Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp2648143ybe; Thu, 12 Sep 2019 12:37:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqy8mjv/sPr4P6e+bZY4761pk1ZgDKQKxYaedpNqHEWXehz5yW55E1y1SKVPM7LY9Lk7kyrK X-Received: by 2002:a17:906:53c1:: with SMTP id p1mr35685240ejo.227.1568317029328; Thu, 12 Sep 2019 12:37:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568317029; cv=none; d=google.com; s=arc-20160816; b=RrZvAk7OHLv5KGMg3+sJsDacCTusa7u/LiOqQQ42m3fnMRfpBO0849ZgUXsgMvHsnh w4WWDyKLPM+FLX3cl3XRULDV1H5hFvrYuREmPCLyOBTrZFU2c8KrOcEW3BDy9HVE2FJn VMcU7AL0gq0h5W+GXlQ/5oExudneh1niNh/hgRal6VURvgJqjqAqiozf88ipO03aX39p xd1zz8hrr2G54v4ifucnOArRxT299LXxXKq66v7HmtqSLkTjSCRwgKAGXSf+vIKUS+c1 ME/Y3el08cZhraciVphC5rGozct/XW1q6rW9dVoSX/1TRopItNEXaKwLc4aLt6RUvgAb +ddw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=3c//BukV/ysuMLfn5wUhRmCzsiDBQQ1Mg6WxYR3g9+o=; b=Jrf5AyawbLcuHprwLudHOH9C8LizTI833wJxbMx9WPqL8Oqup5Lg2gmBFIB+55cl+w wIkOU3M4xbh2itBdgTwzXfv+yiKC1RQ5IbOIavyKHEaa7FWCuho/nf6jaH36Lqy1VilR O1lpQbA8zYH38A2CcCBxs4SlypomxVWKcGWzxqjlXy4ybcrmhfFIGuXiBGPVREiq7KNh 7loLEUkzvggX96yc5XuELRIZrCW4aeL/qIqeL34oZiCJXfBTr/28+Xue57NqPfSq/y9S 9MKkrhSTk4gs7/L8BxsOcGarP9+SmbqSf77mnwdBQFIBN5gBwkJ5RddlOwj7w+Uj5MM/ U0KQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k25si17758866edd.209.2019.09.12.12.36.45; Thu, 12 Sep 2019 12:37:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387764AbfILRhJ (ORCPT + 99 others); Thu, 12 Sep 2019 13:37:09 -0400 Received: from mx2.suse.de ([195.135.220.15]:33424 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2387431AbfILRhJ (ORCPT ); Thu, 12 Sep 2019 13:37:09 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 5DC0DAEF8; Thu, 12 Sep 2019 17:37:07 +0000 (UTC) Received: by ds.suse.cz (Postfix, from userid 10065) id 3B506DA835; Thu, 12 Sep 2019 19:37:28 +0200 (CEST) From: David Sterba To: torvalds@linux-foundation.org Cc: David Sterba , clm@fb.com, linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] Last btrfs fixes for 5.3 Date: Thu, 12 Sep 2019 19:37:26 +0200 Message-Id: X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, there are two fixes, one of them urgent fixing a bug introduced in 5.2 and reported by many users. It took time to identify the root cause, catching the 5.3 release is higly desired also to push the fix to 5.2 stable tree. The bug is a mess up of return values after adding proper error handling and honestly the kind of bug that can cause sleeping disorders until it's caught. My appologies to everybody who was affected. Summary of what could happen: 1) either a hang when committing a transaction, if this happens there's no risk of corruption, still the hang is very inconvenient and can't be resolved without a reboot 2) writeback for some btree nodes may never be started and we end up committing a transaction without noticing that, this is really serious and that will lead to the "parent transid verify failed" messages Please pull, thanks. ---------------------------------------------------------------- The following changes since commit 07301df7d2fc220d3de5f7ad804dcb941400cb00: btrfs: trim: Check the range passed into to prevent overflow (2019-08-07 16:42:39 +0200) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kdave/linux.git for-5.3-rc8-tag for you to fetch changes up to 18dfa7117a3f379862dcd3f67cadd678013bb9dd: Btrfs: fix unwritten extent buffers and hangs on future writeback attempts (2019-09-12 13:37:25 +0200) ---------------------------------------------------------------- Filipe Manana (2): Btrfs: fix assertion failure during fsync and use of stale transaction Btrfs: fix unwritten extent buffers and hangs on future writeback attempts fs/btrfs/extent_io.c | 35 ++++++++++++++++++++++++++--------- fs/btrfs/tree-log.c | 16 ++++++++-------- 2 files changed, 34 insertions(+), 17 deletions(-)