[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1452261014-1682-1-git-send-email-jeff.layton@primarydata.com>
Date: Fri, 8 Jan 2016 08:50:08 -0500
From: Jeff Layton <jlayton@...chiereds.net>
To: linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org
Cc: Dmitry Vyukov <dvyukov@...gle.com>,
"J. Bruce Fields" <bfields@...ldses.org>,
Alexander Viro <viro@...iv.linux.org.uk>,
syzkaller <syzkaller@...glegroups.com>,
Kostya Serebryany <kcc@...gle.com>,
Alexander Potapenko <glider@...gle.com>,
Sasha Levin <sasha.levin@...cle.com>,
Eric Dumazet <edumazet@...gle.com>
Subject: [PATCH v2 0/6] locks: better debugging and fix for setlk/close race handling
The first patch in this patchset fixes a very long-standing bug in the
handling of races between setlk and close. That one should be appropriate
for all stable kernels and should apply to most kernels as-is.
The second patch exempts OFD locks from setlk/close race handling since
they shouldn't need it anyway. The rest of the patches add some better
debugging for these problems and do a little function name cleanup.
I'm planning to go ahead and put these into linux-next today and send
them to Linus for the 4.5 merge, unless there are any objections...
Jeff Layton (6):
locks: fix unlock when fcntl_setlk races with a close
locks: don't check for race with close when setting OFD lock
locks: sprinkle some tracepoints around the file locking code
locks: pass inode pointer to locks_free_lock_context
locks: prink more detail when there are leaked locks
locks: rename __posix_lock_file to posix_lock_inode
fs/inode.c | 2 +-
fs/locks.c | 123 +++++++++++++++++++++++++++-------------
include/linux/fs.h | 4 +-
include/trace/events/filelock.h | 77 +++++++++++++++++++++++++
4 files changed, 165 insertions(+), 41 deletions(-)
--
2.5.0
Powered by blists - more mailing lists