Andrew Elble 7fc0564e3a nfsd: fix race with open / open upgrade stateids
We observed multiple open stateids on the server for files that
seemingly should have been closed.

nfsd4_process_open2() tests for the existence of a preexisting
stateid. If one is not found, the locks are dropped and a new
one is created. The problem is that init_open_stateid(), which
is also responsible for hashing the newly initialized stateid,
doesn't check to see if another open has raced in and created
a matching stateid. This fix is to enable init_open_stateid() to
return the matching stateid and have nfsd4_process_open2()
swap to that stateid and switch to the open upgrade path.
In testing this patch, coverage to the newly created
path indicates that the race was indeed happening.

Signed-off-by: Andrew Elble <aweits@rit.edu>
Reviewed-by: Jeff Layton <jlayton@poochiereds.net>
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
2015-11-10 09:29:45 -05:00
..
2014-07-08 17:14:27 -04:00
2014-08-17 12:00:12 -04:00
2015-02-05 14:35:18 +01:00
2015-07-20 14:58:46 -04:00
2015-07-20 14:58:46 -04:00
2015-08-13 10:26:24 -04:00
2015-04-21 16:16:02 -04:00
2015-02-16 11:43:13 -05:00
2015-02-02 18:09:43 +01:00