Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1268089ybl; Fri, 23 Aug 2019 16:34:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqw6C3Mom9dZDw6Y46b4l8hvLZGqEYlbGveT54jyBjOeVLlK05b3L1loCl+Kr57Bnugrw/dw X-Received: by 2002:a65:6096:: with SMTP id t22mr6297278pgu.204.1566603248024; Fri, 23 Aug 2019 16:34:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566603248; cv=none; d=google.com; s=arc-20160816; b=Jy0N46WoKenkxDKWTNWkjwte3yPexyEHHGZScGJSYuIVnfUGblWwYV8sgJzulOWdJS 9BQn1x2IwlASiV+sbf4G6Uc1HAxOlMyUlBgWTkBupGmi0A+B4Dz504nq/AlJ+qIlrM8G kluNxRo+ZS1k9GEooPxS+hbSivyoE9IzVqQnK8oBg0Uf004YDPbuHvJFscPSBg+dx4KV WWmmSlxh843UeWhOj0FErkJ+BAcHmMANb2TAGn4AU+QFCDV9z62q47RuGD/NtGImoBRN g18FBFIL/XXkrdFYSJpBqDiQ2FpbYoAAXdNIxAWfGguk7+ZNg5+tcmkGEyBjJ6EzktBs D4Og== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date:dkim-signature; bh=uWgCFVy+to21IB2s1C6MIUlUcGY0TuiHqV2gWlhfAFs=; b=EW65xKXxTs1D+xKmYEvnwBdsmBO8ewWENfBpaJzdEdMsE3/Wcz8ZdrZUcAdptFUoXm bzv7YQKntU7V+7GQfZ/dYxRA3wBTtBy+hwvWc5pXM2m6VJgq5ApMltZgu0JGwy8OpseK A/K0RR9/Q5N5Or0foWl5FikL9EVu27nPqVEMUGUy/n1bu0X0tbFAVnwMJQv3S4aI2epG B+zF/3UC6s9E6NDTDHh+uhKSpucHhBsNLf69FLl29/YLSaqj+7jGWEtgcs4955jZbs/E Pq+eFDSNqJ2Xi3FKczCRqggumur9uvJt0ZwN1yOhCe0+wMWiFHmPhJKh3ObnP1yS+49z iwaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ehiQ1jlR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q25si3021295pgv.114.2019.08.23.16.33.53; Fri, 23 Aug 2019 16:34:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ehiQ1jlR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2436771AbfHWQel (ORCPT + 99 others); Fri, 23 Aug 2019 12:34:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:43722 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389827AbfHWQek (ORCPT ); Fri, 23 Aug 2019 12:34:40 -0400 Received: from localhost (c-67-169-218-210.hsd1.or.comcast.net [67.169.218.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AA325205C9; Fri, 23 Aug 2019 16:34:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566578079; bh=wKJz9YOkE0fj8OFVZwyerZJCWFSIUVaGmXLkqc4eHQU=; h=Date:From:To:Cc:Subject:From; b=ehiQ1jlRR/1ZPpGwcgYweF1sBjS3BoFZw8yWbXh+J9bvjP69gPEORLQDgIv2FL39H 9RS7AS3meA/8h7f3zoEwyfRexpZzYQ77Nxegt4U0hM8YkKPtQT8+ikxsLdO+MEu1bM tj7Fg349rFcEk89yvGJrTch0tBDOPf6oAInCZ0AM= Date: Fri, 23 Aug 2019 09:34:39 -0700 From: "Darrick J. Wong" To: Linus Torvalds Cc: "Darrick J. Wong" , linux-fsdevel@vger.kernel.org, linux-xfs@vger.kernel.org, david@fromorbit.com, linux-kernel@vger.kernel.org, sandeen@sandeen.net, hch@lst.de Subject: [GIT PULL] xfs: fixes for 5.3-rc6 Message-ID: <20190823163439.GL1037350@magnolia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, Here are a few more bug fixes that trickled in since the last pull. They've survived the usual xfstests runs and merge cleanly with this morning's master. Please let me know if anything strange happens. I expect there to be one more pull request tomorrow for the fix to that quota related inode unlock bug that we were reviewing last night, but it will continue to soak in the testing machine for several more hours. --D The following changes since commit 8612de3f7ba6e900465e340516b8313806d27b2d: xfs: don't crash on null attr fork xfs_bmapi_read (2019-08-12 09:32:44 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git tags/xfs-5.3-fixes-4 for you to fetch changes up to b68271609c4f16a79eae8069933f64345afcf888: fs/xfs: Fix return code of xfs_break_leased_layouts() (2019-08-19 18:15:28 -0700) ---------------------------------------------------------------- Changes since last update: - Fix missing compat ioctl handling for get/setlabel - Fix missing ioctl pointer sanitization on s390 - Fix a page locking deadlock in the dedupe comparison code - Fix inadequate locking in reflink code w.r.t. concurrent directio - Fix broken error detection when breaking layouts ---------------------------------------------------------------- Christoph Hellwig (2): xfs: fall back to native ioctls for unhandled compat ones xfs: compat_ioctl: use compat_ptr() Darrick J. Wong (2): vfs: fix page locking deadlocks when deduping files xfs: fix reflink source file racing with directio writes Ira Weiny (1): fs/xfs: Fix return code of xfs_break_leased_layouts() fs/read_write.c | 49 +++++++++++++++++++++++++++++++++------- fs/xfs/xfs_ioctl32.c | 56 +++------------------------------------------- fs/xfs/xfs_pnfs.c | 2 +- fs/xfs/xfs_reflink.c | 63 ++++++++++++++++++++++++++++++---------------------- 4 files changed, 82 insertions(+), 88 deletions(-)