Received: by 10.192.165.148 with SMTP id m20csp563573imm; Fri, 4 May 2018 15:15:49 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqtUK1PhYAo6kJz6ekcc0YSkFagpdJ4ZBSihtj+jEWgphzP3eBIYDn1n9ppIjciz5WEJSz+ X-Received: by 2002:a17:902:24c7:: with SMTP id l7-v6mr30282529plg.320.1525472149845; Fri, 04 May 2018 15:15:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525472149; cv=none; d=google.com; s=arc-20160816; b=ssnusVpYrEIDoQx0KRKgXpif5CbWNS5juIvmylKM73iTVYdAsanKrY9WV55826HWft nYg/uTU81ex0oiW1cIZ8YTC/0P3vSXiQGb0dwVLN18OZh/luFkU2afBEvjoMIuXBBFoV CbeF7qt43hENOLIfmr7/ukaL7jlaKYkcfK/1Y87wnRPluZqPh8GkVk5nTGWP4G1awTQj ELzjdUkhKaioNK0JpSZoes/EIwwvF4nCX/XNacCxGuRoaGhUBx0f6BhLGlva8Z5hlBWE lBWVfqGSizCVhCOAARL1CGJmu9/IRKdOfdPRetCxZI2rKPN4o1TToF2ktUAkQdWKZ7Pc cBEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=4RwQip05HDQK9fehZe8DhqfFM6Sh7vZZ9medH3XmPhw=; b=qMFzKihXBeNxJYvGk6flS72eYLPxorR5OrV590kpB6pB1qH7NYHLNmuZEeBHGTvU7j HEaNTkaoXMa90kOsrZEHiIAkaNrPXd8zJ8/xr0cs29ImXE/Q/Q5u+9prYdMOVZptQanG 4ukaPc6yOtKAgc2ZvAc4T+luMuDyltSWHeb0+LKEdhp3cZstcFtViFRkpw4kTR+0rrae mdU5+q1WTe7hrP9QkHNfHEKXkpH6r0aLkyIUZJb79IGBFXsSqwTgyz7eQUloq/69ZDrW SyVcTZ/djNmJPJB1b9jYzVbmIrrC+u89qDdX48s7H6c16MA4TYJklEXHedVk5J6B06Ra OnqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Rm6omMRY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 74-v6si3656334pga.50.2018.05.04.15.15.35; Fri, 04 May 2018 15:15:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Rm6omMRY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751841AbeEDWPP (ORCPT + 99 others); Fri, 4 May 2018 18:15:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:56812 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751628AbeEDWPO (ORCPT ); Fri, 4 May 2018 18:15:14 -0400 Received: from localhost (c-67-169-218-210.hsd1.or.comcast.net [67.169.218.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BB6EC214D5; Fri, 4 May 2018 22:15:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1525472113; bh=0jFldx55b5nQ5RW0+VnpM0Cs9prNEQbDrj+cw2Q7xg0=; h=Date:From:To:Cc:Subject:From; b=Rm6omMRY5S+q7XEhYcOZzNntWW7W+s0BAHFnm+FIfu2xnFOx81NtwdZT5iqGo7EpU WAt4LpT+1y2iwY1PWgufSfXdI1z1A40RDhSVgCRPJNVDDDavc43pe5Uo32i0Q4GBIY kcXCvTjqMR4o9QvnElrDsJOespcPhY7BjBNBsRRw= Date: Fri, 4 May 2018 15:15:13 -0700 From: "Darrick J. Wong" To: Linus Torvalds Cc: "Darrick J. Wong" , Linux Kernel Mailing List , linux-xfs , Eric Sandeen Subject: [GIT PULL] xfs: more fixes for 4.17-rc4 Message-ID: <20180504221513.GT26569@magnolia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, I've got one more bug fix for xfs for 4.17-rc4, which caps the amount of data we try to handle in one dedupe request so that userspace can't livelock the kernel. This series has been run through a full xfstests run during the week and through a quick xfstests run against this morning's master, with no ajor failures reported. Let me know if there are any merge problems. --D The following changes since commit 7b38460dc8e4eafba06c78f8e37099d3b34d473c: xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE (2018-04-17 19:10:15 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git tags/xfs-4.17-fixes-2 for you to fetch changes up to 021ba8e98fe5c6691b3cc3669faafa02403aa211: xfs: cap the length of deduplication requests (2018-05-02 09:21:33 -0700) ---------------------------------------------------------------- Changes since last update: - Cap the maximum length of a deduplication request at MAX_RW_COUNT/2 to avoid kernel livelock due to excessively large IO requests. ---------------------------------------------------------------- Darrick J. Wong (1): xfs: cap the length of deduplication requests fs/xfs/xfs_file.c | 10 ++++++++++ 1 file changed, 10 insertions(+)