Received: by 10.192.165.156 with SMTP id m28csp1173359imm; Wed, 11 Apr 2018 13:53:32 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/jeGwOdWWx4lxAvOuNNa27rl68oudLE6XDT7VB6QscNjaaFH8sAur6rxuz0c0fJx8WTv7u X-Received: by 2002:a17:902:7441:: with SMTP id e1-v6mr6634168plt.169.1523480012378; Wed, 11 Apr 2018 13:53:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523480012; cv=none; d=google.com; s=arc-20160816; b=J/NNlrA10TVDiF/IzMjtWDg7LYlEBDnQWWQAEVcK2zy7kYVvozub0ZS/7kcuahX1vK xDd7fCtcodzXpFtZ5e1oUY6gMrJl+mbU0JAbsZuAhPZUI+mP8rZxfPu3DEwehHfLRVoe h75kKhfxPfoj36G/yS58GP7xRgi6UeeDxFAClnZL7Vf3CpYjnkTFB0b1js+G+vmfCIO/ 4ejaX90jh7aKwC7dTTsux+g7eUZk3CTUoJoH4AMVsPPUySFdXpUuyONhhuNDhnLVKUQd 2dcH8oNqZ9NGCiLha6CZlUBmguuCv3LyzI/aqXDoujH6QmeI9JqbwGKwI4kV/ViFmZqN 21BA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=EGXbu1ja+JsXItS7CScRIBk4XlSiS5armWZPse1OTj4=; b=dGWAUVQsqRsa9w88BG+csuJJhN25vDjRCpeMXUO6l/DNVzh1aCHfeFzEzILx4jnaE5 Vd2cYo3UdgjV7YRKS8C6BpV6OanVvOwGHjsUnmsOcdgwqqQKBp6jBHjZsPrvFpfkj4Zi 7HdBpURSaK2H8TpiSbIe5MlG6ZmubgrzZeuBEyEASlc75BhzyHRGxSlXUG+7pZ36QTUl /+H8IIOXcuAA2B0jjBg02aQ+SczPAExGpugBXS4Kc7wbRvAmYWcQ2D/kBNbAYMwmTGts 7cBGBT/P3+y+wGU7Rqcqr0Mw7tq6AUq8hPhrhwKS5+PRBtrYy0ZKGrhzFbaDUhoEjRFk P4TQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w8-v6si767990plp.521.2018.04.11.13.52.55; Wed, 11 Apr 2018 13:53:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756293AbeDKUtm (ORCPT + 99 others); Wed, 11 Apr 2018 16:49:42 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:58762 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755644AbeDKSp6 (ORCPT ); Wed, 11 Apr 2018 14:45:58 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 27B58CE3; Wed, 11 Apr 2018 18:45:58 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Konstantin Khlebnikov , Theodore Tso , Sasha Levin Subject: [PATCH 4.4 057/190] ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors Date: Wed, 11 Apr 2018 20:35:03 +0200 Message-Id: <20180411183553.676042433@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180411183550.114495991@linuxfoundation.org> References: <20180411183550.114495991@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Konstantin Khlebnikov [ Upstream commit 9651e6b2e20648d04d5e1fe6479a3056047e8781 ] I've got another report about breaking ext4 by ENOMEM error returned from ext4_mb_load_buddy() caused by memory shortage in memory cgroup. This time inside ext4_discard_preallocations(). This patch replaces ext4_error() with ext4_warning() where errors returned from ext4_mb_load_buddy() are not fatal and handled by caller: * ext4_mb_discard_group_preallocations() - called before generating ENOSPC, we'll try to discard other group or return ENOSPC into user-space. * ext4_trim_all_free() - just stop trimming and return ENOMEM from ioctl. Some callers cannot handle errors, thus __GFP_NOFAIL is used for them: * ext4_discard_preallocations() * ext4_mb_discard_lg_preallocations() Fixes: adb7ef600cc9 ("ext4: use __GFP_NOFAIL in ext4_free_blocks()") Signed-off-by: Konstantin Khlebnikov Signed-off-by: Theodore Ts'o Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- fs/ext4/mballoc.c | 23 ++++++++++++++--------- 1 file changed, 14 insertions(+), 9 deletions(-) --- a/fs/ext4/mballoc.c +++ b/fs/ext4/mballoc.c @@ -3874,7 +3874,8 @@ ext4_mb_discard_group_preallocations(str err = ext4_mb_load_buddy(sb, group, &e4b); if (err) { - ext4_error(sb, "Error loading buddy information for %u", group); + ext4_warning(sb, "Error %d loading buddy information for %u", + err, group); put_bh(bitmap_bh); return 0; } @@ -4031,10 +4032,11 @@ repeat: BUG_ON(pa->pa_type != MB_INODE_PA); group = ext4_get_group_number(sb, pa->pa_pstart); - err = ext4_mb_load_buddy(sb, group, &e4b); + err = ext4_mb_load_buddy_gfp(sb, group, &e4b, + GFP_NOFS|__GFP_NOFAIL); if (err) { - ext4_error(sb, "Error loading buddy information for %u", - group); + ext4_error(sb, "Error %d loading buddy information for %u", + err, group); continue; } @@ -4290,11 +4292,14 @@ ext4_mb_discard_lg_preallocations(struct spin_unlock(&lg->lg_prealloc_lock); list_for_each_entry_safe(pa, tmp, &discard_list, u.pa_tmp_list) { + int err; group = ext4_get_group_number(sb, pa->pa_pstart); - if (ext4_mb_load_buddy(sb, group, &e4b)) { - ext4_error(sb, "Error loading buddy information for %u", - group); + err = ext4_mb_load_buddy_gfp(sb, group, &e4b, + GFP_NOFS|__GFP_NOFAIL); + if (err) { + ext4_error(sb, "Error %d loading buddy information for %u", + err, group); continue; } ext4_lock_group(sb, group); @@ -5116,8 +5121,8 @@ ext4_trim_all_free(struct super_block *s ret = ext4_mb_load_buddy(sb, group, &e4b); if (ret) { - ext4_error(sb, "Error in loading buddy " - "information for %u", group); + ext4_warning(sb, "Error %d loading buddy information for %u", + ret, group); return ret; } bitmap = e4b.bd_bitmap;