Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5504356ybp; Tue, 15 Oct 2019 00:07:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqz2BTg3gkuMs5NYHxhdxAlpoqLbahdP/tOExWKXgR2muA5GG/9b+YGbuaPS2tFGR1j7W+7Z X-Received: by 2002:a05:6402:7d2:: with SMTP id u18mr32972269edy.23.1571123224577; Tue, 15 Oct 2019 00:07:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571123224; cv=none; d=google.com; s=arc-20160816; b=k5xY5NTJmYsWNIVueBoW2HLGeMVjkZbFWsHFulNL2JsuEgM29xWV55vDA3qYaPEg8D wFeTijext/41p9ghFOJnGvqIAb4Iw74SAmyzwnQ5XvKfLLLEoHJZE6gnX8+sm1uMg8l2 MT3y7R7UDwBHT9lVXI+fqZfIGOBWDc8LseJ9ZleqcGuXNde7xt54Chrb4UZZJwUeyq84 ucAQGH5NQV7IvryO2f5DE3EYoZpc7wN1w1JaAWo0n4N1a5xINK39LLKXfppGHapWw6uJ ZFW6RT0s7AG22N+wNudd0TyBBQFsX1FiioqLy1Cc/OrorVfhcj1+JtBmTC2CQXzfHORJ LHjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=r1F/M4KWS7jBgGRUkM5modXgBH7SUCLB3S0kJ6jX64s=; b=qb9g+sPXhlzZX9ul+JHiw/z8h1p1Ps1OmqFP1Cs2bY5geBV7FARu5R1+AcEeDZgmaU RmkxucaYkB7W4/g06YFZ9tq8ChRGLY2lfjtFAQ9PnRdGmdElSvoyGTVQ8JSA8qKakp/d 5KO9jWqNE4QwJX5nfBioJ5630kMyaOQwmPwv6Cv/D6e97Un3iEitEUd0GSMdpKmQW+JC Lk6orHp5Co4htkZknmkTJpI61xXAfUdkDqNGsbUeIyPIJchp9TcLUrXtdihEByuqq6x2 95j0qWXgAbLdapDi71BssL6HQAvWl6cMWa2zSZ//Qyjk8gF+bySeEr28lf9H7kxwphvO SdQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r3si2167081ejs.427.2019.10.15.00.06.41; Tue, 15 Oct 2019 00:07:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727230AbfJOGS1 (ORCPT + 99 others); Tue, 15 Oct 2019 02:18:27 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:3756 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726044AbfJOGS1 (ORCPT ); Tue, 15 Oct 2019 02:18:27 -0400 Received: from DGGEMS403-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 78EA37BF91BCA7785E15; Tue, 15 Oct 2019 14:18:25 +0800 (CST) Received: from [10.134.22.195] (10.134.22.195) by smtp.huawei.com (10.3.19.203) with Microsoft SMTP Server (TLS) id 14.3.439.0; Tue, 15 Oct 2019 14:18:21 +0800 Subject: Re: Regression in longterm 4.19: f2fs: use generic EFSBADCRC/EFSCORRUPTED To: Andrew Macks CC: Pavel Machek , , Greg KH , kernel list , Jaegeuk Kim References: <20191013214440.GA20196@amd> From: Chao Yu Message-ID: Date: Tue, 15 Oct 2019 14:18:22 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20191013214440.GA20196@amd> Content-Type: text/plain; charset="windows-1252" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.134.22.195] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019/10/14 5:44, Pavel Machek wrote: > On Sat 2019-10-12 21:55:24, Andrew Macks wrote: >> Sorry for version typo in the previous message. >> >> In addition to 4.19, the issue was also backported to 4.14 and 5.2. >> >> 4.14, 4.19 and 5.2 are all missing the EINVAL fix from 5.3. > > Ouch. > > Well, when I seen the patch, I thought "looks like the bug is not > serious enough for -stable". I guess I should have spoken up. > > Anyway, I guess we need to either revert 59a5cea41dd0a or backport > 38fb6d0ea34299d97b too.... > > So I guess Greg and lists need to be cc-ed... and > > Thanks for the report and sorry for the trouble.... I'm so sorry to introduce original bug, the fixing patch ("f2fs: use EINVAL for superblock with invalid magic") should be backported to stable kernel as soon as possible. Thanks, > > Pavel > > >> Andrew. >> >> On Sat, 12 Oct 2019 at 21:39, Andrew Macks wrote: >> >>> Hi - there is a nasty regression which was recently introduced into >>> longterm 4.19.76. >>> >>> 59a5cea41dd0ae706ab83f8ecd64199aadefb493 was committed to 4.19, however it >>> introduces a regression that filesystems no longer mount if do_mounts >>> iterates through them after F2FS. This surfaced on one of my servers as >>> F2FS superblock check happens before btrfs mount is attempted. >>> >>> With this code, my server panicked after kernel upgrade as btrfs mount >>> wasn't attempted. >>> >>> This issue has already been fixed in 5.3 with this patch in July, but it >>> was missed from the 4.19 backport. >>> >>> 38fb6d0ea34299d97b031ed64fe994158b6f8eb3 >>> f2fs: use EINVAL for superblock with invalid magic >>> >>> Andypoo. >>> >