfsd/nfs4state.c
+++ b/fs/nfsd/nfs4state.c
@@ -388,28 +388,53 @@ static unsigned int file_hashval(struct inode *ino)
static struct hlist_head file_hashtbl[FILE_HASH_SIZE];
-static void __nfs4_file_get_access(struct nfs4_file *fp, int oflag)
+static void
+__nfs4_file_get_access(struct nfs4_file *fp, u32 access)
{
- WARN_ON_ONCE(!(fp->fi_fds[oflag] || fp->fi_fds[O_RDWR]));
- atomic_inc(&fp->fi_access[oflag]);
+ int oflag = nfs4_access_to_omode(access);
+
+ if (oflag == O_RDWR) {
+ atomic_inc(&fp->fi_access[O_RDONLY]);
+ atomic_inc(&fp->fi_access[O_WRONLY]);
+ } else
+ atomic_inc(&fp->fi_access[oflag]);
}
-static void nfs4_file_get_access(struct nfs4_file *fp, u32 access)
+static __be32
+nfs4_file_get_access(struct nfs4_file *fp, u32 access)
{
- int oflag = nfs4_access_to_omode(access);
-
lockdep_assert_held(&fp->fi_lock);
/* Note: relies on NFS4_SHARE_ACCESS_BOTH == READ|WRITE */
access &= NFS4_SHARE_ACCESS_BOTH;
+
+ /* Does this access mask make sense? */
if (access == 0)
- return;
+ return nfserr_inval;
- if (oflag == O_RDWR) {
- __nfs4_file_get_access(fp, O_RDONLY);
- __nfs4_file_get_access(fp, O_WRONLY);
- } else
- __nfs4_file_get_access(fp, oflag);
+ /* Does it conflict with a deny mode already set? */
+ if ((access & fp->fi_share_deny) != 0)
+ return nfserr_share_denied;
+
+ __nfs4_file_get_access(fp, access);
+ return nfs_ok;
+}
+
+static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny)
+{
+ /* Common case is that there is no deny mode. */
+ deny &= NFS4_SHARE_DENY_BOTH;
+ if (deny) {
+ /* Note: relies on NFS4_SHARE_DENY_BOTH == READ|WRITE */
+ if ((deny & NFS4_SHARE_DENY_READ) &&
+ atomic_read(&fp->fi_access[O_RDONLY]))
+ return nfserr_share_denied;
+
+ if ((deny & NFS4_SHARE_DENY_WRITE) &&
+ atomic_read(&fp->fi_access[O_WRONLY]))
+ return nfserr_share_denied;
+ }
+ return nfs_ok;
}
static void __nfs4_file_put_access(struct nfs4_file *fp, int oflag)
@@ -741,17 +766,6 @@ bmap_to_share_mode(unsigned long bmap) {
return access;
}
-static bool
-test_share(struct nfs4_ol_stateid *stp, struct nfsd4_open *open) {
- unsigned int access, deny;
-
- access = bmap_to_share_mode(stp->st_access_bmap);
- deny = bmap_to_share_mode(stp->st_deny_bmap);
- if ((access & open->op_share_deny) || (deny & open->op_share_access))
- return false;
- return true;
-}
-
/* set share access for a given stateid */
static inline void
set_access(u32 access, struct nfs4_ol_stateid *stp)
@@ -810,11 +824,49 @@ test_deny(u32 deny, struct nfs4_ol_stateid *stp)
return (bool)(stp->st_deny_bmap & mask);
}
+/*
+ * A stateid that had a deny mode associated with it is being released
+ * or downgraded. Recalculate the deny mode on the file.
+ */
+static void
+recalculate_deny_mode(struct nfs4_file *fp)
+{
+ struct nfs4_ol_stateid *stp;
+
+ spin_lock(&fp->fi_lock);
+ fp->fi_share_deny = 0;
+ list_for_each_entry(stp, &fp->fi_stateids, st_perfile)
+ fp->fi_share_deny |= bmap_to_share_mode(stp->st_deny_bmap);
+ spin_unlock(&fp->fi_lock);
+}
+
+static void
+reset_union_bmap_deny(u32 deny, struct nfs4_ol_stateid *stp)
+{
+ int i;
+ bool change = false;
+
+ for (i = 1; i < 4; i++) {
+ if ((i & deny) != i) {
+ change = true;
+ clear_deny(i, stp);
+ }
+ }
+
+ /* Recalculate per-file deny mode if there was a change */
+ if (change)
+ recalculate_deny_mode(stp->st_file);
+}
+
/* release all access and file references for a given stateid */
static void
release_all_access(struct nfs4_ol_stateid *stp)
{
int i;
+ struct nfs4_file *fp = stp->st_file;
+
+ if (fp && stp->st_deny_bmap != 0)
+ recalculate_deny_mode(fp);
for (i = 1; i < 4; i++) {
if (test_access(i, stp))
@@ -2806,6 +2858,7 @@ static void nfsd4_init_file(struct nfs4_file *fp, struct inode *ino)
fp->fi_inode = ino;
fp->fi_had_conflict = false;
fp->fi_lease = NULL;
+ fp->fi_share_deny = 0;
memset(fp->fi_fds, 0, sizeof(fp->fi_fds));
memset(fp->fi_access, 0, sizeof(fp->fi_access));
hlist_add_head(&fp->fi_hash, &file_hashtbl[hashval]);
@@ -3034,22 +3087,15 @@ nfs4_share_conflict(struct svc_fh *current_fh, unsigned int deny_type)
{
struct inode *ino = current_fh->fh_dentry->d_inode;
struct nfs4_file *fp;
- struct nfs4_ol_stateid *stp;
- __be32 ret;
+ __be32 ret = nfs_ok;
fp = find_file(ino);
if (!fp)
- return nfs_ok;
- ret = nfserr_locked;
- /* Search for conflicting share reservations */
+ return ret;
+ /* Check for conflicting share reservations */
spin_lock(&fp->fi_lock);
- list_for_each_entry(stp, &fp->fi_stateids, st_perfile) {
- if (test_deny(deny_type, stp) ||
- test_deny(NFS4_SHARE_DENY_BOTH, stp))
- goto out;
- }
- ret = nfs_ok;
-out:
+ if (fp->fi_share_deny & deny_type)
+ ret = nfserr_locked;
spin_unlock(&fp->fi_lock);
put_nfs4_file(fp);
return ret;
@@ -3292,12 +3338,9 @@ nfs4_check_open(struct nfs4_file *fp, struct nfsd4_open *open, struct nfs4_ol_st
if (local->st_stateowner->so_is_open_owner == 0)
continue;
/* remember if we have seen this open owner */
- if (local->st_stateowner == &oo->oo_owner)
+ if (local->st_stateowner == &oo->oo_owner) {
*stpp = local;
- /* check for conflicting share reservations */
- if (!test_share(local, open)) {
- spin_unlock(&fp->fi_lock);
- return nfserr_share_denied;
+ break;
}
}
spin_unlock(&fp->fi_lock);
@@ -3338,20 +3381,47 @@ static __be32 nfs4_get_vfs_file(struct svc_rqst *rqstp, struct nfs4_file *fp,
__be32 status;
int oflag = nfs4_access_to_omode(open->op_share_access);
int access = nfs4_access_to_access(open->op_share_access);
+ unsigned char old_access_bmap, old_deny_bmap;
spin_lock(&fp->fi_lock);
+
+ /*
+ * Are we trying to set a deny mode that would conflict with
+ * current access?
+ */
+ status = nfs4_file_check_deny(fp, open->op_share_deny);
+ if (status != nfs_ok) {
+ spin_unlock(&fp->fi_lock);
+ goto out;
+ }
+
+ /* set access to the file */
+ status = nfs4_file_get_access(fp, open->op_share_access);
+ if (status != nfs_ok) {
+ spin_unlock(&fp->fi_lock);
+ goto out;
+ }
+
+ /* Set access bits in stateid */
+ old_access_bmap = stp->st_access_bmap;
+ set_access(open->op_share_access, stp);
+
+ /* Set new deny mask */
+ old_deny_bmap = stp->st_deny_bmap;
+ set_deny(open->op_share_deny, stp);
+ fp->fi_share_deny |= (open->op_share_deny & NFS4_SHARE_DENY_BOTH);
+
if (!fp->fi_fds[oflag]) {
spin_unlock(&fp->fi_lock);
status = nfsd_open(rqstp, cur_fh, S_IFREG, access, &filp);
if (status)
- goto out;
+ goto out_put_access;
spin_lock(&fp->fi_lock);
if (!fp->fi_fds[oflag]) {
fp->fi_fds[oflag] = filp;
filp = NULL;
}
}
- nfs4_file_get_access(fp, open->op_share_access);
spin_unlock(&fp->fi_lock);
if (filp)
fput(filp);
@@ -3359,33 +3429,43 @@ static __be32 nfs4_get_vfs_file(struct svc_rqst *rqstp, struct nfs4_file *fp,
status = nfsd4_truncate(rqstp, cur_fh, open);
if (status)
goto out_put_access;
-
- /* Set access and deny bits in stateid */
- set_access(open->op_share_access, stp);
- set_deny(open->op_share_deny, stp);
- return nfs_ok;
-
-out_put_access:
- nfs4_file_put_access(fp, open->op_share_access);
out:
return status;
+out_put_access:
+ stp->st_access_bmap = old_access_bmap;
+ nfs4_file_put_access(fp, open->op_share_access);
+ reset_union_bmap_deny(bmap_to_share_mode(old_deny_bmap), stp);
+ goto out;
}
static __be32
nfs4_upgrade_open(struct svc_rqst *rqstp, struct nfs4_file *fp, struct svc_fh *cur_fh, struct nfs4_ol_stateid *stp, struct nfsd4_open *open)
{
__be32 status;
+ unsigned char old_deny_bmap;
if (!test_access(open->op_share_access, stp))
- status = nfs4_get_vfs_file(rqstp, fp, cur_fh, stp, open);
- else
- status = nfsd4_truncate(rqstp, cur_fh, open);
+ return nfs4_get_vfs_file(rqstp, fp, cur_fh, stp, open);
- if (status)
+ /* test and set deny mode */
+ spin_lock(&fp->fi_lock);
+ status = nfs4_file_check_deny(fp, open->op_share_deny);
+ if (status == nfs_ok) {
+ old_deny_bmap = stp->st_deny_bmap;
+ set_deny(open->op_share_deny, stp);
+ fp->fi_share_deny |=
+ (open->op_share_deny & NFS4_SHARE_DENY_BOTH);
+ }
+ spin_unlock(&fp->fi_lock);
+
+ if (status != nfs_ok)
return status;
- return nfs_ok;
-}
+ status = nfsd4_truncate(rqstp, cur_fh, open);
+ if (status != nfs_ok)
+ reset_union_bmap_deny(old_deny_bmap, stp);
+ return status;
+}
static void
nfs4_set_claim_prev(struct nfsd4_open *open, bool has_session)
@@ -3607,7 +3687,8 @@ nfsd4_process_open2(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nf
*/
fp = find_or_add_file(ino, open->op_file);
if (fp != open->op_file) {
- if ((status = nfs4_check_open(fp, open, &stp)))
+ status = nfs4_check_open(fp, open, &stp);
+ if (status)
goto out;
status = nfs4_check_deleg(cl, open, &dp);
if (status)
@@ -4294,17 +4375,6 @@ static inline void nfs4_stateid_downgrade(struct nfs4_ol_stateid *stp, u32 to_ac
}
}
-static void
-reset_union_bmap_deny(u32 deny, struct nfs4_ol_stateid *stp)
-{
- int i;
-
- for (i = 1; i < 4; i++) {
- if ((i & deny) != i)
- clear_deny(i, stp);
- }
-}
-
__be32
nfsd4_open_downgrade(struct svc_rqst *rqstp,
struct nfsd4_compound_state *cstate,
@@ -4603,7 +4673,7 @@ static void get_lock_access(struct nfs4_ol_stateid *lock_stp, u32 access)
if (test_access(access, lock_stp))
return;
- nfs4_file_get_access(fp, access);
+ __nfs4_file_get_access(fp, access);
set_access(access, lock_stp);
}
diff --git a/fs/nfsd/state.h b/fs/nfsd/state.h
index fa6d28329c8a..27adbebfd168 100644
--- a/fs/nfsd/state.h
+++ b/fs/nfsd/state.h
@@ -393,6 +393,7 @@ struct nfs4_file {
* + 1 to both of the above if NFS4_SHARE_ACCESS_BOTH is set.
*/
atomic_t fi_access[2];
+ u32 fi_share_deny;
struct file *fi_deleg_file;
struct file_lock *fi_lease;
atomic_t fi_delegees;
--
1.9.3
next prev parent reply other threads:[~2014-07-08 18:04 UTC|newest]
Thread overview: 144+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-07-08 18:02 [PATCH v4 000/101] nfsd: eliminate the client_mutex Jeff Layton
2014-07-08 18:02 ` [PATCH v4 001/100] nfsd: close potential race between delegation break and laundromat Jeff Layton
2014-07-10 15:59 ` J. Bruce Fields
2014-07-10 16:16 ` Jeff Layton
2014-07-10 16:34 ` Jeff Layton
2014-07-10 17:41 ` J. Bruce Fields
2014-07-08 18:02 ` [PATCH v4 002/100] nfsd: reduce some spinlocking in put_client_renew Jeff Layton
2014-07-10 11:18 ` Christoph Hellwig
2014-07-08 18:02 ` [PATCH v4 003/100] nfsd: Ensure stateids remain unique until they are freed Jeff Layton
2014-07-10 11:23 ` Christoph Hellwig
2014-07-10 12:43 ` Jeff Layton
2014-07-14 16:45 ` Jeff Layton
2014-07-15 7:50 ` Christoph Hellwig
2014-07-08 18:02 ` [PATCH v4 004/100] nfsd: Avoid taking state_lock while holding inode lock in nfsd_break_one_deleg Jeff Layton
2014-07-08 18:02 ` [PATCH v4 005/100] nfsd: Move the delegation reference counter into the struct nfs4_stid Jeff Layton
2014-07-10 11:28 ` Christoph Hellwig
2014-07-08 18:02 ` [PATCH v4 006/100] nfsd4: use cl_lock to synchronize all stateid idr calls Jeff Layton
2014-07-10 11:32 ` Christoph Hellwig
2014-07-10 12:45 ` Jeff Layton
2014-07-08 18:02 ` [PATCH v4 007/100] nfsd: Add fine grained protection for the nfs4_file->fi_stateids list Jeff Layton
2014-07-10 11:33 ` Christoph Hellwig
2014-07-08 18:02 ` [PATCH v4 008/100] nfsd: Add a mutex to protect the NFSv4.0 open owner replay cache Jeff Layton
2014-07-08 18:02 ` [PATCH v4 009/100] nfsd: Add locking to the nfs4_file->fi_fds[] array Jeff Layton
2014-07-10 10:32 ` Christoph Hellwig
2014-07-08 18:02 ` [PATCH v4 010/100] nfsd: clean up helper __release_lock_stateid Jeff Layton
2014-07-08 18:02 ` [PATCH v4 011/100] nfsd: refactor nfs4_file_get_access and nfs4_file_put_access Jeff Layton
2014-07-10 7:59 ` Christoph Hellwig
2014-07-10 11:32 ` Jeff Layton
2014-07-10 11:35 ` Christoph Hellwig
2014-07-10 12:49 ` Jeff Layton
2014-07-10 13:01 ` Christoph Hellwig
2014-07-08 18:03 ` [PATCH v4 012/100] nfsd: remove nfs4_file_put_fd Jeff Layton
2014-07-10 8:03 ` Christoph Hellwig
2014-07-10 11:49 ` Jeff Layton
2014-07-10 12:05 ` Christoph Hellwig
2014-07-10 13:15 ` Jeff Layton
2014-07-08 18:03 ` [PATCH v4 013/100] nfsd: shrink st_access_bmap and st_deny_bmap Jeff Layton
2014-07-10 8:04 ` Christoph Hellwig
2014-07-10 10:50 ` Christoph Hellwig
2014-07-10 12:36 ` Jeff Layton
2014-07-08 18:03 ` [PATCH v4 014/100] nfsd: set stateid access and deny bits in nfs4_get_vfs_file Jeff Layton
2014-07-10 8:34 ` Christoph Hellwig
2014-07-10 15:05 ` Jeff Layton
2014-07-08 18:03 ` [PATCH v4 015/100] nfsd: clean up reset_union_bmap_deny Jeff Layton
2014-07-10 10:31 ` Christoph Hellwig
2014-07-10 12:19 ` Jeff Layton
2014-07-10 12:43 ` Christoph Hellwig
2014-07-10 13:16 ` Christoph Hellwig
2014-07-10 13:21 ` Jeff Layton
2014-07-10 16:20 ` J. Bruce Fields
2014-07-10 16:37 ` Jeff Layton
2014-07-08 18:03 ` [PATCH v4 016/100] nfsd: always hold the fi_lock when bumping fi_access refcounts Jeff Layton
2014-07-10 8:51 ` Christoph Hellwig
2014-07-10 12:20 ` Jeff Layton
2014-07-10 12:43 ` Christoph Hellwig
2014-07-08 18:03 ` Jeff Layton [this message]
2014-07-10 10:49 ` [PATCH v4 017/100] nfsd: make deny mode enforcement more efficient and close races in it Christoph Hellwig
2014-07-10 12:36 ` Jeff Layton
2014-07-10 12:45 ` Christoph Hellwig
2014-07-08 18:03 ` [PATCH v4 018/100] nfsd: cleanup and rename nfs4_check_open Jeff Layton
2014-07-10 10:51 ` Christoph Hellwig
2014-07-08 18:03 ` [PATCH v4 019/100] locks: add file_has_lease to prevent delegation break races Jeff Layton
2014-07-08 18:03 ` [PATCH v4 020/100] nfsd: nfs4_alloc_init_lease should take a nfs4_file arg Jeff Layton
2014-07-08 18:03 ` [PATCH v4 021/100] nfsd: Protect the nfs4_file delegation fields using the fi_lock Jeff Layton
2014-07-08 18:03 ` [PATCH v4 022/100] nfsd: Simplify stateid management Jeff Layton
2014-07-08 18:03 ` [PATCH v4 023/100] nfsd: Fix delegation revocation Jeff Layton
2014-07-08 18:03 ` [PATCH v4 024/100] nfsd: Add reference counting to the lock and open stateids Jeff Layton
2014-07-08 18:03 ` [PATCH v4 025/100] nfsd: Add a struct nfs4_file field to struct nfs4_stid Jeff Layton
2014-07-08 18:03 ` [PATCH v4 026/100] nfsd: Replace nfs4_ol_stateid->st_file with the st_stid.sc_file Jeff Layton
2014-07-08 18:03 ` [PATCH v4 027/100] nfsd: Ensure atomicity of stateid destruction and idr tree removal Jeff Layton
2014-07-08 18:03 ` [PATCH v4 028/100] nfsd: Cleanup the freeing of stateids Jeff Layton
2014-07-08 18:03 ` [PATCH v4 029/100] nfsd: do filp_close in sc_free callback for lock stateids Jeff Layton
2014-07-08 18:03 ` [PATCH v4 030/100] nfsd: Add locking to protect the state owner lists Jeff Layton
2014-07-08 18:03 ` [PATCH v4 031/100] nfsd: clean up races in lock stateid searching and creation Jeff Layton
2014-07-08 18:03 ` [PATCH v4 032/100] nfsd: Convert delegation counter to an atomic_long_t type Jeff Layton
2014-07-08 18:03 ` [PATCH v4 033/100] nfsd: Slight cleanup of find_stateid() Jeff Layton
2014-07-08 18:03 ` [PATCH v4 034/100] nfsd: ensure atomicity in nfsd4_free_stateid and nfsd4_validate_stateid Jeff Layton
2014-07-08 18:03 ` [PATCH v4 035/100] nfsd: Add reference counting to lock stateids Jeff Layton
2014-07-08 18:03 ` [PATCH v4 036/100] nfsd: nfsd4_locku() must reference the lock stateid Jeff Layton
2014-07-08 18:03 ` [PATCH v4 037/100] nfsd: Ensure that nfs4_open_delegation() references the delegation stateid Jeff Layton
2014-07-08 18:03 ` [PATCH v4 038/100] nfsd: nfsd4_process_open2() must reference " Jeff Layton
2014-07-08 18:03 ` [PATCH v4 039/100] nfsd: nfsd4_process_open2() must reference the open stateid Jeff Layton
2014-07-08 18:03 ` [PATCH v4 040/100] nfsd: Prepare nfsd4_close() for open stateid referencing Jeff Layton
2014-07-08 18:03 ` [PATCH v4 041/100] nfsd: nfsd4_open_confirm() must reference the open stateid Jeff Layton
2014-07-08 18:03 ` [PATCH v4 042/100] nfsd: Add reference counting to nfs4_preprocess_confirmed_seqid_op Jeff Layton
2014-07-08 18:03 ` [PATCH v4 043/100] nfsd: Migrate the stateid reference into nfs4_preprocess_seqid_op Jeff Layton
2014-07-08 18:03 ` [PATCH v4 044/100] nfsd: Migrate the stateid reference into nfs4_lookup_stateid() Jeff Layton
2014-07-08 18:03 ` [PATCH v4 045/100] nfsd: Migrate the stateid reference into nfs4_find_stateid_by_type() Jeff Layton
2014-07-08 18:03 ` [PATCH v4 046/100] nfsd: Add reference counting to state owners Jeff Layton
2014-07-08 18:03 ` [PATCH v4 047/100] nfsd: Keep a reference to the open stateid for the NFSv4.0 replay cache Jeff Layton
2014-07-08 18:03 ` [PATCH v4 048/100] nfsd: clean up lockowner refcounting when finding them Jeff Layton
2014-07-08 18:03 ` [PATCH v4 049/100] nfsd: add an operation for unhashing a stateowner Jeff Layton
2014-07-08 18:03 ` [PATCH v4 050/100] nfsd: Make lock stateid take a reference to the lockowner Jeff Layton
2014-07-08 18:03 ` [PATCH v4 051/100] nfsd: clean up refcounting for lockowners Jeff Layton
2014-07-08 18:03 ` [PATCH v4 052/100] nfsd: make openstateids hold references to their openowners Jeff Layton
2014-07-08 18:03 ` [PATCH v4 053/100] nfsd: don't allow CLOSE to proceed until refcount on stateid drops Jeff Layton
2014-07-08 18:03 ` [PATCH v4 054/100] nfsd: Protect adding/removing open state owners using client_lock Jeff Layton
2014-07-08 18:03 ` [PATCH v4 055/100] nfsd: Protect adding/removing lock " Jeff Layton
2014-07-08 18:03 ` [PATCH v4 056/100] nfsd: Move the open owner hash table into struct nfs4_client Jeff Layton
2014-07-08 18:03 ` [PATCH v4 057/100] nfsd: clean up and reorganize release_lockowner Jeff Layton
2014-07-08 18:03 ` [PATCH v4 058/100] nfsd: add locking to stateowner release Jeff Layton
2014-07-08 18:03 ` [PATCH v4 059/100] nfsd: optimize destroy_lockowner cl_lock thrashing Jeff Layton
2014-07-08 18:03 ` [PATCH v4 060/100] nfsd: close potential race in nfsd4_free_stateid Jeff Layton
2014-07-08 18:03 ` [PATCH v4 061/100] nfsd: reduce cl_lock thrashing in release_openowner Jeff Layton
2014-07-08 18:03 ` [PATCH v4 062/100] nfsd: don't thrash the cl_lock while freeing an open stateid Jeff Layton
2014-07-08 18:03 ` [PATCH v4 063/100] nfsd: Ensure struct nfs4_client is unhashed before we try to destroy it Jeff Layton
2014-07-08 18:03 ` [PATCH v4 064/100] nfsd: Ensure that the laundromat unhashes the client before releasing locks Jeff Layton
2014-07-08 18:03 ` [PATCH v4 065/100] nfsd: Don't require client_lock in free_client Jeff Layton
2014-07-08 18:03 ` [PATCH v4 066/100] nfsd: Move create_client() call outside the lock Jeff Layton
2014-07-08 18:03 ` [PATCH v4 067/100] nfsd: Protect unconfirmed client creation using client_lock Jeff Layton
2014-07-08 18:03 ` [PATCH v4 068/100] nfsd: Protect session creation and client confirm " Jeff Layton
2014-07-08 18:03 ` [PATCH v4 069/100] nfsd: Protect nfsd4_destroy_clientid " Jeff Layton
2014-07-08 18:03 ` [PATCH v4 070/100] nfsd: Ensure lookup_clientid() takes client_lock Jeff Layton
2014-07-08 18:03 ` [PATCH v4 071/100] nfsd: Add lockdep assertions to document the nfs4_client/session locking Jeff Layton
2014-07-08 18:04 ` [PATCH v4 072/100] nfsd: protect the close_lru list and oo_last_closed_stid with client_lock Jeff Layton
2014-07-08 18:04 ` [PATCH v4 073/100] nfsd: ensure that clp->cl_revoked list is protected by clp->cl_lock Jeff Layton
2014-07-08 18:04 ` [PATCH v4 074/100] nfsd: move unhash_client_locked call into mark_client_expired_locked Jeff Layton
2014-07-08 18:04 ` [PATCH v4 075/100] nfsd: don't destroy client if mark_client_expired_locked fails Jeff Layton
2014-07-08 18:04 ` [PATCH v4 076/100] nfsd: don't destroy clients that are busy Jeff Layton
2014-07-08 18:04 ` [PATCH v4 077/100] nfsd: protect clid and verifier generation with client_lock Jeff Layton
2014-07-08 18:04 ` [PATCH v4 078/100] nfsd: abstract out the get and set routines into the fault injection ops Jeff Layton
2014-07-08 18:04 ` [PATCH v4 079/100] nfsd: add a forget_clients "get" routine with proper locking Jeff Layton
2014-07-08 18:04 ` [PATCH v4 080/100] nfsd: add a forget_client set_clnt routine Jeff Layton
2014-07-08 18:04 ` [PATCH v4 081/100] nfsd: add nfsd_inject_forget_clients Jeff Layton
2014-07-08 18:04 ` [PATCH v4 082/100] nfsd: add a list_head arg to nfsd_foreach_client_lock Jeff Layton
2014-07-08 18:04 ` [PATCH v4 083/100] nfsd: add more granular locking to forget_locks fault injector Jeff Layton
2014-07-08 18:04 ` [PATCH v4 084/100] nfsd: add more granular locking to forget_openowners " Jeff Layton
2014-07-08 18:04 ` [PATCH v4 085/100] nfsd: add more granular locking to *_delegations fault injectors Jeff Layton
2014-07-08 18:04 ` [PATCH v4 086/100] nfsd: remove old fault injection infrastructure Jeff Layton
2014-07-08 18:04 ` [PATCH v4 087/100] nfsd: Remove nfs4_lock_state(): nfs4_preprocess_stateid_op() Jeff Layton
2014-07-08 18:04 ` [PATCH v4 088/100] nfsd: Remove nfs4_lock_state(): nfsd4_test_stateid/nfsd4_free_stateid Jeff Layton
2014-07-08 18:04 ` [PATCH v4 089/100] nfsd: Remove nfs4_lock_state(): nfsd4_release_lockowner Jeff Layton
2014-07-08 18:04 ` [PATCH v4 090/100] nfsd: Remove nfs4_lock_state(): nfsd4_lock/locku/lockt() Jeff Layton
2014-07-08 18:04 ` [PATCH v4 091/100] nfsd: Remove nfs4_lock_state(): nfsd4_open_downgrade + nfsd4_close Jeff Layton
2014-07-08 18:04 ` [PATCH v4 092/100] nfsd: Remove nfs4_lock_state(): nfsd4_delegreturn() Jeff Layton
2014-07-08 18:04 ` [PATCH v4 093/100] nfsd: Remove nfs4_lock_state(): nfsd4_open and nfsd4_open_confirm Jeff Layton
2014-07-08 18:04 ` [PATCH v4 094/100] nfsd: Remove nfs4_lock_state(): exchange_id, create/destroy_session() Jeff Layton
2014-07-08 18:04 ` [PATCH v4 095/100] nfsd: Remove nfs4_lock_state(): setclientid, setclientid_confirm, renew Jeff Layton
2014-07-08 18:04 ` [PATCH v4 096/100] nfsd: Remove nfs4_lock_state(): reclaim_complete() Jeff Layton
2014-07-08 18:04 ` [PATCH v4 097/100] nfsd: remove nfs4_lock_state: nfs4_laundromat Jeff Layton
2014-07-08 18:04 ` [PATCH v4 098/100] nfsd: remove nfs4_lock_state: nfs4_state_shutdown_net Jeff Layton
2014-07-08 18:04 ` [PATCH v4 099/100] nfsd: remove the client_mutex and the nfs4_lock/unlock_state wrappers Jeff Layton
2014-07-08 18:04 ` [PATCH v4 100/100] nfsd: add some comments to the nfsd4 object definitions Jeff Layton
2014-07-10 7:41 ` Christoph Hellwig
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1404842668-22521-18-git-send-email-jlayton@primarydata.com \
--to=jlayton@primarydata.com \
--cc=bfields@fieldses.org \
--cc=linux-nfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox