Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp897335yba; Thu, 18 Apr 2019 11:24:23 -0700 (PDT) X-Google-Smtp-Source: APXvYqz6ynUbpxu1xXVndfm+GBCMPCZlajH1gxFxDzf94LZl7gDWjOSGZlOrfuZCADS4qNjjHX71 X-Received: by 2002:a63:180a:: with SMTP id y10mr6957661pgl.450.1555611863362; Thu, 18 Apr 2019 11:24:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555611863; cv=none; d=google.com; s=arc-20160816; b=hch5/gxEqIZmoIBQNiFlcOxLFwqJTpl8krOl6ji4pwzM5xBowxVPJVCItpBbi7rexa T5aUxS5XqoVBB60teWDhKZADV5QxYDhjTUYr5CQH94bfPPLi8dnC1oXEQedjvTJoMETP LJIOD6zapKH2MKnyR2i6XTiyyjErD9rkdMC2s44fEK+j32meFlY01qTj7NZfZ0AKGycC 9KVpEc0k97DkaUCJUifrnTPCndIZKKSjxfQrd2z2o2AkVB2udEueo7AR+BbN1S8GHf8G QX2vIuEGEDL697UaQXERopCdnnFwpAzIR8gYgzCQ4mottY7TXLv0JLm+CSCA/LhY+FKg u5BA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=LQ+c8y2Ra0/4BhYx9xo583jpYsZuT6ktflf7nR2hlbI=; b=VzW1kQurJvfMNuGMd6ox6fUgjUrBsiIBhnAQP41c055dcca1EBd5U3gd+Gn8bt3OVm 93oXdOMciP6+f44ee+5p8hbzsW0wsPx+Z0nuBkUn+uREdh/e3bk0j8KG/64o9kWiUYbo xdyz+V8KmdQw5uIkkXjgUAudkOhxqH7FaU2RKOraVnrBxiG98VLeA57ctaxAXX8pTbAZ VJzhRnQcHYyhH6KvbYODCP9LAdElDUkeZnVzokOTgOv/Yg+z4NZFl2/qmM5neRE1tFcv 3KRzD/MFwQjXkcZK6Im7YAuYucbJxRf3gO3ZqzLwgzSj9S5lwrD4+IebB3kx8oUrQ6Nc ltUw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=oHqzUa45; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t9si2445580pgp.273.2019.04.18.11.24.08; Thu, 18 Apr 2019 11:24:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=oHqzUa45; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2403977AbfDRSVT (ORCPT + 99 others); Thu, 18 Apr 2019 14:21:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:38880 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391661AbfDRSHy (ORCPT ); Thu, 18 Apr 2019 14:07:54 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 17C4A218AF; Thu, 18 Apr 2019 18:07:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555610873; bh=sr2/c6ZFz6S1DDcVXG5GRSj4R2z+zr6gULZPI7eLkxo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oHqzUa45btc/WtX85cmOwteRIQV7odrH0yHODumAdHxUdJZWFR1RBcXoQu3ByeOMN FGADqT97+rY3Tksh/UIDsMna3/s6dbbR56iQqr/89ml07RXcAp6T5WMhLHP6kAe+QD L2mNzbarMEaMe82Id3nJtk6BE3gVThh8FChsbll4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lukas Czerner , Theodore Tso , Sasha Levin Subject: [PATCH 4.9 04/50] ext4: report real fs size after failed resize Date: Thu, 18 Apr 2019 19:57:15 +0200 Message-Id: <20190418160423.405452539@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190418160422.455656724@linuxfoundation.org> References: <20190418160422.455656724@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 6c7328400e0488f7d49e19e02290ba343b6811b2 ] Currently when the file system resize using ext4_resize_fs() fails it will report into log that "resized filesystem to ". However this may not be true in the case of failure. Use the current block count as returned by ext4_blocks_count() to report the block count. Additionally, report a warning that "error occurred during file system resize" Signed-off-by: Lukas Czerner Signed-off-by: Theodore Ts'o Signed-off-by: Sasha Levin --- fs/ext4/resize.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/fs/ext4/resize.c b/fs/ext4/resize.c index e16fb545d441..aef2a24dc9f9 100644 --- a/fs/ext4/resize.c +++ b/fs/ext4/resize.c @@ -2047,6 +2047,10 @@ int ext4_resize_fs(struct super_block *sb, ext4_fsblk_t n_blocks_count) free_flex_gd(flex_gd); if (resize_inode != NULL) iput(resize_inode); - ext4_msg(sb, KERN_INFO, "resized filesystem to %llu", n_blocks_count); + if (err) + ext4_warning(sb, "error (%d) occurred during " + "file system resize", err); + ext4_msg(sb, KERN_INFO, "resized filesystem to %llu", + ext4_blocks_count(es)); return err; } -- 2.19.1