Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp2060464ybl; Sat, 24 Aug 2019 09:28:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqzqtUIfukcgRQG3TlGywvpoc3xzENimZnUiOzMPAWxBhtnCeDfhzwS/YV9D/4gdho+JQ+jj X-Received: by 2002:a63:6f8f:: with SMTP id k137mr8746272pgc.90.1566664086621; Sat, 24 Aug 2019 09:28:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566664086; cv=none; d=google.com; s=arc-20160816; b=hLmhnA44ueFl8zvps/HfxZpgcY1DnP5vCUs8uIuKIuYevLJ2jN79JxPg+XPgyp9+wB h9nUJ6A+yqt3z29Qlb0kZSwtoKuSwhf2ifyQ+jiPvYp06yffSAVilTAJQbmIRZLlDEI7 YQ3YkiK2daPDFhQ2KSKHPK2mlXJGABQ8WhkCITvtVtV533cz1KrFwhElu49mB7cnR9+V 4/GWT+ltvraBqvht6WDehYzKLQzq/ZNfcsLwVSOadmoETGXFUAESxbQmKHS6uDBEc0/I 1tmd9Z+qRNDLo0bxm1FanHVOGocNE0uAmEtMlM5QNQdMmxvOZ9j2eCAtIN0Vx9gOm66P wdUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date:dkim-signature; bh=uVajoqDdsq50zTLUQY4X76UKkVV/WUAGolWtiSHiFeI=; b=Dv2u7bSVMwIOoQYXjkewPMMoMVi8iwEbYJ1EAbGAhqtjcmngYvZr033caemYp/eYjj OFdpT3H1aaB2p5iCAso/oRr5WUgV0hMTwfqTbjpI9aIyNTR40R8ZV/IuJ6PYYaB2x/B4 IYaL9hKowWFq+GStNummJBYYZultQxLzM22HxyjDIDN3dFrcV1N0G5g21XBAVJxhbfG+ A3TEhuJWQJRNht0II8wUID3MqL0T9pm0OtoQ/VcUiKwmv4u8Ko31JoHyqrLa7YY2E3w9 66vPcWbcP/JRSfg2s4HRcKQgLB/rPeDALW1mmNscJuKWdn0GVkmwz5rNjfklv8b+wiyA dKIA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=r94swXoK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b17si5074637pjz.105.2019.08.24.09.27.51; Sat, 24 Aug 2019 09:28:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=r94swXoK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727505AbfHXQ1G (ORCPT + 99 others); Sat, 24 Aug 2019 12:27:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:49302 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726343AbfHXQ1G (ORCPT ); Sat, 24 Aug 2019 12:27:06 -0400 Received: from localhost (c-67-169-218-210.hsd1.or.comcast.net [67.169.218.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B68562133F; Sat, 24 Aug 2019 16:27:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566664025; bh=hcaxNPorSpY124jIa9w8rWIov+dp/m3JU7ie7GcfkCE=; h=Date:From:To:Cc:Subject:From; b=r94swXoKa/uz9lHpJMlR+xBqyk/7xwAbnOFs5+EGRgh4C1Kges/VUelKS2x6L9cL8 IRjvMOiYcOAYXGgEDA9PgodALUR3a01D0wdV1OEbasShQ5qNrbqbYZ2HpdYecBJLpo fssndCq7omCzPd8HoQA+2YI8TRoCW2AHSa7oq0+M= Date: Sat, 24 Aug 2019 09:27:05 -0700 From: "Darrick J. Wong" To: Linus Torvalds Cc: "Darrick J. Wong" , linux-fsdevel@vger.kernel.org, linux-xfs@vger.kernel.org, david@fromorbit.com, linux-kernel@vger.kernel.org, sandeen@sandeen.net, hch@lst.de Subject: [GIT PULL] xfs: fix for 5.3-rc6 Message-ID: <20190824162705.GM1037350@magnolia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, Please pull this single patch that fixes a xfs lockup problem when a chown/chgrp operation fails due to running out of quota. It has survived the usual xfstests runs and merges cleanly with this morning's master. Please let me know if anything strange happens. --D The following changes since commit b68271609c4f16a79eae8069933f64345afcf888: fs/xfs: Fix return code of xfs_break_leased_layouts() (2019-08-19 18:15:28 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git tags/xfs-5.3-fixes-6 for you to fetch changes up to 1fb254aa983bf190cfd685d40c64a480a9bafaee: xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT (2019-08-22 20:55:54 -0700) ---------------------------------------------------------------- Changes since last time: - Fix a forgotten inode unlock when chown/chgrp fail due to quota. ---------------------------------------------------------------- Darrick J. Wong (1): xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT fs/xfs/xfs_iops.c | 1 + 1 file changed, 1 insertion(+)