Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2298643imm; Mon, 28 May 2018 05:38:34 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKhtrwUt+FbZOGZQWIGbxfBloeJUx8cuIy4Ww4lx3+XrGFmuHrEEIYj70H8Oanp1ulvEp4h X-Received: by 2002:a62:d9c5:: with SMTP id b66-v6mr8188889pfl.41.1527511114850; Mon, 28 May 2018 05:38:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527511114; cv=none; d=google.com; s=arc-20160816; b=jj+4P6fGPh5asdjKC4/PzNd2xfX0R9NZppRN5mqwS0R/wNg4Z3tzGGhERuO+biwBEk Tc2kJesiwErd33bXQmnvLkyALmXt5oVcrUPD8SR2IyOLkO/cSj+lYK+N3w+K1rzHxCqX QQPUPZSCURzo7gUamARGlWWZyceyVtqGGGBeY55D7L4HP0ms+x54kQMSKYO8fVOfBJzs 04GRi+oRn/GiOFZmq7m98dAmTfszoC94s+jJ1QDwC2wavkbvIOMvoTLr6Oer+ckRBHcC VxU/q4oQoQmMDym6qkQHnmTJSSay5zSNj8L3XbcEGWIPu279YLuxlKPxn83gQdz04Dgz 0sKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=QZgrfnuifFpwOsSNh0JFPfzkjUyos0bu9+lPb5u4+c0=; b=v8Lq44Ji04RUpN+98GEtF6HKSIxAOHDKWvJS7JT3r3Iq01Ikp5HbmgUCXXFcD8wX+8 pEWKL9LBe2zuIMPuwQk12FJx4ZZzRuvDIIQ4+VgMCzO8E980jGfTu5z9BEoTKksljgXI CNel9K1EpFd+4ufH2JS0+kF1XTS6VXob1X395nXRSAhCrACvYp1O0Q8Qi58ou5aBBapc Xh9k+5DBIAty4+nDBxZtZLJdvVqv2Wq51ooYgV08sX/ovh1h1y+3iPou+eRCXJNQ+BMH YC3bIurpfp+FzOUnT1rwA7FcrL0rJ7mIO3hOCramrHnAdmcD22F9sosu4ZCwAyftPvaw nXFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LRoXhII8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w20-v6si18576673pgc.645.2018.05.28.05.38.19; Mon, 28 May 2018 05:38:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LRoXhII8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S938069AbeE1K6z (ORCPT + 99 others); Mon, 28 May 2018 06:58:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:46804 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S938038AbeE1K6o (ORCPT ); Mon, 28 May 2018 06:58:44 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5ACA42088E; Mon, 28 May 2018 10:58:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527505123; bh=reKMG9Bj5NuXRgLYCEt7ijOlZbmowW4v6PFCal/kF3g=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=LRoXhII8tUllBqJkzXJQsO/Ggsyu3sDzZPl7Dl+nphEUD9sUFcrhWejDOX4EKYm7x qLSldlTpFWJQKARtGeAA4JsLA2HQDKDOQN5TnH34ScX1yMTUInnreCmZdq3j9nTp3v djfNO6r/vZg9uQ55IlRKQu3Cgp6EROgkI+jdLHuU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Qu Wenruo , David Sterba , Sasha Levin Subject: [PATCH 4.14 353/496] btrfs: tests/qgroup: Fix wrong tree backref level Date: Mon, 28 May 2018 12:02:18 +0200 Message-Id: <20180528100334.679044439@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100319.498712256@linuxfoundation.org> References: <20180528100319.498712256@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Qu Wenruo [ Upstream commit 3c0efdf03b2d127f0e40e30db4e7aa0429b1b79a ] The extent tree of the test fs is like the following: BTRFS info (device (null)): leaf 16327509003777336587 total ptrs 1 free space 3919 item 0 key (4096 168 4096) itemoff 3944 itemsize 51 extent refs 1 gen 1 flags 2 tree block key (68719476736 0 0) level 1 ^^^^^^^ ref#0: tree block backref root 5 And it's using an empty tree for fs tree, so there is no way that its level can be 1. For REAL (created by mkfs) fs tree backref with no skinny metadata, the result should look like: item 3 key (30408704 EXTENT_ITEM 4096) itemoff 3845 itemsize 51 refs 1 gen 4 flags TREE_BLOCK tree block key (256 INODE_ITEM 0) level 0 ^^^^^^^ tree block backref root 5 Fix the level to 0, so it won't break later tree level checker. Fixes: faa2dbf004e8 ("Btrfs: add sanity tests for new qgroup accounting code") Signed-off-by: Qu Wenruo Signed-off-by: David Sterba Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/tests/qgroup-tests.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/fs/btrfs/tests/qgroup-tests.c +++ b/fs/btrfs/tests/qgroup-tests.c @@ -63,7 +63,7 @@ static int insert_normal_tree_ref(struct btrfs_set_extent_generation(leaf, item, 1); btrfs_set_extent_flags(leaf, item, BTRFS_EXTENT_FLAG_TREE_BLOCK); block_info = (struct btrfs_tree_block_info *)(item + 1); - btrfs_set_tree_block_level(leaf, block_info, 1); + btrfs_set_tree_block_level(leaf, block_info, 0); iref = (struct btrfs_extent_inline_ref *)(block_info + 1); if (parent > 0) { btrfs_set_extent_inline_ref_type(leaf, iref,