Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1152517yba; Wed, 24 Apr 2019 16:15:17 -0700 (PDT) X-Google-Smtp-Source: APXvYqynusjdUhgVShqCba4FOtsSR9oCf3WsGbaeaKd6spYK4fJfxphA3+iizmUEpiBD0NFSJb5Z X-Received: by 2002:a62:204b:: with SMTP id g72mr35085017pfg.51.1556147717887; Wed, 24 Apr 2019 16:15:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556147717; cv=none; d=google.com; s=arc-20160816; b=WMAPwjicGUp8qUPzd3t4wMoqgnMbRbR70vqDXUAefFPArjxGgcyPLIsfwV0Xtit4ts pzRAhJ0xNKAMl+BJ63uTHUfpbCZ9sx/YFU04jGRHoBGHm8tQaxN+jJ2C/Kg3QCftvLWn UF+cgv/7PWP4ghInLocsLS2JIL+honoAAqNYtYIyrjOUTUHhf4m84FPx9J2Dvqu3Qx99 efC5l3Uvp78LDMNkS7UNho3hkVvGQISQlcV7hjXILd1pnzq29GT1eMDLPAaZcrkD9qWh Iewtl1SEahYTZgc52RhqxIFOlbzdWpSKniSyrtZlujjCJaYHVkUQJ4WOxyf/G7NteQk8 4okw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=RNcVdCTGfMLp76fVHpfS9zBQzA4HJ0WaggOomvFRTPw=; b=XE4UyAIP4lrkOvQNhtim1ETXyW2CML4lgAISX4n8wVqmXUcFMo5/uW4Ls7XwW6Arna XUBF3WgeHKpJ3ypk0MpOyCZMS3sn6oJip1Eou4NkeIVI/1JX2MZUo6s1dtBSJZ7X3TMf ra13eiXFYlPjxw8sLw7K6G2EVSQzjkv2pMkHF6hLUYEnu43gv1x0GZH9t5lQrFPkF4p4 IPqhWuKSquHhKHbPXFtZ4DEFpWO2housdpgxxjU33D1APXRqgwyFbQDBCm6pO2y2+MWY tkui/EPp3tszZnQI/JHnE/Dms8Ef6cGlOSFArNvAa6eVd0DvEcogcFu5ZKGNAoIKEaXQ UX7g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xWJL2e8E; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 1si12499158plq.240.2019.04.24.16.15.02; Wed, 24 Apr 2019 16:15:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xWJL2e8E; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389575AbfDXRWa (ORCPT + 99 others); Wed, 24 Apr 2019 13:22:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:48024 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388922AbfDXRW1 (ORCPT ); Wed, 24 Apr 2019 13:22:27 -0400 Received: from localhost (62-193-50-229.as16211.net [62.193.50.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0CD0A21905; Wed, 24 Apr 2019 17:22:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556126546; bh=gJ/msCalUi9MD8rR5wQQMBXS7TYLiSmtIB3opvTpaUk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xWJL2e8EdXVj2F7N16n8DW0OaV2aXP3QtbPYpf882q7l/JwfclxY0zly9lvPd8GVX G1WN/u4+vHNRY9njkpoifEIYO0c7RVh9JkRYWkcy/z/qJhjfEE4/PhXsuMbX/7Wgkk kbYGE79di0taoP8NrOLODHluo+k3KbNeK9mQyzvU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lukas Czerner , Theodore Tso , Sasha Levin Subject: [PATCH 4.4 100/168] ext4: report real fs size after failed resize Date: Wed, 24 Apr 2019 19:09:04 +0200 Message-Id: <20190424170929.572502986@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190424170923.452349382@linuxfoundation.org> References: <20190424170923.452349382@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 6c7328400e0488f7d49e19e02290ba343b6811b2 ] Currently when the file system resize using ext4_resize_fs() fails it will report into log that "resized filesystem to ". However this may not be true in the case of failure. Use the current block count as returned by ext4_blocks_count() to report the block count. Additionally, report a warning that "error occurred during file system resize" Signed-off-by: Lukas Czerner Signed-off-by: Theodore Ts'o Signed-off-by: Sasha Levin --- fs/ext4/resize.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/fs/ext4/resize.c b/fs/ext4/resize.c index 22c90eb9a4e0..5223eb25bf59 100644 --- a/fs/ext4/resize.c +++ b/fs/ext4/resize.c @@ -2047,6 +2047,10 @@ int ext4_resize_fs(struct super_block *sb, ext4_fsblk_t n_blocks_count) free_flex_gd(flex_gd); if (resize_inode != NULL) iput(resize_inode); - ext4_msg(sb, KERN_INFO, "resized filesystem to %llu", n_blocks_count); + if (err) + ext4_warning(sb, "error (%d) occurred during " + "file system resize", err); + ext4_msg(sb, KERN_INFO, "resized filesystem to %llu", + ext4_blocks_count(es)); return err; } -- 2.19.1