From patchwork Wed Apr 17 18:39:55 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jeff Layton X-Patchwork-Id: 10905837 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 3E68817E0 for ; Wed, 17 Apr 2019 18:40:04 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 273C328721 for ; Wed, 17 Apr 2019 18:40:04 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 16627287A2; Wed, 17 Apr 2019 18:40:04 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.0 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id C017828721 for ; Wed, 17 Apr 2019 18:40:03 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732524AbfDQSkC (ORCPT ); Wed, 17 Apr 2019 14:40:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:40996 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728373AbfDQSkC (ORCPT ); Wed, 17 Apr 2019 14:40:02 -0400 Received: from tleilax.poochiereds.net (cpe-71-70-156-158.nc.res.rr.com [71.70.156.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1183920693; Wed, 17 Apr 2019 18:40:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555526401; bh=WYsvpcsuKdRq8rj1wz9LIwRMCBBgrAQSaFSHjL1Qdbk=; h=From:To:Cc:Subject:Date:From; b=tF0gVCRIYkLZzTx/nwfp2Ip8jo5echePdDR2SITAz8eQyTlH5BM/YaBYeCTOf+0R1 R4KfGwe9q1t7IZYzPVtPgAr+ti7+PPafeRqU5ffF0Xqko+PJt2jRhwFYvZTNWQb7HV ZMSz7TOZzFzyxcd0uHshFYyjSjJyEuaqnEr+yQhc= From: Jeff Layton To: zyan@redhat.com, sage@redhat.com, idryomov@gmail.com Cc: ceph-devel@vger.kernel.org, bengland@redhat.com Subject: [PATCH v2 0/4] ceph: dentry->d_name handing fixes Date: Wed, 17 Apr 2019 14:39:55 -0400 Message-Id: <20190417183959.11296-1-jlayton@kernel.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Sender: ceph-devel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: ceph-devel@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP I've sent variants of a couple of these patches individually, but needed to respin at least one of them, and found a couple of other similar bugs in other places. The first two patches in this series should fix the oops that Ben England hit while testing. The next fixes another, similar bug when calculating the dentry hash. The final one fixes a problem that Zheng pointed out. I've marked the first 3 for stable, but I'm not sure whether the 4th needs to go there as of yet. Jeff Layton (4): ceph: always clone dentry name when building MDS request ceph: use pathlen values returned by set_request_path_attr ceph: ensure d_name stability in ceph_dentry_hash ceph: handle the case where a dentry has been renamed on outstanding req fs/ceph/dir.c | 6 +++++- fs/ceph/inode.c | 17 ++++++++++++++++- fs/ceph/mds_client.c | 44 ++++++++++++++++++++++++++++++++++---------- 3 files changed, 55 insertions(+), 12 deletions(-)