Received: by 2002:a05:6622:f08:0:0:0:0 with SMTP id l8csp4488551ivc; Tue, 3 Nov 2020 13:22:18 -0800 (PST) X-Google-Smtp-Source: ABdhPJxcirxeqkhrT8qV3lCjxFFdYRa0uvATN6totoZ5Bck3a8WGu/MsMPCxds34+aHt+9h2AMEA X-Received: by 2002:aa7:c2c3:: with SMTP id m3mr10913381edp.361.1604438538580; Tue, 03 Nov 2020 13:22:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604438538; cv=none; d=google.com; s=arc-20160816; b=gDA33rgIK+QO54ezzK0GzKQzlOKf8tM3059jmfp61dtNw4+8E8CWyK0zzT02DsHkjb AaK6W8GuAqrQ4TTWYMAuPAIuByQaYQ5fyBzHCqD+wZGd315AjoUWDZxIr0aJpJ5T0f/O XZpJs9RvSz6/h5a43++mRpLok1BxMWRI7zNeQJF+/eqDMooHumy3XfwgzJsaZKMizeGH tVuvH49/tT2m2YfMpqZOCa/7wWMT2Etqg6hL0WofFFya8uPwT7HMrvd5/T2oRYHoeM38 LapOT8vNYt/8Z1IkgD/4pm2oR+wcJiccZlJlXvQD9MKNUNAQwUJHohI2LPJ2qXthJjDy MLjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bWnv096jIUPAYzsk9SFcjKUXr4FXGittiCxJt2aC/Vw=; b=Vbiwhw1JVoEeJTlUrx1qlrdCr26mJcKcicxSwTwPjGXKqKp81RItuRyDJagpM42Op7 9uhWSobvaJg58b4ZQg4UXm3fWOnYIMaPaB10hPi1e4BYCZ1yeQQcesZFgeQ1rU+UhjIj seXKkdWSsNPsjD1SGWLBF33FvtO8pce26JcFxWiEdiDQz9Pw2L144jaVcQZxIePK/2fj jAxpTkmrOs5B6HDaBp+JOJX3O8lNecCyS1vRwp8Tap14WDVZaMji87AjqjmH30T5Awt3 pUdb1F8AmASTiV2ZNpwegjb8ovMxXgpQWxqEi/HAcJpnflQgRQS/aUtou68/rBTZha5I +CeA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gcvnIqN4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g18si6156872edh.40.2020.11.03.13.21.55; Tue, 03 Nov 2020 13:22:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gcvnIqN4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388533AbgKCVTZ (ORCPT + 99 others); Tue, 3 Nov 2020 16:19:25 -0500 Received: from mail.kernel.org ([198.145.29.99]:48092 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730019AbgKCVIl (ORCPT ); Tue, 3 Nov 2020 16:08:41 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 12287206B5; Tue, 3 Nov 2020 21:08:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604437720; bh=RzEuN25/ar48nnIB8Nmiu0Rm9ojCIu5D57M0usXW0lg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gcvnIqN4FbOG3J+gP2o/Yg/Xdjj7h4dwy4rcVOrb196f5BMld6J6sR0pnoBrIzmnY yMBLkzi3W3kG6MfRiisfECdjEDO3PI5/jvSx4/+7M4/lJa/umJifrWg0RFVicvK4PB wknn+62WPtghVdRybldnHe3mArE7CzAqZ8EueU8c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, stable@kernel.org, Dinghao Liu , Andreas Dilger , Theodore Tso Subject: [PATCH 4.19 174/191] ext4: fix error handling code in add_new_gdb Date: Tue, 3 Nov 2020 21:37:46 +0100 Message-Id: <20201103203248.889470846@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203232.656475008@linuxfoundation.org> References: <20201103203232.656475008@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dinghao Liu commit c9e87161cc621cbdcfc472fa0b2d81c63780c8f5 upstream. When ext4_journal_get_write_access() fails, we should terminate the execution flow and release n_group_desc, iloc.bh, dind and gdb_bh. Cc: stable@kernel.org Signed-off-by: Dinghao Liu Reviewed-by: Andreas Dilger Link: https://lore.kernel.org/r/20200829025403.3139-1-dinghao.liu@zju.edu.cn Signed-off-by: Theodore Ts'o Signed-off-by: Greg Kroah-Hartman --- fs/ext4/resize.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/fs/ext4/resize.c +++ b/fs/ext4/resize.c @@ -861,8 +861,10 @@ static int add_new_gdb(handle_t *handle, BUFFER_TRACE(dind, "get_write_access"); err = ext4_journal_get_write_access(handle, dind); - if (unlikely(err)) + if (unlikely(err)) { ext4_std_error(sb, err); + goto errout; + } /* ext4_reserve_inode_write() gets a reference on the iloc */ err = ext4_reserve_inode_write(handle, inode, &iloc);