Received: by 10.192.165.148 with SMTP id m20csp5097906imm; Tue, 1 May 2018 09:02:01 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrOdi2nXdBq5W9m+FGmdI73KIhQ6KVwLqgN+YrmAKRENEbKPNTqf9lbSVmIBpK6H46fEzzd X-Received: by 2002:a63:a119:: with SMTP id b25-v6mr13192261pgf.3.1525190521465; Tue, 01 May 2018 09:02:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525190521; cv=none; d=google.com; s=arc-20160816; b=SJ1w+bxAPrP0QaTlsEChw4JWsXUXTdJjc3iWj0NvqDZOKLnJzMIXXdTMbWI4EcMaIc RX2lX/Dbcwvzu1O72PHpvkmZY8gkYWOZzUC8Jwcxv+oXAB1gJsdGFVI1eEkbJf6ZAa6j ngCZZWXsHmEjNUWOWHWBlOawyUTkD0YUJa1JjMaYr8ea3gGNfCrZzA3Qc7plT2xUYGu7 qInfgu36R0/bDbSQQVkK9UIle3faMS7LFlAXG6ndd0Ts6bBX0l1qY5ymmDO/2KbhcTid u6uB/4tdxrnYqwnLgrPnlFJqp6FkT6gOzkZSAcKIsRd1gOXfNK1/krFsq6jIZZ1Htis8 6/MQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date:dmarc-filter :arc-authentication-results; bh=FrEztW2xdaMo1vg4KIHAxOSZpVu3T41Dr8M+s5rSKMI=; b=r2UgowoHVecxsusVoOOZG3yt35DVuk2fafQbrks32wQeVuoQvlrvJDLL+Wh7V+oZgs jBCLWNsTqjOWNEH9mT+uoM/RbPyVQspmov/2F7cxspO8/XBnLxZfem/uQ1ZOPGjOMGhs 4fCKkqguAbdaZt6nDyvWNh+0LOE3YjvSMiWtQOnDLKKHqHsMl4CGggeswKmiLpNaUkrN ChQv3C3axtNN/4o2GnVBMGujMuaWW+i3stv529sQriHMAPosSp/cdntBqgbPpK1mIvgh RGiK9AqD5XmWlhfrQuDQmkr97L/mcVmkK29FVwFwG0os8LwEv2e07gyqZft8qE45kxlZ cxLw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p83si9811831pfl.279.2018.05.01.09.01.46; Tue, 01 May 2018 09:02:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755846AbeEAQBd (ORCPT + 99 others); Tue, 1 May 2018 12:01:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:52426 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753789AbeEAQBb (ORCPT ); Tue, 1 May 2018 12:01:31 -0400 Received: from localhost (c-67-169-218-210.hsd1.or.comcast.net [67.169.218.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 22E6423690; Tue, 1 May 2018 16:01:31 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 22E6423690 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=djwong@kernel.org Date: Tue, 1 May 2018 09:01:30 -0700 From: "Darrick J. Wong" To: Linus Torvalds Cc: "Darrick J. Wong" , Linux Kernel Mailing List , linux-xfs , Eric Sandeen Subject: [GIT PULL] xfs: fixes for 4.17-rc4 Message-ID: <20180501160130.GD4127@magnolia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, Here are a few more bug fixes for xfs for 4.17-rc4. Most of them are fixes for bad behavior. This series has been run through a full xfstests run during LSF and through a quick xfstests run against this morning's master, with no major failures reported. Let me know if there are any merge problems. --D The following changes since commit 60cc43fc888428bb2f18f08997432d426a243338: Linux 4.17-rc1 (2018-04-15 18:24:20 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git tags/xfs-4.17-fixes-1 for you to fetch changes up to 7b38460dc8e4eafba06c78f8e37099d3b34d473c: xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE (2018-04-17 19:10:15 -0700) ---------------------------------------------------------------- Changes since last update: - Enhance inode fork verifiers to prevent loading of corrupted metadata. - Fix a crash when we try to convert extents format inodes to btree format, we run out of space, but forget to revert the in-core state changes. - Fix file size checks when doing INSERT_RANGE that could cause files to end up negative size if there previously was an extent mapped at s_maxbytes. - Fix a bug when doing a remove-then-add ATTR_REPLACE xattr update where we forget to clear ATTR_REPLACE after the remove, which causes the attr to be lost and the fs to shut down due to (what it thinks is) inconsistent in-core state. ---------------------------------------------------------------- Darrick J. Wong (2): xfs: prevent creating negative-sized file via INSERT_RANGE xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE Eric Sandeen (2): xfs: enhance dinode verifier xfs: set format back to extents if xfs_bmap_extents_to_btree fs/xfs/libxfs/xfs_attr.c | 9 ++++++++- fs/xfs/libxfs/xfs_bmap.c | 4 ++++ fs/xfs/libxfs/xfs_inode_buf.c | 21 +++++++++++++++++++++ fs/xfs/xfs_file.c | 14 +++++++++----- 4 files changed, 42 insertions(+), 6 deletions(-)