Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp5294630imd; Tue, 30 Oct 2018 15:16:27 -0700 (PDT) X-Google-Smtp-Source: AJdET5fbF8QevGsZVarIQM/EDY5cG7PTOTsaBG9tqPTK4yvxH1OldEa0uuovMpL9nv6pCVpFbdzd X-Received: by 2002:a63:ee0e:: with SMTP id e14mr534950pgi.8.1540937787745; Tue, 30 Oct 2018 15:16:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540937787; cv=none; d=google.com; s=arc-20160816; b=YcGIKjCeUXD/EEGTw+7nfuFw9moML8cs2UoNRQqSvtM78MBtllXRMU8nh/QRUylMHS CH92N5ZdHZgbJETQQrrbZ1chlSA5qRiq7JEIQfMgREP9CIfYlLQLv0GyO3M8OHH7z9s+ Eg1nJ3uHEOs5x1qFFUSW+/SIrNGtaOTtXuJSRCb+0EL0Nyh7dzVXHbFMzwJHYVO49nVC 9xrh2Dgt5Y7myLY5HlGXu3TS/jnD++EZwZHCk5HpOQ0uI9pePzKGjCT7d23MKRljjhAQ PoO41aVAYJmlwFeCAtt/U4ZKCNt+qTLHaJE2BX1r2mpC1lP2gLnXKhwO1Q8J0rZmxpfJ rKrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:cc:to :subject:from; bh=VWhYHYQLbSg/BULOo/BwCjq+YHqGAjguMmqQBi0GxWQ=; b=deBO25Kh9U+LTt5pAcGucRCBJ0foQwK+ekIwk3dO7KciOkZzKlQAb+WsXfbywKmqzJ lD61/6xGe9toMuFU/TT/5CepWWAMJ1OwwLu4yELzoFOaLuS1JTpQX64VpYm9O2hJ2ls6 arX0Ni+wnsDtRUBImzqQw+tyrrSqbpzKCQJAHyBQKP/fNx68O9P6uJnH7C0eCJ75Hn0/ byDEXD27IbuSbRdS77GCTK7o7CWnkX8d/eJe7vEQYeo3iFmspkigDjsQIbaSOSl7fOs2 wwgkkBUsesVTGPmE+ABZjWKfUWg/FWBqHxQEDHK1uS5mxVT6VamU3ZdjN0KOSYXy7fjN /Ivg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h5-v6si8386294plt.44.2018.10.30.15.16.12; Tue, 30 Oct 2018 15:16:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728145AbeJaGwp (ORCPT + 99 others); Wed, 31 Oct 2018 02:52:45 -0400 Received: from relay.sw.ru ([185.231.240.75]:45926 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725743AbeJaGwp (ORCPT ); Wed, 31 Oct 2018 02:52:45 -0400 Received: from [172.16.24.21] by relay.sw.ru with esmtp (Exim 4.90_1) (envelope-from ) id 1gHc0t-0003g9-Nz; Wed, 31 Oct 2018 00:57:27 +0300 From: Vasily Averin Subject: [PATCH v2 00/11] ext4: number of long lived errors To: linux-ext4@vger.kernel.org, Theodore Ts'o Cc: Andreas Dilger , linux-kernel@vger.kernel.org Message-ID: <52c35b13-6606-5240-137f-37915bc8aded@virtuozzo.com> Date: Wed, 31 Oct 2018 00:57:26 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Last week I've investigated the reason of ext4 resize troubles on RHEL6 and RHEL7 based OpenVZ kernels. Failed resize generated lot of "access beyond end of device" messages followed by warning in __brelse. EXT4-fs (dm-3): resizing filesystem from 2620416 to 4096256 blocks attempt to access beyond end of device dm-3: rw=1, want=32770056, limit=32770048 attempt to access beyond end of device dm-3: rw=1, want=32770064, limit=32770048 ... attempt to access beyond end of device dm-3: rw=1, want=32776216, limit=32770048 EXT4-fs (dm-3): resized filesystem to 4096256 WARNING: CPU: 2 PID: 113370 at fs/buffer.c:1171 __brelse+0x2e/0x50 VFS: brelse: Trying to free free buffer "access beyond end of device" was fixed in mainline by recent commit f0a459dec5495a ("ext4: fix online resize's handling of a too-small final block group") However fixed error did not affected bh accounting and should not lead to warning in __brelse. Then I've reviewed fs/ext4/resize.c and found a number of long-lived errors, earliest of them was imported from ext3 in 2.6.19. First patch in this patch-set fixes the observed problem: sb_issue_zeroout() failed during attempt to write beyond end of device rollback switched to "goto end" and called brelse(bh). however bh was not assigned yet in current iteration, the pointer was not cleaned properly and was inherited from previous iteration. To fix the problem I've moved brelse() calls in body of the cycle to avoid having to call him on rollback. Other patches fixes visually-found mistakes. v2 changes: I've found error in one of v1 patches and fixed it, then I've found 4 additional issues, mostly related to iloc.bh accounting Vasily Averin (11): ext4 resise: extra brelse in setup_new_flex_group_blocks() ext4 resize: missing brelse() after errors in set_flexbg_block_bitmap() ext4 resize: brelse() cleanup in add_new_gdb_meta_bg() ext4 resize: lost brelse() in update_backups() ext4 resize: lost rollback in ext4_resize_fs() ext4 resize: lost resize_inode cleanup before retry in ext4_resize_fs() ext4: lost put_bh in ext4_mark_iloc_dirty() ext4: lost brelse in ext4_orphan_add() ext4: iloc.bh cleanup in add_new_gdb() ext4: remove useless brelse call in ext4_xattr_inode_update_ref() ext4: access to uninitialized bh fields in ext4_xattr_set_handle() fs/ext4/inode.c | 5 +++-- fs/ext4/namei.c | 4 +++- fs/ext4/resize.c | 32 ++++++++++++++++++-------------- fs/ext4/xattr.c | 8 +++----- 4 files changed, 27 insertions(+), 22 deletions(-) -- 2.17.1