Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3420176ybl; Sun, 2 Feb 2020 23:28:13 -0800 (PST) X-Google-Smtp-Source: APXvYqw1L06rgTTNDA8i59rnX6wGvJvgfGEjS/+NT7RE632KmlnnOer08PyM6CIhMbMQGjdWq3oV X-Received: by 2002:a9d:7cd9:: with SMTP id r25mr15948097otn.326.1580714893558; Sun, 02 Feb 2020 23:28:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580714893; cv=none; d=google.com; s=arc-20160816; b=syL0+6JuvpLocfZS0BXO5CXF7ROS/rLGp6m4xlsAdxDJ3nL+6dc53MZdC8TThYXyzo y832oX6JHPW1QfzbnrfLZhiyGn2FNKPbGpfbD1dbj1HW2VhLX8ufDu3jz4XWjx+PKQrJ bSNg9YTJei7rW0Y3WAMQc0cF9LqmFKQJD9oCmULf+XLA4yAwdoIsRxUEtJF2pspF979p wZ2Zna8xncFYp6iwjuBEld4ihyOt2d3maV6O2IYR0FG8BWxHAolp8pbVx4+5+GjPdNB/ KeK3DgrvbpVUXmhNTls33afv07QfrVOogQs/zajwcuFc7DXGYScRMbrQvxfqRprh/Dns StyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=rYo8DJ2KcXUGj/KqlhmvTFtZYmb/1llJJk1oidmZjr0=; b=ObBUCwHNe9RRh6iFxuKrMJSpbx2I6RoNPVYOuyH+xcUSZMvJT74+Wi7PiGB72/E7Mu xW6YxkVMOMROmGt4R3pFybTVcMBfz3/C3uaV9aTSjDYO8T4zfKukRC8xQdY/iKR6dDxw 1T8TldG8Z9+iUIuDqUoJx3FfUW2KWcgerBGNMxNDUbi7Jk8Rkp0KsMVy6gnxTEn4o5Cb 2r0FOUx+qSjmiTsZwpZtkTuo3vr5Vu1Ou0rH+r3HjO6KEaEHKrTz0l82pyj/AqlqX9tK sePQ5zKANeaIH/9XH++PfIvw4ceBYD+Q246wqix4JJbkAVKHfhszLqIo1m6Ey4p2ZuGY cQ6A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j74si9880561otj.246.2020.02.02.23.28.01; Sun, 02 Feb 2020 23:28:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727168AbgBCFPg (ORCPT + 99 others); Mon, 3 Feb 2020 00:15:36 -0500 Received: from out30-45.freemail.mail.aliyun.com ([115.124.30.45]:39163 "EHLO out30-45.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725768AbgBCFPg (ORCPT ); Mon, 3 Feb 2020 00:15:36 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R761e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e07417;MF=joseph.qi@linux.alibaba.com;NM=1;PH=DS;RN=8;SR=0;TI=SMTPD_---0TozpQ89_1580706930; Received: from JosephdeMacBook-Pro.local(mailfrom:joseph.qi@linux.alibaba.com fp:SMTPD_---0TozpQ89_1580706930) by smtp.aliyun-inc.com(127.0.0.1); Mon, 03 Feb 2020 13:15:31 +0800 Subject: Re: [PATCH] ocfs2: fix the oops problem when write cloned file To: Gang He , "mark@fasheh.com" , "jlbec@evilplan.org" , "gechangwei@live.cn" , Shuning Zhang Cc: "linux-kernel@vger.kernel.org" , "ocfs2-devel@oss.oracle.com" , "akpm@linux-foundation.org" References: <20200121050153.13290-1-ghe@suse.com> From: Joseph Qi Message-ID: Date: Mon, 3 Feb 2020 13:15:30 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:60.0) Gecko/20100101 Thunderbird/60.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 20/2/3 10:17, Gang He wrote: > Hello Joseph, Changwei, Sunny and all, > > Could you help to review this patch? > This patch will fix the oops problem caused by write ocfs2 clone files. > The root cause is inode buffer head is NULL when calling ocfs2_refcount_cow. > Secondly, we should use EX meta lock when calling ocfs2_refcount_cow. > Before commit e74540b28556, we may also use NULL buffer head in case of overwrite, so why there is no such issue before? Thanks, Joseph