Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp1943831ybm; Thu, 23 May 2019 09:00:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqwk7Lch4bd26Pwm0AGsw6V+8ES2DIk5HuvMRtSfDZBJWuXeXdDKtfxJePG1p6Yzqw2U4fDI X-Received: by 2002:a63:6f0b:: with SMTP id k11mr97946404pgc.342.1558627214476; Thu, 23 May 2019 09:00:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558627214; cv=none; d=google.com; s=arc-20160816; b=KkHGcUniTN0tC2dZG5v8bmzdUWD3Rpt2VJZQv8JPRfhx100lXztTsf+u+X1bl/SN5S ZfovcAbWEhT0nF/62+z9uZnIzD/SldFs6zJy0zk3sUwV7TmocAZcYzy5T4qVqyyCfspL scPyJIFfN8NtD7jSaL/zZFCAcV3RZ/WN02kBrXbbxuan7QdmVPqW9O9cCRyW3GOpGhO6 ZccDcnj0NRYLVIYj0Kb7cJIUxGueVGLYw6xfPfuOdmfRGzrFwHZpLxYfUN6p8Ul/2twk fRBF5MGAhgaO3n2Sh/17nK/URNcFmQpJ3p/P7/w0EIiaCJcWL7B2X9HH7Q40iJam82w1 T8bA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:cc:subject :from:to; bh=g3cYK4fVMgC9mrdKeUBl4IEbjbKxlP9sN7Diw+kDbe0=; b=zj/dApRLzi3RpVl6q+wn6iw8WzmkKAwdJtuHbKVRNcnVGMy4KYuGM3jw1p0UT7cFJD S1otzp/sU4vmcFF99I3Tn6nY5FDZGc7CPtErPOnyPYW9ldYkumr25jPCPZ305VvDHJh0 XPNH9mOpYR76aZIO3maUJZlFgKr0JcIspMMhYUXHfAXj7B6jbmYPKsVuTE4b7FsLwJ27 0XsGe5hyyfKDwY4zr1XPbbRQMvcgfwKtxeWohjGydoGhp4osv0pL5QCq3+27dTa/YKAR cBr2KD8nSJcxyixaRjBG2lG7mGln1aeg2xRG9ee6yHV0gRs/X1WRNHBj9bs0P3lvgxC/ 5DkQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d1si1164831pjv.85.2019.05.23.08.59.51; Thu, 23 May 2019 09:00:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730867AbfEWP7e (ORCPT + 99 others); Thu, 23 May 2019 11:59:34 -0400 Received: from out30-44.freemail.mail.aliyun.com ([115.124.30.44]:41224 "EHLO out30-44.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730790AbfEWP7e (ORCPT ); Thu, 23 May 2019 11:59:34 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R101e4;CH=green;DM=||false|;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04420;MF=xuyu@linux.alibaba.com;NM=1;PH=DS;RN=6;SR=0;TI=SMTPD_---0TSUF5sN_1558627171; Received: from ali-6c96cfe0d157.local(mailfrom:xuyu@linux.alibaba.com fp:SMTPD_---0TSUF5sN_1558627171) by smtp.aliyun-inc.com(127.0.0.1); Thu, 23 May 2019 23:59:31 +0800 To: gregkh@linuxfoundation.org, kolga@netapp.com, linux-nfs@vger.kernel.org From: Yu Xu Subject: [backport request][stable] NFSv4.x: fix incorrect return value in copy_file_range Cc: joseph.qi@linux.alibaba.com, caspar@linux.alibaba.com Message-ID: <0f0e59bd-2520-e265-265e-4a29bf776c60@linux.alibaba.com> Date: Thu, 23 May 2019 23:59:30 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Hi, I'm using kernel v4.19.y and find that v4.19.y fails in the latest xfstests generic/075, 091, 112, 127 and 263, which can be simply reproduced as follows: # kernel 4.19.y $ xfs_io -fc "copy_range -s 0 -d 1 -l 1 /mnt/nfs/file" /mnt/nfs/file copy_range: Invalid argument # kernel 5.1.0 $ xfs_io -fc "copy_range -s 0 -d 1 -l 1 /mnt/nfs/file" /mnt/nfs/file # success I notice that upstream (v5.1+) has already fixed this issue with: 1) commit 45ac486ecf2dc998e25cf32f0cabf2deaad875be 2) commit 0769663b4f580566ef6cdf366f3073dbe8022c39 But these patches do not cc stable@vger.kernel.org (why? forgotten?). And will v4.19.y consider to backport these patches? Thanks, Yu