Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2711428pxj; Mon, 31 May 2021 08:50:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyM80kwVK0sk2Hn3FGYtaG1UC86tFmN2Y/n4Ll5WF2J1zMjNyMiBe0QXOARPdG4tZx+5ncS X-Received: by 2002:a17:906:5f99:: with SMTP id a25mr3373685eju.45.1622476255342; Mon, 31 May 2021 08:50:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622476255; cv=none; d=google.com; s=arc-20160816; b=HYatv25Zga3KiWgC9R6HQwnT8QKXrovdJo+98VClOUm4RMRMbQln+BJBBeLj/qEiTG oxu3y9v1EdU/Hx/F/C7ILLctX9elcRNqcMOEiN+SLhZpOSs5bUkLDg1JXD2bolrOcxrN bLuq+ySPJnarBzIWdO/GbTfhjEsw00Xx3SbEBQun4eXe9np1ex6ofOpb4eP0i5DQH36Q yKALBaKYWAPZkrdueeWTZsePsCrGH8rO0uPK2W3sBqP7RH9XNUtSQ+JRHKTn7thfp0CA 4z6itBs0zhkXSLQ7keQ679UDmPFiQlZiV5OYH4bBi1pAauPloKsvoEiim9+5DM+oM2JL xQoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=BVaygdEVcdG5XiVjIy2aQClaSxcgw2G9Fr55D6KJ6ng=; b=r7IbGKsi1ld+z14GNi24wqmfUrXEQIdnwYG+MG4MzrNooABiUpaVCx7662Ood1zzBN oX+6yPXcU996UL2HSBWjtnSBWqFik2wVR0xrH0gC8EMJdNsbnMx5/VfL96J/jeJ/WWrI 0kmKdLJ/B/+nJiQV+JTNYwhud2TmC0dAsHr6LnEz8Q6WcO1pxy9o3E8FMJCCA+yXyAO6 y3DD1HWV6G9zYFTKjcJrl4yaKjLxGsXLfQL7971n3Ffzng0qb2IJunq3ezetf7XPSVbN qhlMWc9SrSMv6QEodeZKg4B+EVfLu3/VcCqbNI90EeUsxEqyHZpY6r3w3pEYN83hn50o UkOQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=N8S46KZY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v11si5804750edx.139.2021.05.31.08.50.33; Mon, 31 May 2021 08:50:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=N8S46KZY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232842AbhEaPut (ORCPT + 99 others); Mon, 31 May 2021 11:50:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:55142 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233973AbhEaO2G (ORCPT ); Mon, 31 May 2021 10:28:06 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id F141C61C1A; Mon, 31 May 2021 13:47:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1622468871; bh=N0FAeNuDKMSXFENfB91Epg1afoE4j4T6/AIEHFc73fs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=N8S46KZYK3QCe4EpRHFq0XcVPFjfoieE3uflB9w7/iUGR1UEP83vBfEJe48tbLIwj ZsD9lHMdOf3MTsSAHZ+SXbLguB2tbehGGyfH6t50ffV1GqBClFyk7PZfArsv2t0TPm vbvTAf6VBHP9zQ8ntcXX80Gi/V2MRnvLMe4lzgJk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Josef Bacik , David Sterba , Sasha Levin Subject: [PATCH 5.4 126/177] btrfs: do not BUG_ON in link_to_fixup_dir Date: Mon, 31 May 2021 15:14:43 +0200 Message-Id: <20210531130652.278805513@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210531130647.887605866@linuxfoundation.org> References: <20210531130647.887605866@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Josef Bacik [ Upstream commit 91df99a6eb50d5a1bc70fff4a09a0b7ae6aab96d ] While doing error injection testing I got the following panic kernel BUG at fs/btrfs/tree-log.c:1862! invalid opcode: 0000 [#1] SMP NOPTI CPU: 1 PID: 7836 Comm: mount Not tainted 5.13.0-rc1+ #305 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014 RIP: 0010:link_to_fixup_dir+0xd5/0xe0 RSP: 0018:ffffb5800180fa30 EFLAGS: 00010216 RAX: fffffffffffffffb RBX: 00000000fffffffb RCX: ffff8f595287faf0 RDX: ffffb5800180fa37 RSI: ffff8f5954978800 RDI: 0000000000000000 RBP: ffff8f5953af9450 R08: 0000000000000019 R09: 0000000000000001 R10: 000151f408682970 R11: 0000000120021001 R12: ffff8f5954978800 R13: ffff8f595287faf0 R14: ffff8f5953c77dd0 R15: 0000000000000065 FS: 00007fc5284c8c40(0000) GS:ffff8f59bbd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc5287f47c0 CR3: 000000011275e002 CR4: 0000000000370ee0 Call Trace: replay_one_buffer+0x409/0x470 ? btree_read_extent_buffer_pages+0xd0/0x110 walk_up_log_tree+0x157/0x1e0 walk_log_tree+0xa6/0x1d0 btrfs_recover_log_trees+0x1da/0x360 ? replay_one_extent+0x7b0/0x7b0 open_ctree+0x1486/0x1720 btrfs_mount_root.cold+0x12/0xea ? __kmalloc_track_caller+0x12f/0x240 legacy_get_tree+0x24/0x40 vfs_get_tree+0x22/0xb0 vfs_kern_mount.part.0+0x71/0xb0 btrfs_mount+0x10d/0x380 ? vfs_parse_fs_string+0x4d/0x90 legacy_get_tree+0x24/0x40 vfs_get_tree+0x22/0xb0 path_mount+0x433/0xa10 __x64_sys_mount+0xe3/0x120 do_syscall_64+0x3d/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae We can get -EIO or any number of legitimate errors from btrfs_search_slot(), panicing here is not the appropriate response. The error path for this code handles errors properly, simply return the error. Signed-off-by: Josef Bacik Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Sasha Levin --- fs/btrfs/tree-log.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/fs/btrfs/tree-log.c b/fs/btrfs/tree-log.c index de53e5166997..54647eb9c6ed 100644 --- a/fs/btrfs/tree-log.c +++ b/fs/btrfs/tree-log.c @@ -1846,8 +1846,6 @@ static noinline int link_to_fixup_dir(struct btrfs_trans_handle *trans, ret = btrfs_update_inode(trans, root, inode); } else if (ret == -EEXIST) { ret = 0; - } else { - BUG(); /* Logic Error */ } iput(inode); -- 2.30.2