Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1430692yba; Thu, 4 Apr 2019 10:33:25 -0700 (PDT) X-Google-Smtp-Source: APXvYqxT8RsoBAUdisWQZ9Fw5jRl8JtzFPIUt27DyHWR5SLXXSSTIhNtQUQtrgVoZ9XCQowS0W4t X-Received: by 2002:a63:7c45:: with SMTP id l5mr7115843pgn.303.1554399205575; Thu, 04 Apr 2019 10:33:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554399205; cv=none; d=google.com; s=arc-20160816; b=b0VAUsgR78TIXtoGOlAGgDTMt5xjT/5Q1nJYsEb/Qpgo4O66AATUpkwebU2Ely35X7 LnIRg7IpLWYieEuf1dkjfp7MO3nmHwjXHMsF1e8HQ5cR90meBnO3AvTkhKitmuuMkNEH xJDupDQ1TEfLUKtTDihVMDDhCbqKnkff1t6ljK3t5NsFTGJWiDeWKGt4ULDSWRwtQhE6 NMW7k4XnQBlKtgaf/+6KlXJuFmxzK2MKc0bdfJkwGq9DFpoNXsn6/zW1uI2qM4/wCkud ZmHMnxnqZLi19oynYOvhIdCjuWcEXQdRkrrFLPjPlINebO095o/ZgXulpygrnhJoXs+E 5NyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=VHYV8p/wZ8qgZLSD2UvQm35BuJiVr6vpv5Yop8J+p2E=; b=r1prFvvWIB/MHSrmeZWSQU+gQmMFVFnbfrPDycGO8+xivg2vghifaZKD88nSPo1jqL bMowxoyDbmEd6d2+kUmcYgINq/NC2oCDH14TpM22px4xFQTv20zx+FcGdRhwAubec0M7 Amz4HhA5X7ostbYETgye6Eapz1A86BLxxb4A1x03MEUa0rHC0UlBsUCxvDvjXA50Aey2 x/FbTN3ORa5mX1EFV34T9XRLgTbPjTqSx3Knr3emNINEbyzv8fUD+jvEWD/b9/0scryx AhLFJw8ZjSJPRSiq4kUo09BaaVb4wOHLV8DJeBEx8lnDpOSTE6xqom5R3QUMAg+Gbgt+ 1iww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Zm5w50AW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 5si17410188pls.293.2019.04.04.10.33.09; Thu, 04 Apr 2019 10:33:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Zm5w50AW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728894AbfDDRcE (ORCPT + 99 others); Thu, 4 Apr 2019 13:32:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:57956 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727562AbfDDRcD (ORCPT ); Thu, 4 Apr 2019 13:32:03 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6DCF02075E; Thu, 4 Apr 2019 17:32:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554399122; bh=CmKh2tR/pTIuWm8wOShEfPZThUFcRz7Ow+2kNUxjfW8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Zm5w50AWXSBAW3GwsOw+zXcaZ0B0DoPHEpntVb8HrN08SzxwGERIF+O5/lZ6OuaEW P/5sJUpyzADJHwEEYGxLeHrs2NGBF77mfVbJsFUWkOevhanRdDqIP0s/N0TumimC11 vXRFMkveTB2bF4LzZajd7jFY+Q+gPotpdzRXamKY= Date: Thu, 4 Apr 2019 19:32:00 +0200 From: "gregkh@linuxfoundation.org" To: Slavomir Kaslev Cc: "linux-kernel@vger.kernel.org" , "torvalds@linux-foundation.org" , "sashal@kernel.org" , "stable@vger.kernel.org" , "rostedt@goodmis.org" Subject: Re: [PATCH 5.0 047/246] fs: Make splice() and tee() take into account O_NONBLOCK flag on pipes Message-ID: <20190404173200.GB29613@kroah.com> References: <20190404084619.236418459@linuxfoundation.org> <20190404084620.671108728@linuxfoundation.org> <3fa8b886ccb1ea2229344091be9ac769021f69a4.camel@vmware.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3fa8b886ccb1ea2229344091be9ac769021f69a4.camel@vmware.com> User-Agent: Mutt/1.11.4 (2019-03-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 04, 2019 at 04:16:57PM +0000, Slavomir Kaslev wrote: > On Thu, 2019-04-04 at 10:45 +0200, Greg Kroah-Hartman wrote: > > 5.0-stable review patch. If anyone has any objections, please let me > > know. > > > > ------------------ > > > > [ Upstream commit ee5e001196d1345b8fee25925ff5f1d67936081e ] > > > > The current implementation of splice() and tee() ignores O_NONBLOCK > > set > > on pipe file descriptors and checks only the SPLICE_F_NONBLOCK flag > > for > > blocking on pipe arguments. This is inconsistent since splice()-ing > > from/to non-pipe file descriptors does take O_NONBLOCK into > > consideration. > > > > Fix this by promoting O_NONBLOCK, when set on a pipe, to > > SPLICE_F_NONBLOCK. > > [...] > > > This change does have potential of breaking users who don't expect > > EAGAIN from splice() when SPLICE_F_NONBLOCK is not set. OTOH > > programs > > that set O_NONBLOCK and don't anticipate EAGAIN are arguably > > buggy[2]. > > Hi Greg, > > Can you drop this one from the stable queues? We discussed it with > Sasha[1] already in the autosel patches thread. > > [1] https://lkml.org/lkml/2019/4/3/811 Dropped from everywhere now. Sasha, how did this still get in? greg k-h