[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <ZoQFEp+U+689DPdO@debian>
Date: Tue, 2 Jul 2024 21:48:02 +0800
From: Gao Xiang <xiang@...nel.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-erofs@...ts.ozlabs.org, LKML <linux-kernel@...r.kernel.org>,
Sandeep Dhavale <dhavale@...gle.com>,
Huang Xiaojia <huangxiaojia2@...wei.com>, Chao Yu <chao@...nel.org>
Subject: [GIT PULL] erofs fixes for 6.10-rc7
Hi Linus,
Could you consider these patches for 6.10-rc7?
The most important one fixes possible infinite loops reported by
a smartphone vendor OPPO recently due to some unexpected zero-sized
compressed pcluster out of interrupted I/Os, storage failures, etc.
Another patch fixes global buffer memory leak on unloading, and the
remaining one switches to use super_set_uuid() to keep with the other
filesystems.
All commits have been in -next for a while and no potential merge
conflict is observed.
Thanks,
Gao Xiang
The following changes since commit f2661062f16b2de5d7b6a5c42a9a5c96326b8454:
Linux 6.10-rc5 (2024-06-23 17:08:54 -0400)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/xiang/erofs.git tags/erofs-for-6.10-rc7-fixes
for you to fetch changes up to 9b32b063be1001e322c5f6e01f2a649636947851:
erofs: ensure m_llen is reset to 0 if metadata is invalid (2024-06-30 10:54:28 +0800)
----------------------------------------------------------------
Changes since last update:
- Fix possible global buffer memory leak when unloading EROFS module;
- Fix FS_IOC_GETFSUUID ioctl by using super_set_uuid();
- Reset m_llen to 0 so then it can retry if metadata is invalid.
----------------------------------------------------------------
Gao Xiang (1):
erofs: ensure m_llen is reset to 0 if metadata is invalid
Huang Xiaojia (1):
erofs: convert to use super_set_uuid to support for FS_IOC_GETFSUUID
Sandeep Dhavale (1):
erofs: fix possible memory leak in z_erofs_gbuf_exit()
fs/erofs/super.c | 2 +-
fs/erofs/zmap.c | 2 ++
fs/erofs/zutil.c | 8 ++++----
3 files changed, 7 insertions(+), 5 deletions(-)
Powered by blists - more mailing lists