Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1131134ybt; Tue, 7 Jul 2020 08:26:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJywdNJJ+1Z0O+GjTfTeIg1mzQzqbwcYCJexbUhToFHlc2r38hHcKNGDjOmdLoB4GNEnTIYI X-Received: by 2002:a50:f047:: with SMTP id u7mr64556936edl.274.1594135618724; Tue, 07 Jul 2020 08:26:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594135618; cv=none; d=google.com; s=arc-20160816; b=DDGFlwqxDDm+dEMedU2SZghrP96uxeX2XsJGvXhQtqctNm8nQzlgY5lFxKH4fzF+9V mFF3d2AfbixI6bRHCQSsWq9OxnoawuHDb6jtQg3KEUTzlq3hjByKF4vnaDVY7Ul2TE/w mzJIPSXGu2ntnWAz/y0ZyBsqBbsv8gUuVWYWh1U0gw693AKzx27uihCPHsNXDQvELQUY yggonhmnBIhkT15oBi4aeLfgSR8j/Ji+Z56KwqVzJ5pteIaG4yfOUqUyRlvpla2rd1t6 UhsR1XeU+zclZPovFHXnSvS4JXu0tsCKQZsbUAA88BoAA34tjp5ntR7PkC4AAC94pH2+ ThRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=6PWVy/UAXYxOs9kXx2NTGyq7n1GPCN+ErTjewCKd2vQ=; b=qzPQdN9d+PjONg77dTqYkpNayanBEUqUI68d5kw7jTKtaOeyCGlAZEoS42T0vcPoG+ GBGFhTxFhbcRFJ79g3dL5PI5KwF/7iy7B5swgd/IW0wGcIg/BhgEvklLWFHwxbo+ULg7 SZZBO44txsgxu5LBqdOOPjLoi2t03v1TCpz5zy9Qh9O0VXvmGFnnwkVHJzmHg+pHp3Pt MQHUbuFl7yrIX0UICeSSB49T1ezBugQs4USlTIesknOolTERl8BGA6nkyjnUFB02Vcoy C4e3czzzgelSFaTcSpLXO0zrJnDWszV51DcbCQv/HgMCKoFF3gP2ot/cdRjO18R/Elkn rwBA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tS7alWj3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i13si605654ejp.659.2020.07.07.08.26.35; Tue, 07 Jul 2020 08:26:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tS7alWj3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729427AbgGGPXU (ORCPT + 99 others); Tue, 7 Jul 2020 11:23:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:36276 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729957AbgGGPXS (ORCPT ); Tue, 7 Jul 2020 11:23:18 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B6460206F6; Tue, 7 Jul 2020 15:23:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135397; bh=uIk4ESIW5Mg7M/v0OCJWVJvllWdahzivRGgMbeGe7dw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tS7alWj3w8W43903DmvzOKviX+0VNQaf0uU8C+8Ur/DKrzzuKvyzOAmDq+P9oTtNB nzJFfcTMUI2zaPFe1ZfcHNCFYMRq8kZ6EBdTFmzjFEnfBesywbvpv854gloGGYWdt/ 1q4GM5QqWZ+Pj7F+XWQ6KcDYssKbl1lFXDx1rMyU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tetsuhiro Kohada , Sungjong Seo , Namjae Jeon , Sasha Levin Subject: [PATCH 5.7 004/112] exfat: move setting VOL_DIRTY over exfat_remove_entries() Date: Tue, 7 Jul 2020 17:16:09 +0200 Message-Id: <20200707145801.142772468@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145800.925304888@linuxfoundation.org> References: <20200707145800.925304888@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Namjae Jeon [ Upstream commit 3bcfb701099acf96b0e883bf5544f96af473aa1d ] Move setting VOL_DIRTY over exfat_remove_entries() to avoid unneeded leaving VOL_DIRTY on -ENOTEMPTY. Fixes: 5f2aa075070c ("exfat: add inode operations") Cc: stable@vger.kernel.org # v5.7 Reported-by: Tetsuhiro Kohada Reviewed-by: Sungjong Seo Signed-off-by: Namjae Jeon Signed-off-by: Sasha Levin --- fs/exfat/namei.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/exfat/namei.c b/fs/exfat/namei.c index 3bf1dbadab691..2c9c783177213 100644 --- a/fs/exfat/namei.c +++ b/fs/exfat/namei.c @@ -984,7 +984,6 @@ static int exfat_rmdir(struct inode *dir, struct dentry *dentry) goto unlock; } - exfat_set_vol_flags(sb, VOL_DIRTY); exfat_chain_set(&clu_to_free, ei->start_clu, EXFAT_B_TO_CLU_ROUND_UP(i_size_read(inode), sbi), ei->flags); @@ -1012,6 +1011,7 @@ static int exfat_rmdir(struct inode *dir, struct dentry *dentry) num_entries++; brelse(bh); + exfat_set_vol_flags(sb, VOL_DIRTY); err = exfat_remove_entries(dir, &cdir, entry, 0, num_entries); if (err) { exfat_msg(sb, KERN_ERR, -- 2.25.1