Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp8169ybl; Tue, 7 Jan 2020 13:03:43 -0800 (PST) X-Google-Smtp-Source: APXvYqzEI9yxcaoc5OI0my/uE81OfhMmI7OFSSSQunyc+fDZA8Y6hyrpKEl4GZz6o3z7FRmLs3sM X-Received: by 2002:aca:72cd:: with SMTP id p196mr281418oic.99.1578431023233; Tue, 07 Jan 2020 13:03:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578431023; cv=none; d=google.com; s=arc-20160816; b=Hq7uA6RWSad2U9znzfK6mSsLl14k7WZbdVVgGKgWxfUqWxw4byp5zwDxDr5j2FvTWe n8OkNoPj/r6bFuLjDd/4Oad0irSXzCsZgWwErJ+DHxTOulxuZo7TKNkje//9jWJY7mcj RJb/AKkTRfVHEnVl3PtzKFCfpcASXLjDDLjqW9UDXRKiIJVC0RkK/JnJa+NZkBz46ge1 GBbIgldaWLABhpvA7FVGVvdCfxLrtiq8mJinOzDVqf0Zgm6wwSV6ALGZL0Kk2kNVpsf2 aFluX7PY8tFZhrCygpb1veKkrSLU4A1PU90LMQiBQ8MSRmdDlyt/t2GhxstrrhS+ZM8L VZGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=TUCMvAlrozTSswUZRaX/kk/b3mxYfUe4t6CXtrf2o+s=; b=BbcETBARYE+ZZQbGHRK7Xxt4MSop4mKu93PCfi5O3e9P1uZhWKOi8wFJ1UcCO8J75o 31zHyQuI+brfjhFw4P6vA+b31XQNUnBAZU2do949jfhh+ewd2CvkWH2H8bvc+IHY1d2i K6cTKXgW6m4ZdT5UO2l8dD3qhRFn0SOmc9nAZfBXOQc0+SZzhGVnb4sGN+eBIdqpjLTO LNjrsO4MrMkPcScIfritbkC+iCexHalRqAv0ty9BmKi3uXEkthLlGDQmY2/3+WANjXRi 5/jpsRrkP8TvCBw+zmOcneAP8KCsacNt3Yzd7aMVOC5cfdIzHbkUUxmkbaXnh47LvcBj cGSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b=GehBVaBA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p25si502657oto.191.2020.01.07.13.03.25; Tue, 07 Jan 2020 13:03:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b=GehBVaBA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728464AbgAGVBL (ORCPT + 99 others); Tue, 7 Jan 2020 16:01:11 -0500 Received: from mail-io1-f68.google.com ([209.85.166.68]:38004 "EHLO mail-io1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728476AbgAGVA6 (ORCPT ); Tue, 7 Jan 2020 16:00:58 -0500 Received: by mail-io1-f68.google.com with SMTP id v3so839108ioj.5 for ; Tue, 07 Jan 2020 13:00:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel-dk.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=TUCMvAlrozTSswUZRaX/kk/b3mxYfUe4t6CXtrf2o+s=; b=GehBVaBAx2yLw8xmK6L9yXpZmniP/2JyAJ3/e8p9FE6da8ZcO/BGm8rhirJ906imzR MyMS2cxd096Pcka3v1dxK5QOY76n81+jkNNzm92Fu1BLm12o33wIh8PuqUyvqB5JgEAT kg2l9mn1owXVwnaEwiAe9SxaV14zDbe3aXQoIoZMkigADe2qBr1ShfEmJPt4DmnIkFdM Nl7O3XfkSkhCda0b1Hkp1OlbetxllC5f4OMGIaWe96kCUf2NJ3z2UgdQ3Uskep4pyBmT i7Kg9HyftPWed+j0nbeSEVmQxWqgcolE4dTvs6xIG2mvTDxwga0AhX4w/wDYcgT/lrhn TfCQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=TUCMvAlrozTSswUZRaX/kk/b3mxYfUe4t6CXtrf2o+s=; b=mOR2aKMVVgVDNg44QqBzBXKZMwS9IlOhgSta+NdoWY3Jsl6rpZ6wI2OAx9Vc8A5rLS KYubTzwgoTjCClQRva3snUd58joBKrA4J2OhOBo9Xsnr65WFrI4XTgOuTVffVtmsKWAh LEIvPcVH2Ns/TJ1Cl068B5/VNOaM87aQsrk+3sXBT8AA+VE62TwgsmPFm9mRuLLCIJVA 5wY7fz7td1m6vGZbNhfiD39w+uABfnIlVwtk9UJ2uza0elrANx1OSJmW5p0VcXJ5ta1E kJJiOu1sQ5If4Aexw7zzTs9AEPoVIPKr9+cEfiJL6rk2aZsmlu839Ww+Ja6cjfm7TQRt SdLg== X-Gm-Message-State: APjAAAUg7wdLT1ATde704mU+SNuahY1IFUgOzPS1/3ZHaZ5dDeof+T6J wfUaumrBT60u/BC6g1TQmZHTyg== X-Received: by 2002:a6b:7f47:: with SMTP id m7mr789897ioq.82.1578430857516; Tue, 07 Jan 2020 13:00:57 -0800 (PST) Received: from [192.168.1.159] ([65.144.74.34]) by smtp.gmail.com with ESMTPSA id g62sm230208ile.39.2020.01.07.13.00.56 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 07 Jan 2020 13:00:57 -0800 (PST) Subject: Re: [PATCH 5.4 100/191] block: fix splitting segments on boundary masks To: Greg Kroah-Hartman , linux-kernel@vger.kernel.org Cc: stable@vger.kernel.org, Chris Mason , Ming Lei References: <20200107205332.984228665@linuxfoundation.org> <20200107205338.341621494@linuxfoundation.org> From: Jens Axboe Message-ID: <1fc351dd-a213-3310-7611-6b8c60c209cf@kernel.dk> Date: Tue, 7 Jan 2020 14:00:56 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: <20200107205338.341621494@linuxfoundation.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/7/20 1:53 PM, Greg Kroah-Hartman wrote: > From: Ming Lei > > commit 429120f3df2dba2bf3a4a19f4212a53ecefc7102 upstream. > > We ran into a problem with a mpt3sas based controller, where we would > see random (and hard to reproduce) file corruption). The issue seemed > specific to this controller, but wasn't specific to the file system. > After a lot of debugging, we find out that it's caused by segments > spanning a 4G memory boundary. This shouldn't happen, as the default > setting for segment boundary masks is 4G. > > Turns out there are two issues in get_max_segment_size(): > > 1) The default segment boundary mask is bypassed > > 2) The segment start address isn't taken into account when checking > segment boundary limit > > Fix these two issues by removing the bypass of the segment boundary > check even if the mask is set to the default value, and taking into > account the actual start address of the request when checking if a > segment needs splitting. Greg, there's a problem with this one on ARM. Should be resolved shortly, but probably best to defer this one until the next 5.4 stable release. I'll ping you with both patches once the dust has settled. -- Jens Axboe