Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4971802imu; Mon, 12 Nov 2018 22:03:23 -0800 (PST) X-Google-Smtp-Source: AJdET5cy+RSooizEEMhEurC/3NWI5l/ZInxst3PDLNl9U6p4Ax2Q5FTrs+Zif3GNmYViJQZngQPR X-Received: by 2002:a62:12d0:: with SMTP id 77-v6mr3897698pfs.140.1542089003091; Mon, 12 Nov 2018 22:03:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542089003; cv=none; d=google.com; s=arc-20160816; b=zi1Qbf0ZuHbdYdEQBfSlwn8NcS5YhO41L1CPxT0gt5knaV1hZqLWWyTEWak5o+ODnQ 7rS6VmV185WtTpyXHClwjJnuMzacfjTtQcZH5aHaI71CWCCaNh+XcqjoJn0f6CPeYIUa pbujUtDyc0feRdFjsnSQVthH4JBVUE1ED8oNrKo/sf9qV9roZz25COJ6WYkTwRj3BXmF AcL4Qu85Z+QlanAtgzmfopDdJ12qPvTQfYTpF3nIegJRmK5Zt+AG3ozD88i28BzY3fCA cFvZyG/XY/BrXvkwocTbGQcBZCLDMbJ4Xpkw2K8LNOYUueRyuHVEpsPjRX7fwkFMF48P 24QA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=oFoquBlpUsAgxSE3zwi3RYF/N1zSOv129Ji6fJIL3+o=; b=kYCYN6hWc8bRmyej0juu2I7j/nF1MnLN4agSNf2Vp6FGKYCVgkA8+bTblgLDZFHLiB xLHQnOZoFlQeyQ/Q+N+FNgvCQv4EniDF5k4N5qIieHNDQf4Shaf3KFI7ayIuXSUKX63t NcBAkE1DRI2na3VruBhjVMlElY1Pfg3zGDb4EzpyHi/E+pTUMthitvSfIBLp5oqVHUS5 Qwwuly59jOpbKsJ0oie/XXARGJGEYGNvvHbVt5GPOW+SR5Wei6RLbqbe5cIs90cmA8pV nwYZ6eCqAkXNjgJPuM+QnmLWtLJuD7WGSoGf+ae5UTsSGAayULJ5IqO56rRWyw6FHIkY R0vA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GPT0APo6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u6si5760655plz.220.2018.11.12.22.03.08; Mon, 12 Nov 2018 22:03:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GPT0APo6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732144AbeKMPrp (ORCPT + 99 others); Tue, 13 Nov 2018 10:47:45 -0500 Received: from mail.kernel.org ([198.145.29.99]:33560 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732103AbeKMPro (ORCPT ); Tue, 13 Nov 2018 10:47:44 -0500 Received: from sasha-vm.mshome.net (unknown [64.114.255.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A75042250E; Tue, 13 Nov 2018 05:51:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542088276; bh=R+AKyqm/KciTIua5eOwQVlXvgOdbhtob0JVo/RcL+5Q=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GPT0APo6lLrnJ9Nfzw379yZ9ilRSjMf3RE4ZbHBB5z/DRvrCogKjvWUjzAy10xJmw AHNxppZYppjSw0Db9iEhZS+/5W/9nZIImUDuBk7KIK3kvr9fUnpyuPQCFnMEWTYfmZ yU0RvBXGpdNiNQSo02Wlb2LMpBmm3Xpiy6uWNCgY= From: Sasha Levin To: stable@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Jann Horn , Jeff Mahoney , Eric Biggers , Al Viro , Andrew Morton , Linus Torvalds , Sasha Levin , reiserfs-devel@vger.kernel.org Subject: [PATCH AUTOSEL 4.18 13/39] reiserfs: propagate errors from fill_with_dentries() properly Date: Tue, 13 Nov 2018 00:50:27 -0500 Message-Id: <20181113055053.78352-13-sashal@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20181113055053.78352-1-sashal@kernel.org> References: <20181113055053.78352-1-sashal@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jann Horn [ Upstream commit b10298d56c9623f9b173f19959732d3184b35f4f ] fill_with_dentries() failed to propagate errors up to reiserfs_for_each_xattr() properly. Plumb them through. Note that reiserfs_for_each_xattr() is only used by reiserfs_delete_xattrs() and reiserfs_chown_xattrs(). The result of reiserfs_delete_xattrs() is discarded anyway, the only difference there is whether a warning is printed to dmesg. The result of reiserfs_chown_xattrs() does matter because it can block chowning of the file to which the xattrs belong; but either way, the resulting state can have misaligned ownership, so my patch doesn't improve things greatly. Credit for making me look at this code goes to Al Viro, who pointed out that the ->actor calling convention is suboptimal and should be changed. Link: http://lkml.kernel.org/r/20180802163335.83312-1-jannh@google.com Signed-off-by: Jann Horn Reviewed-by: Andrew Morton Cc: Jeff Mahoney Cc: Eric Biggers Cc: Al Viro Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- fs/reiserfs/xattr.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/fs/reiserfs/xattr.c b/fs/reiserfs/xattr.c index 48cdfc81fe10..32d8986c26fb 100644 --- a/fs/reiserfs/xattr.c +++ b/fs/reiserfs/xattr.c @@ -185,6 +185,7 @@ struct reiserfs_dentry_buf { struct dir_context ctx; struct dentry *xadir; int count; + int err; struct dentry *dentries[8]; }; @@ -207,6 +208,7 @@ fill_with_dentries(struct dir_context *ctx, const char *name, int namelen, dentry = lookup_one_len(name, dbuf->xadir, namelen); if (IS_ERR(dentry)) { + dbuf->err = PTR_ERR(dentry); return PTR_ERR(dentry); } else if (d_really_is_negative(dentry)) { /* A directory entry exists, but no file? */ @@ -215,6 +217,7 @@ fill_with_dentries(struct dir_context *ctx, const char *name, int namelen, "not found for file %pd.\n", dentry, dbuf->xadir); dput(dentry); + dbuf->err = -EIO; return -EIO; } @@ -262,6 +265,10 @@ static int reiserfs_for_each_xattr(struct inode *inode, err = reiserfs_readdir_inode(d_inode(dir), &buf.ctx); if (err) break; + if (buf.err) { + err = buf.err; + break; + } if (!buf.count) break; for (i = 0; !err && i < buf.count && buf.dentries[i]; i++) { -- 2.17.1