Received: by 2002:a05:6a10:5594:0:0:0:0 with SMTP id ee20csp519361pxb; Mon, 25 Apr 2022 15:25:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyA9lpb1HMYerFVnm9krJXlPmtPDxkqRTZQUYo8fwVOKs7WzuK0g+o5wi0b5RU+xCmUWZ8/ X-Received: by 2002:a63:6c0a:0:b0:3ab:8716:3d04 with SMTP id h10-20020a636c0a000000b003ab87163d04mr968990pgc.507.1650925559377; Mon, 25 Apr 2022 15:25:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650925559; cv=none; d=google.com; s=arc-20160816; b=YCT0XttEmi0AODGu2tLFCShAIppWjnRkROeXZJCGaYl8SnIdksh3QdSDQFhfVfo+0y oqFYNnVJW+OZHKDaL4EAyIf1iLwKtZj00KWTjHUVGn41gmAsi+0dlYHoS/T+ceK1kRAy vA34BaM+IkENM59wgh5KOFtWBYhOlR9C7M7i1XN9pvrM1vB3XRgqM/rdQfWpgPwVmcxR 6E7usGi8RxvwE/Muvdp7HURKZODBh3A+vMjmYu75rYrV4oLYdO2BO28Z1VllqKXFZxBU wfDvZiwgMF5fnmifjEdJxpEeKdsafdtl18pGrryTIX6J5Wl83/5a0k/Jl3BDSEf6rzt/ px2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=zuazSixnh/En8mPXRrRQRpsp8N/NJ3a8si8nWHopowA=; b=A8h3WL1W7ClU+GdFqHv8xv2HcC+ie6aRxoel9PZJ+I3GrzyiXLCdb1pqKMXfOBG1pk GoFKPZKP8QcPfF5RvO51MwdUkcD4GwRRHYOubByfNtK7Jh+U94P4NYeP4lKYSL0hMabd 4AM01G1WtAjIZ29lniu0PrShvhIt81DLYlAKFzMwoUiw+r5Fgk1DoOCp/eWYZ2ep9hD9 6vuUqLHJZErXANpK+e9rIs0WTB9E1WqXFPWluAvrkctLM0rOJ2IYCC85dPWer6h6snx7 4cQnbPkW8lreXzi7NTO8R3ZR0GaeVcwMwyL0JDbfls2xxrA3V1D4gbDwJYuumLK99U+h hTeg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id bm6-20020a656e86000000b003aa661aee4fsi4830904pgb.554.2022.04.25.15.25.43; Mon, 25 Apr 2022 15:25:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243278AbiDYQQ6 (ORCPT + 99 others); Mon, 25 Apr 2022 12:16:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52430 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239957AbiDYQQ5 (ORCPT ); Mon, 25 Apr 2022 12:16:57 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F3D25119ECB; Mon, 25 Apr 2022 09:13:52 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8C8EC612F2; Mon, 25 Apr 2022 16:13:52 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A02F7C385A7; Mon, 25 Apr 2022 16:13:49 +0000 (UTC) From: Catalin Marinas To: Catalin Marinas , Andrew Morton Cc: Will Deacon , Chris Mason , Josef Bacik , Al Viro , linux-fsdevel@vger.kernel.org, linux-btrfs@vger.kernel.org, linux-arm-kernel@lists.infradead.org, David Sterba , linux-kernel@vger.kernel.org, Andreas Gruenbacher , Linus Torvalds Subject: Re: [PATCH v4 0/3] Avoid live-lock in btrfs fault-in+uaccess loop Date: Mon, 25 Apr 2022 17:13:47 +0100 Message-Id: <165090314404.2743611.7102822933741144292.b4-ty@arm.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220423100751.1870771-1-catalin.marinas@arm.com> References: <20220423100751.1870771-1-catalin.marinas@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-6.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 23 Apr 2022 11:07:48 +0100, Catalin Marinas wrote: > A minor update from v3 here: > > https://lore.kernel.org/r/20220406180922.1522433-1-catalin.marinas@arm.com > > In patch 3/3 I dropped the 'len' local variable, so the btrfs patch > simply replaces fault_in_writeable() with fault_in_subpage_writeable() > and adds a comment. I kept David's ack as there's no functional change > since v3. > > [...] Applied to arm64 (for-next/fault-in-subpage). Also changed the probe_subpage_writeable() prototype to use char __user * instead of void __user * (as per Andrew's suggestion). [1/3] mm: Add fault_in_subpage_writeable() to probe at sub-page granularity https://git.kernel.org/arm64/c/da32b5817253 [2/3] arm64: Add support for user sub-page fault probing https://git.kernel.org/arm64/c/f3ba50a7a100 [3/3] btrfs: Avoid live-lock in search_ioctl() on hardware with sub-page faults https://git.kernel.org/arm64/c/18788e34642e -- Catalin