This fault injection hook causes all SEQUENCE operation replies to have the SEQ4_STATUS_CB_PATH_DOWN flag set until the client calls BIND_CONN_TO_SESSION or creates a new session. Signed-off-by: Weston Andros Adamson <dros@xxxxxxxxxx> --- fs/nfsd/fault_inject.c | 4 ++++ fs/nfsd/fault_inject.h | 2 ++ fs/nfsd/nfs4state.c | 20 ++++++++++++++++++++ 3 files changed, 26 insertions(+), 0 deletions(-) diff --git a/fs/nfsd/fault_inject.c b/fs/nfsd/fault_inject.c index e6c3815..ab81144 100644 --- a/fs/nfsd/fault_inject.c +++ b/fs/nfsd/fault_inject.c @@ -38,6 +38,10 @@ static struct nfsd_fault_inject_op inject_ops[] = { .file = "recall_delegations", .func = nfsd_recall_delegations, }, + { + .file = "kill_backchannel", + .func = nfsd_kill_backchannel, + }, }; static long int NUM_INJECT_OPS = sizeof(inject_ops) / sizeof(struct nfsd_fault_inject_op); diff --git a/fs/nfsd/fault_inject.h b/fs/nfsd/fault_inject.h index 90bd057..b058e03 100644 --- a/fs/nfsd/fault_inject.h +++ b/fs/nfsd/fault_inject.h @@ -15,6 +15,7 @@ void nfsd_forget_locks(u64); void nfsd_forget_openowners(u64); void nfsd_forget_delegations(u64); void nfsd_recall_delegations(u64); +void nfsd_kill_backchannel(u64); #else /* CONFIG_NFSD_FAULT_INJECTION */ static inline int nfsd_fault_inject_init(void) { return 0; } static inline void nfsd_fault_inject_cleanup(void) {} @@ -23,6 +24,7 @@ static inline void nfsd_forget_locks(u64 num) {} static inline void nfsd_forget_openowners(u64 num) {} static inline void nfsd_forget_delegations(u64 num) {} static inline void nfsd_recall_delegations(u64 num) {} +static inline void nfsd_kill_backchannel(u64 num) {} #endif /* CONFIG_NFSD_FAULT_INJECTION */ #endif /* LINUX_NFSD_FAULT_INJECT_H */ diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c index 21266c7..9afc902 100644 --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c @@ -4737,6 +4737,26 @@ void nfsd_recall_delegations(u64 num) printk(KERN_INFO "NFSD: Recalled %d delegations", count); } +/* + * Force SEQUENCE operations to have SEQ4_STATUS_CB_PATH_DOWN flag set + * until backchannel is reestablished by BIND_CONN_TO_SESSION or + * DESTROY_SESSION/CREATE_SESSION with SP4_NONE. + * + * The argument 'num' is ignored, any value will trigger the fault on + * all clients. + */ +void nfsd_kill_backchannel(u64 num) +{ + struct nfs4_client *clp, *next; + + nfs4_lock_state(); + list_for_each_entry_safe(clp, next, &client_lru, cl_lru) { + clp->cl_cb_state = NFSD4_CB_DOWN; + } + nfs4_unlock_state(); + + printk(KERN_INFO "NFSD: killed backchannel"); +} #endif /* CONFIG_NFSD_FAULT_INJECTION */ /* initialization to perform at module load time: */ -- 1.7.4.4 -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html