Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp10761397ybi; Thu, 11 Jul 2019 10:31:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqzdmH+pUhAi79lInXhhfV22Wq7GJUyHDtiAZLOR81AQAxHl148irZpbyVbQ3uwNTZetMDQh X-Received: by 2002:a17:90b:d8f:: with SMTP id bg15mr6130695pjb.65.1562866313371; Thu, 11 Jul 2019 10:31:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562866313; cv=none; d=google.com; s=arc-20160816; b=A8aJmko5vN/tnyVhJWpbhfn3NRgfKtAH0fvhMIfXGqBLM0uTGeoww3QlMdRxvwhV88 gWR/RJflEXGpGa3EQwLKFPYyiyV0fs/rVga48EMV2L9hzEImr/a5uM0bpY7yN/g8PdLg fwB4oW6xG4GjetDZNzVUbhE/kOK3uhg9CsOu3ZMiAUYYUz1rn+cKoD1nSwNTzqki5m5V jKxwy0PrOQMaLTBWsMh8gSzf5CrNFHC5AwB6zsYLY9OkWWNwp/UZ1NfEk7ggTV4xYm8x uUbFDevDY7rM1VtMS5hK+1LntjpB2RfjiwE0ikT8RtJTasTCeQ1d+VX3stQB0LrbUe8L 9EVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date:dkim-signature; bh=9ltUKjxI4P3vAkDjFa2tt1UCWMprBt/FXvc+x5OcnOQ=; b=bvyS1lBnt67fS/TfNvUA4vM9KVqvaK453GOkyblCdmQw8RrWkkalRztrmxitB1TVSF WO0xrZ2B0NqDuU4BuQnyHn/mI7oHbV9U2go6lNXkBAbIcrryOndVY9fx3o3pHmgrjaac NbEfXQfROak3rQcHX2knsgTSGgT3lmK+5spVXTWbAhrFk2fav5PgFNJ36ZKoXVmftqvE e/D8jWId9Dppu7cFdBed1y4Pq2mdKpaj62+KEg4uhYErujcEG2iXeN1tTMLJXur5abMz GkXjlVLCu5wjbAOSUpm4tWr+LWMXllSO0cD0UhOECbApteWv/jEBS/5PsjiAhFDgKYwI CEoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0TqnHc8q; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i133si5567171pgc.109.2019.07.11.10.31.37; Thu, 11 Jul 2019 10:31:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0TqnHc8q; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728864AbfGKRNj (ORCPT + 99 others); Thu, 11 Jul 2019 13:13:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:56890 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728549AbfGKRNi (ORCPT ); Thu, 11 Jul 2019 13:13:38 -0400 Received: from localhost (unknown [104.132.1.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7453C20872; Thu, 11 Jul 2019 17:13:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1562865217; bh=bvCqdNXA0lNVRHiKVn7GV3+2W08VEttCRx0QEFub0cs=; h=Date:From:To:Cc:Subject:From; b=0TqnHc8qfAgJztGG94YdRuN4xG2kZaS6sbf1z74YUdhdwMk2kV4Stu438wlgeKV8L oh3vC96kARmmtfPmwIhzbWFROiLU1zK2h36Bc/YzMJEobAdVQGMHqA8iWxDsHuoFlw sJBgH8E0onMZ8EOj+HQItpmYf2qEOsOwt7zk0lAw= Date: Thu, 11 Jul 2019 10:13:36 -0700 From: Jaegeuk Kim To: Linus Torvalds Cc: Linux F2FS Dev Mailing List , Linux Kernel Mailing List Subject: [GIT PULL] f2fs for 5.3 Message-ID: <20190711171336.GA66396@jaegeuk-macbookpro.roam.corp.google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.8.2 (2017-04-18) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, Could you please consider this pull request? Thanks, The following changes since commit e0654264c4806dc436b291294a0fbf9be7571ab6: Merge tag 'backlight-next-5.2' of git://git.kernel.org/pub/scm/linux/kernel/git/lee/backlight (2019-05-14 10:45:03 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jaegeuk/f2fs.git tags/f2fs-for-5.3 for you to fetch changes up to 2d008835ec2fcf6eef3285e41e62a5eabd1fe76b: f2fs: improve print log in f2fs_sanity_check_ckpt() (2019-07-10 18:44:47 -0700) ---------------------------------------------------------------- f2fs-for-5.3-rc1 In this round, we've introduced native swap file support which can exploit DIO, enhanced existing checkpoint=disable feature with additional mount option to tune the triggering condition, and allowed user to preallocate physical blocks in a pinned file which will be useful to avoid f2fs fragmentation in append-only workloads. In addition, we've fixed subtle quota corruption issue. Enhancement: - add swap file support which uses DIO - allocate blocks for pinned file - allow SSR and mount option to enhance checkpoint=disable - enhance IPU IOs - add more sanity checks such as memory boundary access Bug fix: - quota corruption in very corner case of error-injected SPO case - fix root_reserved on remount and some wrong counts - add missing fsck flag Some patches were also introduced to clean up ambiguous i_flags and debugging messages codes. ---------------------------------------------------------------- Chao Yu (10): f2fs: fix to check layout on last valid checkpoint park f2fs: add bio cache for IPU f2fs: fix to avoid deadloop if data_flush is on f2fs: fix to do sanity check on segment bitmap of LFS curseg f2fs: fix sparse warning f2fs: avoid get_valid_blocks() for cleanup f2fs: print kernel message if filesystem is inconsistent f2fs: use generic EFSBADCRC/EFSCORRUPTED f2fs: set SBI_NEED_FSCK for xattr corruption case f2fs: improve print log in f2fs_sanity_check_ckpt() Daniel Rosenberg (4): f2fs: Lower threshold for disable_cp_again f2fs: Fix root reserved on remount f2fs: Fix accounting for unusable blocks f2fs: Add option to limit required GC for checkpoint=disable Eric Biggers (1): f2fs: separate f2fs i_flags from fs_flags and ext4 i_flags Geert Uytterhoeven (1): f2fs: Use DIV_ROUND_UP() instead of open-coding Heng Xiao (1): f2fs: fix to avoid long latency during umount Jaegeuk Kim (7): f2fs: link f2fs quota ops for sysfile f2fs: allow ssr block allocation during checkpoint=disable period f2fs: add missing sysfs entries in documentation f2fs: add a rw_sem to cover quota flag changes f2fs: allocate blocks for pinned file f2fs: support swap file w/ DIO f2fs: allow all the users to pin a file Joe Perches (1): f2fs: introduce f2fs_ macros to wrap f2fs_printk() Kimberly Brown (1): f2fs: replace ktype default_attrs with default_groups Ocean Chen (1): f2fs: avoid out-of-range memory access Park Ju Hyung (1): f2fs: always assume that the device is idle under gc_urgent Qiuyang Sun (1): f2fs: ioctl for removing a range from F2FS Sahitya Tummala (3): f2fs: add error prints for debugging mount failure f2fs: fix f2fs_show_options to show nodiscard mount option f2fs: fix is_idle() check for discard type Wang Shilong (1): f2fs: only set project inherit bit for directory Documentation/ABI/testing/sysfs-fs-f2fs | 8 + Documentation/filesystems/f2fs.txt | 133 ++++++- fs/f2fs/checkpoint.c | 107 +++--- fs/f2fs/data.c | 249 +++++++++++-- fs/f2fs/debug.c | 7 + fs/f2fs/dir.c | 16 +- fs/f2fs/extent_cache.c | 7 +- fs/f2fs/f2fs.h | 129 +++---- fs/f2fs/file.c | 302 ++++++++++------ fs/f2fs/gc.c | 196 +++++++++- fs/f2fs/inline.c | 16 +- fs/f2fs/inode.c | 78 ++-- fs/f2fs/namei.c | 10 +- fs/f2fs/node.c | 38 +- fs/f2fs/recovery.c | 43 +-- fs/f2fs/segment.c | 170 +++++++-- fs/f2fs/segment.h | 16 +- fs/f2fs/super.c | 610 +++++++++++++++----------------- fs/f2fs/sysfs.c | 28 +- fs/f2fs/xattr.c | 10 +- include/trace/events/f2fs.h | 11 +- 21 files changed, 1409 insertions(+), 775 deletions(-)