From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CCCF31D88B4; Fri, 1 May 2026 00:53:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777596804; cv=none; b=o3y/KN7GfVhDDscYisR5jjNr6H4fkevGcHBOdnD6dVMzybcl/CuW5zsrr3JqxH8VCe5+r0m0TTvvXQGN0VdJKEf90et1yyko4zT2Bd0f1X/NC5QzOoHh5VsWu9rOvKUQ1DML9sldU0+tbbxxHs6Za9Zc8a7lLq4qN/2GhNTAuCE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777596804; c=relaxed/simple; bh=nQF8Ykfj8+2QCwIYCJZ21I3zd5B77lm7Ueq+m26Y97M=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=ncw7lC8+ROQBWDPSsm5Zi9f0bKQja1VsIi5IG1sNsHzIvPj5uIdNc1rSuIe+HXN7+DsAxyESr9ZPYmV6F4ylutJJHXPbpsvS3ftUp25nFAyGESGLgTmm57GWelVmB3DW3t/Ww2McRo+332AMBY4K9Y2NEi05C8DpFqsoOnkq3pg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=G+fLdPSo; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="G+fLdPSo" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 06A66C2BCB3; Fri, 1 May 2026 00:53:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1777596804; bh=nQF8Ykfj8+2QCwIYCJZ21I3zd5B77lm7Ueq+m26Y97M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=G+fLdPSoHn1ju+dGJ+phcc2I05mJOy2mbsT4Lq1ZmEwhMnDvop0Q6dim8/MZueIwY OpTJBqfazrdzbbZk6WbYyv+EWo+2aJfmDNUSMXENPFwod2TQXlps6crJKWNEzA6OPJ TcXY9Vs5uzTenlGnjho5P5q3YDzsnDKS9W8JaFY9fMN3f7Etmbw6jTFJ60aRdwlub2 4XnTJaA6Cyw123aB6YsWdRttdJYiU5x/VcAKywu7ZLszFWqyqnWRz4tyeORjQt8a2e NMFCR6N8/+MlxQ0GFUQy11b3tZsOww/jM2YGkT/P5PwDEOvfHHWbqzXRXyJi7kybE8 ifeott33tBAZg== From: Sasha Levin To: stable@vger.kernel.org, Chao Yu Cc: Jaegeuk Kim , Robert Garcia , linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org Subject: Re: [PATCH 6.1.y] f2fs: fix to detect potential corrupted nid in free_nid_list Date: Thu, 30 Apr 2026 20:53:22 -0400 Message-ID: <20260430160000.item006-6.1@kernel.org> X-Mailer: git-send-email 2.53.0 In-Reply-To: <20260430055537.2105721-1-rob_garcia@163.com> References: <20260430055537.2105721-1-rob_garcia@163.com> Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit On Thu, Apr 30, 2026 at 01:55:37PM +0800, Robert Garcia wrote: > From: Chao Yu > > [ Upstream commit 8fc6056dcf79937c46c97fa4996cda65956437a9 ] > > As reported, on-disk footer.ino and footer.nid is the same and > out-of-range, let's add sanity check on f2fs_alloc_nid() to detect > any potential corruption in free_nid_list. Thanks, queued for 6.1.y. -- Thanks, Sasha