Received: by 10.223.176.5 with SMTP id f5csp1033466wra; Fri, 2 Feb 2018 10:02:30 -0800 (PST) X-Google-Smtp-Source: AH8x224aufssK7xA1hWE34ZUlmWb9zpoES2nHtdqsItQT/fB5ihvP4HHfTZx2nWH5akxWtRuqBFv X-Received: by 10.101.99.205 with SMTP id n13mr14827211pgv.397.1517594550416; Fri, 02 Feb 2018 10:02:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517594550; cv=none; d=google.com; s=arc-20160816; b=lvLSLwi113Q78RWBpqNPhHVP8NU7pZbMQcgtwh89T0hKHZ8dfntTnnqrTCdmVp+fRM ci2gfYytawWdLUxwLHrKshcULkTFl+HMllrjTHfe4z2kLuaccTCZthfR5Kg8/BNTHHVo l2xAFgQh7g1aYK236hlwafs2Ytx+ADOLC4vTKPOpDtRCFOz/Mix9L+Jr2F38mpk8Hmle VRnb1Eki7oA9CEfhO2hSfbxlOQvS9oMk/KbnwQgvcfP8vF+Mn8GvJJfHmx0mOaEVXFsa ISKiXthVgPcJIQVrxQgac6yAv6r4ondbvCqsn/z8/z9LTFSbvZohjSC5Vm4CldgS8/T3 OJQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=Ynhb9djjyOF1A+Bd7L5lCYAF+iF3NM+4bNKZf1hpnpw=; b=XK6Pm8TGQ2PzfMuz3TaLrTo2O6e9a1fTNT1JqITdoVQJPH9xBtpBpjYvv2rpbXc47A FkcEnxi4mYXQwnL6+47rrCiNbHQsI8qiVsyMU2zu5iUr5V2zpNfNb5rHo69oQyRbt7hX m+HnACKEuGMABz7k5ULFXw+xCUS8Ex4U+Q0Yr73bGgQbY/zobdh6iL+RpI2OplsbQCrv SYQtl8vowMrhIb21XBJcz9ngqEu/dMNnRGHDl7IE9S5wTcOQf8sWap+t2Gx8/ZCm6dvr GKW2gB1MkJ1U0SubA+/bLL7FUIaCwNJyo8fCC1Ud1oOFPxSb16wtkxOyk+XxKypOASss OvkQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u7si2179157pfl.198.2018.02.02.10.02.15; Fri, 02 Feb 2018 10:02:30 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753601AbeBBSBB (ORCPT + 99 others); Fri, 2 Feb 2018 13:01:01 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:38030 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752498AbeBBRJn (ORCPT ); Fri, 2 Feb 2018 12:09:43 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 3C48FE27; Fri, 2 Feb 2018 17:09:42 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Liu Bo , Guillaume Bouchard , David Sterba , Sasha Levin Subject: [PATCH 4.14 033/156] Btrfs: bail out gracefully rather than BUG_ON Date: Fri, 2 Feb 2018 17:56:54 +0100 Message-Id: <20180202140841.821186650@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180202140840.242829545@linuxfoundation.org> References: <20180202140840.242829545@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Liu Bo [ Upstream commit 56a0e706fcf870270878d6d72b71092ae42d229c ] If a file's DIR_ITEM key is invalid (due to memory errors) and gets written to disk, a future lookup_path can end up with kernel panic due to BUG_ON(). This gets rid of the BUG_ON(), meanwhile output the corrupted key and return ENOENT if it's invalid. Signed-off-by: Liu Bo Reported-by: Guillaume Bouchard Signed-off-by: David Sterba Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/inode.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) --- a/fs/btrfs/inode.c +++ b/fs/btrfs/inode.c @@ -5500,6 +5500,14 @@ static int btrfs_inode_by_name(struct in goto out_err; btrfs_dir_item_key_to_cpu(path->nodes[0], di, location); + if (location->type != BTRFS_INODE_ITEM_KEY && + location->type != BTRFS_ROOT_ITEM_KEY) { + btrfs_warn(root->fs_info, +"%s gets something invalid in DIR_ITEM (name %s, directory ino %llu, location(%llu %u %llu))", + __func__, name, btrfs_ino(BTRFS_I(dir)), + location->objectid, location->type, location->offset); + goto out_err; + } out: btrfs_free_path(path); return ret; @@ -5816,8 +5824,6 @@ struct inode *btrfs_lookup_dentry(struct return inode; } - BUG_ON(location.type != BTRFS_ROOT_ITEM_KEY); - index = srcu_read_lock(&fs_info->subvol_srcu); ret = fixup_tree_root_location(fs_info, dir, dentry, &location, &sub_root);