Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp873039yba; Thu, 18 Apr 2019 11:00:39 -0700 (PDT) X-Google-Smtp-Source: APXvYqwiYaWJPWkEBePFLTVHHjfF4lvkdZRIGTj9zSPidnIbY1VznxhWTgaEhzN087hxjDDT+Cek X-Received: by 2002:a62:1815:: with SMTP id 21mr99046155pfy.107.1555610439525; Thu, 18 Apr 2019 11:00:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555610439; cv=none; d=google.com; s=arc-20160816; b=kTljmMk+cLjKepFglHYTF9Qg1GOuky2HckKqL5QE3n0e2JCpvqZ4DSKDkZOVJ9VuET nQ9ouRYjIVb9WgwIIewl4YtIkEbJ/qLhn6c19fMbBOqaSwz8JO8MdSqSs1wP6lJGkogm Lun7YqXxjTha+zx+gpocXqTvILrphNU2HhxRgY48DcsMlWh6QXd6vl9y5iYEMVkzzNQI bqk2uy08Mb1bCAHv+VS8xDs9cFUhCIUTaITnG1CqP4YPd8ZOTB5cmD32htNUsIyqIpXX gNjVV8J7Z5SnZs3SajyBHvVmsfmucUYRD8AsFveMIY123Wax7CRDQSK8aZBDe/x7ifb0 LzLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=cltLNdxL7FFpQ4XOyOLs7elYDl9KcLzW4y+V98BjV10=; b=hnONZv3Oa5VM8JBoiowYDBpUyY1+magpdFPoWR+8pWACmKhi+4f3hTDBqJYgFmAz9j m4hQdJVlVjyg1gTQI+RpTA1mom7XoOGvKcyyLQcK5ogECIVe+NRVcf6dD9vLAdF1tFbF zff7SxAz9nTcuUzZ1DZmPfKfB3Xr6ecxw03FL70TFKHJ1sk6iicoVqE2Q+oCuiCiMMI9 eVD56lwQMNEKkr6fLBx7BAOq2HaG0g01U6HQmpH6CchGLAJvNTyNQRafL2GYaUnetmr/ NL6W8EkngKqGbfJByY2+6BLdtzzlCDfvJuN93AL0kmgsR2/hCZ9DSg6FmfEgsoNWCEkJ km5g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=R2YUU0nt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e14si2836750pfn.203.2019.04.18.11.00.24; Thu, 18 Apr 2019 11:00:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=R2YUU0nt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390044AbfDRR7H (ORCPT + 99 others); Thu, 18 Apr 2019 13:59:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:53398 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390014AbfDRR67 (ORCPT ); Thu, 18 Apr 2019 13:58:59 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C3AEA217FA; Thu, 18 Apr 2019 17:58:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555610339; bh=2lyiCBU9FjYFYsa2mPpwZ6W58qOtlZI8IJkQGr0g5Gg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=R2YUU0ntLuyuG4GCg7ZvaWtDUDUXDZhLve0X6d+U/ja0DOtKwp+W8Si6YNoTnGOcC HrmkTBijD4eyz12iVO6dhYft5ezhob0Yq+LCZ3xLejTUXv2HbUiU/FkpP3OGWz/8tE 0ByWgI2UopduPAba6bA/kogrbg7SO82EAK5OVZr0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lukas Czerner , Theodore Tso , Sasha Levin Subject: [PATCH 4.19 008/110] ext4: report real fs size after failed resize Date: Thu, 18 Apr 2019 19:55:57 +0200 Message-Id: <20190418160438.217446887@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190418160437.484158340@linuxfoundation.org> References: <20190418160437.484158340@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 6c7328400e0488f7d49e19e02290ba343b6811b2 ] Currently when the file system resize using ext4_resize_fs() fails it will report into log that "resized filesystem to ". However this may not be true in the case of failure. Use the current block count as returned by ext4_blocks_count() to report the block count. Additionally, report a warning that "error occurred during file system resize" Signed-off-by: Lukas Czerner Signed-off-by: Theodore Ts'o Signed-off-by: Sasha Levin --- fs/ext4/resize.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/fs/ext4/resize.c b/fs/ext4/resize.c index 90061c3d048b..e7ae26e36c9c 100644 --- a/fs/ext4/resize.c +++ b/fs/ext4/resize.c @@ -2080,6 +2080,10 @@ int ext4_resize_fs(struct super_block *sb, ext4_fsblk_t n_blocks_count) free_flex_gd(flex_gd); if (resize_inode != NULL) iput(resize_inode); - ext4_msg(sb, KERN_INFO, "resized filesystem to %llu", n_blocks_count); + if (err) + ext4_warning(sb, "error (%d) occurred during " + "file system resize", err); + ext4_msg(sb, KERN_INFO, "resized filesystem to %llu", + ext4_blocks_count(es)); return err; } -- 2.19.1