Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3726398imm; Mon, 4 Jun 2018 08:19:03 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJc78pDHqr8Vc1vTBKtBSg+1lEyvLqzJQqOrQjJ/bc+QBXWFrid44KWZkX+aM+n5FFk35XJ X-Received: by 2002:a17:902:8c95:: with SMTP id t21-v6mr22067967plo.306.1528125543571; Mon, 04 Jun 2018 08:19:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528125543; cv=none; d=google.com; s=arc-20160816; b=xhJUTblrLDbq1TcAE8+++xgjReUhfgGp2p7xIp2cGcHK56o/G96oUGn1MwDexUdTUY lAF+zp4yLTWJJj42q6F5srnoeea4r6Kj6urCClANdPOKxCQmiSo9wlphSexEFx/ZiLjR eZuXmbpqULY6c5BWGAyplYm80Gxi/UHnzFgR1ZKpIvNmAp4XW6sFnkh59IbQhzVVmW49 ejiNOf09zYFTq68PDYZMF/iyQUUpN7991J5gLZQFBPWrLIaIumde+UWTF1hRUJPn2+ri yjWwaYzqxZ9LC3AWOVXqjwgDpkbZKjnFWEAAVs9fPjpY3xiAg5En/Jn1AyMdvOiGSRrV 4Pcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=5tyrfXVEjrUCmvNbQTMGvrqI/Jq4MM5F+HhMyl0ccE4=; b=rpKNKOlFYw7WLeY/DaMJ8PhP311EHQI6VOnbc9xLe/0R1QH/79jjqmEVys/CsvF1zN Fdtu3EKDUwW+Zk6jeFhfYl8GCtw/GFalHolm4XVOfS5Qp3TreYdeq4pQzXVlGtZWT8FK zpGBSqlBLehJQicXI2LgpsGs2uxpdYIjXslTToiGRXJIP3sCHOmQyI0bzrvjes9Z1832 l4MGifUo2JRZlpxHZ3z2RitqtbqJwrpu4G6UI3EUzrogzHF+FQR/+xvx6O4RHDD6B93g kHs/ygwfrHJmR/ZNPT73DVbXlKZt3QxTLIi4aEMMbmFUmBYLbOcCseY31pl9eQtFOTW0 dvXg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o10-v6si14401187pgp.153.2018.06.04.08.18.48; Mon, 04 Jun 2018 08:19:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753697AbeFDPRo (ORCPT + 99 others); Mon, 4 Jun 2018 11:17:44 -0400 Received: from mx2.suse.de ([195.135.220.15]:54185 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752543AbeFDPRn (ORCPT ); Mon, 4 Jun 2018 11:17:43 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext-too.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id C5424ADA7; Mon, 4 Jun 2018 15:17:41 +0000 (UTC) Received: by ds.suse.cz (Postfix, from userid 10065) id D8B84DA7C6; Mon, 4 Jun 2018 17:14:56 +0200 (CEST) From: David Sterba To: torvalds@linux-foundation.org Cc: David Sterba , linux-kernel@vger.kernel.org Subject: [GIT PULL] AFFS fix for 4.18 Date: Mon, 4 Jun 2018 17:14:53 +0200 Message-Id: X-Mailer: git-send-email 2.17.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, there's one potential memory leak fix for AFFS. I'm using my main k.org tree for that. The branch is based on some random pre-rc7 commit I had in master and forgot to rebase it on top of rc7 in time. Functionally it should not matter, but I guess you'd notice. Please pull, thanks. ---------------------------------------------------------------- The following changes since commit b50694381cfc22dce3a60a291cdae294a5e5777c: Merge branch 'stable/for-linus-4.17' of git://git.kernel.org/pub/scm/linux/kernel/git/konrad/swiotlb (2018-05-24 14:42:43 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kdave/linux.git affs-for-4.18-tag for you to fetch changes up to 84ae6f829fc2b23dd4985ab059cddfd4a1ccc14f: affs: fix potential memory leak when parsing option 'prefix' (2018-05-28 12:36:41 +0200) ---------------------------------------------------------------- Chengguang Xu (1): affs: fix potential memory leak when parsing option 'prefix' fs/affs/super.c | 1 + 1 file changed, 1 insertion(+)