Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp634918ybl; Wed, 8 Jan 2020 03:22:17 -0800 (PST) X-Google-Smtp-Source: APXvYqx1iyql9U8nFGRjch6bhI2WOxzFWk8mC5Z4psD/9Uzs+QQHgydtkC2H1IsCL3ITf42KLDy3 X-Received: by 2002:a9d:2c68:: with SMTP id f95mr3888601otb.33.1578482537050; Wed, 08 Jan 2020 03:22:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578482537; cv=none; d=google.com; s=arc-20160816; b=WvMho4wpB2zCzBZ19BIr1aofhdtStWosb6yIfrWkZvo8dg5mgCPu5XBFkYWaPPOw/W RxF8X+MVlrNaB6mgvnB6fpHPQT9h2xG6hvJTJq1BGNB0YWTgXtLNYcbmKSDI+CTCvDfT FLlRFnQ4czXxE3V4+Btj4TOcY83tI+UU5mSUQKnuoFZ74vopq7/2F5grKEmV6grDrLwf ls2qrtibixcargbzIoASmNH94EGg9dfWoKZOYvRSeETGgG1VGGSsEnFQolQ6dCbngIxz MDJwk7t4yYjX9mUNOdg9XviePpXwrnQVsQEyE4x2yvmUCD8aGFYMEGfW1Uc0MTTJ64F0 EcqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=MAVueXPRBnlcwgNv6m5MsfpOs5m6BZr53MIo13u5YFg=; b=j7XS6WRRrPrwu3gTYenLICL6FxlYGaG5GrznQD19fbR0vRT0x/3B3GNeSijrB0GlEy rcuFAw2qoIYWFBjWC/5vdWYAyzN2lAGwDkmoIoS1zTSF1MFOzTleEXQTpsXP2kBjCTk0 wx1X8Ph8GtzSZjAZMBztWN04okaTJUxQpyekBwM97xaTbhPhgQ4OthJQpF4K6t9+U5Dl ZAxn5fD3ZZPovbLdOpJY0Iym7k7QUqzVNBZ5/XczOXy36QpAsNgL4tsjt66HD6WwHjsM dOM5jKYaJKnVSJn1BTI5vKFRZAZOI2X+TidhgmOMMnfMo/02PZbJC3y8q8Y3fFnBXwcu BvPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=iUqJ1nIU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w4si1695147otl.214.2020.01.08.03.22.05; Wed, 08 Jan 2020 03:22:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=iUqJ1nIU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728089AbgAHLRm (ORCPT + 99 others); Wed, 8 Jan 2020 06:17:42 -0500 Received: from mail.kernel.org ([198.145.29.99]:55716 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728045AbgAHLRl (ORCPT ); Wed, 8 Jan 2020 06:17:41 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0BDBB2072A; Wed, 8 Jan 2020 11:17:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578482260; bh=ioOKvnobadRKGl98r6pmbN1f/3RtAZ7P8SY4kAowiP0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=iUqJ1nIUDQ0rT9Yvt8dvDDVLXlVAZuTxmKFC+RN79X4vfPYepLhX+ZdNA7r7ZUZJT cBmAu4gkIgHw7D8hrNH32yHIgcf2+WorjhVhZxIUaNycnJZJuCPEgVYwgoakQMBhda mfvLk3KoMUoQmEKJEbJ6QyMZfKOYmKT2qDN3Dtns= Date: Wed, 8 Jan 2020 07:42:06 +0100 From: Greg Kroah-Hartman To: Jens Axboe Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Chris Mason , Ming Lei Subject: Re: [PATCH 5.4 100/191] block: fix splitting segments on boundary masks Message-ID: <20200108064206.GB2278146@kroah.com> References: <20200107205332.984228665@linuxfoundation.org> <20200107205338.341621494@linuxfoundation.org> <1fc351dd-a213-3310-7611-6b8c60c209cf@kernel.dk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1fc351dd-a213-3310-7611-6b8c60c209cf@kernel.dk> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 07, 2020 at 02:00:56PM -0700, Jens Axboe wrote: > On 1/7/20 1:53 PM, Greg Kroah-Hartman wrote: > > From: Ming Lei > > > > commit 429120f3df2dba2bf3a4a19f4212a53ecefc7102 upstream. > > > > We ran into a problem with a mpt3sas based controller, where we would > > see random (and hard to reproduce) file corruption). The issue seemed > > specific to this controller, but wasn't specific to the file system. > > After a lot of debugging, we find out that it's caused by segments > > spanning a 4G memory boundary. This shouldn't happen, as the default > > setting for segment boundary masks is 4G. > > > > Turns out there are two issues in get_max_segment_size(): > > > > 1) The default segment boundary mask is bypassed > > > > 2) The segment start address isn't taken into account when checking > > segment boundary limit > > > > Fix these two issues by removing the bypass of the segment boundary > > check even if the mask is set to the default value, and taking into > > account the actual start address of the request when checking if a > > segment needs splitting. > > Greg, there's a problem with this one on ARM. Should be resolved > shortly, but probably best to defer this one until the next 5.4 > stable release. > > I'll ping you with both patches once the dust has settled. Thanks for letting me know, I've now dropped this from the queue. greg k-h