From patchwork Tue Jun 20 18:24:01 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Sterba X-Patchwork-Id: 13286329 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id EAC5AEB64D8 for ; Tue, 20 Jun 2023 18:30:32 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229996AbjFTSaa (ORCPT ); Tue, 20 Jun 2023 14:30:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57362 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229973AbjFTSa2 (ORCPT ); Tue, 20 Jun 2023 14:30:28 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E6DAA1718; Tue, 20 Jun 2023 11:30:25 -0700 (PDT) Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out1.suse.de (Postfix) with ESMTP id 5C825218A0; Tue, 20 Jun 2023 18:30:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1687285824; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=Zq1z3U5IAtvjtp2bBDIsg7ir5yq0cMT3vnb9mvXSoKs=; b=U3Vbhk02KNcLM5Xhj3qZVUUzR1JV9gRsRUX0rF5lDpVZSMSSKLWbhz2wSoJq5U/OyrH8jk Aprjui7cGpC4TKljD8uoCJvlVQBC7BJRzBJ7jNEy+ZvemjWwNS9HJ+Rztw9Ksi2oyDhGJX Opfbhzdhh20OHWWSJbBYdWaOA8soSA4= Received: from ds.suse.cz (ds.suse.cz [10.100.12.205]) by relay2.suse.de (Postfix) with ESMTP id 4995A2C141; Tue, 20 Jun 2023 18:30:24 +0000 (UTC) Received: by ds.suse.cz (Postfix, from userid 10065) id 2852EDA7D7; Tue, 20 Jun 2023 20:24:02 +0200 (CEST) From: David Sterba To: torvalds@linux-foundation.org Cc: David Sterba , linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] Btrfs fix for 6.4-rc8 Date: Tue, 20 Jun 2023 20:24:01 +0200 Message-Id: X-Mailer: git-send-email 2.40.0 MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-btrfs@vger.kernel.org Hi, one more regression fix for an assertion failure that uncovered a nasty problem with stripe calculations. This is caused by a u32 overflow when there are enough devices. The fstests require 6 so this hasn't been caught, I was able to hit it with 8. The fix is minimal and only adds u64 casts, we'll clean that up later. I did various additional tests to be sure. Please pull, thanks. ---------------------------------------------------------------- The following changes since commit b50f2d048ecf1512ff85128ea4153bceb0e60590: btrfs: scrub: fix a return value overwrite in scrub_stripe() (2023-06-14 18:30:30 +0200) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kdave/linux.git for-6.4-rc7-tag for you to fetch changes up to a7299a18a179a9713651fce9ad00972a633c14a9: btrfs: fix u32 overflows when left shifting stripe_nr (2023-06-20 19:10:31 +0200) ---------------------------------------------------------------- Qu Wenruo (1): btrfs: fix u32 overflows when left shifting stripe_nr fs/btrfs/volumes.c | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-)