Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp4111032pxb; Tue, 10 Nov 2020 08:11:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJyJL6nuG7MYgvsbLn4KkvY0d1A1bJ4Iidk0345uPv2jBn1ddC2acyLCR0Ft0UlyaiA+Sf/B X-Received: by 2002:a17:906:cb0f:: with SMTP id lk15mr19880389ejb.431.1605024718239; Tue, 10 Nov 2020 08:11:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605024718; cv=none; d=google.com; s=arc-20160816; b=n+aVpI3TQLuRjLwYX7fe5QwL1wqUEWLodq+HGS1j2OD/UkPl0uQOQxJbX3DHxU/dYF 4Plbs7Crt+SZwbfLRzxr975udx3WIjtVbvgV5Be/n+u6cMkC3RQHU2BqMswX4k4QBtQX yQtWHIxNaJWkI3N+agYOUVg1qii9Sq4LFJj9nhCHCOVWBpKjDh5JE5jzE7QLCe5toqrU KMKnPCFGzRq7lbQAHw3ZghBZJyprxG3is48zNC1h7l+BJml9MwzVD6qK9vAoZ+r5lzLH tX2nN6oveWfJ+ccbZiLBNNSkSG4Ssjk+GcNzXkUMXcbXUsJTPC1REVMe8LPU/loqQjVx zqmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=3e+3nDrdHe42lYq8N47pjMvAbKv/DdnTrRGXCyH/IA4=; b=B1iSNPuwGt5RhHiEo2+ow0DD9x0cNpGLmZDlq8IbqNeQfZSOsttZDf2e4S9eTNgIYB SrsKRUbCnQdfrURkSpgLS30pfY/+MCf0NMa2fxj1MTow44zatQ327GaanEuYjG0Mgn2/ q0EJ+DnebHP0WjG3KCDhQEQLAQ2y8EestuvTwSrV2BRhRm/SiddEgMhiK/TFTacwJbEQ iBCWoDlxFLlafe+VhrRqjqXpCCIGFyZvJsNUObgIJc3QmJlMiEjGtvH0VI4PBdlGfQSQ sed+1W3Ii+icYU9datBqItkJrFmziGxzgDnwJUipAWJAeo2g+Mdqgx074MyW0wifhz9Z haAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=RNOSyfWL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a20si13486652edn.39.2020.11.10.08.11.33; Tue, 10 Nov 2020 08:11:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=RNOSyfWL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731067AbgKJQHh (ORCPT + 99 others); Tue, 10 Nov 2020 11:07:37 -0500 Received: from mx2.suse.de ([195.135.220.15]:50786 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729909AbgKJQHh (ORCPT ); Tue, 10 Nov 2020 11:07:37 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1605024455; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=3e+3nDrdHe42lYq8N47pjMvAbKv/DdnTrRGXCyH/IA4=; b=RNOSyfWLDNXg5vBsPWFJ9M5iAXYU/iCqniUlT4fkteLZQh3Dx/yTSNzFD0bfkE1ZZjavX5 j0rF87uhDN0lZPsd2ygQbFwQyipey16vzuQmiTgunc6RyhNQKkflKKw9VLlXWM6A5i6sUH qBXmp5gH9JV0Zb5Se/RVMpyiiq6alVM= Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id D2B69ABCC; Tue, 10 Nov 2020 16:07:35 +0000 (UTC) Received: by ds.suse.cz (Postfix, from userid 10065) id 7719EDA7D7; Tue, 10 Nov 2020 17:05:54 +0100 (CET) From: David Sterba To: torvalds@linux-foundation.org Cc: David Sterba , linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] Btrfs updates for v5.10-rc4 Date: Tue, 10 Nov 2020 17:05:52 +0100 Message-Id: X-Mailer: git-send-email 2.25.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, a handful of minor fixes and updates: - handle missing device replace item on mount (syzbot report) - fix space reservation calculation when finishing relocation - fix memory leak on error path in ref-verify (debugging feature) - fix potential overflow during defrag on 32bit arches - minor code update to silence smatch warning - minor error message updates Please pull, thanks. ---------------------------------------------------------------- The following changes since commit d5c8238849e7bae6063dfc16c08ed62cee7ee688: btrfs: convert data_seqcount to seqcount_mutex_t (2020-10-27 15:11:51 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/kdave/linux.git for-5.10-rc3-tag for you to fetch changes up to 468600c6ec28613b756193c5f780aac062f1acdf: btrfs: ref-verify: fix memory leak in btrfs_ref_tree_mod (2020-11-05 13:03:39 +0100) ---------------------------------------------------------------- Anand Jain (1): btrfs: dev-replace: fail mount if we don't have replace item with target device Dan Carpenter (1): btrfs: clean up NULL checks in qgroup_unreserve_range() David Sterba (1): btrfs: scrub: update message regarding read-only status Dinghao Liu (1): btrfs: ref-verify: fix memory leak in btrfs_ref_tree_mod Josef Bacik (2): btrfs: print the block rsv type when we fail our reservation btrfs: fix min reserved size calculation in merge_reloc_root Matthew Wilcox (Oracle) (1): btrfs: fix potential overflow in cluster_pages_for_defrag on 32bit arch fs/btrfs/block-rsv.c | 3 ++- fs/btrfs/dev-replace.c | 26 ++++++++++++++++++++++++-- fs/btrfs/ioctl.c | 10 ++++------ fs/btrfs/qgroup.c | 12 ++++-------- fs/btrfs/ref-verify.c | 1 + fs/btrfs/relocation.c | 4 +++- fs/btrfs/scrub.c | 5 +++-- fs/btrfs/volumes.c | 26 +++++++------------------- 8 files changed, 48 insertions(+), 39 deletions(-)