Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp688687ybz; Fri, 1 May 2020 06:51:33 -0700 (PDT) X-Google-Smtp-Source: APiQypKlBanN0yQuhmF8x0nmA+xlp5EsXE7yapxI2YdywCGmlXKL9MFV7rz2rGoTl8Mt7jNiiOt5 X-Received: by 2002:a05:6402:1d88:: with SMTP id dk8mr3764798edb.52.1588341092885; Fri, 01 May 2020 06:51:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588341092; cv=none; d=google.com; s=arc-20160816; b=XJMpbjuZtov1p7jFobNeywSFmd/ynzgtDO99EJH0sFQdnqHWqFK3GOwpHnsnVGMFRA Jeb1pIszirhZ1RN28quTiyNTWkWcTt7YTuaHx878lo/0WLo7edEmniVD4l2haAvCcGgQ MFTfZj/5VpL8rBumYbO4myBAgb8zb8N3Jl1ReBSGCgLZzPiCvBE/UEpa8EVQpbSQ1+Jp LWdZyJwHR5k8K17+uz5Vf7oqINhz+LN8TmKwYE9aG72ZSjhSynxr35iOIschF3g+aSyt SxBP7YKrcZAq4QHa3HWs53kykaPZ43zbtSFCewiSnqycE2wLWEeNZjUe7uPBIAo/IwKP nM6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=MwuiCpdcj2Je2xKxMaYROxEkPixAGP2hbtMhKfpZ+y4=; b=Fk58nYjbIOkXyvbLTz07Kvz2VOauBF0eUpPWXIKesjhc0ZPe2admK0eFwy/aZnHfBJ /R+O3/eislpQpeNypfm1dpzyxDJ/a2MQdX4W8OEiR00wc8BRtPHB1zAcnYqxrE7HNNpQ yvUpiqdl6wVSwNamLrCfeI1UJkeRfr+qfuDUvsc1ko62+ucMXfb8KcfqOr2mlnC4nZps jS/Bml/uCXiZKSkP0tZcsFKTIQ66qlGgS3XgYmJuBZs5ZNXiiLs+ov8XXam+gj5UAcpB VmNK+UvQqpai2/zmMoM3C5hfzq0RfL6/YSNtzzv9dj1EkXM8SVZCBriJQTcvkYJkR5MW djBg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=G6bOLdWK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s13si1588696ejr.484.2020.05.01.06.51.10; Fri, 01 May 2020 06:51:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=G6bOLdWK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731499AbgEANtc (ORCPT + 99 others); Fri, 1 May 2020 09:49:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:41502 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728894AbgEANlP (ORCPT ); Fri, 1 May 2020 09:41:15 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 27EA4205C9; Fri, 1 May 2020 13:41:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588340474; bh=wbTdBVJuZ2QGIL3DoE3RkbBh6BRtM0pmebWeNOoD6qo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=G6bOLdWKr0pxVEpij5JbLDibDpoN8K8TLaxK7FB5pdxL/LPy8L++aubFFchHcr+aB 6bjQAife79/UHa7tJbsdhXdku42ocPt38FNk9idABRpMN54kB1PcC0PzEdEAF+6qIm Kcd1+ZsvZU0BoCaAajdvbVwMdiqrsschaqhRPecs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?=D0=9A=D0=BE=D1=87=D0=B5=D1=82=D0=BA=D0=BE=D0=B2=20=D0=9C=D0=B0=D0=BA=D1=81=D0=B8=D0=BC?= , Karl Olsen , Jef Driesen , Richard Weinberger , Christian Eggers , "Christian Berger" Subject: [PATCH 5.6 001/106] ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() Date: Fri, 1 May 2020 15:22:34 +0200 Message-Id: <20200501131543.592652133@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200501131543.421333643@linuxfoundation.org> References: <20200501131543.421333643@linuxfoundation.org> User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Richard Weinberger commit 4ab25ac8b2b5514151d5f91cf9514df08dd26938 upstream. Orphans are allowed to point to deleted inodes. So -ENOENT is not a fatal error. Reported-by: Кочетков Максим Reported-and-tested-by: "Christian Berger" Tested-by: Karl Olsen Tested-by: Jef Driesen Fixes: ee1438ce5dc4 ("ubifs: Check link count of inodes when killing orphans.") Signed-off-by: Richard Weinberger Cc: Christian Eggers Signed-off-by: Greg Kroah-Hartman --- fs/ubifs/orphan.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/fs/ubifs/orphan.c +++ b/fs/ubifs/orphan.c @@ -688,14 +688,14 @@ static int do_kill_orphans(struct ubifs_ ino_key_init(c, &key1, inum); err = ubifs_tnc_lookup(c, &key1, ino); - if (err) + if (err && err != -ENOENT) goto out_free; /* * Check whether an inode can really get deleted. * linkat() with O_TMPFILE allows rebirth of an inode. */ - if (ino->nlink == 0) { + if (err == 0 && ino->nlink == 0) { dbg_rcvry("deleting orphaned inode %lu", (unsigned long)inum);