Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp901484yba; Thu, 18 Apr 2019 11:29:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqx9yBEfMLP92lDbd3lcEV7LFV+lkkLVJcc6Wm9DduTLbTBgGd9abduEnnfcSGn/9LU69y/f X-Received: by 2002:a17:902:9002:: with SMTP id a2mr7916269plp.317.1555612150292; Thu, 18 Apr 2019 11:29:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555612150; cv=none; d=google.com; s=arc-20160816; b=Atnh+voSy+fD+TGsg76rZlwd7sIGKcTsTqcNG4jZRGu903aGc4y/jY8e9mmRwkDSsw wz7lk9aNmFLsjYk0mDqvv6ZulK0kwEDkCFk9S3qtPFPGrwZeFGqe2E1b9BS3HEFyxh8X m6uj8qshyXgqQp1TTD5Crsh7x3BKX7mupW851oprgMgt5yxNaWhIcxNXG5zxf2MdK1pR kfLGaZm169V0t+PY5pK0J0o1P73xuhuHNK5YZcjzZz9G2nX6sIP5JZngBZncelDampzN /d4+lYLMgk2AZw+sTLS1gyXofJepru/o0BazprSymQKoKDEotstmOmyOkRWShEcZO7js CBjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JmaR7fck9TK8hayAGz99UhW4n9pUEoY0ssrzlTaIgys=; b=PRnDzy0YbIcWX3Y4k1ynkEaqLo/Nmx1i08h50mxHVqyhnqyhTAt9S8x4jpo+gv+oDx m96o+Nbh7Ls2acW1PQBfullZnuEc8nCJRBi4zWvMda8oUDAG7uGx1fxYHdJfJWV+1cK9 Kejuy92W00ZG6HvWDMnDDvHtI3pnMJUDRYqBvwmb5iCKHeivWX/2EFKofCZ3sX64auu1 UMxpCE5HAYq8sXkIgHfUIFdOh1sXwla43EuNpjgLOM/FcaiYTC7g4LZ8Rrs7xnISuzBf 6UwB7DwL7iWgdHfHzaoCOSPRXNnvwfLA91GWGBV3NhLBLzwfrtLZ2jivg0LXau6KFufM pqdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yCpM5oMJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n129si2733946pgn.580.2019.04.18.11.28.55; Thu, 18 Apr 2019 11:29:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yCpM5oMJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391121AbfDRSE3 (ORCPT + 99 others); Thu, 18 Apr 2019 14:04:29 -0400 Received: from mail.kernel.org ([198.145.29.99]:33342 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391097AbfDRSEW (ORCPT ); Thu, 18 Apr 2019 14:04:22 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C62CB206B6; Thu, 18 Apr 2019 18:04:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555610662; bh=RuFa1+8xl5fvD/eNj1M4aNk6Yl9zZQxtIxZdR+bzvJM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yCpM5oMJrNP4v7zpl0JW4xr65C9/NC2uX4shtzleYNdoJyuDSk+YLni9m4Id/ds1k jPVM+DUeMpu44tFu9cz3W5VpeqHfBLPR9Ef44pSLqpvFHBgjGZjvXJrpLB9V16voyA tngrpwK7mJgyJc9UrdMbUHY957XMFilEdksH4Ufg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lukas Czerner , Theodore Tso , Sasha Levin Subject: [PATCH 4.14 05/92] ext4: report real fs size after failed resize Date: Thu, 18 Apr 2019 19:56:23 +0200 Message-Id: <20190418160430.935807848@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190418160430.325165109@linuxfoundation.org> References: <20190418160430.325165109@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 6c7328400e0488f7d49e19e02290ba343b6811b2 ] Currently when the file system resize using ext4_resize_fs() fails it will report into log that "resized filesystem to ". However this may not be true in the case of failure. Use the current block count as returned by ext4_blocks_count() to report the block count. Additionally, report a warning that "error occurred during file system resize" Signed-off-by: Lukas Czerner Signed-off-by: Theodore Ts'o Signed-off-by: Sasha Levin --- fs/ext4/resize.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/fs/ext4/resize.c b/fs/ext4/resize.c index fb9fbf993e22..333fba05e1a5 100644 --- a/fs/ext4/resize.c +++ b/fs/ext4/resize.c @@ -2049,6 +2049,10 @@ int ext4_resize_fs(struct super_block *sb, ext4_fsblk_t n_blocks_count) free_flex_gd(flex_gd); if (resize_inode != NULL) iput(resize_inode); - ext4_msg(sb, KERN_INFO, "resized filesystem to %llu", n_blocks_count); + if (err) + ext4_warning(sb, "error (%d) occurred during " + "file system resize", err); + ext4_msg(sb, KERN_INFO, "resized filesystem to %llu", + ext4_blocks_count(es)); return err; } -- 2.19.1