Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1144771ybl; Fri, 6 Dec 2019 12:01:46 -0800 (PST) X-Google-Smtp-Source: APXvYqxGgC8GHsrdWH9y/3Josu6ghCddIatRQic0UTi+i/J9yrYyCV3ns9DTQg03Y4d3cWbvjYCc X-Received: by 2002:aca:4c87:: with SMTP id z129mr14420722oia.72.1575662506649; Fri, 06 Dec 2019 12:01:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575662506; cv=none; d=google.com; s=arc-20160816; b=nZ7CWCf34dkcth2KT86Tre4xpFzmdONEwDfrJtZjqOdtEL+D1ckqdwVv4IvEyN23fI wF410rAD8dWwpmYKecskrHDW31WQILZboGBRF70pX3tG/zq5eur97bJm7cEUKtFmLtn2 LGTjzpUKVGDqU57We//zmAjwOmqPHctDVVK10eegNKkGxUTz3hLWte7VKwurXXwdkb5Q MAKNy0kT1CvUYeO+/zmYLuS8XwaXQpO1NK7e5ajk6smOU9cIpSf2aXkHdO112d63Wepy orR+5KQ+FABxk0PIF5OKU7MWSBfCrEESWrBWS7pbW8KvCCgjwbl4dTppwhmG4R/tdNzl 5LnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date:dkim-signature; bh=OdQpYRDSsgmPeGCyrEQMg7BxQ6OZqQa4VhEVDjzOMq0=; b=rFeuzMZl5s2OpOZSJmwg+bdgyjZiWXqrx0BKdrNHwHIhW2IvrSvT7Pirk5rH309BdI 8wg+RME7fGxX+Ybi9Thwwcr4D+ZHgLu482hj7ewKk1hP0m6Ch9+SBxtLHzV52W1KNKxx SdVw4V/FgluzhamAj8sAUFzYR+gJtxDRLne87XD9YoteO06gohEJTqRU5Jyp+8tKm+K+ WA+VeP+Ll4Tfd6XJ5kKO9Uk1jpqYaPRlehQxTY4s3itXuV6R3EdoB3MkMZBkF/66B2gN Glwtf3IOhwxtdCinb7UpcTETRduuCSSDVmOVex1VjPGbxq2s7WWnnE6iZh7D02iHBFEY yg7g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="X/cgc1Zv"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p12si7401864otk.86.2019.12.06.12.01.33; Fri, 06 Dec 2019 12:01:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="X/cgc1Zv"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726407AbfLFUBD (ORCPT + 99 others); Fri, 6 Dec 2019 15:01:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:33654 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726325AbfLFUBC (ORCPT ); Fri, 6 Dec 2019 15:01:02 -0500 Received: from localhost (c-67-169-218-210.hsd1.or.comcast.net [67.169.218.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0DDDF2245C; Fri, 6 Dec 2019 19:51:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575661903; bh=79RvXak1dP5bCbsaEmGOMsdl02gOD69RYh+qUaJSG0E=; h=Date:From:To:Cc:Subject:From; b=X/cgc1ZvXOhYRyVK3HYtCz3uTC+DCt8OUyz1130hFD7loo0n/81SfY6qJnvvMhh25 VUPHjlK4WOn6EzAdIwAmtcYkMDddghKzHNVG5h0/IC5napYD2Rm2e9E61fUi1yduEt +KqGUNV3H/SmK3gvQz+sIUtcl9VGinrEKDxlDJM4= Date: Fri, 6 Dec 2019 11:51:42 -0800 From: "Darrick J. Wong" To: Linus Torvalds Cc: "Darrick J. Wong" , linux-fsdevel@vger.kernel.org, linux-xfs@vger.kernel.org, david@fromorbit.com, linux-kernel@vger.kernel.org, sandeen@sandeen.net, hch@lst.de Subject: [GIT PULL] xfs: fixes for 5.5-rc1 Message-ID: <20191206195142.GA9464@magnolia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, Please pull these bug fixes for 5.5-rc1, which fix a couple of resource management errors and a hang. The branch has survived a couple of days of xfstests runs and merges cleanly with this morning's master. Please let me know if anything strange happens. --D The following changes since commit 8feb4732ff9f2732354b44c4418569974e2f949c: xfs: allow parent directory scans to be interrupted with fatal signals (2019-11-27 08:23:14 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/fs/xfs/xfs-linux.git tags/xfs-5.5-merge-17 for you to fetch changes up to 798a9cada4694ca8d970259f216cec47e675bfd5: xfs: fix mount failure crash on invalid iclog memory access (2019-12-03 14:53:07 -0800) ---------------------------------------------------------------- Fixes for 5.5-rc1: - Fix a crash in the log setup code when log mounting fails - Fix a hang when allocating space on the realtime device - Fix a block leak when freeing space on the realtime device ---------------------------------------------------------------- Brian Foster (1): xfs: fix mount failure crash on invalid iclog memory access Omar Sandoval (2): xfs: fix realtime file data space leak xfs: don't check for AG deadlock for realtime files in bunmapi fs/xfs/libxfs/xfs_bmap.c | 27 +++++++++++++++------------ fs/xfs/xfs_log.c | 2 ++ 2 files changed, 17 insertions(+), 12 deletions(-)