From: Jeff Layton <jeff.layton@primarydata.com>
To: "J. Bruce Fields" <bfields@fieldses.org>
Cc: linux-nfs@vger.kernel.org
Subject: Re: [PATCH v3 004/114] nfsd: Avoid taking state_lock while holding inode lock in nfsd_break_one_deleg
Date: Thu, 3 Jul 2014 07:20:12 -0400 [thread overview]
Message-ID: <20140703072012.74b78c49@tlielax.poochiereds.net> (raw)
In-Reply-To: <20140702211424.GD11510@fieldses.org>
On Wed, 2 Jul 2014 17:14:24 -0400
"J. Bruce Fields" <bfields@fieldses.org> wrote:
> On Mon, Jun 30, 2014 at 11:48:33AM -0400, Jeff Layton wrote:
> > state_lock is a heavily contended global lock. We don't want to grab
> > that while simultaneously holding the inode->i_lock.
> >
> > Add a new per-nfs4_file lock that we can use to protect the
> > per-nfs4_file delegation list. Hold that while walking the list in the
> > break_deleg callback and queue the workqueue job for each one.
> >
> > The workqueue job can then take the state_lock and do the list
> > manipulations without the i_lock being held prior to starting the
> > rpc call.
>
> The code tends to assume that the callback thread only works with the
> delegation struct itself and puts it when done but doesn't otherwise
> touch other state.
>
> I wonder how this interacts with state shutdown....
>
> E.g. in nfs4_state_shutdown_net() we walk the dl_recall_lru and destroy
> everything we find, but this callback workqueue is still running so I
> think another delegation could get added to that list after this? Does
> that cause bugs?
>
I don't see what would prevent those bugs today and I'm unclear on why
you think this patch will make things worse. All this patch really does
is protect the dl_perfile list manipulations with a new per-nfs4_file
lock, and have it lock that when walking the perfile list. Then it has
the workqueue callback do the work of adding it to the del_recall_lru
list.
Why wouldn't you have the same problem if you do the queueing to the
LRU list in break_deleg codepath with the code as it is today?
That said, the delegation code is horribly complex so it's possible
I've missed something here.
> And it'd also be worth checking delegreturn and destroy_client.
>
> Maybe there's no bug, or they just need to flush the workqueue at the
> appropriate point.
>
> There's also a preexisting expire_client/laundromat vs break race:
>
> - expire_client/laundromat adds a delegation to its local
> reaplist using the same dl_recall_lru field that a delegation
> uses to track its position on the recall lru and drops the
> state lock.
>
> - a concurrent break_lease adds the delegation to the lru.
>
> - expire/client/laundromat then walks it reaplist and sees the
> lru head as just another delegation on the list....
>
> Possibly unrelated, but it might be good to fix that first.
>
> --b.
>
I was thinking that that would be fixed up in a later patch:
nfsd: Fix delegation revocation
...but now I'm not so sure. Once you drop the fi_lock, you could end up
with the race above.
Honestly, the locking around the delegation code is still a mess, even
with this series. I don't care much for the state_lock/recall_lock at
all. It seems like we ought to be able to do something more granular
there. Let me give it some thought -- maybe I can come up with a better
way to handle this.
> >
> > Signed-off-by: Trond Myklebust <trond.myklebust@primarydata.com>
> > Signed-off-by: Jeff Layton <jlayton@primarydata.com>
> > Reviewed-by: Christoph Hellwig <hch@lst.de>
> > ---
> > fs/nfsd/nfs4callback.c | 28 +++++++++++++++++++++-------
> > fs/nfsd/nfs4state.c | 43 ++++++++++++++++++++++++++++---------------
> > fs/nfsd/state.h | 2 ++
> > 3 files changed, 51 insertions(+), 22 deletions(-)
> >
> > diff --git a/fs/nfsd/nfs4callback.c b/fs/nfsd/nfs4callback.c
> > index 00cb9b7a75f6..cba4ca375f5e 100644
> > --- a/fs/nfsd/nfs4callback.c
> > +++ b/fs/nfsd/nfs4callback.c
> > @@ -43,7 +43,7 @@
> > #define NFSDDBG_FACILITY NFSDDBG_PROC
> >
> > static void nfsd4_mark_cb_fault(struct nfs4_client *, int reason);
> > -static void nfsd4_do_callback_rpc(struct work_struct *w);
> > +static void nfsd4_run_cb_null(struct work_struct *w);
> >
> > #define NFSPROC4_CB_NULL 0
> > #define NFSPROC4_CB_COMPOUND 1
> > @@ -764,7 +764,7 @@ static void do_probe_callback(struct nfs4_client *clp)
> >
> > cb->cb_ops = &nfsd4_cb_probe_ops;
> >
> > - INIT_WORK(&cb->cb_work, nfsd4_do_callback_rpc);
> > + INIT_WORK(&cb->cb_work, nfsd4_run_cb_null);
> >
> > run_nfsd4_cb(cb);
> > }
> > @@ -936,7 +936,7 @@ void nfsd4_shutdown_callback(struct nfs4_client *clp)
> > set_bit(NFSD4_CLIENT_CB_KILL, &clp->cl_flags);
> > /*
> > * Note this won't actually result in a null callback;
> > - * instead, nfsd4_do_callback_rpc() will detect the killed
> > + * instead, nfsd4_run_cb_null() will detect the killed
> > * client, destroy the rpc client, and stop:
> > */
> > do_probe_callback(clp);
> > @@ -1014,9 +1014,8 @@ static void nfsd4_process_cb_update(struct nfsd4_callback *cb)
> > run_nfsd4_cb(cb);
> > }
> >
> > -static void nfsd4_do_callback_rpc(struct work_struct *w)
> > +static void nfsd4_run_callback_rpc(struct nfsd4_callback *cb)
> > {
> > - struct nfsd4_callback *cb = container_of(w, struct nfsd4_callback, cb_work);
> > struct nfs4_client *clp = cb->cb_clp;
> > struct rpc_clnt *clnt;
> >
> > @@ -1034,6 +1033,22 @@ static void nfsd4_do_callback_rpc(struct work_struct *w)
> > cb->cb_ops, cb);
> > }
> >
> > +static void nfsd4_run_cb_null(struct work_struct *w)
> > +{
> > + struct nfsd4_callback *cb = container_of(w, struct nfsd4_callback,
> > + cb_work);
> > + nfsd4_run_callback_rpc(cb);
> > +}
> > +
> > +static void nfsd4_run_cb_recall(struct work_struct *w)
> > +{
> > + struct nfsd4_callback *cb = container_of(w, struct nfsd4_callback,
> > + cb_work);
> > +
> > + nfsd4_prepare_cb_recall(cb->cb_op);
> > + nfsd4_run_callback_rpc(cb);
> > +}
> > +
> > void nfsd4_cb_recall(struct nfs4_delegation *dp)
> > {
> > struct nfsd4_callback *cb = &dp->dl_recall;
> > @@ -1050,8 +1065,7 @@ void nfsd4_cb_recall(struct nfs4_delegation *dp)
> >
> > INIT_LIST_HEAD(&cb->cb_per_client);
> > cb->cb_done = true;
> > -
> > - INIT_WORK(&cb->cb_work, nfsd4_do_callback_rpc);
> > + INIT_WORK(&cb->cb_work, nfsd4_run_cb_recall);
> >
> > run_nfsd4_cb(&dp->dl_recall);
> > }
> > diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c
> > index b49b46b0ce23..461229a01963 100644
> > --- a/fs/nfsd/nfs4state.c
> > +++ b/fs/nfsd/nfs4state.c
> > @@ -513,7 +513,9 @@ hash_delegation_locked(struct nfs4_delegation *dp, struct nfs4_file *fp)
> > lockdep_assert_held(&state_lock);
> >
> > dp->dl_stid.sc_type = NFS4_DELEG_STID;
> > + spin_lock(&fp->fi_lock);
> > list_add(&dp->dl_perfile, &fp->fi_delegations);
> > + spin_unlock(&fp->fi_lock);
> > list_add(&dp->dl_perclnt, &dp->dl_stid.sc_client->cl_delegations);
> > }
> >
> > @@ -521,14 +523,18 @@ hash_delegation_locked(struct nfs4_delegation *dp, struct nfs4_file *fp)
> > static void
> > unhash_delegation(struct nfs4_delegation *dp)
> > {
> > + struct nfs4_file *fp = dp->dl_file;
> > +
> > spin_lock(&state_lock);
> > list_del_init(&dp->dl_perclnt);
> > - list_del_init(&dp->dl_perfile);
> > list_del_init(&dp->dl_recall_lru);
> > + spin_lock(&fp->fi_lock);
> > + list_del_init(&dp->dl_perfile);
> > + spin_unlock(&fp->fi_lock);
> > spin_unlock(&state_lock);
> > - if (dp->dl_file) {
> > - nfs4_put_deleg_lease(dp->dl_file);
> > - put_nfs4_file(dp->dl_file);
> > + if (fp) {
> > + nfs4_put_deleg_lease(fp);
> > + put_nfs4_file(fp);
> > dp->dl_file = NULL;
> > }
> > }
> > @@ -2612,6 +2618,7 @@ static void nfsd4_init_file(struct nfs4_file *fp, struct inode *ino)
> > lockdep_assert_held(&state_lock);
> >
> > atomic_set(&fp->fi_ref, 1);
> > + spin_lock_init(&fp->fi_lock);
> > INIT_LIST_HEAD(&fp->fi_stateids);
> > INIT_LIST_HEAD(&fp->fi_delegations);
> > ihold(ino);
> > @@ -2857,26 +2864,32 @@ out:
> > return ret;
> > }
> >
> > -static void nfsd_break_one_deleg(struct nfs4_delegation *dp)
> > +void nfsd4_prepare_cb_recall(struct nfs4_delegation *dp)
> > {
> > struct nfs4_client *clp = dp->dl_stid.sc_client;
> > struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
> >
> > - lockdep_assert_held(&state_lock);
> > + /*
> > + * We can't do this in nfsd_break_deleg_cb because it is
> > + * already holding inode->i_lock
> > + */
> > + spin_lock(&state_lock);
> > + if (list_empty(&dp->dl_recall_lru)) {
> > + dp->dl_time = get_seconds();
> > + list_add_tail(&dp->dl_recall_lru, &nn->del_recall_lru);
> > + }
> > + spin_unlock(&state_lock);
> > +}
> > +
> > +static void nfsd_break_one_deleg(struct nfs4_delegation *dp)
> > +{
> > /* We're assuming the state code never drops its reference
> > * without first removing the lease. Since we're in this lease
> > * callback (and since the lease code is serialized by the kernel
> > * lock) we know the server hasn't removed the lease yet, we know
> > * it's safe to take a reference: */
> > atomic_inc(&dp->dl_count);
> > -
> > - list_add_tail(&dp->dl_recall_lru, &nn->del_recall_lru);
> > -
> > - /* Only place dl_time is set; protected by i_lock: */
> > - dp->dl_time = get_seconds();
> > -
> > block_delegations(&dp->dl_fh);
> > -
> > nfsd4_cb_recall(dp);
> > }
> >
> > @@ -2901,11 +2914,11 @@ static void nfsd_break_deleg_cb(struct file_lock *fl)
> > */
> > fl->fl_break_time = 0;
> >
> > - spin_lock(&state_lock);
> > fp->fi_had_conflict = true;
> > + spin_lock(&fp->fi_lock);
> > list_for_each_entry(dp, &fp->fi_delegations, dl_perfile)
> > nfsd_break_one_deleg(dp);
> > - spin_unlock(&state_lock);
> > + spin_unlock(&fp->fi_lock);
> > }
> >
> > static
> > diff --git a/fs/nfsd/state.h b/fs/nfsd/state.h
> > index 9447f86f2778..7d6ba06c1abe 100644
> > --- a/fs/nfsd/state.h
> > +++ b/fs/nfsd/state.h
> > @@ -382,6 +382,7 @@ static inline struct nfs4_lockowner * lockowner(struct nfs4_stateowner *so)
> > /* nfs4_file: a file opened by some number of (open) nfs4_stateowners. */
> > struct nfs4_file {
> > atomic_t fi_ref;
> > + spinlock_t fi_lock;
> > struct hlist_node fi_hash; /* hash by "struct inode *" */
> > struct list_head fi_stateids;
> > struct list_head fi_delegations;
> > @@ -471,6 +472,7 @@ extern void nfsd4_cb_recall(struct nfs4_delegation *dp);
> > extern int nfsd4_create_callback_queue(void);
> > extern void nfsd4_destroy_callback_queue(void);
> > extern void nfsd4_shutdown_callback(struct nfs4_client *);
> > +extern void nfsd4_prepare_cb_recall(struct nfs4_delegation *dp);
> > extern void nfs4_put_delegation(struct nfs4_delegation *dp);
> > extern struct nfs4_client_reclaim *nfs4_client_to_reclaim(const char *name,
> > struct nfsd_net *nn);
> > --
> > 1.9.3
> >
--
Jeff Layton <jlayton@primarydata.com>
next prev parent reply other threads:[~2014-07-03 11:20 UTC|newest]
Thread overview: 151+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-06-30 15:48 [PATCH v3 000/114] nfsd: eliminate the client_mutex Jeff Layton
2014-06-30 15:48 ` [PATCH v3 001/114] nfsd: fix file access refcount leak when nfsd4_truncate fails Jeff Layton
2014-06-30 15:48 ` [PATCH v3 002/114] nfsd: Protect addition to the file_hashtbl Jeff Layton
2014-06-30 20:28 ` J. Bruce Fields
2014-06-30 20:32 ` Jeff Layton
2014-06-30 15:48 ` [PATCH v3 003/114] nfsd: wait to initialize work struct just prior to using it Jeff Layton
2014-07-08 21:11 ` J. Bruce Fields
2014-07-08 23:32 ` Jeff Layton
2014-07-09 8:21 ` Christoph Hellwig
2014-07-09 19:41 ` J. Bruce Fields
2014-07-09 20:37 ` Jeff Layton
2014-07-09 20:51 ` J. Bruce Fields
2014-07-10 7:40 ` Christoph Hellwig
2014-07-10 10:53 ` Christoph Hellwig
2014-07-10 13:23 ` Jeff Layton
2014-06-30 15:48 ` [PATCH v3 004/114] nfsd: Avoid taking state_lock while holding inode lock in nfsd_break_one_deleg Jeff Layton
2014-07-02 21:14 ` J. Bruce Fields
2014-07-03 11:20 ` Jeff Layton [this message]
2014-07-03 14:40 ` J. Bruce Fields
2014-06-30 15:48 ` [PATCH v3 005/114] nfsd: nfs4_preprocess_seqid_op should only set *stpp on success Jeff Layton
2014-06-30 15:48 ` [PATCH v3 006/114] nfsd: Cleanup nfs4svc_encode_compoundres Jeff Layton
2014-06-30 15:48 ` [PATCH v3 007/114] nfsd: declare v4.1+ openowners confirmed on creation Jeff Layton
2014-06-30 15:48 ` [PATCH v3 008/114] nfsd: clean up nfsd4_close_open_stateid Jeff Layton
2014-06-30 18:01 ` Christoph Hellwig
2014-06-30 15:48 ` [PATCH v3 009/114] nfsd: lock owners are not per open stateid Jeff Layton
2014-06-30 15:48 ` [PATCH v3 010/114] nfsd: Allow lockowners to hold several stateids Jeff Layton
2014-06-30 15:48 ` [PATCH v3 011/114] nfsd: NFSv4 lock-owners are not associated to a specific file Jeff Layton
2014-06-30 15:48 ` [PATCH v3 012/114] nfsd: clean up nfsd4_release_lockowner Jeff Layton
2014-06-30 18:02 ` Christoph Hellwig
2014-06-30 15:48 ` [PATCH v3 013/114] nfsd: Don't get a session reference without a client reference Jeff Layton
2014-06-30 15:48 ` [PATCH v3 014/114] nfsd: Cleanup - Let nfsd4_lookup_stateid() take a cstate argument Jeff Layton
2014-06-30 15:48 ` [PATCH v3 015/114] nfsd: Allow struct nfsd4_compound_state to cache the nfs4_client Jeff Layton
2014-06-30 18:03 ` Christoph Hellwig
2014-07-03 15:18 ` J. Bruce Fields
2014-07-03 15:20 ` Jeff Layton
2014-07-03 15:32 ` J. Bruce Fields
2014-07-03 15:37 ` Jeff Layton
2014-07-03 16:11 ` Christoph Hellwig
2014-07-03 16:28 ` Trond Myklebust
2014-07-03 19:07 ` Jeff Layton
2014-07-03 20:32 ` J. Bruce Fields
2014-07-03 21:35 ` J. Bruce Fields
2014-07-03 21:50 ` Jeff Layton
2014-07-03 22:31 ` Jeff Layton
2014-07-04 12:14 ` Jeff Layton
2014-07-07 18:23 ` J. Bruce Fields
2014-06-30 15:48 ` [PATCH v3 016/114] nfsd: Convert nfsd4_process_open1() to work with lookup_clientid() Jeff Layton
2014-06-30 15:48 ` [PATCH v3 017/114] nfsd: Always use lookup_clientid() in nfsd4_process_open1 Jeff Layton
2014-06-30 15:48 ` [PATCH v3 018/114] nfsd: Convert nfs4_check_open_reclaim() to work with lookup_clientid() Jeff Layton
2014-06-30 15:48 ` [PATCH v3 019/114] nfsd: Move the delegation reference counter into the struct nfs4_stid Jeff Layton
2014-06-30 15:48 ` [PATCH v3 020/114] nfsd4: use cl_lock to synchronize all stateid idr calls Jeff Layton
2014-06-30 15:48 ` [PATCH v3 021/114] nfsd: Add fine grained protection for the nfs4_file->fi_stateids list Jeff Layton
2014-06-30 15:48 ` [PATCH v3 022/114] nfsd: Add a mutex to protect the NFSv4.0 open owner replay cache Jeff Layton
2014-06-30 15:48 ` [PATCH v3 023/114] nfsd: Add locking to the nfs4_file->fi_fds[] array Jeff Layton
2014-06-30 15:48 ` [PATCH v3 024/114] nfsd: clean up helper __release_lock_stateid Jeff Layton
2014-06-30 15:48 ` [PATCH v3 025/114] nfsd: refactor nfs4_file_get_access and nfs4_file_put_access Jeff Layton
2014-06-30 15:48 ` [PATCH v3 026/114] nfsd: remove nfs4_file_put_fd Jeff Layton
2014-06-30 15:48 ` [PATCH v3 027/114] nfsd: shrink st_access_bmap and st_deny_bmap Jeff Layton
2014-07-01 10:51 ` Jeff Layton
2014-06-30 15:48 ` [PATCH v3 028/114] nfsd: set stateid access and deny bits in nfs4_get_vfs_file Jeff Layton
2014-06-30 15:48 ` [PATCH v3 029/114] nfsd: clean up reset_union_bmap_deny Jeff Layton
2014-06-30 15:48 ` [PATCH v3 030/114] nfsd: make deny mode enforcement more efficient and close races in it Jeff Layton
2014-06-30 15:49 ` [PATCH v3 031/114] nfsd: cleanup nfs4_check_open Jeff Layton
2014-06-30 15:49 ` [PATCH v3 032/114] locks: add file_has_lease to prevent delegation break races Jeff Layton
2014-06-30 15:49 ` [PATCH v3 033/114] nfsd: Protect the nfs4_file delegation fields using the fi_lock Jeff Layton
2014-06-30 15:49 ` [PATCH v3 034/114] nfsd: Simplify stateid management Jeff Layton
2014-06-30 15:49 ` [PATCH v3 035/114] nfsd: Fix delegation revocation Jeff Layton
2014-06-30 15:49 ` [PATCH v3 036/114] nfsd: Add reference counting to the lock and open stateids Jeff Layton
2014-06-30 15:49 ` [PATCH v3 037/114] nfsd: Add a struct nfs4_file field to struct nfs4_stid Jeff Layton
2014-06-30 15:49 ` [PATCH v3 038/114] nfsd: Replace nfs4_ol_stateid->st_file with the st_stid.sc_file Jeff Layton
2014-06-30 15:49 ` [PATCH v3 039/114] nfsd: Ensure stateids remain unique until they are freed Jeff Layton
2014-06-30 15:49 ` [PATCH v3 040/114] nfsd: Ensure atomicity of stateid destruction and idr tree removal Jeff Layton
2014-06-30 15:49 ` [PATCH v3 041/114] nfsd: Cleanup the freeing of stateids Jeff Layton
2014-06-30 15:49 ` [PATCH v3 042/114] nfsd: do filp_close in sc_free callback for lock stateids Jeff Layton
2014-06-30 15:49 ` [PATCH v3 043/114] nfsd: Add locking to protect the state owner lists Jeff Layton
2014-06-30 15:49 ` [PATCH v3 044/114] nfsd: clean up races in lock stateid searching and creation Jeff Layton
2014-06-30 15:49 ` [PATCH v3 045/114] nfsd: Convert delegation counter to an atomic_long_t type Jeff Layton
2014-06-30 15:49 ` [PATCH v3 046/114] nfsd: Slight cleanup of find_stateid() Jeff Layton
2014-06-30 15:49 ` [PATCH v3 047/114] nfsd: ensure atomicity in nfsd4_free_stateid and nfsd4_validate_stateid Jeff Layton
2014-06-30 15:49 ` [PATCH v3 048/114] nfsd: Add reference counting to lock stateids Jeff Layton
2014-06-30 15:49 ` [PATCH v3 049/114] nfsd: nfsd4_locku() must reference the lock stateid Jeff Layton
2014-06-30 15:49 ` [PATCH v3 050/114] nfsd: Ensure that nfs4_open_delegation() references the delegation stateid Jeff Layton
2014-06-30 15:49 ` [PATCH v3 051/114] nfsd: nfsd4_process_open2() must reference " Jeff Layton
2014-06-30 15:49 ` [PATCH v3 052/114] nfsd: nfsd4_process_open2() must reference the open stateid Jeff Layton
2014-06-30 15:49 ` [PATCH v3 053/114] nfsd: Prepare nfsd4_close() for open stateid referencing Jeff Layton
2014-06-30 15:49 ` [PATCH v3 054/114] nfsd: nfsd4_open_confirm() must reference the open stateid Jeff Layton
2014-06-30 15:49 ` [PATCH v3 055/114] nfsd: Add reference counting to nfs4_preprocess_confirmed_seqid_op Jeff Layton
2014-06-30 15:49 ` [PATCH v3 056/114] nfsd: Migrate the stateid reference into nfs4_preprocess_seqid_op Jeff Layton
2014-06-30 15:49 ` [PATCH v3 057/114] nfsd: Migrate the stateid reference into nfs4_lookup_stateid() Jeff Layton
2014-06-30 15:49 ` [PATCH v3 058/114] nfsd: Migrate the stateid reference into nfs4_find_stateid_by_type() Jeff Layton
2014-06-30 15:49 ` [PATCH v3 059/114] nfsd: Add reference counting to state owners Jeff Layton
2014-06-30 15:49 ` [PATCH v3 060/114] nfsd: Keep a reference to the open stateid for the NFSv4.0 replay cache Jeff Layton
2014-06-30 15:49 ` [PATCH v3 061/114] nfsd: clean up lockowner refcounting when finding them Jeff Layton
2014-06-30 15:49 ` [PATCH v3 062/114] nfsd: add an operation for unhashing a stateowner Jeff Layton
2014-06-30 15:49 ` [PATCH v3 063/114] nfsd: Make lock stateid take a reference to the lockowner Jeff Layton
2014-06-30 15:49 ` [PATCH v3 064/114] nfsd: clean up refcounting for lockowners Jeff Layton
2014-06-30 15:49 ` [PATCH v3 065/114] nfsd: make openstateids hold references to their openowners Jeff Layton
2014-06-30 15:49 ` [PATCH v3 066/114] nfsd: don't allow CLOSE to proceed until refcount on stateid drops Jeff Layton
2014-06-30 15:49 ` [PATCH v3 067/114] nfsd: Protect adding/removing open state owners using client_lock Jeff Layton
2014-06-30 15:49 ` [PATCH v3 068/114] nfsd: Protect adding/removing lock " Jeff Layton
2014-06-30 15:49 ` [PATCH v3 069/114] nfsd: Move the open owner hash table into struct nfs4_client Jeff Layton
2014-06-30 15:49 ` [PATCH v3 070/114] nfsd: clean up and reorganize release_lockowner Jeff Layton
2014-06-30 15:49 ` [PATCH v3 071/114] lockdep: add lockdep_assert_not_held Jeff Layton
2014-07-01 10:03 ` Peter Zijlstra
2014-07-01 10:11 ` Peter Zijlstra
2014-07-01 10:41 ` Jeff Layton
2014-07-01 11:07 ` Peter Zijlstra
2014-07-01 11:10 ` Jeff Layton
2014-06-30 15:49 ` [PATCH v3 072/114] nfsd: add locking to stateowner release Jeff Layton
2014-06-30 15:49 ` [PATCH v3 073/114] nfsd: optimize destroy_lockowner cl_lock thrashing Jeff Layton
2014-06-30 15:49 ` [PATCH v3 074/114] nfsd: close potential race in nfsd4_free_stateid Jeff Layton
2014-06-30 15:49 ` [PATCH v3 075/114] nfsd: reduce cl_lock thrashing in release_openowner Jeff Layton
2014-06-30 15:49 ` [PATCH v3 076/114] nfsd: don't thrash the cl_lock while freeing an open stateid Jeff Layton
2014-06-30 15:49 ` [PATCH v3 077/114] nfsd: Ensure struct nfs4_client is unhashed before we try to destroy it Jeff Layton
2014-06-30 15:49 ` [PATCH v3 078/114] nfsd: Ensure that the laundromat unhashes the client before releasing locks Jeff Layton
2014-06-30 15:49 ` [PATCH v3 079/114] nfsd: Don't require client_lock in free_client Jeff Layton
2014-06-30 15:49 ` [PATCH v3 080/114] nfsd: Move create_client() call outside the lock Jeff Layton
2014-06-30 15:49 ` [PATCH v3 081/114] nfsd: Protect unconfirmed client creation using client_lock Jeff Layton
2014-06-30 15:49 ` [PATCH v3 082/114] nfsd: Protect session creation and client confirm " Jeff Layton
2014-06-30 15:49 ` [PATCH v3 083/114] nfsd: Protect nfsd4_destroy_clientid " Jeff Layton
2014-06-30 15:49 ` [PATCH v3 084/114] nfsd: Ensure lookup_clientid() takes client_lock Jeff Layton
2014-06-30 15:49 ` [PATCH v3 085/114] nfsd: Add lockdep assertions to document the nfs4_client/session locking Jeff Layton
2014-06-30 15:49 ` [PATCH v3 086/114] nfsd: protect the close_lru list and oo_last_closed_stid with client_lock Jeff Layton
2014-06-30 15:49 ` [PATCH v3 087/114] nfsd: ensure that clp->cl_revoked list is protected by clp->cl_lock Jeff Layton
2014-06-30 15:49 ` [PATCH v3 088/114] nfsd: move unhash_client_locked call into mark_client_expired_locked Jeff Layton
2014-06-30 15:49 ` [PATCH v3 089/114] nfsd: don't destroy client if mark_client_expired_locked fails Jeff Layton
2014-06-30 15:49 ` [PATCH v3 090/114] nfsd: don't destroy clients that are busy Jeff Layton
2014-06-30 15:50 ` [PATCH v3 091/114] nfsd: protect clid and verifier generation with client_lock Jeff Layton
2014-06-30 15:50 ` [PATCH v3 092/114] nfsd: abstract out the get and set routines into the fault injection ops Jeff Layton
2014-06-30 15:50 ` [PATCH v3 093/114] nfsd: add a forget_clients "get" routine with proper locking Jeff Layton
2014-06-30 15:50 ` [PATCH v3 094/114] nfsd: add a forget_client set_clnt routine Jeff Layton
2014-06-30 15:50 ` [PATCH v3 095/114] nfsd: add nfsd_inject_forget_clients Jeff Layton
2014-06-30 15:50 ` [PATCH v3 096/114] nfsd: add a list_head arg to nfsd_foreach_client_lock Jeff Layton
2014-06-30 15:50 ` [PATCH v3 097/114] nfsd: add more granular locking to forget_locks fault injector Jeff Layton
2014-06-30 15:50 ` [PATCH v3 098/114] nfsd: add more granular locking to forget_openowners " Jeff Layton
2014-06-30 15:54 ` [PATCH v3 099/114] nfsd: add more granular locking to *_delegations fault injectors Jeff Layton
2014-06-30 15:54 ` [PATCH v3 100/114] nfsd: remove old fault injection infrastructure Jeff Layton
2014-06-30 15:54 ` [PATCH v3 101/114] nfsd: Remove nfs4_lock_state(): nfs4_preprocess_stateid_op() Jeff Layton
2014-06-30 15:54 ` [PATCH v3 102/114] nfsd: Remove nfs4_lock_state(): nfsd4_test_stateid/nfsd4_free_stateid Jeff Layton
2014-06-30 15:54 ` [PATCH v3 103/114] nfsd: Remove nfs4_lock_state(): nfsd4_release_lockowner Jeff Layton
2014-06-30 15:54 ` [PATCH v3 104/114] nfsd: Remove nfs4_lock_state(): nfsd4_lock/locku/lockt() Jeff Layton
2014-06-30 15:54 ` [PATCH v3 105/114] nfsd: Remove nfs4_lock_state(): nfsd4_open_downgrade + nfsd4_close Jeff Layton
2014-06-30 15:54 ` [PATCH v3 106/114] nfsd: Remove nfs4_lock_state(): nfsd4_delegreturn() Jeff Layton
2014-06-30 15:54 ` [PATCH v3 107/114] nfsd: Remove nfs4_lock_state(): nfsd4_open and nfsd4_open_confirm Jeff Layton
2014-06-30 15:54 ` [PATCH v3 108/114] nfsd: Remove nfs4_lock_state(): exchange_id, create/destroy_session() Jeff Layton
2014-06-30 15:54 ` [PATCH v3 109/114] nfsd: Remove nfs4_lock_state(): setclientid, setclientid_confirm, renew Jeff Layton
2014-06-30 15:54 ` [PATCH v3 110/114] nfsd: Remove nfs4_lock_state(): reclaim_complete() Jeff Layton
2014-06-30 15:54 ` [PATCH v3 111/114] nfsd: remove nfs4_lock_state: nfs4_laundromat Jeff Layton
2014-06-30 15:54 ` [PATCH v3 112/114] nfsd: remove nfs4_lock_state: nfs4_state_shutdown_net Jeff Layton
2014-06-30 15:55 ` [PATCH v3 113/114] nfsd: remove the client_mutex and the nfs4_lock/unlock_state wrappers Jeff Layton
2014-06-30 15:55 ` [PATCH v3 114/114] nfsd: add some comments to the nfsd4 object definitions Jeff Layton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140703072012.74b78c49@tlielax.poochiereds.net \
--to=jeff.layton@primarydata.com \
--cc=bfields@fieldses.org \
--cc=linux-nfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox