Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4791857ybp; Mon, 14 Oct 2019 10:05:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqwAk9F3h9x5tKpsNU7/v4oHVxlo1U18ngxW1p6e628YZELlTtA8fNDJXc2YqjoZ4uy4Xj9h X-Received: by 2002:aa7:d582:: with SMTP id r2mr22599662edq.196.1571072703166; Mon, 14 Oct 2019 10:05:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571072703; cv=none; d=google.com; s=arc-20160816; b=QqAhf+iVS4a9RRSnrUuYy/d7LInj6nI+FKY/jjUVifX8hAFMWJW5rsgae/0dSQGHBG NnuWE1AJW6B9PHPNBIKAA6cznsJ9IcB08i8qRtsxdHeZDTTt9obVuzk6vBLQZwgnvcoN kL22eP0k1XgXptQrXPizATFxRr/efoSFamLk9XFcuJ0bJ4aPV8RieTIcahXTC0+MxJ2G pz3nue6RxVUtfsJ5Jkz2uOXX3L1YfgXxUxxsfvtZzvH5w+WATTHTqhrPpE8wA8EWIC9E zZk8ZjG0B/Hji+jq0Z7ge6x7ovhd/3XVWisuWr3e5D+X2WJGpkmyER4ZgTF2xdaJNZhG pywg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=uWw2Z/fUr9r7ygmx7OmoI9hUOmbElzCT/dV1MH9e69I=; b=tRlf3u5DljAJ3z0QpgKRfgnfq/QmOUk+2MKeojrI35dvzgr2OeiJflmYPTlaJevzIy WAWz/aZmWKNBB6poFYNFGUi7iEh9tyCNH3Uzay3E6cUCvvts3y0deWHkf8OjUPILkDIw XtbwELjlTJJcBsFWVBtNGLYK6+sZFXq73cc6hpWCFhRKJfy1F/IgCvZqyAXHb1GE5niy hsxDVznWMHm3pcm089GpN+wc+sMKWj3vQfOUpBB0bWsl+pCsuM8ampoeobXkSU/hpANs pukwVLaSpCUaBuEmQpHmUgHK87gkjkceeRLk+GnCT9WCnXx2mQHZ6p7GSDupYFcixzqN 6w0w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YgC2erON; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i10si13234541ede.101.2019.10.14.10.04.37; Mon, 14 Oct 2019 10:05:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YgC2erON; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388133AbfJNQhS (ORCPT + 99 others); Mon, 14 Oct 2019 12:37:18 -0400 Received: from mail.kernel.org ([198.145.29.99]:40474 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732550AbfJNQhS (ORCPT ); Mon, 14 Oct 2019 12:37:18 -0400 Received: from localhost (unknown [104.132.0.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 86B0B21835; Mon, 14 Oct 2019 16:37:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571071037; bh=878DuIWznyHShg4KkX2cLIzJpu5yrUZVvBHYaduUPEQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=YgC2erON/ZOLaFpvCgMjE09GdR0Bmm3yDqH0L9s3AvEXcz6sb1/hC4PRdzPUj8cPv vLxMrWW+5yTiWhLHlNuezjfTM/uZloh15o0D5bS2U9NPDdoBdaphejammqHKOvCoci hOinQbQ2/Ybsa3vAthO7x1nAfNOhdYLYQpbZEYaY= Date: Mon, 14 Oct 2019 09:37:16 -0700 From: Jaegeuk Kim To: Pavel Machek Cc: Andrew Macks , stable@kernel.org, Greg KH , kernel list , Chao Yu Subject: Re: Regression in longterm 4.19: f2fs: use generic EFSBADCRC/EFSCORRUPTED Message-ID: <20191014163716.GA76340@jaegeuk-macbookpro.roam.corp.google.com> References: <20191013214440.GA20196@amd> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191013214440.GA20196@amd> User-Agent: Mutt/1.8.2 (2017-04-18) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Thank you so much for taking care of this. Hi Greg, Could you please cherry-pick the below commit in -stable? 38fb6d0ea34299d97b031ed64fe994158b6f8eb3 f2fs: use EINVAL for superblock with invalid magic Thanks, On 10/13, Pavel Machek wrote: > On Sat 2019-10-12 21:55:24, Andrew Macks wrote: > > Sorry for version typo in the previous message. > > > > In addition to 4.19, the issue was also backported to 4.14 and 5.2. > > > > 4.14, 4.19 and 5.2 are all missing the EINVAL fix from 5.3. > > Ouch. > > Well, when I seen the patch, I thought "looks like the bug is not > serious enough for -stable". I guess I should have spoken up. > > Anyway, I guess we need to either revert 59a5cea41dd0a or backport > 38fb6d0ea34299d97b too.... > > So I guess Greg and lists need to be cc-ed... and > > Thanks for the report and sorry for the trouble.... > > Pavel > > > > Andrew. > > > > On Sat, 12 Oct 2019 at 21:39, Andrew Macks wrote: > > > > > Hi - there is a nasty regression which was recently introduced into > > > longterm 4.19.76. > > > > > > 59a5cea41dd0ae706ab83f8ecd64199aadefb493 was committed to 4.19, however it > > > introduces a regression that filesystems no longer mount if do_mounts > > > iterates through them after F2FS. This surfaced on one of my servers as > > > F2FS superblock check happens before btrfs mount is attempted. > > > > > > With this code, my server panicked after kernel upgrade as btrfs mount > > > wasn't attempted. > > > > > > This issue has already been fixed in 5.3 with this patch in July, but it > > > was missed from the 4.19 backport. > > > > > > 38fb6d0ea34299d97b031ed64fe994158b6f8eb3 > > > f2fs: use EINVAL for superblock with invalid magic > > > > > > Andypoo. > > > > > -- > (english) http://www.livejournal.com/~pavelmachek > (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html