Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3810371ybp; Sun, 13 Oct 2019 14:51:35 -0700 (PDT) X-Google-Smtp-Source: APXvYqzZzT+g6mAZwzQwh0tnm8b4ScLPk77lkyVJuPZlfyuf+JIG4tc48ZJkz8AyN1TbIkDQUwj1 X-Received: by 2002:a17:906:35c7:: with SMTP id p7mr25523554ejb.310.1571003495740; Sun, 13 Oct 2019 14:51:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571003495; cv=none; d=google.com; s=arc-20160816; b=Zecg1r3UW8pOJ2QZl12ilYLHpSktEcSvawhkism9Kb3pNrMglThpJpxy4pqJLqhGwl /Y48PGMr/pooXidh2eUbSL9B2/BCgZTP6ZuOJQE9a5lZ4RDJbSb87iyAumVP1lVjZy3p 7RGbULwiz1enKYj08H5lNi0Y4Q6oNkGgTX3wXhTVx1Cf8iyt8Y+GpbF8/RGPYDYBgGdU ovwN0ZqCQqUdp1CADdfg2OA7MmySxYIUJ29TUW91e45ZBGWLh/BgR5FuyNJEkUKpWrMR +phzvh75jZCmvTcjczTenEof4biPorKYTfu0MMHAk73myFh0BEmxpIYYngJjHSpU8DVB rT/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=aq2b5Uki78XY8DoAGWUpyCnRpCEzWPojDuQB1ikAskg=; b=MzQSQxfscPTiDACIWJE6Ikw57kJH/GrfM0jLzGfCY1c83yQv0yE+zQy8Psk9b8iqRS OagBs+LFHZIyHeBr+LlXmvcJJSK9KLiyHRVbv68LzGQE0fgtjAv96lz3XOb+xEPLGC5T w9n63e1xBa8wOvVoe4wjmus0sUWijgxgTp1FORzqRnhKBslkMqXqbY1rYs7VcnJX5Q5C hZ+cSM8/KSlC8Wpj5Iw+XCKGPXRZ7rKCxZy2pvN0RMOrgz8Lfe7hHDxrJwN07uTaOLd4 qU746CX4VxD70LGtkRgqwnh5F1nuhHqt/khpD9E6nVC+UiePg4DR6bdiwO1r0GdldZ5v NMqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f13si10694748eda.277.2019.10.13.14.51.12; Sun, 13 Oct 2019 14:51:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729468AbfJMVoo (ORCPT + 99 others); Sun, 13 Oct 2019 17:44:44 -0400 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:53461 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728777AbfJMVoo (ORCPT ); Sun, 13 Oct 2019 17:44:44 -0400 Received: by atrey.karlin.mff.cuni.cz (Postfix, from userid 512) id B6E3E80220; Sun, 13 Oct 2019 23:44:26 +0200 (CEST) Date: Sun, 13 Oct 2019 23:44:41 +0200 From: Pavel Machek To: Andrew Macks , stable@kernel.org, Greg KH , kernel list Cc: Chao Yu , Jaegeuk Kim Subject: Re: Regression in longterm 4.19: f2fs: use generic EFSBADCRC/EFSCORRUPTED Message-ID: <20191013214440.GA20196@amd> References: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="8t9RHnE3ZwKMSgU+" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --8t9RHnE3ZwKMSgU+ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat 2019-10-12 21:55:24, Andrew Macks wrote: > Sorry for version typo in the previous message. >=20 > In addition to 4.19, the issue was also backported to 4.14 and 5.2. >=20 > 4.14, 4.19 and 5.2 are all missing the EINVAL fix from 5.3. Ouch. Well, when I seen the patch, I thought "looks like the bug is not serious enough for -stable". I guess I should have spoken up. Anyway, I guess we need to either revert 59a5cea41dd0a or backport 38fb6d0ea34299d97b too.... So I guess Greg and lists need to be cc-ed... and=20 Thanks for the report and sorry for the trouble.... Pavel > Andrew. >=20 > On Sat, 12 Oct 2019 at 21:39, Andrew Macks wrote: >=20 > > Hi - there is a nasty regression which was recently introduced into > > longterm 4.19.76. > > > > 59a5cea41dd0ae706ab83f8ecd64199aadefb493 was committed to 4.19, however= it > > introduces a regression that filesystems no longer mount if do_mounts > > iterates through them after F2FS. This surfaced on one of my servers as > > F2FS superblock check happens before btrfs mount is attempted. > > > > With this code, my server panicked after kernel upgrade as btrfs mount > > wasn't attempted. > > > > This issue has already been fixed in 5.3 with this patch in July, but it > > was missed from the 4.19 backport. > > > > 38fb6d0ea34299d97b031ed64fe994158b6f8eb3 > > f2fs: use EINVAL for superblock with invalid magic > > > > Andypoo. > > --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --8t9RHnE3ZwKMSgU+ Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAl2jmsgACgkQMOfwapXb+vL2NwCeNwJGQVue06R4Q3nOP1MkrMaU sH4AnihqqfajtmJ6pQ+zd3t/bRJfqAEf =eLSo -----END PGP SIGNATURE----- --8t9RHnE3ZwKMSgU+--