Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp297204pxj; Fri, 14 May 2021 03:49:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzOt5Kh4tYpLrsss6upuDHaph5ryKsaiWZN+mO6QKV6BwfDbOx54iMmtUD+RC8ockxEV+kW X-Received: by 2002:a17:906:724b:: with SMTP id n11mr48527058ejk.338.1620989368508; Fri, 14 May 2021 03:49:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620989368; cv=none; d=google.com; s=arc-20160816; b=GlZL0mX4r+mgUiCN0sl4/rmgZ4l+7p2OV6tkkQ9YiH8rqCmHTckeNw8u5WOtaIy2Tj O2ezMmyHkMVH8VCQdVa+2orjyWJCRJAvMS2dovsB2WdF0XS0/ceIhEk8/1oTRiy08pK5 cOCJDY7oKozyvEYN82ekbis5KtBhTsm5+Sgth+ZDY8kpWmTv/tGhLA78Fx64l/6Rb2nz VtnPSd+Ct2PPCsh2X+CjNCqPaoyUOeCaDtJm9fMGiPA2YjaqaoYd6QHYPM8VJLKAuZDf jQM7N8XZKT56LwybPFDOoIWS+F3oZn68V+xnaxGYrZSQhbQ6jLNaXdwpeWeZveWhPV2/ r68g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date:dkim-signature; bh=ZuiRjkIVdBJ4qLiM2q+xHdgLXq0/CwiXT2qH5mIM1QI=; b=ftYayvMBxd0v+iiBQHZK3MGHaUd5w8jokdXRDiBvrDSQXR4Fpx/mBidPmqVMavp+II 6fEnWN+tVm7bwXo/A9/rDrCaeIeH/Ycj/Bg4eVvfJv+Vjy9ZLqwT5ICA6Zf0edww3u69 3Xid4da5tB1R0K3ygIT+c85ogjqx326tXdXn04mX+sFsYkdsPi9yeETcgegxFmqnDAtp rKEGy2qUmO1qibWudMAjtNTO1InTeP5nF0LZapqwCt8JvY0bKWagHFYczpGt22T6haMV E3XVM1lbTv1f12ldbfXTgJQcqBcV00UMmxrMfuLkcAAgSz5Orp2fw3+7V0i6wUiM7v5v C5jQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=IUBAohzO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id kz24si5682012ejc.33.2021.05.14.03.49.05; Fri, 14 May 2021 03:49:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=IUBAohzO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231380AbhENKPZ (ORCPT + 99 others); Fri, 14 May 2021 06:15:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:35488 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229654AbhENKPZ (ORCPT ); Fri, 14 May 2021 06:15:25 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C0FB3613AA; Fri, 14 May 2021 10:14:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1620987253; bh=ti35DWvjjXET7XuI9BAF+V+AMh3UIKweXBk2BcOMOiM=; h=Date:From:To:Cc:Subject:From; b=IUBAohzO/B15+HaPGczZmguSUWEh3Jkk2WSFR3FB+qQqtyr+SKM5YNNiwobai2OxC /tgLcC/DM8QTsY+Xc1YsQP/ypkKpKKhthqc7KQnnvrn5pMfZ3P8Y5WVSk2V7Kwa1wD tK1DdgFfxauri6q8QeRngySBM56+7TFCD28hQmP+xvhNqn11xCA/plbOFUZxqyv/N8 52bfa6PWMfA9S5QM5AW+gAwMiUTzSrd4d/UFJiW4rbBhXHwPaHWuIKJkW8eeT4iDYt rr4Nm11kAGYWL2YJIKb3ezHT4AtF28oOi9gyW1hLGfk2VpG+O1JW9GhSkrOcEvZ49K z6pZM5FwA+RxQ== Date: Fri, 14 May 2021 03:14:12 -0700 From: Jaegeuk Kim To: Linus Torvalds Cc: Linux F2FS Dev Mailing List , Linux Kernel Mailing List Subject: [GIT PULL] f2fs fix for 5.13-rc1 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, Could you please consider this pull request? Thanks, The following changes since commit 6efb943b8616ec53a5e444193dccf1af9ad627b5: Linux 5.13-rc1 (2021-05-09 14:17:44 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jaegeuk/f2fs.git tags/f2fs-5.13-rc1-fix for you to fetch changes up to f395183f9544ba2f56b25938d6ea7042bd873521: f2fs: return EINVAL for hole cases in swap file (2021-05-12 07:38:00 -0700) ---------------------------------------------------------------- f2fs-5.13-rc1-fix This series of patches fix some critical bugs such as memory leak in compression flows, kernel panic when handling errors, and swapon failure due to newly added condition check. ---------------------------------------------------------------- Chao Yu (3): f2fs: compress: fix to free compress page correctly f2fs: compress: fix race condition of overwrite vs truncate f2fs: compress: fix to assign cc.cluster_idx correctly Jaegeuk Kim (4): f2fs: avoid null pointer access when handling IPU error f2fs: support iflag change given the mask f2fs: avoid swapon failure by giving a warning first f2fs: return EINVAL for hole cases in swap file fs/f2fs/compress.c | 55 +++++++++++++++++++++++------------------------------- fs/f2fs/data.c | 39 +++++++++++++++++++++++++++----------- fs/f2fs/f2fs.h | 2 +- fs/f2fs/file.c | 3 ++- fs/f2fs/segment.c | 4 ++-- 5 files changed, 56 insertions(+), 47 deletions(-)