Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp1915079pxb; Sat, 23 Apr 2022 22:25:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzjp1MU45wBfur82TsPGvXbFBprwpgqBBuQ+JvEi+md1QVyWA6zDmw2EZd2OJmQb5hZ2JWr X-Received: by 2002:a17:907:7f8f:b0:6f0:e67:e3a7 with SMTP id qk15-20020a1709077f8f00b006f00e67e3a7mr11168784ejc.517.1650777910005; Sat, 23 Apr 2022 22:25:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650777910; cv=none; d=google.com; s=arc-20160816; b=0cPU/tbj4wQ4uYh21HzuNQeqs9+HI6w6maaOtD4LAeqiVbRBu8t8S/iK62Cbu2cU56 dmTCqQ4rtXxBIVEeG9jnk++H5/OVgjIW33Ez6HpgyPZrDHX71MgMEw013gMZUD6g4KEH cQSslfUnDNBqV7nUG5nxEBcJ9dyZhxGkI4/lCCgS4jhCMbnj6lXG79KNoUU+cqGBQ9Rd tSIjyey+JxtwIG2dvBCb4RW5IvUraMfYp6Rwn1LGOmpX2iThvwjwbPiukad8IOHp7D15 BBcjUGQ0zHARMfGsbF3hxVIuwxEUlNzDUzl6deJ2sPwtP5fUgxr6Wz2sMU0+HEVAeHam +oww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Qb5Szh+CcKy2SBrVNCKts80EODHTuY3uc2BaRSQms88=; b=XIQpcjedgjdlL/EAimo4QslWOO4zL9bO1J7FIBqK4p0Uq5jAqHtX5HgLT7XL0Jlzk2 tUxuC/2g6cyg2eLiorUHalCGFl4GzxxYfapgoQig+nBk1bP1SxgdQ017SezZx72eSeD9 HbsopIChu1/XpLe3XXCzWFdktqUhRqSV8aPu7blgpNdSZVcAjNfJ+49nLPwrvzIpt+kZ vo7SPlhBaSR+XXqEGFZSqcS7z2MCibdlC7UpIIvytDpA3rJljQK1H+uUKRvJxKuf+h8A gJ0kLV/MVu69MzWtr2/9PkA09oSnoiunAYgWopEVXgWN0qaSMZEaaORQnJjA7+OFIJeC hWPQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=google header.b=DY1qADis; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id am10-20020a170906568a00b006df76385d4dsi10686667ejc.493.2022.04.23.22.24.44; Sat, 23 Apr 2022 22:25:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=google header.b=DY1qADis; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236414AbiDWQjD (ORCPT + 99 others); Sat, 23 Apr 2022 12:39:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40184 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236115AbiDWQjC (ORCPT ); Sat, 23 Apr 2022 12:39:02 -0400 Received: from mail-lj1-x230.google.com (mail-lj1-x230.google.com [IPv6:2a00:1450:4864:20::230]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3CE305FF2 for ; Sat, 23 Apr 2022 09:36:04 -0700 (PDT) Received: by mail-lj1-x230.google.com with SMTP id c15so13023144ljr.9 for ; Sat, 23 Apr 2022 09:36:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux-foundation.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Qb5Szh+CcKy2SBrVNCKts80EODHTuY3uc2BaRSQms88=; b=DY1qADisgv4bdnv5TOJXAoTsHGxPnzMJtTUEpOVn3Cevi/YDTmZqy13LyQ+f7Fzr8f BDsGuSh7cddzLWLWnuMvJFflGmiSd5+Ou/nCN59b52nfewu0XF6gU/hq/w0YVaKtMhOi nAuo0+xpgMEeAUbjsbMs9AtgbjUdaSu4QnUeY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Qb5Szh+CcKy2SBrVNCKts80EODHTuY3uc2BaRSQms88=; b=0mt4ZJ6+QLGrTH8b4lXoDMk++dVJI0BtbJmAqfU3BBEnfN/IF/vaBvlMi+qsBsV66R wpU9qBI+v/W8Y81WSN4D7B0TAoGm+ClxsUTjePhasMXgTI46GGo1Hh8oNggoNkMi1Yw7 PDJX/JESc1WqGvwl3pWpo0SJkOfTk1uZtXsuDc5VmZ3sbNfH31CrqnaxPsFWD8UWi6rn L+3MINj4k/X8Smchb4lBWVxYHCvNPTmQEQg9P0AfnnDx+piSYHbSQhcBvpuXnEIUWGtY HgR+V3jb9NtLh+KGeBqjrEwZjJM4RXM1cFPcqY3HaXgTjx700CqjL9gJe8Po1hq1kgz4 CUhQ== X-Gm-Message-State: AOAM532YH0lBQEMHr+YebXpNQ2fERZC+qkftLtR6Ge712/SzfyU/bueX 28+ZF6SjPTKktNdlz0J1jo6RKIeF+szHBQTN X-Received: by 2002:a2e:320a:0:b0:24d:c7d8:2286 with SMTP id y10-20020a2e320a000000b0024dc7d82286mr6181134ljy.530.1650731762220; Sat, 23 Apr 2022 09:36:02 -0700 (PDT) Received: from mail-lf1-f42.google.com (mail-lf1-f42.google.com. [209.85.167.42]) by smtp.gmail.com with ESMTPSA id e24-20020a196918000000b00471fe70158esm33985lfc.56.2022.04.23.09.35.59 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 23 Apr 2022 09:36:00 -0700 (PDT) Received: by mail-lf1-f42.google.com with SMTP id w19so19284916lfu.11 for ; Sat, 23 Apr 2022 09:35:59 -0700 (PDT) X-Received: by 2002:a05:6512:6d4:b0:470:f48d:44e2 with SMTP id u20-20020a05651206d400b00470f48d44e2mr7148386lff.542.1650731759019; Sat, 23 Apr 2022 09:35:59 -0700 (PDT) MIME-Version: 1.0 References: <20220423100751.1870771-1-catalin.marinas@arm.com> In-Reply-To: <20220423100751.1870771-1-catalin.marinas@arm.com> From: Linus Torvalds Date: Sat, 23 Apr 2022 09:35:42 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v4 0/3] Avoid live-lock in btrfs fault-in+uaccess loop To: Catalin Marinas Cc: Andrew Morton , Andreas Gruenbacher , Josef Bacik , Al Viro , Chris Mason , David Sterba , Will Deacon , linux-fsdevel , Linux ARM , linux-btrfs , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Apr 23, 2022 at 3:07 AM Catalin Marinas wrote: > > The series introduces fault_in_subpage_writeable() together with the > arm64 probing counterpart and the btrfs fix. Looks fine to me - and I think it can probably go through the arm64 tree since you'd be the only one really testing it anyway. I assume you checked that btrfs is the only one that uses fault_in_writeable() in this way? Everybody else updates to the right byte boundary and retries (or returns immediately)? Linus