Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4369520pxj; Tue, 8 Jun 2021 12:36:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJznw15UFS0KkEEjaRzuYRPj4ZMN1nEvMJxykV8QfaxaduTLuEGOGBGcKsHf4ipTkjc7GNWj X-Received: by 2002:a17:906:c293:: with SMTP id r19mr18267956ejz.252.1623181004802; Tue, 08 Jun 2021 12:36:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623181004; cv=none; d=google.com; s=arc-20160816; b=XxWTJ6fRN8e/xGriIoS3mEdhuqYKWdQxB4kaCquMjECnanp1hk4955qW7F8en8cczK EI466geOvY45ZbJzuI/4slki37b97C2MYn4gjcqRsEx2BcVFZR6zUhGjc34eu/4BoRPE lcIEs0guGPZsi3DTBHMQtKlFXllNku1nsm7c/wKp7AitE+CvAruxH8IobAxLeRwEJXnT Z81PiJ57HVHad/q9lL9oaEMc+nZNdbcd3Pk07ycILSAUsvVpzpp0l1lTpFBGVVy5E8GJ 0wJsBul9wWi+wCtAjojJNxiDmq6pSDAF0G6/IU2IqMcPskX+IPWKw24f46gZkRcuMtZl S0hg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=qYnfjszF81EoyzTPHdaJTfqm9Oorf2nfn6ChQ5d6bkU=; b=uh/6ssIC7RCNjzvNWf+37TaaMrcVruw3/cUmHYvhX82eeLpBKoKM19X7HJe1195EQy 0AkG1TmffRIqnOK3H9EtATDyy8cSFzVSdiKlNbrP1+FHmZf3cG60bUtNXImIFYWxYCCh /mGTg5F3iw6XmJo6g8jxQbTHyUUF2Wag+k5vYTZxj1u6ENDmgU9X1hciX8+YYBqqjhtn JBbe+U49PEFLlKKRxDlHQOSlLXzPLmvRnNAGAzr4JJGrBzhRgoCaaz9+3Foj6e1T7YiB zmr35VH5GNLs/dzZ7ASW31PFJsWy4N4Dw6yxj3cAIyEeXNrVHtY+0yR1BIHREiIihhqm rIFw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=O2htL8Bn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h7si462207edt.10.2021.06.08.12.36.21; Tue, 08 Jun 2021 12:36:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=O2htL8Bn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234990AbhFHTdA (ORCPT + 99 others); Tue, 8 Jun 2021 15:33:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:37120 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237556AbhFHTQ6 (ORCPT ); Tue, 8 Jun 2021 15:16:58 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id BCAB66197D; Tue, 8 Jun 2021 18:51:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1623178282; bh=vAPH0TNGLrjtCoRIcq5nfXMuSLVkb6lKfxUQIrkhNrE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=O2htL8Bn3VSijtMFBskiNs64UgjNjlgSSFrcCxZ5rFUmuj05eZj0w50v20nSwThke LJ3UIC05c21gZpN7B4NK9wgksSVqQT2wLkAxIpkI26bvVTdkHekF0ybfPKjHLM2iA3 KD5lnE0R5yUAksi/Vibk3QCE4D/1Bs6SQUCTocpY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johannes Thumshirn , Qu Wenruo , Josef Bacik , David Sterba Subject: [PATCH 5.12 144/161] btrfs: check error value from btrfs_update_inode in tree log Date: Tue, 8 Jun 2021 20:27:54 +0200 Message-Id: <20210608175950.317992821@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210608175945.476074951@linuxfoundation.org> References: <20210608175945.476074951@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Josef Bacik commit f96d44743a44e3332f75d23d2075bb8270900e1d upstream. Error injection testing uncovered a case where we ended up with invalid link counts on an inode. This happened because we failed to notice an error when updating the inode while replaying the tree log, and committed the transaction with an invalid file system. Fix this by checking the return value of btrfs_update_inode. This resolved the link count errors I was seeing, and we already properly handle passing up the error values in these paths. CC: stable@vger.kernel.org # 4.4+ Reviewed-by: Johannes Thumshirn Reviewed-by: Qu Wenruo Signed-off-by: Josef Bacik Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/tree-log.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) --- a/fs/btrfs/tree-log.c +++ b/fs/btrfs/tree-log.c @@ -1574,7 +1574,9 @@ static noinline int add_inode_ref(struct if (ret) goto out; - btrfs_update_inode(trans, root, BTRFS_I(inode)); + ret = btrfs_update_inode(trans, root, BTRFS_I(inode)); + if (ret) + goto out; } ref_ptr = (unsigned long)(ref_ptr + ref_struct_size) + namelen; @@ -1749,7 +1751,9 @@ static noinline int fixup_inode_link_cou if (nlink != inode->i_nlink) { set_nlink(inode, nlink); - btrfs_update_inode(trans, root, BTRFS_I(inode)); + ret = btrfs_update_inode(trans, root, BTRFS_I(inode)); + if (ret) + goto out; } BTRFS_I(inode)->index_cnt = (u64)-1;