Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2993917imu; Mon, 19 Nov 2018 09:06:35 -0800 (PST) X-Google-Smtp-Source: AJdET5dTuUjmHdrBRNcFkZmRdzq+EM729cFl/Yr/vidi57raJtIOYUWfI8bSAyEIX3RDJE+zttpW X-Received: by 2002:a62:a1a:: with SMTP id s26mr2477251pfi.31.1542647195186; Mon, 19 Nov 2018 09:06:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542647195; cv=none; d=google.com; s=arc-20160816; b=aiazrTYJ7J2hps5UQFpxjQLlL6fppQQALepCtjk825on0nza3fTawk8VJE2j9mBT4S 6Jw0WHbKX+Ckv6rvzSp6TeFLQdXmQc2fQRzcGn1KXEAubDXrWzQhr+oPRpt0Ktr21CO+ 84GsFWlTNrEkBKdz9+UxJIGLwAuTCuduNP4RrTVGnp17i/xF1oTI3/GHk0S/CfHfnUbu nxKOrmfkgKrSwvxv2gbpvPNyHxaswCQt8f27aMiTWbfT7BsHh4OMGtpIQS9tq1lKBuJL ROASEucIDS/tt/kPVXdCmblbB6OwfwDIdH1051fsiif/mPVeAAX+ZuUxtd08SC7+rFTA o0Dg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=lYqp1RAAvtC0J5NvsjNj19ZByNinANUf1F1WlqYeu+Q=; b=X9SU9m0MLQ6SoNbqJxIh2rBoJpzHffvaNxGQxNmIJqd49iF6WtyYP8xklSnsTokuDj XAAQ0wN99SzfdcVMRpB5jrOAAoeTk1xKERTQexjWzN3n7snbFSSnR+MJnvitvY47dfu+ y1UtpGXSARdZWfg+hZiYYYo6am/yOX6KDaH2+EH/RsvGXzYqU3/Sutc8U/65F5bQXP8c gxhWKPJYRDTAnlmFloH5vfE2fR03Wzn5hByRxmBsby72PDIAQxy3rKu4JvSDkaNNspCV XWqINeIaNCm6KZMYUKBB3U8iv8n1vtD9t+NAhNwv3Cprj1YK1ue1FZF/o0lTVydHendE vu1w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QtAxfDZh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 28si18776848pgw.364.2018.11.19.09.06.19; Mon, 19 Nov 2018 09:06:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QtAxfDZh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2406182AbeKTD12 (ORCPT + 99 others); Mon, 19 Nov 2018 22:27:28 -0500 Received: from mail.kernel.org ([198.145.29.99]:41448 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2405145AbeKTD12 (ORCPT ); Mon, 19 Nov 2018 22:27:28 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BC47021508; Mon, 19 Nov 2018 17:03:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542646991; bh=HYqNMTK9ZkFFuWsFZPG6I4ZK1UQx3HO3S7WUee3qao0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QtAxfDZhbUdf2baYQ6w7i5vX3ksHfJD1o4E7yW7c0ZiImu9rFJXOsvDb2esxhzc6f fr7WdsPa9acQjc+4fDHZBnzuFKz2MO28jr8lCQXV+Aaj9vwXun2BEDXzJVnzS761nW pzqm4JKjYtAjlkN8RB3kE/6b/h6Fz2rzeeCVWm/I= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tang Junhui , Coly Li , Jens Axboe Subject: [PATCH 3.18 01/90] bcache: fix miss key refill->end in writeback Date: Mon, 19 Nov 2018 17:28:43 +0100 Message-Id: <20181119162620.834725892@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181119162620.585061184@linuxfoundation.org> References: <20181119162620.585061184@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Tang Junhui commit 2d6cb6edd2c7fb4f40998895bda45006281b1ac5 upstream. refill->end record the last key of writeback, for example, at the first time, keys (1,128K) to (1,1024K) are flush to the backend device, but the end key (1,1024K) is not included, since the bellow code: if (bkey_cmp(k, refill->end) >= 0) { ret = MAP_DONE; goto out; } And in the next time when we refill writeback keybuf again, we searched key start from (1,1024K), and got a key bigger than it, so the key (1,1024K) missed. This patch modify the above code, and let the end key to be included to the writeback key buffer. Signed-off-by: Tang Junhui Cc: stable@vger.kernel.org Signed-off-by: Coly Li Signed-off-by: Jens Axboe Signed-off-by: Greg Kroah-Hartman --- drivers/md/bcache/btree.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/md/bcache/btree.c +++ b/drivers/md/bcache/btree.c @@ -2372,7 +2372,7 @@ static int refill_keybuf_fn(struct btree struct keybuf *buf = refill->buf; int ret = MAP_CONTINUE; - if (bkey_cmp(k, refill->end) >= 0) { + if (bkey_cmp(k, refill->end) > 0) { ret = MAP_DONE; goto out; }