From patchwork Tue Dec 6 13:11:43 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jeff Layton X-Patchwork-Id: 30292 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:f944:0:0:0:0:0 with SMTP id q4csp2814295wrr; Tue, 6 Dec 2022 05:17:56 -0800 (PST) X-Google-Smtp-Source: AA0mqf4ZVRO6tQUVkPR5Npb/ESb1i82zv4UWSbxbN7G972nQD8JlWv7d46eLgmkr3z1o/RsJ0Ja9 X-Received: by 2002:a17:906:3493:b0:7c1:a0d:cb31 with SMTP id g19-20020a170906349300b007c10a0dcb31mr2669375ejb.399.1670332676617; Tue, 06 Dec 2022 05:17:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670332676; cv=none; d=google.com; s=arc-20160816; b=LJnfR6qbmARlW4aQJnZyaVKmfJ9xOG/4NkVT8hFpULXWuPODZ/f7C+WDFSOd6Bhn5E +8ofsz8xGK+4YVAJnOXPTeVUty3mldVk9OzPxoHBFmmNEcB85n8ui/8TxmOydMIPWV2P mmjPv7OwGQVaGMj+aeSLC9jihzNKAeXTPwoYwU9SLlPvAg6EdsbQ/VHhgkjHwuykmb6p 9Mn5I9n/VtpalnIMtkpSZCxcl/TzJ33ya76rR7cC2h6o/Wd+M88zE4Q16iAn5BlDiltN 21x4wSnmnLUIBL3vA1Op69jWakDpBq0ySrggaU3IYk9TDUkXCNyG49LVjpuD8zzU8Jpb jarQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:date:cc:to:from:subject :message-id:dkim-signature; bh=z2iTFHUH+mgNJKtjGam3c4/yYshITMmnfIyQ72V8jSk=; b=hNJHQ6KXCqcG4LqML98n/E0e+vSQn5dZfBnDGiENV6XJf0kV0wRXgUg0hemDqIgw5p uEfy1Zza121CpAO326rwskzamC6SL1E8L3rdHcn+BNfI5qsbXtlBMCzPuFeM8j6Vlw4L hZOG3HMYj1m53xhp11YYivjJHSStCCLrghUbcqK181f+pBwtSp1aSmbxuvcUMw2xp2tW GzmAxvwccNpLAc5phYcJaAZldBE3al9qz7lWxLT8IHdy51pdkyL78i9f+qVSmwLx+U0q rf05XON0GEdUiEdQpsmHkKNaI7KsRtU/9xxRkNv2xqUPmRe2Qc9hgWMoaEQeSPpFR6J8 pvqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=F5UWSOaE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gt13-20020a1709072d8d00b007b2a6aaff06si16773256ejc.50.2022.12.06.05.17.31; Tue, 06 Dec 2022 05:17:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=F5UWSOaE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230233AbiLFNMl (ORCPT + 99 others); Tue, 6 Dec 2022 08:12:41 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46002 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235438AbiLFNMU (ORCPT ); Tue, 6 Dec 2022 08:12:20 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3F6942C0; Tue, 6 Dec 2022 05:11:55 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id EE348B81974; Tue, 6 Dec 2022 13:11:53 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B76B1C433C1; Tue, 6 Dec 2022 13:11:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1670332312; bh=VVHMOEJUAAOA/RtsQv7QMpPJdj1/u6S3jZMKl5TJ8GI=; h=Subject:From:To:Cc:Date:From; b=F5UWSOaEDoHnHXcU43B6TM2774yeZtYXZDnrTEFERzcizLauw+q4z7w0sFjdCwgEM huAj5OJJFPWgQSasfmi4uSSS0OEX+Y/vxsmi7RfTQRerMNS7IXQxgC9+IHe2N0OqIZ bykRXwyVOVqRyoc2ZEZQLSZORUpf+x/W73Tp2mH5y4C+h+qTI4v1cI/UEl5NH7CyA3 KziTvZKgDn8+FDKW1SwLaWiaZj2iBzMLqBurHa2fwOVe++oPEQ7ja2MDh/VmYHn9OY l/sKhKiPELag18Tz4hheNehfCMFkjfrdaMTT5UjiZ1sVXJx2riaWScvR+0WdK7fEH+ a3gv6qN6lIAkQ== Message-ID: Subject: [GIT PULL] file locking changes for v6.2-rc1 From: Jeff Layton To: Linus Torvalds Cc: linux-cifs , ceph-devel , linux-nfs , Chuck Lever , linux-kernel , Al Viro , linux-fsdevel Date: Tue, 06 Dec 2022 08:11:43 -0500 User-Agent: Evolution 3.46.1 (3.46.1-1.fc37) MIME-Version: 1.0 X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1751470756595593315?= X-GMAIL-MSGID: =?utf-8?q?1751470756595593315?= The following changes since commit 094226ad94f471a9f19e8f8e7140a09c2625abaa: Linux 6.1-rc5 (2022-11-13 13:12:55 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jlayton/linux.git tags/locks-v6.2 for you to fetch changes up to f2f2494c8aa3cc317572c4674ef256005ebc092b: Add process name and pid to locks warning (2022-11-30 05:08:10 -0500) ---------------------------------------------------------------- The main change here is to add the new locks_inode_context helper, and convert all of the places that dereference inode->i_flctx directly to use that instead. There a new helper to indicate whether any locks are held on an inode. This is mostly for Ceph but may be usable elsewhere too. Andi Kleen requested that we print the PID when the LOCK_MAND warning fires, to help track down applications trying to use it. Finally, we added some new warnings to some of the file locking functions that fire when the ->fl_file and filp arguments differ. This helped us find some long-standing bugs in lockd. Patches for those are in Chuck Lever's tree and should be in his v6.2 PR. After that patch, people using NFSv2/v3 locking may see some warnings fire until those go in. Happy Holidays! ---------------------------------------------------------------- Andi Kleen (1): Add process name and pid to locks warning Jeff Layton (9): filelock: WARN_ON_ONCE when ->fl_file and filp don't match filelock: new helper: vfs_inode_has_locks filelock: add a new locks_inode_context accessor function ceph: use locks_inode_context helper cifs: use locks_inode_context helper ksmbd: use locks_inode_context helper lockd: use locks_inode_context helper nfs: use locks_inode_context helper nfsd: use locks_inode_context helper fs/ceph/locks.c | 4 ++-- fs/cifs/file.c | 2 +- fs/ksmbd/vfs.c | 2 +- fs/lockd/svcsubs.c | 4 ++-- fs/locks.c | 50 ++++++++++++++++++++++++++++++++++++++------------ fs/nfs/delegation.c | 2 +- fs/nfs/nfs4state.c | 2 +- fs/nfs/pagelist.c | 2 +- fs/nfs/write.c | 4 ++-- fs/nfsd/nfs4state.c | 6 +++--- include/linux/fs.h | 20 ++++++++++++++++++++ 11 files changed, 72 insertions(+), 26 deletions(-)