Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2640722pxj; Mon, 31 May 2021 07:11:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzxD2IzGqGSlcKsxz+vdWs55asPjZm+4blgbNEVQHUEICwd3R6NknRTjE1oFgRUa0pSkRAL X-Received: by 2002:a17:906:b14f:: with SMTP id bt15mr24056631ejb.126.1622470283972; Mon, 31 May 2021 07:11:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622470283; cv=none; d=google.com; s=arc-20160816; b=vKB/yOHSirwclsLo26vH3bjvU9KvScd2ynbPyAsQ8XppaPfdGaQ9zifVf1Hm9up/l8 IFIWdy0tgcAtO/VF2S3gIvecv88B/M4Vm2VjhmvgIzutEDJjD66g7yAIoe8ltmx5iy89 RfqUHmOBiCdlH64BO9Hlchyc7A2rAyNshBny8c/WdcYf5ZJycZeQVJVkOD1cYILNsFA8 sscQR4laqfPX6ohS5wS6mGGeanvnnnBjodRcUFVmtYi7vx3sSegbl4bq3UHPUQ3xEnnt eRKjcPSTGTF4tvPBE1D2YyHkSIZwk9zL/DS3CMuWUovsazjGrJQ/vbWENqyrt2v27E22 aECQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Set1pnl3BUQAH9z0ZfX7nny14NqezIpQgYzIlH1QFE8=; b=atPGUgo4elNL+GUQtlFB6Cvv7Ae0iefcwKRfSrny5r2NCigd9fpmRIGSm2RlZWTBx0 3IiOkB7gdsIVIcKmN7Z2ZUvkF1nJMpSPHdulyKaJgu37qXLmWNcIYHxjWzJRMGDJoDte aDxsn1NBGOF9R00xnyRUfpH4T5MFW+8n9OUbAi2lYh/MXXPa14eWnyU7l0SPoalOZJSg 9YbfwWiJzmK+EJ8IMXorCFyeN+5Pzjc3fmpdwR1LHtSrPxQO+5oW5xELcUaIv+Uk2egj QiU7RR5u4ac/kqEclUpwVBDRGyPf66BDLWzH/8ZWOz1H0xwFCP14+JvOd2Zjgg7A+SdI w3Xw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=OYYLmgR5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p5si14044762edi.291.2021.05.31.07.10.59; Mon, 31 May 2021 07:11:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=OYYLmgR5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233455AbhEaOJX (ORCPT + 99 others); Mon, 31 May 2021 10:09:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:49706 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232331AbhEaNnK (ORCPT ); Mon, 31 May 2021 09:43:10 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1C829613D7; Mon, 31 May 2021 13:28:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1622467729; bh=Dv1gPJz98h71tKkFr3ikWvxAKFWRsMK+BBbWvj2Tgjc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=OYYLmgR5IT/cJeDv3BfhWKKhMKKBE06JKyIY65dIf+Dvx5cDr/Odc81YsH60EdBvI ukNhtF45lbEGiQOdSfnNdQRyttKbkvy7fHAdSkRujS7sIsIs4+plPiPo0cEe7+BUWy K6svABQ3J4rzFlzsU32DUAWtVhwQL/CzABLAHDIk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Josef Bacik , David Sterba , Sasha Levin Subject: [PATCH 4.14 58/79] btrfs: do not BUG_ON in link_to_fixup_dir Date: Mon, 31 May 2021 15:14:43 +0200 Message-Id: <20210531130637.856622078@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210531130636.002722319@linuxfoundation.org> References: <20210531130636.002722319@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Josef Bacik [ Upstream commit 91df99a6eb50d5a1bc70fff4a09a0b7ae6aab96d ] While doing error injection testing I got the following panic kernel BUG at fs/btrfs/tree-log.c:1862! invalid opcode: 0000 [#1] SMP NOPTI CPU: 1 PID: 7836 Comm: mount Not tainted 5.13.0-rc1+ #305 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014 RIP: 0010:link_to_fixup_dir+0xd5/0xe0 RSP: 0018:ffffb5800180fa30 EFLAGS: 00010216 RAX: fffffffffffffffb RBX: 00000000fffffffb RCX: ffff8f595287faf0 RDX: ffffb5800180fa37 RSI: ffff8f5954978800 RDI: 0000000000000000 RBP: ffff8f5953af9450 R08: 0000000000000019 R09: 0000000000000001 R10: 000151f408682970 R11: 0000000120021001 R12: ffff8f5954978800 R13: ffff8f595287faf0 R14: ffff8f5953c77dd0 R15: 0000000000000065 FS: 00007fc5284c8c40(0000) GS:ffff8f59bbd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc5287f47c0 CR3: 000000011275e002 CR4: 0000000000370ee0 Call Trace: replay_one_buffer+0x409/0x470 ? btree_read_extent_buffer_pages+0xd0/0x110 walk_up_log_tree+0x157/0x1e0 walk_log_tree+0xa6/0x1d0 btrfs_recover_log_trees+0x1da/0x360 ? replay_one_extent+0x7b0/0x7b0 open_ctree+0x1486/0x1720 btrfs_mount_root.cold+0x12/0xea ? __kmalloc_track_caller+0x12f/0x240 legacy_get_tree+0x24/0x40 vfs_get_tree+0x22/0xb0 vfs_kern_mount.part.0+0x71/0xb0 btrfs_mount+0x10d/0x380 ? vfs_parse_fs_string+0x4d/0x90 legacy_get_tree+0x24/0x40 vfs_get_tree+0x22/0xb0 path_mount+0x433/0xa10 __x64_sys_mount+0xe3/0x120 do_syscall_64+0x3d/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae We can get -EIO or any number of legitimate errors from btrfs_search_slot(), panicing here is not the appropriate response. The error path for this code handles errors properly, simply return the error. Signed-off-by: Josef Bacik Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Sasha Levin --- fs/btrfs/tree-log.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/fs/btrfs/tree-log.c b/fs/btrfs/tree-log.c index e40c27aec949..035a2e2be156 100644 --- a/fs/btrfs/tree-log.c +++ b/fs/btrfs/tree-log.c @@ -1629,8 +1629,6 @@ static noinline int link_to_fixup_dir(struct btrfs_trans_handle *trans, ret = btrfs_update_inode(trans, root, inode); } else if (ret == -EEXIST) { ret = 0; - } else { - BUG(); /* Logic Error */ } iput(inode); -- 2.30.2