Re: [PATCH 1/3] Add network context to struct nfs_client and makeNFSv3 use it.

From: Rob Landley
Date: Fri Apr 08 2011 - 09:30:11 EST

On 04/04/2011 09:52 PM, Serge E. Hallyn wrote:
> Quoting Rob Landley (rlandley@xxxxxxxxxxxxx):
>> From: Rob Landley <rlandley@xxxxxxxxxxxxx>
>> This patch:
>> Adds struct net *cl_net to struct nfs_client.
>> Intializes it from mount process context.
>> Copies it down through nfs_client_initdata and similar.
>> Replaces existing init_net uses with cl_net.
>> Adds net_eq() checks to nfs_match_client() and nfs_compare_super_address().
>> Remount copies the existing network context rather than any associated with
>> the new mount process. NFSv4 is still using init_net. Reference counting
>> for struct net follows the struct nfs_client object lifetimes (pinned by
>> task context outside of that).
>> Signed-off-by: Rob Landley <rlandley@xxxxxxxxxxxxx>
> Sorry for the delay. Took me two long readings to feel like I've got
> it.
> Acked-by: Serge Hallyn <serge.hallyn@xxxxxxxxxx>
> Do you have any testcases coded up for this?

Not coded up, just stuff I ran from the command line, as described in
the 0/3 patch:

Here's a blog entry describing the two different types of test cases in
more detail:

The "occlusion" test case (which can only reach an IP address from one
network context because a local interface intercepts it otherwise, and
prevents it from routing out) works fine, and filtering at the NFS
server (giving different source IP addresses different NFS flags, such
as making it read only for one and read/write for another) worked fine
for me too.

The "redirection" test case (where the same IP address routes out from
both contexts, but reaches different destinations) seems to screw up the
Linux arp cache or something, so that the _host_ can no longer access
that address for a bit once the container has done so (and vice versa).
But that doesn't seem to be an NFS-specific issue, or a new bug I
introduced. (I'm still working on that one, it's obscure, reproducible,
and confusing. But these patches don't make it worse, so...)

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at
Please read the FAQ at