Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp5846109ybn; Sun, 29 Sep 2019 07:00:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqy5BDFYw9yKs6axpQBls2eoAHXqBnbCgTxy6BDIa8pGMXoVcaHg+fLPSKK5+E/kdjnom0bL X-Received: by 2002:a50:ab84:: with SMTP id u4mr14745056edc.13.1569765632907; Sun, 29 Sep 2019 07:00:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569765632; cv=none; d=google.com; s=arc-20160816; b=Cadq2Kr1BPQsh+KmCZT9+Jqx7eXOsteFbLkILt+kpSG5mSWmkM5EGmPc8e9/XuBAYd r/zibuJffGdBQ7DjqTNrLwGH6ml66qNqfg/yZ4TStHDupQC6TMrzlrmQ33i9aBqrNRiG BIFGohmweXMf0poTCQgtk4DEfbphhBkuBL66pgYBTOEe6xYEpC0lqK7dnv2THYq4dTqr wx7dgKf6abw17crdJqaLI4eaqwzL7N3yHnMW47T9Jaqj/dlB1gQfROccR6zPPtVJvNrF nWstkr9BUNf6b6wMUw2AT3c7ClviQHUr8J8icfC1FbuqVXLpksW7BfcD5jXkuYNf41oM x6+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pH1UQKUvh1PVuLNB9nX7rKNVlYQnbLwwobSPOj9/vFY=; b=TIAzm6l+M1sdMEeIezAZys2o7QdQGAbY56RPOvLtUpMhYZLpzr/oAuX8sdQk2LVWDC XduKCSOp/y/DUNO1SSF6ven3CYAkRjG+Ku3/G8F8EAGhFINuTSf0kLETeFv1MaYl78/e 9/1IuH6gHirp76JpooWQI59ljElB2hJ28D0HBp2+AMhxpn0R/gmsByBQRc3bf8yZFcTN ///QbDIXyZj+lMruelQGgS9fmJzcGCC8i+wKhnF3tqk3bCTihO8WYhMFePV2GPEA6vaf PI/GxgY4NDNcq3gddf+/zqBaWzqjzY7eR5H7GSzev4s+cNngT9iGhytrDDmJeSnQqLX4 6/HA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=u8B2wJzY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u3si5584095ejj.47.2019.09.29.07.00.08; Sun, 29 Sep 2019 07:00:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=u8B2wJzY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729570AbfI2N6k (ORCPT + 99 others); Sun, 29 Sep 2019 09:58:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:39446 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729567AbfI2N6j (ORCPT ); Sun, 29 Sep 2019 09:58:39 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5A7422082F; Sun, 29 Sep 2019 13:58:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1569765519; bh=tMeytRh19/5JwBBfiNuzCT9ZIvcUn/hRqRtQ3c1g+Xg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=u8B2wJzYr+uu9vGpqGSG40obWIUUempDXzC/KgCwV2H7nVjtUZuX6FGk34r2xrI3X uc2AmdejDvDQleDE5TsEKt2fts1e6VJcLr5zj1ah2PavunSD1w5s7xXlReMpor19Kh EyN5+MAspi3GIUEYobw7wELvlJuTCO/8kF2m0oJc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Surbhi Palande , Chao Yu , Jaegeuk Kim , Sasha Levin Subject: [PATCH 4.19 44/63] f2fs: check all the data segments against all node ones Date: Sun, 29 Sep 2019 15:54:17 +0200 Message-Id: <20190929135039.441288123@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190929135031.382429403@linuxfoundation.org> References: <20190929135031.382429403@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Surbhi Palande [ Upstream commit 1166c1f2f69117ad254189ca781287afa6e550b6 ] As a part of the sanity checking while mounting, distinct segment number assignment to data and node segments is verified. Fixing a small bug in this verification between node and data segments. We need to check all the data segments with all the node segments. Fixes: 042be0f849e5f ("f2fs: fix to do sanity check with current segment number") Signed-off-by: Surbhi Palande Reviewed-by: Chao Yu Signed-off-by: Jaegeuk Kim Signed-off-by: Sasha Levin --- fs/f2fs/super.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c index 1871031e2d5eb..e9ab4b39d4eef 100644 --- a/fs/f2fs/super.c +++ b/fs/f2fs/super.c @@ -2413,11 +2413,11 @@ int f2fs_sanity_check_ckpt(struct f2fs_sb_info *sbi) } } for (i = 0; i < NR_CURSEG_NODE_TYPE; i++) { - for (j = i; j < NR_CURSEG_DATA_TYPE; j++) { + for (j = 0; j < NR_CURSEG_DATA_TYPE; j++) { if (le32_to_cpu(ckpt->cur_node_segno[i]) == le32_to_cpu(ckpt->cur_data_segno[j])) { f2fs_msg(sbi->sb, KERN_ERR, - "Data segment (%u) and Data segment (%u)" + "Node segment (%u) and Data segment (%u)" " has the same segno: %u", i, j, le32_to_cpu(ckpt->cur_node_segno[i])); return 1; -- 2.20.1