[PATCH v2] btrfs: fix a potential hole-punching failure

2021-03-24 Thread bingjingc
From: BingJing Chang In commit d77815461f04 ("btrfs: Avoid trucating page or punching hole in a already existed hole."), existed holes can be skipped by calling find_first_non_hole() to adjust *start and *len. However, if the given len is invalid and large, when an EXTENT_MAP_HOLE extent is

[PATCH] btrfs: fix a potential hole-punching failure

2021-03-24 Thread bingjingc
From: BingJing Chang In commit d77815461f04 ("btrfs: Avoid trucating page or punching hole in a already existed hole."), existed holes can be skipped by calling find_first_non_hole() to adjust *start and *len. However, if the given len is invalid and large, when an EXTENT_MAP_HOLE extent is

[PATCH] parser: Fix kernel-doc markups

2021-01-28 Thread bingjingc
From: BingJing Chang Fix existing issues at the kernel-doc markups Signed-off-by: BingJing Chang --- lib/parser.c | 22 +++--- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/lib/parser.c b/lib/parser.c index f5b3e5d..763acd7 100644 --- a/lib/parser.c +++

[PATCH v3 3/3] udf: handle large user and group ID

2021-01-28 Thread bingjingc
From: BingJing Chang If uid or gid of mount options is larger than INT_MAX, udf_fill_super will return -EINVAL. The problem can be encountered by a domain user or reproduced via: mount -o loop,uid=2147483648 something-in-udf-format.iso /mnt This can be fixed as commit 233a01fa9c4c ("fuse:

[PATCH v3 2/3] isofs: handle large user and group ID

2021-01-28 Thread bingjingc
From: BingJing Chang If uid or gid of mount options is larger than INT_MAX, isofs_fill_super will return -EINVAL. The problem can be encountered by a domain user or reproduced via: mount -o loop,uid=2147483648 ubuntu-16.04.6-server-amd64.iso /mnt This can be fixed as commit 233a01fa9c4c

[PATCH v3 1/3] parser: add unsigned int parser

2021-01-28 Thread bingjingc
From: BingJing Chang Will be used by fs parsing options Reviewed-by: Robbie Ko Reviewed-by: Chung-Chiang Cheng Signed-off-by: BingJing Chang --- include/linux/parser.h | 1 + lib/parser.c | 22 ++ 2 files changed, 23 insertions(+) diff --git

[PATCH v3 0/3] handle large user and group ID for isofs and udf

2021-01-28 Thread bingjingc
From: BingJing Chang The uid/gid (unsigned int) of a domain user may be larger than INT_MAX. The parse_options of isofs and udf will return 0, and mount will fail with -EINVAL. These patches try to handle large user and group ID. BingJing Chang (3): parser: add unsigned int parser isofs:

[PATCH v2 2/3] isofs: handle large user and group ID

2021-01-27 Thread bingjingc
From: BingJing Chang If uid or gid of mount options is larger than INT_MAX, isofs_fill_super will return -EINVAL. The problem can be encountered by a domain user or reproduced via: mount -o loop,uid=2147483648 ubuntu-16.04.6-server-amd64.iso /mnt This can be fixed as commit 233a01fa9c4c

[PATCH v2 1/3] parser: add unsigned int parser

2021-01-27 Thread bingjingc
From: BingJing Chang Will be used by fs parsing options & fix kernel-doc typos Reviewed-by: Robbie Ko Reviewed-by: Chung-Chiang Cheng Reviewed-by: Matthew Wilcox Reviewed-by: Randy Dunlap Signed-off-by: BingJing Chang --- include/linux/parser.h | 1 + lib/parser.c | 44

[PATCH v2 3/3] udf: handle large user and group ID

2021-01-27 Thread bingjingc
From: BingJing Chang If uid or gid of mount options is larger than INT_MAX, udf_fill_super will return -EINVAL. The problem can be encountered by a domain user or reproduced via: mount -o loop,uid=2147483648 something-in-udf-format.iso /mnt This can be fixed as commit 233a01fa9c4c ("fuse:

[PATCH v2 0/3] handle large user and group ID for isofs and udf

2021-01-27 Thread bingjingc
From: BingJing Chang The uid/gid (unsigned int) of a domain user may be larger than INT_MAX. The parse_options of isofs and udf will return 0, and mount will fail with -EINVAL. These patches try to handle large user and group ID. BingJing Chang (3): parser: add unsigned int parser isofs:

[PATCH 3/3] parser: add unsigned int parser

2021-01-27 Thread bingjingc
From: BingJing Chang Will be used by fs parsing options Reviewed-by: Robbie Ko Reviewed-by: Chung-Chiang Cheng Signed-off-by: BingJing Chang --- fs/isofs/inode.c | 16 ++-- fs/udf/super.c | 16 ++-- include/linux/parser.h | 1 + lib/parser.c |

[PATCH 2/3] udf: handle large user and group ID

2021-01-27 Thread bingjingc
From: BingJing Chang If uid or gid of mount options is larger than INT_MAX, udf_fill_super will return -EINVAL. The problem can be encountered by a domain user or reproduced via: mount -o loop,uid=2147483648 something-in-udf-format.iso /mnt This can be fixed as commit 233a01fa9c4c ("fuse:

[PATCH 1/3] isofs: handle large user and group ID

2021-01-27 Thread bingjingc
From: BingJing Chang If uid or gid of mount options is larger than INT_MAX, isofs_fill_super will return -EINVAL. The problem can be encountered by a domain user or reproduced via: mount -o loop,uid=2147483648 ubuntu-16.04.6-server-amd64.iso /mnt This can be fixed as commit 233a01fa9c4c

[PATCH 0/3] handle large user and group ID for isofs and udf

2021-01-27 Thread bingjingc
From: BingJing Chang The uid/gid (unsigned int) of a domain user may be larger than INT_MAX. The parse_options of isofs and udf will return 0, and mount will fail with -EINVAL. These patches try to handle large user and group ID. BingJing Chang (3): isofs: handle large user and group ID