Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp763486ybl; Fri, 6 Dec 2019 05:57:06 -0800 (PST) X-Google-Smtp-Source: APXvYqyIPW4LgkHeW7cJcVEMGTSADzrg8pcF8SFmVlSlqzF6zweb6cR3as0+3/OwKnebKsMqy85I X-Received: by 2002:aca:fd58:: with SMTP id b85mr12637877oii.106.1575640626815; Fri, 06 Dec 2019 05:57:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575640626; cv=none; d=google.com; s=arc-20160816; b=gc15biTiI1pYXBMuuVhnfpJ/LL8Kqs8zZVlAZ/L6lJ6wRwHSjpl+9R3nlUN5REYf06 ZXvaqPxXibLKUfwRzJab+JD5Gl+FN3E23lSqB/3PAP9NRmmRd/uT/aO4z6u8raJJ6xJg dWH+gVcXyEZpYd+hPgt0hDhTrvFFErYKNKS4bEsxXJJTmwnPGEfiJ938NIZA37EdUGel MPDfd73jnBv3cNtgHTKMJLAMMWxgC/zJX36OVnnsLNaqmV7qWIX1c1BQXtdhpaq82tN9 VfqdBvJ0NSzezBZZUAHwOFemRwiP7mDHDG70nO9u7qjxSzaSxpbYU+NHJqNB8a5M/bmW 1hqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :reply-to:message-id:subject:cc:to:from:date; bh=7S2LBqRHTNWbXQ3o2fBJZSPKSSbn17l+GmCkQQh2axE=; b=N2u/BXs+pD4lho/nLV5yE3KwCKCfmrQQKurllfz+kwzHFHTzuKs08sinG+xdhlqp5j ArtAsvN9sBjNuIiRdDZ0jeux7Dr/5Q+Qgj+8p9EwouPMT9iVcVJgKtEWUs95q0757elt +8+m9RtJ3rJVVj/FlOttUPBUf5Cb70wTw3lwoLjODgwd9bZSsMsGXVLH4b7Bt6PnvAQG K619CpviRY8mdspXds3PO42DnmEgl+FKdvtiHxqCP0pK4aoc3Yz2lqYT8PyUb6uujUtD XX8d3igqoEPhBE3JwmCIaEy6jC8rGzDDCw6wc+V6kL04EOY6fNTVQJ3CDxjcnk5EUurc Zm5g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d2si7052736oth.267.2019.12.06.05.56.55; Fri, 06 Dec 2019 05:57:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726691AbfLFN4M (ORCPT + 99 others); Fri, 6 Dec 2019 08:56:12 -0500 Received: from mx2.suse.de ([195.135.220.15]:42268 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726475AbfLFN4M (ORCPT ); Fri, 6 Dec 2019 08:56:12 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id C886FAB87; Fri, 6 Dec 2019 13:56:10 +0000 (UTC) Received: by ds.suse.cz (Postfix, from userid 10065) id 23E53DA7AA; Fri, 6 Dec 2019 14:56:05 +0100 (CET) Date: Fri, 6 Dec 2019 14:56:04 +0100 From: David Sterba To: David Howells Cc: torvalds@linux-foundation.org, ebiggers@kernel.org, viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 0/2] pipe: Fixes [ver #2] Message-ID: <20191206135604.GB2734@twin.jikos.cz> Reply-To: dsterba@suse.cz Mail-Followup-To: dsterba@suse.cz, David Howells , torvalds@linux-foundation.org, ebiggers@kernel.org, viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org References: <157558502272.10278.8718685637610645781.stgit@warthog.procyon.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <157558502272.10278.8718685637610645781.stgit@warthog.procyon.org.uk> User-Agent: Mutt/1.5.23.1-rc1 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Dec 05, 2019 at 10:30:22PM +0000, David Howells wrote: > David Howells (2): > pipe: Remove assertion from pipe_poll() > pipe: Fix missing mask update after pipe_wait() For reference, I've retested current master (b0d4beaa5a4b7d), that incldes the 2 pipe fixes, the test still hangs. The stack now points to pipe_wait but otherwise seems to be the same: [<0>] pipe_wait+0x72/0xc0 [<0>] pipe_write+0x217/0x4b0 [<0>] new_sync_write+0x11e/0x1c0 [<0>] vfs_write+0xc1/0x1d0 [<0>] kernel_write+0x2c/0x40 [<0>] send_cmd+0x78/0xf0 [btrfs] [<0>] send_extent_data+0x4af/0x52a [btrfs] [<0>] process_extent+0xe5d/0xeb4 [btrfs] [<0>] changed_cb+0xcf5/0xd2f [btrfs] [<0>] send_subvol+0x8af/0xc0d [btrfs] [<0>] btrfs_ioctl_send+0xe2b/0xef0 [btrfs] [<0>] _btrfs_ioctl_send+0x80/0x110 [btrfs] [<0>] btrfs_ioctl+0x14b8/0x3120 [btrfs] [<0>] do_vfs_ioctl+0xa1/0x750 [<0>] ksys_ioctl+0x70/0x80 [<0>] __x64_sys_ioctl+0x16/0x20 [<0>] do_syscall_64+0x56/0x240 [<0>] entry_SYSCALL_64_after_hwframe+0x49/0xbe (gdb) l *(pipe_wait+0x72) 0x622 is in pipe_wait (fs/pipe.c:120). 115 * is considered a noninteractive wait: 116 */ 117 prepare_to_wait(&pipe->wait, &wait, TASK_INTERRUPTIBLE); 118 pipe_unlock(pipe); 119 schedule(); 120 finish_wait(&pipe->wait, &wait); 121 pipe_lock(pipe); 122 } 123 124 static void anon_pipe_buf_release(struct pipe_inode_info *pipe,