Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp11262167rwr; Fri, 12 May 2023 23:36:37 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ634Ji1XUqDlZP/FW1/zRgOww3gDkUaYmMrZIjGFVjVMy9u/E1SfzIJFZQbOsw/8qt68LGD X-Received: by 2002:a17:90a:65c6:b0:24e:4b1c:74d2 with SMTP id i6-20020a17090a65c600b0024e4b1c74d2mr27516634pjs.32.1683959796737; Fri, 12 May 2023 23:36:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683959796; cv=none; d=google.com; s=arc-20160816; b=y3I9wB3vQkVRhMXneyeW9c7S2LUVodtojZD/ZSbB79HwqvrsyB90dmiNBScpR/XtU4 Twlo9qQK/bXM6MzK2A36b4o4qwcu/+dYx4H4iZHlmNvAU/5hNyf/P6bAytn+4pawrtPK RHgLtsv33ASIWVyZK3eGkVOZgT7tAj7qz5noQxOo0dahhGGQKf6c0xZT2UlKY29mjLLt 4O/i8ZRQUtomdZqOt2mM3ttUh6NDf5mhZzrTGyPsbiw8158KzWoB/p0D9TstHXBYPmyZ 08TZfq+jfba9isUylW0sPp19BvIkAIdHAOyldX/kyYGKDnPiIdmvY+3UqOTg6QvcyYwy 5oow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=dP8cUmedl4/qxac+pn4Gmr1fHv5/w3A4ypuxRSa09v4=; b=xLiPbyat1YWI7jT9iWDBLsD+nrMzE9Mlh2EY1blAJuKS7m/R+DZ1f/uvY2vU439jK7 OEoF19MpOFoGoVm0o3J3pX5EEOWPqlntaArjuCfJv0ydqPjCwjG0sgo7A+ECxlN3gW8l VleS9R/0HLRIU9r/+gS+fWnZoI7Ps7uzUDWvHv+vvbe4YuFh0dFRZXl1LCoZQsBix0/G 01EXnuie4X/LEz2xD88pZHEOhKDMezYrxHeu5eZdSLovc4WYVgfgdUz+Js2KYF/R9sD+ 8fNDaYcpFzO4/PtznwfOC5RiNUnE6FzYg9KyLK7GwRJOcGrJrOp5mG+SwdipFLjQEQ7b 57bg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mit.edu header.s=outgoing header.b="Ign/OTlD"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x22-20020a170902821600b001aaf62c76cesi9717327pln.129.2023.05.12.23.36.18; Fri, 12 May 2023 23:36:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@mit.edu header.s=outgoing header.b="Ign/OTlD"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229750AbjEME7y (ORCPT + 99 others); Sat, 13 May 2023 00:59:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48144 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231174AbjEME7w (ORCPT ); Sat, 13 May 2023 00:59:52 -0400 Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6DB99448C for ; Fri, 12 May 2023 21:59:51 -0700 (PDT) Received: from cwcc.thunk.org (pool-173-48-120-46.bstnma.fios.verizon.net [173.48.120.46]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 34D4xXOj020076 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 13 May 2023 00:59:34 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=outgoing; t=1683953975; bh=dP8cUmedl4/qxac+pn4Gmr1fHv5/w3A4ypuxRSa09v4=; h=From:To:Cc:Subject:Date:In-Reply-To:References; b=Ign/OTlDg/eOdNLiiIPrHOozMbyf+JexbhrBBVMi+z78LIqDoKtDedOhethKYD5Fp yV5PsAlUVaEEgyJ/fO17Y9Is9LnjIIQ7CNWPU3FsOputshM/fCs7b7fIMSEw8TzHtG CWD4ZtdoW4sRVt1ZnS2lz1kIf2C7uVmoorgMJTLNyYe3uUmcIp8bg06M86BhMy3K4M 6jU5gifWdBV4W0V9/s/rgKrF9HtVxl9Z9YixRuH9JqRvmDPhUQRF4hvMPwhx6leJ1/ jhjy3DPc1BVlU1+9mmJ6uB+78eTrIFn4p1tisjdRFd/pH/BC0avLc9OtVyFFx3q+Sg pOyeK4ZRemitQ== Received: by cwcc.thunk.org (Postfix, from userid 15806) id 744A815C02E7; Sat, 13 May 2023 00:59:33 -0400 (EDT) From: "Theodore Ts'o" To: Jan Kara Cc: "Theodore Ts'o" , linux-ext4@vger.kernel.org, Christian Brauner , syzbot+aacb82fca60873422114@syzkaller.appspotmail.com Subject: Re: [PATCH] ext4: Fix lockdep warning when enabling MMP Date: Sat, 13 May 2023 00:59:28 -0400 Message-Id: <168395396128.1443054.13940837195861107555.b4-ty@mit.edu> X-Mailer: git-send-email 2.31.0 In-Reply-To: <20230411121019.21940-1-jack@suse.cz> References: <20230411121019.21940-1-jack@suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Tue, 11 Apr 2023 14:10:19 +0200, Jan Kara wrote: > When we enable MMP in ext4_multi_mount_protect() during mount or > remount, we end up calling sb_start_write() from write_mmp_block(). This > triggers lockdep warning because freeze protection ranks above s_umount > semaphore we are holding during mount / remount. The problem is harmless > because we are guaranteed the filesystem is not frozen during mount / > remount but still let's fix the warning by not grabbing freeze > protection from ext4_multi_mount_protect(). > > [...] Applied, thanks! [1/1] ext4: Fix lockdep warning when enabling MMP commit: 949f95ff39bf188e594e7ecd8e29b82eb108f5bf Best regards, -- Theodore Ts'o