Received: by 2002:a05:6a10:9afc:0:0:0:0 with SMTP id t28csp1023253pxm; Wed, 23 Feb 2022 16:10:24 -0800 (PST) X-Google-Smtp-Source: ABdhPJyS4nsgzvIW4bv+PvaF7Rog4Td+U0cnaVqKe6gqXKVb/U8WcIhWgUo+RjY746lpNNCBmJSA X-Received: by 2002:a17:90a:4fa1:b0:1bb:8ad8:581c with SMTP id q30-20020a17090a4fa100b001bb8ad8581cmr58395pjh.105.1645661424532; Wed, 23 Feb 2022 16:10:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1645661424; cv=none; d=google.com; s=arc-20160816; b=nBRsZCYzNF5xqmb6QLu1Ix3vekoDK4m6s6A0epzl4aysJrH7ef0qP5wKAqZMZ4pvfD pawF2tVgfwt0HpKfZWkiPpRBpfHlhsoPC+IvvnuGX8jqfdLXQ1bNvXQio7eIjoDTKZtj HS/ps7GXpuVF3JSl6tXiY9/tOPwya5a+zEnw9dux22J0nPQ/9aFFIuZr5KzDM18VFWKM u2NmB+mUl1oc+uZbQfWsAEMJvAHIzuvs5QVYWFt21PvrXnvUR8VR7At70vV92RhsqtaE 8YDgReHz/VdG77hLJFLu0CqXLfZWwhRoO7qPmVHpgiljdbeyIjNGANmh0JK3VrpdP0I5 I0sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=6TSEb07aQA4xcxm4bCTW8rdmNv+8QhcR7dGQjk4SEWk=; b=krSEh2An9g2NU3ugQiixt8XDOfFwqZbjOqJY7dZfXt3ZSIPg5k1vex5fYRidgY7D4k mZKYfDGL+RPhSOFcC0mi9LMTpldGTKotRF9rPOOOf7mW5e+ODISDtGXIj/e/CyNyDuJf LZs3i3CCLZJN3WwnGWAWU3INCvPtaffLQlWs290lihtMdEGhkPGLT9IxiNmmT6pQq47x f0vWbIx1FxzekdQmi9NLSMpmB6s+L4/2mJokm6y/nyCJEDBKBgLG/viCNrkRbPyLXizN vTryl0cc2NEFbYpVzPOj1lSRlHhRaFLWXMoBqhX08OBSopnH8H2P72mIMIde4cY0HhJl dvPw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a15si905709pll.350.2022.02.23.16.09.59; Wed, 23 Feb 2022 16:10:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244972AbiBWXjV (ORCPT + 99 others); Wed, 23 Feb 2022 18:39:21 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60030 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244970AbiBWXjP (ORCPT ); Wed, 23 Feb 2022 18:39:15 -0500 Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8E4A85B3E1; Wed, 23 Feb 2022 15:38:13 -0800 (PST) Received: from cwcc.thunk.org (pool-108-7-220-252.bstnma.fios.verizon.net [108.7.220.252]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 21NNZsRH024029 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 23 Feb 2022 18:35:54 -0500 Received: by cwcc.thunk.org (Postfix, from userid 15806) id 0E27A15C0036; Wed, 23 Feb 2022 18:35:54 -0500 (EST) Date: Wed, 23 Feb 2022 18:35:54 -0500 From: "Theodore Ts'o" To: Greg Kroah-Hartman Cc: John Hubbard , Lee Jones , linux-ext4@vger.kernel.org, Christoph Hellwig , Dave Chinner , Goldwyn Rodrigues , "Darrick J . Wong" , Bob Peterson , Damien Le Moal , Andreas Gruenbacher , Ritesh Harjani , Johannes Thumshirn , linux-xfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, cluster-devel@redhat.com, linux-kernel@vger.kernel.org Subject: Re: [REPORT] kernel BUG at fs/ext4/inode.c:2620 - page_buffers() Message-ID: References: <82d0f4e4-c911-a245-4701-4712453592d9@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Fri, Feb 18, 2022 at 08:51:54AM +0100, Greg Kroah-Hartman wrote: > > The challenge is that fixing this "the right away" is probably not > > something we can backport into an LTS kernel, whether it's 5.15 or > > 5.10... or 4.19. > > Don't worry about stable backports to start with. Do it the "right way" > first and then we can consider if it needs to be backported or not. Fair enough; on the other hand, we could also view this as making ext4 more robust against buggy code in other subsystems, and while other file systems may be losing user data if they are actually trying to do remote memory access to file-backed memory, apparently other file systems aren't noticing and so they're not crashing. Issuing a warning and then not crashing is arguably a better way for ext4 to react, especially if there are other parts of the kernel that are randomly calling set_page_dirty() on file-backed memory without properly first informing the file system in a context where it can block and potentially do I/O to do things like allocate blocks. - Ted