Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp531977rdb; Thu, 30 Nov 2023 11:01:47 -0800 (PST) X-Google-Smtp-Source: AGHT+IF15s4fGQMFB8ob8d6aRfiww1BnNJRd7skJRHe9OvdB3bBydZ+apMyiem67ZNRxcIMm3P+3 X-Received: by 2002:a05:6808:14cf:b0:3b8:382b:8e1f with SMTP id f15-20020a05680814cf00b003b8382b8e1fmr610827oiw.28.1701370907506; Thu, 30 Nov 2023 11:01:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701370907; cv=none; d=google.com; s=arc-20160816; b=Ukx0m4801GQcXNjxuT6jCEQggtmDLGMPasPjWZ0xcZNA0B5iZU7PTI+4CGJsPjWqJP lqsha5+RBYhVVfoZKv+vZBaBuGAur9K8WaH8qiB9fjoAc3ttVSQwRDocoMJlFMZpelRA PXrCgqTdBGX4rnfwv7BhfTc58DhDMwAT4A2nIzmV0yzifU206AV5qTKdoJ8dM/PPLHgH rWM56LjvoqAMMbUJrzEkfhEn+TyX48ST3gGQBvHVJ/+BtQvscVkB2R/ywnjbZqcZTXJk wcLy09UNT96BVAc8OomGNNnw6fMzknSrdS5UuUc8lEIrPJSSFfhUVrdUeWIgFj3v6g7c u9zg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=EKUU0mD3zYDebcoW8acRuurI7BucCuD7DVNvXuNVSTA=; fh=TcgjV2Pp8Ik+MZL4F4jVLxsvX7qtVhZcUa0hp9nTT6c=; b=p4xU04PL5d8ZEiv5TSa21Ri6uoFUsM2WHViPwCDrLBnyzvTu3X+q143r28imIq/+Us lh8s/z0NVo7ghfhQG3VFH1zVstRAvAx7P5AQCrlSe+njtRylHe6vWSQfno8DfL0fmJgU XC54f0KpZyXjbhk4aLLB6uCTZ1S317htV19kna2Ro2WWhkuR1PvYQei/aDAifhueGNyR ludQGzMcHnItTAkY3fvHlelb54bT0JWFU1zIp9YhDd1k5Bd7xckZ3qMa2MscFuuHLh14 52Wm709WnAVeogPdIDHoXdUW02e9Kz4tbkVwr8UlPEgRz8PNy6kIgN3ze5jYdVuFXm19 yyJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=LtpRvOLb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id t1-20020a63d241000000b005bdbcf7c446si1978082pgi.171.2023.11.30.11.01.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 11:01:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=LtpRvOLb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id CBDEE8526819; Thu, 30 Nov 2023 11:01:39 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235211AbjK3TBU (ORCPT + 99 others); Thu, 30 Nov 2023 14:01:20 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45950 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231199AbjK3TBS (ORCPT ); Thu, 30 Nov 2023 14:01:18 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F065A10E2 for ; Thu, 30 Nov 2023 11:01:23 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8D1ACC433C7; Thu, 30 Nov 2023 19:01:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701370883; bh=mrQTm2/X3bNSt7Um/8oj1SlRbeIm1qp56xkDGGk6vZg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=LtpRvOLbxzuM9+T7wChsLRxkoWLmlRHSuhamm/cm+uImj8aiTKd1mbpS1L6+hinSF +iNyCj1PClAmM/v1fVCmJGkHI3rli9TB+OtV3+FCVBYYXE9gL4zo/IQ//emX0sij+S K/tTriiGbay61VRch0RwgO9G3tkh6TVGhnvEXTTsaVwrM5JjK+qWj/g/JC4c1L63cb Zd1JifYSTxgm4n5tulghabJ0TMoO7WtOxkpfpT2m+iNx8gGiKtXI0ECmYudI4FmbBC XxUI9xCnBj8d0ZgZTDlpn/OXYXYXhIRUzEwbWDgxVt5IbJh8pBvdTtVtHLeavN51Wp tJNBPStIGf9jg== Date: Thu, 30 Nov 2023 11:01:20 -0800 From: "Darrick J. Wong" To: Jiachen Zhang Cc: Chandan Babu R , Dave Chinner , Allison Henderson , Zhang Tianci , Brian Foster , linux-xfs@vger.kernel.org, linux-kernel@vger.kernel.org, xieyongji@bytedance.com, me@jcix.top, Christoph Hellwig Subject: Re: [PATCH v3 1/3] xfs: ensure logflagsp is initialized in xfs_bmap_del_extent_real Message-ID: <20231130190120.GM361584@frogsfrogsfrogs> References: <20231130040516.35677-1-zhangjiachen.jaycee@bytedance.com> <20231130040516.35677-2-zhangjiachen.jaycee@bytedance.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231130040516.35677-2-zhangjiachen.jaycee@bytedance.com> X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Thu, 30 Nov 2023 11:01:40 -0800 (PST) On Thu, Nov 30, 2023 at 12:05:14PM +0800, Jiachen Zhang wrote: > In the case of returning -ENOSPC, ensure logflagsp is initialized by 0. > Otherwise the caller __xfs_bunmapi will set uninitialized illegal > tmp_logflags value into xfs log, which might cause unpredictable error > in the log recovery procedure. > > Also, remove the flags variable and set the *logflagsp directly, so that > the code should be more robust in the long run. > > Fixes: 1b24b633aafe ("xfs: move some more code into xfs_bmap_del_extent_real") > Signed-off-by: Jiachen Zhang > Reviewed-by: Christoph Hellwig Looks good, Reviewed-by: Darrick J. Wong --D > --- > fs/xfs/libxfs/xfs_bmap.c | 73 +++++++++++++++++----------------------- > 1 file changed, 31 insertions(+), 42 deletions(-) > > diff --git a/fs/xfs/libxfs/xfs_bmap.c b/fs/xfs/libxfs/xfs_bmap.c > index be62acffad6c..eacd7f43c952 100644 > --- a/fs/xfs/libxfs/xfs_bmap.c > +++ b/fs/xfs/libxfs/xfs_bmap.c > @@ -5010,7 +5010,6 @@ xfs_bmap_del_extent_real( > xfs_fileoff_t del_endoff; /* first offset past del */ > int do_fx; /* free extent at end of routine */ > int error; /* error return value */ > - int flags = 0;/* inode logging flags */ > struct xfs_bmbt_irec got; /* current extent entry */ > xfs_fileoff_t got_endoff; /* first offset past got */ > int i; /* temp state */ > @@ -5023,6 +5022,8 @@ xfs_bmap_del_extent_real( > uint32_t state = xfs_bmap_fork_to_state(whichfork); > struct xfs_bmbt_irec old; > > + *logflagsp = 0; > + > mp = ip->i_mount; > XFS_STATS_INC(mp, xs_del_exlist); > > @@ -5035,7 +5036,6 @@ xfs_bmap_del_extent_real( > ASSERT(got_endoff >= del_endoff); > ASSERT(!isnullstartblock(got.br_startblock)); > qfield = 0; > - error = 0; > > /* > * If it's the case where the directory code is running with no block > @@ -5051,13 +5051,13 @@ xfs_bmap_del_extent_real( > del->br_startoff > got.br_startoff && del_endoff < got_endoff) > return -ENOSPC; > > - flags = XFS_ILOG_CORE; > + *logflagsp = XFS_ILOG_CORE; > if (whichfork == XFS_DATA_FORK && XFS_IS_REALTIME_INODE(ip)) { > if (!(bflags & XFS_BMAPI_REMAP)) { > error = xfs_rtfree_blocks(tp, del->br_startblock, > del->br_blockcount); > if (error) > - goto done; > + return error; > } > > do_fx = 0; > @@ -5072,11 +5072,9 @@ xfs_bmap_del_extent_real( > if (cur) { > error = xfs_bmbt_lookup_eq(cur, &got, &i); > if (error) > - goto done; > - if (XFS_IS_CORRUPT(mp, i != 1)) { > - error = -EFSCORRUPTED; > - goto done; > - } > + return error; > + if (XFS_IS_CORRUPT(mp, i != 1)) > + return -EFSCORRUPTED; > } > > if (got.br_startoff == del->br_startoff) > @@ -5093,17 +5091,15 @@ xfs_bmap_del_extent_real( > xfs_iext_prev(ifp, icur); > ifp->if_nextents--; > > - flags |= XFS_ILOG_CORE; > + *logflagsp |= XFS_ILOG_CORE; > if (!cur) { > - flags |= xfs_ilog_fext(whichfork); > + *logflagsp |= xfs_ilog_fext(whichfork); > break; > } > if ((error = xfs_btree_delete(cur, &i))) > - goto done; > - if (XFS_IS_CORRUPT(mp, i != 1)) { > - error = -EFSCORRUPTED; > - goto done; > - } > + return error; > + if (XFS_IS_CORRUPT(mp, i != 1)) > + return -EFSCORRUPTED; > break; > case BMAP_LEFT_FILLING: > /* > @@ -5114,12 +5110,12 @@ xfs_bmap_del_extent_real( > got.br_blockcount -= del->br_blockcount; > xfs_iext_update_extent(ip, state, icur, &got); > if (!cur) { > - flags |= xfs_ilog_fext(whichfork); > + *logflagsp |= xfs_ilog_fext(whichfork); > break; > } > error = xfs_bmbt_update(cur, &got); > if (error) > - goto done; > + return error; > break; > case BMAP_RIGHT_FILLING: > /* > @@ -5128,12 +5124,12 @@ xfs_bmap_del_extent_real( > got.br_blockcount -= del->br_blockcount; > xfs_iext_update_extent(ip, state, icur, &got); > if (!cur) { > - flags |= xfs_ilog_fext(whichfork); > + *logflagsp |= xfs_ilog_fext(whichfork); > break; > } > error = xfs_bmbt_update(cur, &got); > if (error) > - goto done; > + return error; > break; > case 0: > /* > @@ -5150,18 +5146,18 @@ xfs_bmap_del_extent_real( > new.br_state = got.br_state; > new.br_startblock = del_endblock; > > - flags |= XFS_ILOG_CORE; > + *logflagsp |= XFS_ILOG_CORE; > if (cur) { > error = xfs_bmbt_update(cur, &got); > if (error) > - goto done; > + return error; > error = xfs_btree_increment(cur, 0, &i); > if (error) > - goto done; > + return error; > cur->bc_rec.b = new; > error = xfs_btree_insert(cur, &i); > if (error && error != -ENOSPC) > - goto done; > + return error; > /* > * If get no-space back from btree insert, it tried a > * split, and we have a zero block reservation. Fix up > @@ -5174,33 +5170,28 @@ xfs_bmap_del_extent_real( > */ > error = xfs_bmbt_lookup_eq(cur, &got, &i); > if (error) > - goto done; > - if (XFS_IS_CORRUPT(mp, i != 1)) { > - error = -EFSCORRUPTED; > - goto done; > - } > + return error; > + if (XFS_IS_CORRUPT(mp, i != 1)) > + return -EFSCORRUPTED; > /* > * Update the btree record back > * to the original value. > */ > error = xfs_bmbt_update(cur, &old); > if (error) > - goto done; > + return error; > /* > * Reset the extent record back > * to the original value. > */ > xfs_iext_update_extent(ip, state, icur, &old); > - flags = 0; > - error = -ENOSPC; > - goto done; > - } > - if (XFS_IS_CORRUPT(mp, i != 1)) { > - error = -EFSCORRUPTED; > - goto done; > + *logflagsp = 0; > + return -ENOSPC; > } > + if (XFS_IS_CORRUPT(mp, i != 1)) > + return -EFSCORRUPTED; > } else > - flags |= xfs_ilog_fext(whichfork); > + *logflagsp |= xfs_ilog_fext(whichfork); > > ifp->if_nextents++; > xfs_iext_next(ifp, icur); > @@ -5224,7 +5215,7 @@ xfs_bmap_del_extent_real( > ((bflags & XFS_BMAPI_NODISCARD) || > del->br_state == XFS_EXT_UNWRITTEN)); > if (error) > - goto done; > + return error; > } > } > > @@ -5239,9 +5230,7 @@ xfs_bmap_del_extent_real( > if (qfield && !(bflags & XFS_BMAPI_REMAP)) > xfs_trans_mod_dquot_byino(tp, ip, qfield, (long)-nblks); > > -done: > - *logflagsp = flags; > - return error; > + return 0; > } > > /* > -- > 2.20.1 > >