Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp13527524rwl; Wed, 4 Jan 2023 09:17:58 -0800 (PST) X-Google-Smtp-Source: AMrXdXu0TYhZn56kDfiU+FvXejW6+1t8MVuSz2OOFmyfDUsjPjWsw08MomIXnC4Zkpro8VRzxFxs X-Received: by 2002:a05:6402:e09:b0:46c:b919:997f with SMTP id h9-20020a0564020e0900b0046cb919997fmr43880457edh.17.1672852677970; Wed, 04 Jan 2023 09:17:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672852677; cv=none; d=google.com; s=arc-20160816; b=x1iRS2wr86ABvM2nvof/r6r5IFHJMFg1lC9emtPQQN3BOZdr8es1CWdpxrUl5k+j1O SmqqstHuwPBQ+R+LTDiBqpBQvS2u718mjAd7rsnD8itjeKhABB/78yQ7LBIRQ/l4MSTX NIk2cM1OgPFLTetBH0mF1qkGBXUMXA6kXk5dcRa21Ec8df9F/XWE9HsKgBYxsair73io kmM/fqwvebIkst5LWrCe/fZ3p5M6tReSUCDgw/1HVqyKtIoA+Y+IcpPv4jV0kdR94baa EUUT5/PxK/k13w5/p6QdnpkQ9QuMz2H3LIsWxTDFWIr3kFMBCoReZQyDN6Z87EihUUe/ lmbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=EXmzZ8r0+HT2vxggA22lEEziO9hEUPBw2msDYcAmgL4=; b=JluJZOaQK3kKDaH3UJEgvM3E5o86g7fknj54Kk8m2q8hDEq62F0eT446ZdG+7Z6IDK gorKe+hCoUGMQeHhtxs5u4DFoIHzIq3CnYzkbeIMI1LIQ5lI4/NnmzZBAWuPn8cFgQlS 8/dPij5NITnHCqUJUofU8yxRZR4qtaQ6y99UG1U2294IqpM0C2vgoXsfwPINzxZXr1QN ID1+Uu3aoKiJ7fduDhVuCIPtd67NEW0eurjqEF9PcRmH0EOZ44riwDoAYx4xOdfjQNhd 7QHCLjW83bjjBVJq4tgPVrz26JmJ/zZyCrKMQcmMOJBjNFUXVrtkN+VTycZO8wK42MYg OUkQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=G0hsT8mx; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x34-20020a50baa5000000b0046fdd119a4esi30393665ede.529.2023.01.04.09.17.33; Wed, 04 Jan 2023 09:17:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=G0hsT8mx; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231967AbjADRAv (ORCPT + 99 others); Wed, 4 Jan 2023 12:00:51 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55392 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230198AbjADRAu (ORCPT ); Wed, 4 Jan 2023 12:00:50 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 731431F3 for ; Wed, 4 Jan 2023 09:00:46 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E9913B817B0 for ; Wed, 4 Jan 2023 17:00:44 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 850BEC433EF; Wed, 4 Jan 2023 17:00:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1672851643; bh=Ynt3B+EQLx4vfdV2c9jZx1hahooZ1vhP+CdgNxGZ5R0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=G0hsT8mxKNiEyMHOBV4blkp0ZZMx29WIvrfKhMDlz9kr9fvNTsjI3oHmsdFlBnN4P 8Iiu9gcMjT226ZJxFqHPSV7kTHPkmk2X4ulMx7P4z94WSQamqt6a6yt9ntL2ndLTrn 1sf/RQAcEyNOHA2uXaCnTA3WyqhrSG9Sdm9XwOdn2qr3+793Kv09ImcSIp8QmT6Zv/ rmOKCREfI/hQJz7ZqgOg9VEtWhlUGdy/VPKhIt1f6qSS9+QtwJokfbDEezz1sP0ByD sN7cD02fflbZ+ZQvjmXAy7feIbIvs/in2S2jQQplju/sL2AyYLw8rXhjeHOej/zx2o YW3zecmK1dTiA== Date: Wed, 4 Jan 2023 09:00:43 -0800 From: "Darrick J. Wong" To: Jan Kara Cc: Artem Blagodarenko , linux-ext4@vger.kernel.org, adilger.kernel@dilger.ca, andrew.perepechko@hpe.com, Artem Blagodarenko Subject: Re: [PATCH v4] ext4: truncate during setxattr leads to kernel panic Message-ID: References: <20220711145735.53676-1-artem.blagodarenko@gmail.com> <20230104160308.baj4u5xzfz3jy2z2@quack3> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230104160308.baj4u5xzfz3jy2z2@quack3> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Wed, Jan 04, 2023 at 05:03:08PM +0100, Jan Kara wrote: > On Mon 11-07-22 10:57:34, Artem Blagodarenko wrote: > > When changing a large xattr value to a different large xattr > > value, the old xattr inode is freed. Truncate during the final iput causes > > current transaction restart. Eventually, parent inode bh is marked dirty and > > kernel panic happens when jbd2 figures out that this bh belongs to the > > committed transaction. > > > > Here is a reporoducer: > > > > dd if=/dev/zero of=/tmp/ldiskfs bs=1M count=100 > > mkfs.ext4 -O ea_inode /tmp/ldiskfs -J size=16 -I 512 > > mkdir -p /tmp/ldiskfs_m > > mount -t ext4 /tmp/ldiskfs /tmp/ldiskfs_m -o loop,commit=600,no_mbcache > > touch /tmp/ldiskfs_m/file{1..1024} > > V=$(for i in `seq 60000`; do echo -n x ; done) > > V1="1$V" > > V2="2$V" > > for k in 1 2 3 4 5 6 7 8 9; do > > setfattr -n user.xattr -v $V /tmp/ldiskfs_m/file{1..1024} > > setfattr -n user.xattr -v $V1 /tmp/ldiskfs_m/file{1..1024} & > > setfattr -n user.xattr -v $V2 /tmp/ldiskfs_m/file{1024..1} & > > wait > > done > > umount /tmp/ldiskfs_m > > > > The above reproducer triggers the following oops (using a build from a > > recent linux.git commit): > > > > [ 181.269541] ------------[ cut here ]------------ > > [ 181.269733] kernel BUG at fs/jbd2/transaction.c:1511! > > [ 181.269951] invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI > > [ 181.270169] CPU: 0 PID: 940 Comm: setfattr Not tainted > > 5.17.0-13430-g787af64d05cd #9 > > [ 181.270243] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS > > VirtualBox 12/01/2006 > > [ 181.270243] RIP: 0010:jbd2_journal_dirty_metadata+0x400/0x420 > > [ 181.270243] Code: 24 4c 4c 8b 0c 24 41 83 f8 01 0f 84 3c ff ff ff e9 > > 24 94 0b 01 48 8b 7c 24 08 e8 cb f6 df ff 4d 39 6c 24 70 0f 84 e6 fc ff > > ff <0f> 0b 0f 0b c7 4 > > 4 24 18 e4 ff ff ff e9 9f fe ff ff 0f 0b c7 44 24 > > [ 181.270243] RSP: 0018:ffff88802632f698 EFLAGS: 00010207 > > [ 181.270243] RAX: 0000000000000000 RBX: ffff88800044fcc8 RCX: > > ffffffffa73a03b5 > > [ 181.270243] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: > > ffff888032ff6f58 > > [ 181.270243] RBP: ffff88802eb04418 R08: ffffffffa6f502bf R09: > > ffffed1004c65ec6 > > [ 181.270243] R10: 0000000000000003 R11: ffffed1004c65ec5 R12: > > ffff888032ff6ee8 > > [ 181.270243] R13: ffff888024af8300 R14: ffff88800044fcec R15: > > ffff888032ff6f50 > > [ 181.270243] FS: 00007ffb5f6e3740(0000) GS:ffff888034800000(0000) > > knlGS:0000000000000000 > > [ 181.270243] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > [ 181.270243] CR2: 00007f9ca09dc024 CR3: 0000000032244000 CR4: > > 00000000000506f0 > > [ 181.270243] Call Trace: > > [ 181.270243] > > [ 181.270243] __ext4_handle_dirty_metadata+0xb1/0x330 > > [ 181.270243] ext4_mark_iloc_dirty+0x2b7/0xcd0 > > [ 181.270243] ext4_xattr_set_handle+0x694/0xaf0 > > [ 181.270243] ext4_xattr_set+0x164/0x260 > > [ 181.270243] __vfs_setxattr+0xcb/0x110 > > [ 181.270243] __vfs_setxattr_noperm+0x8c/0x300 > > [ 181.270243] vfs_setxattr+0xff/0x250 > > [ 181.270243] setxattr+0x14a/0x260 > > [ 181.270243] path_setxattr+0x132/0x150 > > [ 181.270243] __x64_sys_setxattr+0x63/0x70 > > [ 181.270243] do_syscall_64+0x3b/0x90 > > [ 181.270243] entry_SYSCALL_64_after_hwframe+0x44/0xae > > [ 181.270243] RIP: 0033:0x7ffb5efebbee > > > > A possible fix is to call this final iput in a separate thread. > > This way, setxattr transactions will never be split into two. > > Since the setxattr code adds xattr inodes with nlink=0 into the > > orphan list, old xattr inodes will be properly cleaned up in > > any case. > > > > Signed-off-by: Andrew Perepechko > > Signed-off-by: Artem Blagodarenko > > > > Changes since v3: > > - execute delayed_iput() only then recount is 0 > > and iput() in all another cases > > Changes since v1: > > - fixed a bug added during the porting > > - fixed a workqueue related deadlock reported by Tetsuo Handa > > Thanks for this fix! Did this patch get merged in some other form? As far > as I'm looking into the code this still seems to be a problem? > > Looking into ext4_xattr_block_set() I can see more places that are dropping > ea_inode link count and that can theoretically result in the same problem? > In theory any iput() of ea_inode can result in ea_inode being deleted > unless current inode's xattr references this ea_inode (because another > process could have dropped the last xattr reference to the ea_inode) so we > need to be careful. For example even such a simple thing as > ext4_xattr_inode_cache_find() is prone to cause inode being deleted within > the currently running transaction... So we need some generic way how to > deal with these ea_inode iput() calls. > > Honestly, I'm not yet sure how to do that in an elegant way. XFS has a similar problem; we put all unreferenced inodes requiring cleanup work on a percpu list and run background workers ("inodegc") to deal with the mess. That looks pretty similar to what you're doing here. (That said, xfs inode lifetimes don't match the vfs...) > Honza > > > diff --git a/fs/ext4/ext4.h b/fs/ext4/ext4.h > > index 75b8d81b2469..1eed86d0d37f 100644 > > --- a/fs/ext4/ext4.h > > +++ b/fs/ext4/ext4.h > > @@ -1649,6 +1649,12 @@ struct ext4_sb_info { > > /* workqueue for reserved extent conversions (buffered io) */ > > struct workqueue_struct *rsv_conversion_wq; > > > > + /* > > + * workqueue for reserved extent conversions (buffered io) > > + * and large ea inodes reclaim > > + */ > > + struct workqueue_struct *s_misc_wq; > > + > > /* timer for periodic error stats printing */ > > struct timer_list s_err_report; > > > > diff --git a/fs/ext4/page-io.c b/fs/ext4/page-io.c > > index 97fa7b4c645f..e42ac5f54b12 100644 > > --- a/fs/ext4/page-io.c > > +++ b/fs/ext4/page-io.c > > @@ -230,7 +230,7 @@ static void ext4_add_complete_io(ext4_io_end_t *io_end) > > WARN_ON(!(io_end->flag & EXT4_IO_END_UNWRITTEN)); > > WARN_ON(!io_end->handle && sbi->s_journal); > > spin_lock_irqsave(&ei->i_completed_io_lock, flags); > > - wq = sbi->rsv_conversion_wq; > > + wq = sbi->s_misc_wq; > > if (list_empty(&ei->i_rsv_conversion_list)) > > queue_work(wq, &ei->i_rsv_conversion_work); > > list_add_tail(&io_end->list, &ei->i_rsv_conversion_list); > > diff --git a/fs/ext4/super.c b/fs/ext4/super.c > > index 845f2f8aee5f..5b93fc2dd0a1 100644 > > --- a/fs/ext4/super.c > > +++ b/fs/ext4/super.c > > @@ -1215,10 +1215,11 @@ static void ext4_put_super(struct super_block *sb) > > ext4_msg(sb, KERN_INFO, "unmounting filesystem."); > > > > ext4_unregister_li_request(sb); > > + flush_workqueue(sbi->s_misc_wq); > > ext4_quota_off_umount(sb); > > > > flush_work(&sbi->s_error_work); > > - destroy_workqueue(sbi->rsv_conversion_wq); > > + destroy_workqueue(sbi->s_misc_wq); Uhhh won't this leak rsv_conversion_wq? You didn't replace the old field declaration in ext4_sb_info. Or did rsv_conversion_wq become an unused variable? --D > > ext4_release_orphan_info(sb); > > > > if (sbi->s_journal) { > > @@ -5218,9 +5219,9 @@ static int __ext4_fill_super(struct fs_context *fc, struct super_block *sb) > > * The maximum number of concurrent works can be high and > > * concurrency isn't really necessary. Limit it to 1. > > */ > > - EXT4_SB(sb)->rsv_conversion_wq = > > - alloc_workqueue("ext4-rsv-conversion", WQ_MEM_RECLAIM | WQ_UNBOUND, 1); > > - if (!EXT4_SB(sb)->rsv_conversion_wq) { > > + EXT4_SB(sb)->s_misc_wq = > > + alloc_workqueue("ext4-misc", WQ_MEM_RECLAIM | WQ_UNBOUND, 1); > > + if (!EXT4_SB(sb)->s_misc_wq) { > > printk(KERN_ERR "EXT4-fs: failed to create workqueue\n"); > > ret = -ENOMEM; > > goto failed_mount4; > > @@ -5434,8 +5435,8 @@ static int __ext4_fill_super(struct fs_context *fc, struct super_block *sb) > > sb->s_root = NULL; > > failed_mount4: > > ext4_msg(sb, KERN_ERR, "mount failed"); > > - if (EXT4_SB(sb)->rsv_conversion_wq) > > - destroy_workqueue(EXT4_SB(sb)->rsv_conversion_wq); > > + if (EXT4_SB(sb)->s_misc_wq) > > + destroy_workqueue(EXT4_SB(sb)->s_misc_wq); > > failed_mount_wq: > > ext4_xattr_destroy_cache(sbi->s_ea_inode_cache); > > sbi->s_ea_inode_cache = NULL; > > @@ -6061,7 +6062,7 @@ static int ext4_sync_fs(struct super_block *sb, int wait) > > return 0; > > > > trace_ext4_sync_fs(sb, wait); > > - flush_workqueue(sbi->rsv_conversion_wq); > > + flush_workqueue(sbi->s_misc_wq); > > /* > > * Writeback quota in non-journalled quota case - journalled quota has > > * no dirty dquots > > diff --git a/fs/ext4/xattr.c b/fs/ext4/xattr.c > > index 564e28a1aa94..d67035c9223a 100644 > > --- a/fs/ext4/xattr.c > > +++ b/fs/ext4/xattr.c > > @@ -974,7 +974,7 @@ int __ext4_xattr_set_credits(struct super_block *sb, struct inode *inode, > > } > > > > static int ext4_xattr_inode_update_ref(handle_t *handle, struct inode *ea_inode, > > - int ref_change) > > + int ref_change, s64 *ret_ref_count) > > { > > struct mb_cache *ea_inode_cache = EA_INODE_CACHE(ea_inode); > > struct ext4_iloc iloc; > > @@ -1035,6 +1035,8 @@ static int ext4_xattr_inode_update_ref(handle_t *handle, struct inode *ea_inode, > > if (ret) > > ext4_warning_inode(ea_inode, > > "ext4_mark_iloc_dirty() failed ret=%d", ret); > > + if (ret_ref_count) > > + *ret_ref_count = ref_count; > > out: > > inode_unlock(ea_inode); > > return ret; > > @@ -1042,12 +1044,12 @@ static int ext4_xattr_inode_update_ref(handle_t *handle, struct inode *ea_inode, > > > > static int ext4_xattr_inode_inc_ref(handle_t *handle, struct inode *ea_inode) > > { > > - return ext4_xattr_inode_update_ref(handle, ea_inode, 1); > > + return ext4_xattr_inode_update_ref(handle, ea_inode, 1, NULL); > > } > > > > -static int ext4_xattr_inode_dec_ref(handle_t *handle, struct inode *ea_inode) > > +static int ext4_xattr_inode_dec_ref(handle_t *handle, struct inode *ea_inode, s64 *ret_ref_count) > > { > > - return ext4_xattr_inode_update_ref(handle, ea_inode, -1); > > + return ext4_xattr_inode_update_ref(handle, ea_inode, -1, ret_ref_count); > > } > > > > static int ext4_xattr_inode_inc_ref_all(handle_t *handle, struct inode *parent, > > @@ -1097,7 +1099,7 @@ static int ext4_xattr_inode_inc_ref_all(handle_t *handle, struct inode *parent, > > err); > > continue; > > } > > - err = ext4_xattr_inode_dec_ref(handle, ea_inode); > > + err = ext4_xattr_inode_dec_ref(handle, ea_inode, NULL); > > if (err) > > ext4_warning_inode(ea_inode, "cleanup dec ref error %d", > > err); > > @@ -1180,7 +1182,7 @@ ext4_xattr_inode_dec_ref_all(handle_t *handle, struct inode *parent, > > } > > } > > > > - err = ext4_xattr_inode_dec_ref(handle, ea_inode); > > + err = ext4_xattr_inode_dec_ref(handle, ea_inode, NULL); > > if (err) { > > ext4_warning_inode(ea_inode, "ea_inode dec ref err=%d", > > err); > > @@ -1531,7 +1533,7 @@ static int ext4_xattr_inode_lookup_create(handle_t *handle, struct inode *inode, > > > > err = ext4_xattr_inode_write(handle, ea_inode, value, value_len); > > if (err) { > > - ext4_xattr_inode_dec_ref(handle, ea_inode); > > + ext4_xattr_inode_dec_ref(handle, ea_inode, NULL); > > iput(ea_inode); > > return err; > > } > > @@ -1544,6 +1546,36 @@ static int ext4_xattr_inode_lookup_create(handle_t *handle, struct inode *inode, > > return 0; > > } > > > > +struct delayed_iput_work { > > + struct work_struct work; > > + struct inode *inode; > > +}; > > + > > +static void delayed_iput_fn(struct work_struct *work) > > +{ > > + struct delayed_iput_work *diwork; > > + > > + diwork = container_of(work, struct delayed_iput_work, work); > > + iput(diwork->inode); > > + kfree(diwork); > > +} > > + > > +noinline void delayed_iput(struct inode *inode, struct delayed_iput_work *work) > > +{ > > + if (!inode) { > > + kfree(work); > > + return; > > + } > > + > > + if (!work) { > > + iput(inode); > > + } else { > > + INIT_WORK(&work->work, delayed_iput_fn); > > + work->inode = inode; > > + queue_work(EXT4_SB(inode->i_sb)->s_misc_wq, &work->work); > > + } > > +} > > + > > /* > > * Reserve min(block_size/8, 1024) bytes for xattr entries/names if ea_inode > > * feature is enabled. > > @@ -1561,8 +1593,10 @@ static int ext4_xattr_set_entry(struct ext4_xattr_info *i, > > int in_inode = i->in_inode; > > struct inode *old_ea_inode = NULL; > > struct inode *new_ea_inode = NULL; > > + struct delayed_iput_work *diwork = NULL; > > size_t old_size, new_size; > > int ret; > > + s64 ret_ref_count = -1; > > > > /* Space used by old and new values. */ > > old_size = (!s->not_found && !here->e_value_inum) ? > > @@ -1637,7 +1671,11 @@ static int ext4_xattr_set_entry(struct ext4_xattr_info *i, > > * Finish that work before doing any modifications to the xattr data. > > */ > > if (!s->not_found && here->e_value_inum) { > > - ret = ext4_xattr_inode_iget(inode, > > + diwork = kmalloc(sizeof(*diwork), GFP_NOFS); > > + if (!diwork) > > + ret = -ENOMEM; > > + else > > + ret = ext4_xattr_inode_iget(inode, > > le32_to_cpu(here->e_value_inum), > > le32_to_cpu(here->e_hash), > > &old_ea_inode); > > @@ -1665,14 +1703,16 @@ static int ext4_xattr_set_entry(struct ext4_xattr_info *i, > > > > if (old_ea_inode) { > > /* We are ready to release ref count on the old_ea_inode. */ > > - ret = ext4_xattr_inode_dec_ref(handle, old_ea_inode); > > + ret = ext4_xattr_inode_dec_ref(handle, old_ea_inode, > > + &ret_ref_count); > > if (ret) { > > /* Release newly required ref count on new_ea_inode. */ > > if (new_ea_inode) { > > int err; > > > > err = ext4_xattr_inode_dec_ref(handle, > > - new_ea_inode); > > + new_ea_inode, > > + NULL); > > if (err) > > ext4_warning_inode(new_ea_inode, > > "dec ref new_ea_inode err=%d", > > @@ -1790,7 +1830,12 @@ static int ext4_xattr_set_entry(struct ext4_xattr_info *i, > > > > ret = 0; > > out: > > - iput(old_ea_inode); > > + if (ret_ref_count == 0) > > + delayed_iput(old_ea_inode, diwork); > > + else { > > + kfree(diwork); > > + iput(old_ea_inode); > > + } > > iput(new_ea_inode); > > return ret; > > } > > @@ -2087,7 +2132,8 @@ ext4_xattr_block_set(handle_t *handle, struct inode *inode, > > if (ea_inode) { > > /* Drop the extra ref on ea_inode. */ > > error = ext4_xattr_inode_dec_ref(handle, > > - ea_inode); > > + ea_inode, > > + NULL); > > if (error) > > ext4_warning_inode(ea_inode, > > "dec ref error=%d", > > @@ -2137,7 +2183,7 @@ ext4_xattr_block_set(handle_t *handle, struct inode *inode, > > if (ea_inode) { > > int error2; > > > > - error2 = ext4_xattr_inode_dec_ref(handle, ea_inode); > > + error2 = ext4_xattr_inode_dec_ref(handle, ea_inode, NULL); > > if (error2) > > ext4_warning_inode(ea_inode, "dec ref error=%d", > > error2); > > -- > > 2.31.1 > > > -- > Jan Kara > SUSE Labs, CR