Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2451891imm; Mon, 28 May 2018 08:19:40 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrB+7tUXEhZeKEZ6Iw0KiPv9dBL2N2USuGqMmZEYCnlgupA0/nJjJlIa6Zjd5tk7mQottPt X-Received: by 2002:a65:480a:: with SMTP id h10-v6mr10636019pgs.403.1527520780058; Mon, 28 May 2018 08:19:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527520780; cv=none; d=google.com; s=arc-20160816; b=inhYtbto7BHAZpxg69w5hXXGLFwfqMQBwfb4XCIDhrQlPX28Q1pJi3/+nvL0DfjgR7 Nz8VbURycmM182hO1fLwBEEHTD/DRFHwXYBT2oej7sacKIV1+JVQe4L9V+kQKgPbdf7y 55t2VDem/qT76oy8DFg1QAF6ft0d9Eme8VolXWUOHfIBwOtyVtF1T83ftEfPuGlT2VHr 5iAYUHTd3jea996i+pLxe1iUPcjxUBPaXM+/FWgbd+6MaA6j341mbOzpOZb+7mO5615e HdSRS9N6One/NqBkNjYaIRvm73GARU4YQednq3vSE7AtIRjTGv+avU+S04eoHo6QsCKS UnUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=ye7I+bj0b7AVWo0yvofnKDYquHK3mg1ePYelP9cArOs=; b=lOT7DMBVEPjCSoTZd12Cb+k22pyGBzxxFQ5z2IsyOyF/ftXm+xfRK46FgZSCQvdycY 8rB/5v7Uvb4i8SZBZ1SAfPbrCMSG3DUYIX1hHDBPLDZYlEiIVypr3vWYsc6RPPMSr4bs eF0SL8oid0jjID9stVSnSqnBFBmGZXtdqOdmi+x0SezBgsLvP2nC6Z7ykxBNXldLu85S gxzPCm6cy3m1zRZopLSb1lR+HKinLm/g9SS9AJLwW2OA1ih+cF5ilM30j/Pb5O1WdUjJ I9wBjTf9czZjH8AldxJW1T8cR/xMX4HCaX0pfJaLvcjUJMWIzQka24FZq2/Rd5X5JWDO CRzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yaIV28X6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h8-v6si30638775pfh.278.2018.05.28.08.19.25; Mon, 28 May 2018 08:19:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yaIV28X6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1034196AbeE1PSk (ORCPT + 99 others); Mon, 28 May 2018 11:18:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:41610 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1033474AbeE1KWL (ORCPT ); Mon, 28 May 2018 06:22:11 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A9A8E20883; Mon, 28 May 2018 10:22:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527502931; bh=FRDYZNRSb5ljt6HpI9kQSUVN0PehuDuzmgFDE4toCec=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yaIV28X6QBrpBZo2e45sV7Zt/JQMNz8mT0PugU/TD5XcVfV/5Eh53eCzSCKzMwtf+ AOXX87E8uJysK8iWxMcBQ1m5fyZumxT45jd8W/jnIbZj6jlZAicDRzpAgYzCZYGaKt HOzyge5c8TQUOnKR+AqtIrB1Y7pei/gVZc1iMIak= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Qu Wenruo , David Sterba , Sasha Levin Subject: [PATCH 4.4 180/268] btrfs: tests/qgroup: Fix wrong tree backref level Date: Mon, 28 May 2018 12:02:34 +0200 Message-Id: <20180528100222.775137840@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100202.045206534@linuxfoundation.org> References: <20180528100202.045206534@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Qu Wenruo [ Upstream commit 3c0efdf03b2d127f0e40e30db4e7aa0429b1b79a ] The extent tree of the test fs is like the following: BTRFS info (device (null)): leaf 16327509003777336587 total ptrs 1 free space 3919 item 0 key (4096 168 4096) itemoff 3944 itemsize 51 extent refs 1 gen 1 flags 2 tree block key (68719476736 0 0) level 1 ^^^^^^^ ref#0: tree block backref root 5 And it's using an empty tree for fs tree, so there is no way that its level can be 1. For REAL (created by mkfs) fs tree backref with no skinny metadata, the result should look like: item 3 key (30408704 EXTENT_ITEM 4096) itemoff 3845 itemsize 51 refs 1 gen 4 flags TREE_BLOCK tree block key (256 INODE_ITEM 0) level 0 ^^^^^^^ tree block backref root 5 Fix the level to 0, so it won't break later tree level checker. Fixes: faa2dbf004e8 ("Btrfs: add sanity tests for new qgroup accounting code") Signed-off-by: Qu Wenruo Signed-off-by: David Sterba Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/tests/qgroup-tests.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/fs/btrfs/tests/qgroup-tests.c +++ b/fs/btrfs/tests/qgroup-tests.c @@ -70,7 +70,7 @@ static int insert_normal_tree_ref(struct btrfs_set_extent_generation(leaf, item, 1); btrfs_set_extent_flags(leaf, item, BTRFS_EXTENT_FLAG_TREE_BLOCK); block_info = (struct btrfs_tree_block_info *)(item + 1); - btrfs_set_tree_block_level(leaf, block_info, 1); + btrfs_set_tree_block_level(leaf, block_info, 0); iref = (struct btrfs_extent_inline_ref *)(block_info + 1); if (parent > 0) { btrfs_set_extent_inline_ref_type(leaf, iref,