Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp973588ybg; Mon, 27 Jul 2020 04:47:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz9ErgLxlWpF/hR256Dmiu1d2qA+d2i7TIaCaHuCnmXSw7MaWqmLYXkG8d5846cJQymucDt X-Received: by 2002:a50:fa4c:: with SMTP id c12mr18812921edq.5.1595850446087; Mon, 27 Jul 2020 04:47:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595850446; cv=none; d=google.com; s=arc-20160816; b=msn2XE1I6c8R+Pgu+uov+bDDgv/DhQQy/XHlDOWJ6OlzUYWWvHtfRMgi6Q4s9I6XaP ctHtBkqu31lYnpVj3rY8mWzgIN+OBqZ2E5hd6CodiYASCPZUqkY2ds2NN0BWIdIAuFCq nm8IpitG2MCSit3fc5Qy4i1Ed17YEfidDs+XqaNc3+xISKjPxK2W8ykxyLJdkJDcOXCu s/TzFTXIPC3CWFqbUz1bOVNi6FA1Ec3OOUJL65c9QJgA3qM0WjLQdJSJejfWVQWVeqPG dkgx35BsHBFe2sLiHeWIGF0kWW9Vdqa142U6+1ic4OwuM2REKS5ywwNwsezxycg+dC0X /Kqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=n+DdKJzbM6Vyzi2+KCnA8Tn3R29FudtQIXn3ZIB81FE=; b=Vxynf0s7wD+DSdWFrVoYe9EYubXddgvYYTb7Ee8zjq4c+Ce361JvV8n+gcf3VNqehV dP3gfeC5+b8dGUeSiq/L3RODnhj+xiOitXUhqVOMW68hkWloQP1VHvOR2nl/5axhxqiC TzEGdppIMoN5v+bDyk9n+3It3SgR1D8KF1Nw7iTmvsZEgElxfmTa4SeeHIjBAmByaI6l P4ex9tVaW+P5kIYMhj1z6gZrdr6Hil3/CPWswoydtiLX05BW4+0BgVsQj/8NHRxBbrvo mgzu/oePzDlhWdCa81JieAJqhMtHTaEHtZJ7PwKmUMCfaaIZry7db8wB1PMn642o7kW1 d+FA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h5si5539629ejq.249.2020.07.27.04.47.02; Mon, 27 Jul 2020 04:47:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726885AbgG0Lob (ORCPT + 99 others); Mon, 27 Jul 2020 07:44:31 -0400 Received: from mx2.suse.de ([195.135.220.15]:45904 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727978AbgG0Lob (ORCPT ); Mon, 27 Jul 2020 07:44:31 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id C0C67B68F; Mon, 27 Jul 2020 11:44:40 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 4AE9A1E12C5; Mon, 27 Jul 2020 13:44:30 +0200 (CEST) From: Jan Kara To: Ted Tso Cc: , Lukas Czerner , Jan Kara Subject: [PATCH 0/6 v2] ext4: Check journal inode extents more carefully Date: Mon, 27 Jul 2020 13:44:23 +0200 Message-Id: <20200727114429.1478-1-jack@suse.cz> X-Mailer: git-send-email 2.16.4 Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Hello! This series changes ext4 to properly check extent tree blocks of journal inode. Omitting these (which is a limitation of block validity checks) leads to crash in ext4_cache_extents() in case the extent tree of the journal inode is suitably corrupted. Changes since v1: * Added Reviewed-by tags from Lukas * Fixed two more unrelated minor bugs in block validity testing spotted by Lukas Honza