Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp298002pxf; Thu, 25 Mar 2021 04:30:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzQSobhqj0yJrq9Pt5LG0bQWffaDhFXwaaqPxQfxjh+edr1LQaN6jXjILcQSMcvc8bgdJTF X-Received: by 2002:a05:6402:68e:: with SMTP id f14mr8440390edy.169.1616671831719; Thu, 25 Mar 2021 04:30:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616671831; cv=none; d=google.com; s=arc-20160816; b=sFfd23O5ggHllKQl2ewCdGsTYupcU5KE2spe8+LpycYOOIQsFeLs3mlOHdzry+bM32 ZPrQIZcgiamN1kyGrG7hg759//tzvMl2b62GamoOJOTYneq/2gZj/BJmG0txSTmOTY4S xk3uclT0/62B7bmXfABM7FwbuEVNtu0R3n5AglYsaiKiWVKDGwRHqVrDyHrDnXC0+jHj VK1cVrne3SEW88VwISHitE+OYBUTJG5u4YjeucEhKq62yVrn3LoSAQkysD8IPvY+B/s9 ABHZix83678vnzTYrgL5Btgw7xKLcLQJ0nzdQbkrg+rKeXMVSMmXrYiWaYKuD5jxj+C2 m9iA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=7SNqbZ/ItfOUXx8vPmzWmk0UI0mxzyufZedWzANukpQ=; b=rj+olWOydJgq4iNGu6yoJip4c8CKDoACJATWbIT9zcuNGCibgXxN+gS3JUPCfh9ppg AT65k5/y0lRIgSjXgyvlSRd3gA6auEkcumg9U+fklNRZdfiC5n7H+Hdmq2S4yseTWB7t 6ASQIJeeaA8ry9QHvZp9wwwsyg3BM5a9AjM4QScT/p7OOHOgl8jde2ZXPVMXHshvTU+E IK/ePNdbgY+B7DWmwCff88CfMlLUXzVhz1/Bussuh8K7MxkinnVWJb+KgqYlBQ6XUHHc EnHqqIRbDt4+ta9Y828TXR6iRvm5AYtBJgktxiV8Pe+odVP5HGuh4TIR8gD1Nty6G4Ak yYew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Lvzabexf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a21si3863321ejd.654.2021.03.25.04.30.09; Thu, 25 Mar 2021 04:30:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Lvzabexf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231379AbhCYL1G (ORCPT + 99 others); Thu, 25 Mar 2021 07:27:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:33974 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230223AbhCYLZe (ORCPT ); Thu, 25 Mar 2021 07:25:34 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 229F561A24; Thu, 25 Mar 2021 11:25:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1616671533; bh=L9K+An1mAexKxxJjd9SicPaNHcs34iGZOFdaZ2GdXc8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Lvzabexfpky+aaaTW2+H+TcQlvSjR6QZR/HbWPMjhoRUWo3QobFHnCwRpO6+xq8Dt YbZ90uCiMt7D+qbKVTpFdjAgz3t2cd1CfOdfV3NG9+3uR0faceL3X8A5SYX6y/JTv2 i6aSPRD1o3gELMGuFNe3G9v4QN/OljatRhITKjb78rp+iVY4IFkSz4doONYWlMneXW jD7xKB9WK+W+5vtrmA8isYleG8XH2SeDkgPNI59s0D5BTteodv5B1YZ6GoN9s4ORco FVnciDJeNT6/uYhPZCxV1LyQqvEBTjMle6cqgiCNy90aTJjquzNo8ZM9Ern9uqgwz3 WWGnsvMg+TpBg== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Qu Wenruo , David Sterba , Sasha Levin , linux-btrfs@vger.kernel.org Subject: [PATCH AUTOSEL 5.11 26/44] btrfs: track qgroup released data in own variable in insert_prealloc_file_extent Date: Thu, 25 Mar 2021 07:24:41 -0400 Message-Id: <20210325112459.1926846-26-sashal@kernel.org> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210325112459.1926846-1-sashal@kernel.org> References: <20210325112459.1926846-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Qu Wenruo [ Upstream commit fbf48bb0b197e6894a04c714728c952af7153bf3 ] There is a piece of weird code in insert_prealloc_file_extent(), which looks like: ret = btrfs_qgroup_release_data(inode, file_offset, len); if (ret < 0) return ERR_PTR(ret); if (trans) { ret = insert_reserved_file_extent(trans, inode, file_offset, &stack_fi, true, ret); ... } extent_info.is_new_extent = true; extent_info.qgroup_reserved = ret; ... Note how the variable @ret is abused here, and if anyone is adding code just after btrfs_qgroup_release_data() call, it's super easy to overwrite the @ret and cause tons of qgroup related bugs. Fix such abuse by introducing new variable @qgroup_released, so that we won't reuse the existing variable @ret. Signed-off-by: Qu Wenruo Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Sasha Levin --- fs/btrfs/inode.c | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/fs/btrfs/inode.c b/fs/btrfs/inode.c index 9b4f75568261..8f36071769fa 100644 --- a/fs/btrfs/inode.c +++ b/fs/btrfs/inode.c @@ -9674,6 +9674,7 @@ static struct btrfs_trans_handle *insert_prealloc_file_extent( struct btrfs_path *path; u64 start = ins->objectid; u64 len = ins->offset; + int qgroup_released; int ret; memset(&stack_fi, 0, sizeof(stack_fi)); @@ -9686,14 +9687,14 @@ static struct btrfs_trans_handle *insert_prealloc_file_extent( btrfs_set_stack_file_extent_compression(&stack_fi, BTRFS_COMPRESS_NONE); /* Encryption and other encoding is reserved and all 0 */ - ret = btrfs_qgroup_release_data(inode, file_offset, len); - if (ret < 0) - return ERR_PTR(ret); + qgroup_released = btrfs_qgroup_release_data(inode, file_offset, len); + if (qgroup_released < 0) + return ERR_PTR(qgroup_released); if (trans) { ret = insert_reserved_file_extent(trans, inode, file_offset, &stack_fi, - true, ret); + true, qgroup_released); if (ret) return ERR_PTR(ret); return trans; @@ -9706,7 +9707,7 @@ static struct btrfs_trans_handle *insert_prealloc_file_extent( extent_info.file_offset = file_offset; extent_info.extent_buf = (char *)&stack_fi; extent_info.is_new_extent = true; - extent_info.qgroup_reserved = ret; + extent_info.qgroup_reserved = qgroup_released; extent_info.insertions = 0; path = btrfs_alloc_path(); -- 2.30.1