Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp2382597ybl; Thu, 15 Aug 2019 10:54:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqwgzbCQvz6TMWddSShxJZlQ+vaRQsl2VGwTSPOfOU9zd2zD4a5A/v34GhCThG9FajYb+39m X-Received: by 2002:a62:e901:: with SMTP id j1mr6737948pfh.189.1565891699363; Thu, 15 Aug 2019 10:54:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565891699; cv=none; d=google.com; s=arc-20160816; b=AgZrxKBrAsGDGFHE5zm/CfhJQK4yzSTL244g15wBMO8R6l770N5vCg2cQi142myTYX APLlsYGWj8wlr+YDQff89QREjDlJSkD+tby7H3mJMe6Kkekb3u5rVPRitgkRjAMgAVwk eWkSnY5tRtODPWj2/zu6vbsY8ZXYyRmL3MFDR6qKJO1eaRlcXbXfb6bYJ34bFa2zQ064 2h5OIbNW/GESkC20MDD8/Wfcx2COBv0EIP8j8Tb8IBfwdMlRyBoSfGbIlgISxX1D6Pjg M4BnWGu61P3n1U/j4hiHbfjcD6YX7T8hcKOzVGmwdK4ufGr+mGXKJ8rxDuZReSnBztn5 mHSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date:dkim-signature; bh=b1RS9KSySaNL+Xr+Wr/yacTXSR8AtEsaRT2VIMA9fOY=; b=OBWhhDdBQ6yBkW5rTIcQ9m9fobjyOn6A+t7QzO483wLzGPljlk82sOO9ZSNHR/YX2q OA6kI+O+dunggWhHYTJB1IqJ+jjZKSu+j3H+cu0yZCt0UPgEoc9c5qlKEsCYO4AmYwiD SHEHDTBInjJ7ZUaPwbJt/XIpmXI5PY6Y690F8wAUCJX8X28JCN5wbv6oQWauQUVP6xDf ci8Dsft1Mtc/jQA8nD1uqXvFKm7s+adrK4mQViiSR4FQ0q9Xpw9xPsKOKysxUROefk1K WZQbTAR0Dh1C1MSEAg9GnjSYbMZBx0FWMfitAmlyvKKHYbA09A7q4JUOb6UxJvxDap7j c1pA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=s1NtQV4Q; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w198si2472433pfd.106.2019.08.15.10.54.43; Thu, 15 Aug 2019 10:54:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=s1NtQV4Q; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731474AbfHORNt (ORCPT + 99 others); Thu, 15 Aug 2019 13:13:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:53704 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730932AbfHORNs (ORCPT ); Thu, 15 Aug 2019 13:13:48 -0400 Received: from localhost (c-67-169-218-210.hsd1.or.comcast.net [67.169.218.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C7249205F4; Thu, 15 Aug 2019 17:13:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565889227; bh=OKnNdaFflk01RelsesjLPMicKWo1UdpFSgHbeCLxf00=; h=Date:From:To:Cc:Subject:From; b=s1NtQV4QDwfCIanOxEY6gJfURskShQ6M/q1if21UG/eHis2DblrJwMwSd6PzILckR Fi7SD5Fswtg62p6PaWtXYs3bN54YA6idXgjrw4EKXof2HwPcZl/ESqJHyF3ZOhDJxs Flkp1XUVtJ+edDIni5EjmwJ8bdac7XHT6Q3x9cOM= Date: Thu, 15 Aug 2019 10:13:47 -0700 From: "Darrick J. Wong" To: Linus Torvalds Cc: "Darrick J. Wong" , linux-fsdevel@vger.kernel.org, linux-xfs@vger.kernel.org, david@fromorbit.com, linux-kernel@vger.kernel.org, sandeen@sandeen.net, hch@lst.de Subject: [GIT PULL] xfs: fixes for 5.3-rc5 Message-ID: <20190815171347.GD15186@magnolia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, Here are a few more bug fixes that trickled in since -rc3. It's survived the usual xfstests runs and merges cleanly with this morning's master. Please let me know if anything strange happens. --D The following changes since commit afa1d96d1430c2138c545fb76e6dcb21222098d4: xfs: Fix possible null-pointer dereferences in xchk_da_btree_block_check_sibling() (2019-07-30 11:28:20 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git tags/xfs-5.3-fixes-2 for you to fetch changes up to 8612de3f7ba6e900465e340516b8313806d27b2d: xfs: don't crash on null attr fork xfs_bmapi_read (2019-08-12 09:32:44 -0700) ---------------------------------------------------------------- Changes since last update: - Fix crashes when the attr fork isn't present due to errors but inode inactivation tries to zap the attr data anyway. - Convert more directory corruption debugging asserts to actual EFSCORRUPTED returns instead of blowing up later on. - Don't fail writeback just because we ran out of memory allocating metadata log data. ---------------------------------------------------------------- Darrick J. Wong (2): xfs: remove more ondisk directory corruption asserts xfs: don't crash on null attr fork xfs_bmapi_read Tetsuo Handa (1): fs: xfs: xfs_log: Don't use KM_MAYFAIL at xfs_log_reserve(). fs/xfs/libxfs/xfs_bmap.c | 29 +++++++++++++++++++++-------- fs/xfs/libxfs/xfs_da_btree.c | 19 ++++++++++++------- fs/xfs/libxfs/xfs_dir2_node.c | 3 ++- fs/xfs/xfs_log.c | 5 +---- 4 files changed, 36 insertions(+), 20 deletions(-)