From patchwork Fri Apr 5 22:59:29 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mike Snitzer X-Patchwork-Id: 10887943 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id A7CEA1669 for ; Fri, 5 Apr 2019 22:59:35 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 7F8F828A4E for ; Fri, 5 Apr 2019 22:59:35 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 6E27128B35; Fri, 5 Apr 2019 22:59:35 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 02B3A28A4E for ; Fri, 5 Apr 2019 22:59:35 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726218AbfDEW7d (ORCPT ); Fri, 5 Apr 2019 18:59:33 -0400 Received: from mx1.redhat.com ([209.132.183.28]:54908 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725973AbfDEW7d (ORCPT ); Fri, 5 Apr 2019 18:59:33 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id E11A159444; Fri, 5 Apr 2019 22:59:32 +0000 (UTC) Received: from localhost (unknown [10.18.25.174]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 5EF9C648BE; Fri, 5 Apr 2019 22:59:30 +0000 (UTC) Date: Fri, 5 Apr 2019 18:59:29 -0400 From: Mike Snitzer To: Linus Torvalds Cc: dm-devel@redhat.com, linux-block@vger.kernel.org, Alasdair G Kergon , Andi Kleen , Ilya Dryomov , Mikulas Patocka , YueHaibing Subject: [git pull] device mapper fixes for 5.1-rc4 Message-ID: <20190405225928.GB26473@redhat.com> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Fri, 05 Apr 2019 22:59:33 +0000 (UTC) Sender: linux-block-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-block@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Hi Linus, The following changes since commit 79a3aaa7b82e3106be97842dedfd8429248896e6: Linux 5.1-rc3 (2019-03-31 14:39:29 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/device-mapper/linux-dm.git tags/for-5.1/dm-fixes for you to fetch changes up to 4ed319c6ac08e9a28fca7ac188181ac122f4de84: dm integrity: fix deadlock with overlapping I/O (2019-04-05 18:49:08 -0400) Please pull, thanks. Mike ---------------------------------------------------------------- - Two queue_limits stacking fixes: disable discards if underlying driver does. And propagate BDI_CAP_STABLE_WRITES to fix sporadic checksum errors. - Fix that reverts a DM core limit that wasn't needed given that dm-crypt was already updated to impose an equivalent limit. - Fix dm-init to properly establish 'const' for __initconst array. - Fix deadlock in DM integrity target that occurs when overlapping IO is being issued to it. And two smaller fixes to the DM integrity target. ---------------------------------------------------------------- Andi Kleen (1): dm init: fix const confusion for dm_allowed_targets array Ilya Dryomov (1): dm table: propagate BDI_CAP_STABLE_WRITES to fix sporadic checksum errors Mike Snitzer (1): dm: disable DISCARD if the underlying storage no longer supports it Mikulas Patocka (3): dm integrity: change memcmp to strncmp in dm_integrity_ctr dm: revert 8f50e358153d ("dm: limit the max bio size as BIO_MAX_PAGES * PAGE_SIZE") dm integrity: fix deadlock with overlapping I/O YueHaibing (1): dm integrity: make dm_integrity_init and dm_integrity_exit static drivers/md/dm-core.h | 1 + drivers/md/dm-init.c | 2 +- drivers/md/dm-integrity.c | 16 +++++++--------- drivers/md/dm-rq.c | 11 +++++++---- drivers/md/dm-table.c | 39 +++++++++++++++++++++++++++++++++++++++ drivers/md/dm.c | 30 +++++++++++++++++------------- 6 files changed, 72 insertions(+), 27 deletions(-)