From: Kinglong Mee <kinglongmee-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> To: Jeff Layton <jeff.layton-7I+n7zu2hftEKMMhf/gKZA@public.gmane.org> Cc: "J. Bruce Fields" <bfields-uC3wQj2KruNg9hUCZPvPmw@public.gmane.org>, Linux NFS Mailing List <linux-nfs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>, Trond Myklebust <trond.myklebust-7I+n7zu2hftEKMMhf/gKZA@public.gmane.org>, linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, kinglongmee-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org Subject: Re: [PATCH 2/5 v3] locks: Copy all infomation for conflock Date: Sat, 16 Aug 2014 21:35:49 +0800 [thread overview] Message-ID: <53EF5E35.5090501@gmail.com> (raw) In-Reply-To: <53EE1A4E.1010707-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> On 8/15/2014 22:33, Kinglong Mee wrote: > On 8/15/2014 19:14, Jeff Layton wrote: >> On Fri, 15 Aug 2014 08:07:12 +0800 >> Kinglong Mee <kinglongmee-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> wrote: >> >>> Commit d5b9026a67 ([PATCH] knfsd: locks: flag NFSv4-owned locks) using >>> fl_lmops field in file_lock for checking nfsd4 lockowner. >>> >>> But, commit 1a747ee0cc (locks: don't call ->copy_lock methods on return >>> of conflicting locks) causes the fl_lmops of conflock always be NULL. >>> >>> Also, commit 0996905f93 (lockd: posix_test_lock() should not call >>> locks_copy_lock()) caused the fl_lmops of conflock always be NULL too. >>> >>> Make sure copy the private information by fl_copy_lock() in struct >>> file_lock_operations, merge __locks_copy_lock() to fl_copy_lock(). >>> >>> v3: Update based on Joe and Jeff's patch. >>> >>> Signed-off-by: Kinglong Mee <kinglongmee-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> >>> --- >>> fs/locks.c | 24 +++++++----------------- >>> include/linux/fs.h | 6 ------ >>> 2 files changed, 7 insertions(+), 23 deletions(-) >>> >>> diff --git a/fs/locks.c b/fs/locks.c >>> index cb66fb0..fe52abb 100644 >>> --- a/fs/locks.c >>> +++ b/fs/locks.c >>> @@ -281,33 +281,23 @@ static void locks_copy_private(struct file_lock *new, struct file_lock *fl) >>> /* >>> * Initialize a new lock from an existing file_lock structure. >>> */ >>> -void __locks_copy_lock(struct file_lock *new, const struct file_lock *fl) >>> +void locks_copy_lock(struct file_lock *new, struct file_lock *fl) >>> { >>> + /* "new" must be a freshly-initialized lock */ >>> + WARN_ON_ONCE(new->fl_ops); >>> + >>> new->fl_owner = fl->fl_owner; >>> new->fl_pid = fl->fl_pid; >>> - new->fl_file = NULL; >>> + new->fl_file = fl->fl_file; >>> new->fl_flags = fl->fl_flags; >>> new->fl_type = fl->fl_type; >>> new->fl_start = fl->fl_start; >>> new->fl_end = fl->fl_end; >>> new->fl_ops = NULL; >>> new->fl_lmops = NULL; >>> -} >>> -EXPORT_SYMBOL(__locks_copy_lock); >>> - >>> -void locks_copy_lock(struct file_lock *new, struct file_lock *fl) >>> -{ >>> - /* "new" must be a freshly-initialized lock */ >>> - WARN_ON_ONCE(new->fl_ops); >>> - >>> - __locks_copy_lock(new, fl); >>> - new->fl_file = fl->fl_file; >>> - new->fl_ops = fl->fl_ops; >>> - new->fl_lmops = fl->fl_lmops; >>> >>> locks_copy_private(new, fl); >>> } >>> - >>> EXPORT_SYMBOL(locks_copy_lock); >>> >>> static inline int flock_translate_cmd(int cmd) { >>> @@ -735,7 +725,7 @@ posix_test_lock(struct file *filp, struct file_lock *fl) >>> break; >>> } >>> if (cfl) { >>> - __locks_copy_lock(fl, cfl); >>> + locks_copy_lock(fl, cfl); >>> if (cfl->fl_nspid) >>> fl->fl_pid = pid_vnr(cfl->fl_nspid); >>> } else >>> @@ -941,7 +931,7 @@ static int __posix_lock_file(struct inode *inode, struct file_lock *request, str >>> if (!posix_locks_conflict(request, fl)) >>> continue; >>> if (conflock) >>> - __locks_copy_lock(conflock, fl); >>> + locks_copy_lock(conflock, fl); >>> error = -EAGAIN; >>> if (!(request->fl_flags & FL_SLEEP)) >>> goto out; >>> diff --git a/include/linux/fs.h b/include/linux/fs.h >>> index 908af4f..a383a30 100644 >>> --- a/include/linux/fs.h >>> +++ b/include/linux/fs.h >>> @@ -966,7 +966,6 @@ void locks_free_lock(struct file_lock *fl); >>> extern void locks_init_lock(struct file_lock *); >>> extern struct file_lock * locks_alloc_lock(void); >>> extern void locks_copy_lock(struct file_lock *, struct file_lock *); >>> -extern void __locks_copy_lock(struct file_lock *, const struct file_lock *); >>> extern void locks_remove_posix(struct file *, fl_owner_t); >>> extern void locks_remove_file(struct file *); >>> extern void locks_release_private(struct file_lock *); >>> @@ -1026,11 +1025,6 @@ static inline void locks_init_lock(struct file_lock *fl) >>> return; >>> } >>> >>> -static inline void __locks_copy_lock(struct file_lock *new, struct file_lock *fl) >>> -{ >>> - return; >>> -} >>> - >>> static inline void locks_copy_lock(struct file_lock *new, struct file_lock *fl) >>> { >>> return; >> >> I'm not sure this is really what you want to do. Calling fl_copy_lock >> for a conflock looks relatively harmless for nfs and nlm. AFS though >> seems to add the lock to a list associated with the inode. That seems a >> little suspicious for a conflock and could be problematic. It may be >> best to avoid dealing with fl_ops for a conflock. >> >> Also in the case of fcntl_getlk, the struct file_lock lives on the >> stack, and locks_release_private is never called on it. You'll need to >> audit all of the current callers of __locks_copy_lock to ensure that >> any resources you end up taking references on when copying the conflock >> are eventually released. > > Sorry for my no further think about it. > I will check that again next day. I think we should not change the logical of coping lock, leave fl_ops and fl_lmops as private data as right now. I have plan to, 1. move fl_owner assign from __locks_copy_lock() to locks_copy_private(), I think it should be a private data, am I right? 2. call locks_copy_private() coping private data specifically. a. add an argument for posix_test_lock() and __posix_lock_file() and etc, to point whether coping private data. b. hack the conflock's fl_flags to do the same thing as a, adds FL_NEED_PRIV fl_flags only valid for conflock. I don't think 2.a is a nice resolve, because it changes the interface and many caller don't care the private data (I think contains fl_owner) for conflock except nfsd. So, I'd like *2.b*. A draft is appended as following, thanks, Kinglong Mee ------------------snip-------------------------- diff --git a/fs/locks.c b/fs/locks.c index be1858e..5f0349d 100644 --- a/fs/locks.c +++ b/fs/locks.c @@ -282,6 +282,8 @@ static void locks_copy_private(struct file_lock *new, struct file_lock *fl) if (fl->fl_lmops) { if (fl->fl_lmops->lm_copy_owner) fl->fl_lmops->lm_copy_owner(new, fl); + else + new->fl_owner = fl->fl_owner; new->fl_lmops = fl->fl_lmops; } } @@ -291,7 +293,7 @@ static void locks_copy_private(struct file_lock *new, struct file_lock *fl) */ void __locks_copy_lock(struct file_lock *new, const struct file_lock *fl) { - new->fl_owner = fl->fl_owner; + new->fl_owner = NULL; new->fl_pid = fl->fl_pid; new->fl_file = NULL; new->fl_flags = fl->fl_flags; @@ -734,6 +736,7 @@ posix_test_lock(struct file *filp, struct file_lock *fl) { struct file_lock *cfl; struct inode *inode = file_inode(filp); + bool need_priv = !!(fl->fl_flags & FL_NEED_PRIV); spin_lock(&inode->i_lock); for (cfl = file_inode(filp)->i_flock; cfl; cfl = cfl->fl_next) { @@ -746,6 +749,8 @@ posix_test_lock(struct file *filp, struct file_lock *fl) __locks_copy_lock(fl, cfl); if (cfl->fl_nspid) fl->fl_pid = pid_vnr(cfl->fl_nspid); + if (need_priv) + locks_copy_private(fl, cfl); } else fl->fl_type = F_UNLCK; spin_unlock(&inode->i_lock); @@ -919,7 +924,7 @@ static int __posix_lock_file(struct inode *inode, struct file_lock *request, str struct file_lock *right = NULL; struct file_lock **before; int error; - bool added = false; + bool added = false, need_priv = false; LIST_HEAD(dispose); /* @@ -948,8 +953,12 @@ static int __posix_lock_file(struct inode *inode, struct file_lock *request, str continue; if (!posix_locks_conflict(request, fl)) continue; - if (conflock) + if (conflock) { + need_priv = !!(conflock->fl_flags & FL_NEED_PRIV); __locks_copy_lock(conflock, fl); + if (need_priv) + locks_copy_private(conflock, fl); + } error = -EAGAIN; if (!(request->fl_flags & FL_SLEEP)) goto out; diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c index 5076497..3db43f9 100644 --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c @@ -5275,6 +5275,7 @@ nfsd4_lock(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, goto out; } + conflock->fl_flags = FL_NEED_PRIV; err = vfs_lock_file(filp, F_SETLK, file_lock, conflock); switch (-err) { case 0: /* success! */ @@ -5396,7 +5397,7 @@ nfsd4_lockt(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, if (lo) file_lock->fl_owner = (fl_owner_t)lo; file_lock->fl_pid = current->tgid; - file_lock->fl_flags = FL_POSIX; + file_lock->fl_flags = FL_POSIX | FL_NEED_PRIV; file_lock->fl_start = lockt->lt_offset; file_lock->fl_end = last_byte_offset(lockt->lt_offset, lockt->lt_length); diff --git a/include/linux/fs.h b/include/linux/fs.h index 56f2acd..f257d0d 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -844,6 +844,7 @@ static inline struct file *get_file(struct file *f) #define FL_DOWNGRADE_PENDING 256 /* Lease is being downgraded */ #define FL_UNLOCK_PENDING 512 /* Lease is being broken */ #define FL_OFDLCK 1024 /* lock is "owned" by struct file */ +#define FL_NEED_PRIV 2048 /* Need copy private data from conflock */ /* * Special return value from posix_lock_file() and vfs_lock_file() for -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html
WARNING: multiple messages have this Message-ID (diff)
From: Kinglong Mee <kinglongmee@gmail.com> To: Jeff Layton <jeff.layton@primarydata.com> Cc: "J. Bruce Fields" <bfields@fieldses.org>, Linux NFS Mailing List <linux-nfs@vger.kernel.org>, Trond Myklebust <trond.myklebust@primarydata.com>, linux-fsdevel@vger.kernel.org, kinglongmee@gmail.com Subject: Re: [PATCH 2/5 v3] locks: Copy all infomation for conflock Date: Sat, 16 Aug 2014 21:35:49 +0800 [thread overview] Message-ID: <53EF5E35.5090501@gmail.com> (raw) In-Reply-To: <53EE1A4E.1010707@gmail.com> On 8/15/2014 22:33, Kinglong Mee wrote: > On 8/15/2014 19:14, Jeff Layton wrote: >> On Fri, 15 Aug 2014 08:07:12 +0800 >> Kinglong Mee <kinglongmee@gmail.com> wrote: >> >>> Commit d5b9026a67 ([PATCH] knfsd: locks: flag NFSv4-owned locks) using >>> fl_lmops field in file_lock for checking nfsd4 lockowner. >>> >>> But, commit 1a747ee0cc (locks: don't call ->copy_lock methods on return >>> of conflicting locks) causes the fl_lmops of conflock always be NULL. >>> >>> Also, commit 0996905f93 (lockd: posix_test_lock() should not call >>> locks_copy_lock()) caused the fl_lmops of conflock always be NULL too. >>> >>> Make sure copy the private information by fl_copy_lock() in struct >>> file_lock_operations, merge __locks_copy_lock() to fl_copy_lock(). >>> >>> v3: Update based on Joe and Jeff's patch. >>> >>> Signed-off-by: Kinglong Mee <kinglongmee@gmail.com> >>> --- >>> fs/locks.c | 24 +++++++----------------- >>> include/linux/fs.h | 6 ------ >>> 2 files changed, 7 insertions(+), 23 deletions(-) >>> >>> diff --git a/fs/locks.c b/fs/locks.c >>> index cb66fb0..fe52abb 100644 >>> --- a/fs/locks.c >>> +++ b/fs/locks.c >>> @@ -281,33 +281,23 @@ static void locks_copy_private(struct file_lock *new, struct file_lock *fl) >>> /* >>> * Initialize a new lock from an existing file_lock structure. >>> */ >>> -void __locks_copy_lock(struct file_lock *new, const struct file_lock *fl) >>> +void locks_copy_lock(struct file_lock *new, struct file_lock *fl) >>> { >>> + /* "new" must be a freshly-initialized lock */ >>> + WARN_ON_ONCE(new->fl_ops); >>> + >>> new->fl_owner = fl->fl_owner; >>> new->fl_pid = fl->fl_pid; >>> - new->fl_file = NULL; >>> + new->fl_file = fl->fl_file; >>> new->fl_flags = fl->fl_flags; >>> new->fl_type = fl->fl_type; >>> new->fl_start = fl->fl_start; >>> new->fl_end = fl->fl_end; >>> new->fl_ops = NULL; >>> new->fl_lmops = NULL; >>> -} >>> -EXPORT_SYMBOL(__locks_copy_lock); >>> - >>> -void locks_copy_lock(struct file_lock *new, struct file_lock *fl) >>> -{ >>> - /* "new" must be a freshly-initialized lock */ >>> - WARN_ON_ONCE(new->fl_ops); >>> - >>> - __locks_copy_lock(new, fl); >>> - new->fl_file = fl->fl_file; >>> - new->fl_ops = fl->fl_ops; >>> - new->fl_lmops = fl->fl_lmops; >>> >>> locks_copy_private(new, fl); >>> } >>> - >>> EXPORT_SYMBOL(locks_copy_lock); >>> >>> static inline int flock_translate_cmd(int cmd) { >>> @@ -735,7 +725,7 @@ posix_test_lock(struct file *filp, struct file_lock *fl) >>> break; >>> } >>> if (cfl) { >>> - __locks_copy_lock(fl, cfl); >>> + locks_copy_lock(fl, cfl); >>> if (cfl->fl_nspid) >>> fl->fl_pid = pid_vnr(cfl->fl_nspid); >>> } else >>> @@ -941,7 +931,7 @@ static int __posix_lock_file(struct inode *inode, struct file_lock *request, str >>> if (!posix_locks_conflict(request, fl)) >>> continue; >>> if (conflock) >>> - __locks_copy_lock(conflock, fl); >>> + locks_copy_lock(conflock, fl); >>> error = -EAGAIN; >>> if (!(request->fl_flags & FL_SLEEP)) >>> goto out; >>> diff --git a/include/linux/fs.h b/include/linux/fs.h >>> index 908af4f..a383a30 100644 >>> --- a/include/linux/fs.h >>> +++ b/include/linux/fs.h >>> @@ -966,7 +966,6 @@ void locks_free_lock(struct file_lock *fl); >>> extern void locks_init_lock(struct file_lock *); >>> extern struct file_lock * locks_alloc_lock(void); >>> extern void locks_copy_lock(struct file_lock *, struct file_lock *); >>> -extern void __locks_copy_lock(struct file_lock *, const struct file_lock *); >>> extern void locks_remove_posix(struct file *, fl_owner_t); >>> extern void locks_remove_file(struct file *); >>> extern void locks_release_private(struct file_lock *); >>> @@ -1026,11 +1025,6 @@ static inline void locks_init_lock(struct file_lock *fl) >>> return; >>> } >>> >>> -static inline void __locks_copy_lock(struct file_lock *new, struct file_lock *fl) >>> -{ >>> - return; >>> -} >>> - >>> static inline void locks_copy_lock(struct file_lock *new, struct file_lock *fl) >>> { >>> return; >> >> I'm not sure this is really what you want to do. Calling fl_copy_lock >> for a conflock looks relatively harmless for nfs and nlm. AFS though >> seems to add the lock to a list associated with the inode. That seems a >> little suspicious for a conflock and could be problematic. It may be >> best to avoid dealing with fl_ops for a conflock. >> >> Also in the case of fcntl_getlk, the struct file_lock lives on the >> stack, and locks_release_private is never called on it. You'll need to >> audit all of the current callers of __locks_copy_lock to ensure that >> any resources you end up taking references on when copying the conflock >> are eventually released. > > Sorry for my no further think about it. > I will check that again next day. I think we should not change the logical of coping lock, leave fl_ops and fl_lmops as private data as right now. I have plan to, 1. move fl_owner assign from __locks_copy_lock() to locks_copy_private(), I think it should be a private data, am I right? 2. call locks_copy_private() coping private data specifically. a. add an argument for posix_test_lock() and __posix_lock_file() and etc, to point whether coping private data. b. hack the conflock's fl_flags to do the same thing as a, adds FL_NEED_PRIV fl_flags only valid for conflock. I don't think 2.a is a nice resolve, because it changes the interface and many caller don't care the private data (I think contains fl_owner) for conflock except nfsd. So, I'd like *2.b*. A draft is appended as following, thanks, Kinglong Mee ------------------snip-------------------------- diff --git a/fs/locks.c b/fs/locks.c index be1858e..5f0349d 100644 --- a/fs/locks.c +++ b/fs/locks.c @@ -282,6 +282,8 @@ static void locks_copy_private(struct file_lock *new, struct file_lock *fl) if (fl->fl_lmops) { if (fl->fl_lmops->lm_copy_owner) fl->fl_lmops->lm_copy_owner(new, fl); + else + new->fl_owner = fl->fl_owner; new->fl_lmops = fl->fl_lmops; } } @@ -291,7 +293,7 @@ static void locks_copy_private(struct file_lock *new, struct file_lock *fl) */ void __locks_copy_lock(struct file_lock *new, const struct file_lock *fl) { - new->fl_owner = fl->fl_owner; + new->fl_owner = NULL; new->fl_pid = fl->fl_pid; new->fl_file = NULL; new->fl_flags = fl->fl_flags; @@ -734,6 +736,7 @@ posix_test_lock(struct file *filp, struct file_lock *fl) { struct file_lock *cfl; struct inode *inode = file_inode(filp); + bool need_priv = !!(fl->fl_flags & FL_NEED_PRIV); spin_lock(&inode->i_lock); for (cfl = file_inode(filp)->i_flock; cfl; cfl = cfl->fl_next) { @@ -746,6 +749,8 @@ posix_test_lock(struct file *filp, struct file_lock *fl) __locks_copy_lock(fl, cfl); if (cfl->fl_nspid) fl->fl_pid = pid_vnr(cfl->fl_nspid); + if (need_priv) + locks_copy_private(fl, cfl); } else fl->fl_type = F_UNLCK; spin_unlock(&inode->i_lock); @@ -919,7 +924,7 @@ static int __posix_lock_file(struct inode *inode, struct file_lock *request, str struct file_lock *right = NULL; struct file_lock **before; int error; - bool added = false; + bool added = false, need_priv = false; LIST_HEAD(dispose); /* @@ -948,8 +953,12 @@ static int __posix_lock_file(struct inode *inode, struct file_lock *request, str continue; if (!posix_locks_conflict(request, fl)) continue; - if (conflock) + if (conflock) { + need_priv = !!(conflock->fl_flags & FL_NEED_PRIV); __locks_copy_lock(conflock, fl); + if (need_priv) + locks_copy_private(conflock, fl); + } error = -EAGAIN; if (!(request->fl_flags & FL_SLEEP)) goto out; diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c index 5076497..3db43f9 100644 --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c @@ -5275,6 +5275,7 @@ nfsd4_lock(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, goto out; } + conflock->fl_flags = FL_NEED_PRIV; err = vfs_lock_file(filp, F_SETLK, file_lock, conflock); switch (-err) { case 0: /* success! */ @@ -5396,7 +5397,7 @@ nfsd4_lockt(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, if (lo) file_lock->fl_owner = (fl_owner_t)lo; file_lock->fl_pid = current->tgid; - file_lock->fl_flags = FL_POSIX; + file_lock->fl_flags = FL_POSIX | FL_NEED_PRIV; file_lock->fl_start = lockt->lt_offset; file_lock->fl_end = last_byte_offset(lockt->lt_offset, lockt->lt_length); diff --git a/include/linux/fs.h b/include/linux/fs.h index 56f2acd..f257d0d 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -844,6 +844,7 @@ static inline struct file *get_file(struct file *f) #define FL_DOWNGRADE_PENDING 256 /* Lease is being downgraded */ #define FL_UNLOCK_PENDING 512 /* Lease is being broken */ #define FL_OFDLCK 1024 /* lock is "owned" by struct file */ +#define FL_NEED_PRIV 2048 /* Need copy private data from conflock */ /* * Special return value from posix_lock_file() and vfs_lock_file() for
next prev parent reply other threads:[~2014-08-16 13:35 UTC|newest] Thread overview: 102+ messages / expand[flat|nested] mbox.gz Atom feed top 2014-07-07 14:12 [PATCH 2/4] NFSD: Rervert "knfsd: locks: flag NFSv4-owned locks" Kinglong Mee 2014-07-07 16:45 ` Jeff Layton 2014-07-08 2:30 ` Kinglong Mee 2014-07-07 17:26 ` Jeff Layton 2014-07-08 3:23 ` Kinglong Mee 2014-07-08 11:03 ` Jeff Layton 2014-07-08 12:26 ` Kinglong Mee 2014-07-08 12:39 ` Jeff Layton 2014-07-11 22:11 ` J. Bruce Fields 2014-08-02 14:45 ` [PATCH] fs/locks.c: Copy fl_lmops to conflock for nfsd using Kinglong Mee 2014-08-02 14:59 ` Trond Myklebust [not found] ` <53DCF97D.3000605-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-02 23:05 ` Jeff Layton 2014-08-02 23:05 ` Jeff Layton [not found] ` <20140802190505.442f07b8-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 2014-08-05 19:14 ` J. Bruce Fields 2014-08-05 19:14 ` J. Bruce Fields [not found] ` <20140805191458.GV23341-uC3wQj2KruNg9hUCZPvPmw@public.gmane.org> 2014-08-05 19:20 ` Jeff Layton 2014-08-05 19:20 ` Jeff Layton [not found] ` <53BAAAC5.9000106-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-06 13:33 ` [PATCH 1/3] NFSD: New FL_NFSD for marking file_lock belongs to NFSD Kinglong Mee 2014-08-06 13:33 ` Kinglong Mee [not found] ` <53E22EA5.70708-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-06 13:35 ` [PATCH 2/3] NFSD: Increase the reference of lockowner when coping file_lock Kinglong Mee 2014-08-06 13:35 ` Kinglong Mee [not found] ` <53E22F2C.8070900-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-06 13:38 ` [PATCH 3/3 RFC] fs/locks.c: Copy all infomation for conflock Kinglong Mee 2014-08-06 13:38 ` Kinglong Mee 2014-08-09 11:08 ` [PATCH 2/3] NFSD: Increase the reference of lockowner when coping file_lock Jeff Layton 2014-08-09 11:08 ` Jeff Layton [not found] ` <20140809070818.4d939a6a-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 2014-08-10 15:47 ` Kinglong Mee 2014-08-10 15:47 ` Kinglong Mee 2014-08-09 10:51 ` [PATCH 1/3] NFSD: New FL_NFSD for marking file_lock belongs to NFSD Jeff Layton [not found] ` <20140809065112.700e0ecc-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 2014-08-10 12:46 ` Kinglong Mee 2014-08-10 12:46 ` Kinglong Mee 2014-08-10 15:38 ` [PATCH 1/3 v2] fs/locks.c: Copy all information for conflock Kinglong Mee 2014-08-10 15:38 ` Kinglong Mee 2014-08-15 0:07 ` [PATCH 2/5 v3] locks: Copy all infomation " Kinglong Mee [not found] ` <53ED4F30.4060308-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-15 11:14 ` Jeff Layton 2014-08-15 11:14 ` Jeff Layton [not found] ` <20140815071450.498949d8-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 2014-08-15 14:33 ` Kinglong Mee 2014-08-15 14:33 ` Kinglong Mee [not found] ` <53EE1A4E.1010707-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-16 13:35 ` Kinglong Mee [this message] 2014-08-16 13:35 ` Kinglong Mee [not found] ` <53EF5E35.5090501-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-17 13:42 ` Kinglong Mee 2014-08-17 13:42 ` Kinglong Mee [not found] ` <53F0B13D.2040700-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-18 11:54 ` Jeff Layton 2014-08-18 11:54 ` Jeff Layton 2014-08-19 15:10 ` Kinglong Mee 2014-08-15 0:10 ` [PATCH 4/5 v3] NFSD: New helper nfs4_get_stateowner() for atomic_inc reference Kinglong Mee [not found] ` <53E791F1.40802-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-10 15:42 ` [PATCH 2/3 v2] fs/locks.c: New ops in file_lock_operations for copying/releasing owner Kinglong Mee 2014-08-10 15:42 ` Kinglong Mee 2014-08-10 15:43 ` [PATCH 3/3 v2] NFSD: Increase the reference of lockowner when coping file_lock Kinglong Mee 2014-08-10 15:43 ` Kinglong Mee [not found] ` <53E7933D.80504-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-11 16:46 ` Jeff Layton 2014-08-11 16:46 ` Jeff Layton [not found] ` <20140811124610.16f49168-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 2014-08-14 12:30 ` Kinglong Mee 2014-08-14 12:30 ` Kinglong Mee 2014-08-11 16:19 ` [PATCH 1/3 v2] fs/locks.c: Copy all information for conflock Jeff Layton 2014-08-11 16:19 ` Jeff Layton [not found] ` <20140811121949.4c3d7894-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 2014-08-11 16:25 ` Joe Perches 2014-08-11 16:25 ` Joe Perches 2014-08-14 12:59 ` Kinglong Mee 2014-08-14 12:59 ` Kinglong Mee 2014-08-14 12:26 ` Kinglong Mee 2014-08-14 12:26 ` Kinglong Mee 2014-08-14 14:00 ` Jeff Layton [not found] ` <20140814100025.2b2f72db-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 2014-08-14 14:04 ` Kinglong Mee 2014-08-14 14:04 ` Kinglong Mee 2014-08-15 0:02 ` [PATCH 1/5 v3] NFSD: Remove duplicate initialization of file_lock Kinglong Mee 2014-08-15 0:02 ` Kinglong Mee [not found] ` <53ED4E2F.2010701-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-15 10:57 ` Jeff Layton 2014-08-15 10:57 ` Jeff Layton [not found] ` <20140815065741.42f18ec9-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 2014-08-15 21:35 ` J. Bruce Fields 2014-08-15 21:35 ` J. Bruce Fields 2014-08-15 0:09 ` [PATCH 3/5 v3] locks: New ops in file_lock_operations for copy/release owner Kinglong Mee 2014-08-15 0:09 ` Kinglong Mee 2014-08-15 0:13 ` [PATCH 5/5 v3] NFSD: Increase the reference of lockowner when coping file_lock Kinglong Mee 2014-08-15 0:13 ` Kinglong Mee 2014-08-19 15:18 ` [PATCH 2/6 v4] locks: New ops in file_lock_operations for get/put owner Kinglong Mee [not found] ` <53F36AE2.7070507-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-19 19:42 ` Jeff Layton 2014-08-19 19:42 ` Jeff Layton 2014-08-19 15:21 ` [PATCH 3/6 v4] locks: Rename __locks_copy_lock() to locks_copy_conflock() Kinglong Mee 2014-08-19 19:46 ` Jeff Layton [not found] ` <53ED5093.6000308-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-19 15:16 ` [PATCH 1/6 v4] NFSD: Remove the duplicate initialize of file_lock Kinglong Mee 2014-08-19 15:16 ` Kinglong Mee 2014-08-19 15:24 ` [PATCH 4/6 v4] locks: Copy fl_lmops information for conflock in, locks_copy_conflock() Kinglong Mee 2014-08-19 15:24 ` Kinglong Mee 2014-08-19 20:08 ` Jeff Layton 2014-08-19 15:25 ` [PATCH 5/6 v4] NFSD: New helper nfs4_get_stateowner() for atomic_inc sop reference Kinglong Mee 2014-08-19 20:14 ` Jeff Layton 2014-08-19 15:26 ` [PATCH 6/6 v4] NFSD: Increase the reference of lockowner when coping file_lock Kinglong Mee 2014-08-20 9:51 ` [PATCH 1/6 v5] NFSD: Remove the duplicate initialize of file_lock Kinglong Mee [not found] ` <53F36CB5.2030707-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2014-08-19 20:23 ` [PATCH 6/6 v4] NFSD: Increase the reference of lockowner when coping file_lock Jeff Layton 2014-08-19 20:23 ` Jeff Layton 2014-08-19 20:24 ` J. Bruce Fields [not found] ` <20140819162344.269953bd-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 2014-08-20 10:02 ` Kinglong Mee 2014-08-20 10:02 ` Kinglong Mee 2014-08-20 9:53 ` [PATCH 2/6 v5] locks: Rename __locks_copy_lock() to locks_copy_conflock() Kinglong Mee 2014-08-20 9:53 ` Kinglong Mee 2014-08-20 9:54 ` [PATCH 3/6 v5] locks: New ops in file_lock_operations for get/put owner Kinglong Mee 2014-08-20 9:54 ` Kinglong Mee 2014-08-20 9:57 ` [PATCH 5/6 v5] NFSD: New helper nfs4_get_stateowner() for atomic_inc sop reference Kinglong Mee 2014-08-20 9:57 ` Kinglong Mee 2014-08-20 9:59 ` [PATCH 6/6 v5] NFSD: Get reference of lockowner when coping file_lock Kinglong Mee 2014-08-20 9:59 ` Kinglong Mee 2014-08-20 9:56 ` [PATCH 4/6 v5] locks: Copy fl_lmops information for conflock in locks_copy_conflock() Kinglong Mee
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=53EF5E35.5090501@gmail.com \ --to=kinglongmee-re5jqeeqqe8avxtiumwx3w@public.gmane.org \ --cc=bfields-uC3wQj2KruNg9hUCZPvPmw@public.gmane.org \ --cc=jeff.layton-7I+n7zu2hftEKMMhf/gKZA@public.gmane.org \ --cc=linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \ --cc=linux-nfs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \ --cc=trond.myklebust-7I+n7zu2hftEKMMhf/gKZA@public.gmane.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.