Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp248986ybi; Wed, 29 May 2019 20:37:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqyLewTGeqJhYYcPPbxg8Z2ZNSvwkZ5O1zKUnG6R6NN8RUwb/mUwgwfEdo/GhKaUXTx0Jct1 X-Received: by 2002:a63:fd4a:: with SMTP id m10mr1587772pgj.302.1559187440051; Wed, 29 May 2019 20:37:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559187440; cv=none; d=google.com; s=arc-20160816; b=g0bvIqCpeHybTN+vQh+R1oYXlMSlv4J9veT53tRCOyPHtNxZ6zi/u47NutIzjO906K JdWk5V77+vNkUZSH6FmktjTladd6SkkUgRlophaQLucH4konB6tSAjwjylgjB4ef5dza oYRhG637OlIHITx9aWoemEH+iwRibH2usmwiWbig6j4BK2UZyXQO/Wlez9lIKzFj/L49 4vnnebF4wJYTNQwV/3tqaKczVOEEDutjlrjDnZAhpRGq2z+FqExG3v3+f/J18wZE6MIj /NOA8pi0Rivvb7uzgZZHv0ArYW+ndEsivfOVZfUGajKRzsr2hazHpKs9GcFLEofAetKP a/SQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=s8XZAoEi0ea0d57SMWP8me5Dexj686Q0HlGGeF3pSBg=; b=lPzl4X4WfO84ivHAjYkahfQaGIQHqWGOOVLwf4o8Dm0NCVS/6I5WkPBOE2RxszAEjj J+g5PdI2uPbG+CkenA/qVTb7CCr9m+M29iJkscmghDXwl0TZrLxPKuJ5HcbXi6ZCmU1z O1JP9/pBilhuzVow0TSJQ1NNwmGiaB4n64MCht8x0wX7Hj4gPNUEql3ww21rvAroETtB C/jXDJQJdNBbt1rsivWMgDqkdJzonpq4/I+fU8bAM05QfP4/aL8wFwEj/P+U790Wn0Xl ikXpbje9SiIlN1a1ElHZUaiSOTY6g3ob3HC8B0sRBT90QNilLNw1q9YrlLcUxm7TdrGX GjUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hIKsAqTw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cj1si1972064plb.373.2019.05.29.20.37.04; Wed, 29 May 2019 20:37:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hIKsAqTw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731756AbfE3DZf (ORCPT + 99 others); Wed, 29 May 2019 23:25:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:51796 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731587AbfE3DSe (ORCPT ); Wed, 29 May 2019 23:18:34 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5DD2A247CF; Thu, 30 May 2019 03:18:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559186313; bh=WEkxGOTOrldUFzewf8WLDqXHSWnnWqn7UaLHQjhoE0o=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hIKsAqTwo1BbOpmFENLd+2yInOV8ZLDAIlNiVtO12b8rB5UIF+Z1IDmO1mvMjnhjT fZCFCs6xCWm1OVc9jJHB7/TGSLmNYi+MtwiMy2Uj/z/wDL7eOaS3hXbfiTZevtOqzp /DBbZ2Og3lHIsy6KiXnPQdrofenmaB2RXWpDrKXk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Filipe Manana , Anand Jain , David Sterba Subject: [PATCH 4.14 016/193] Btrfs: do not abort transaction at btrfs_update_root() after failure to COW path Date: Wed, 29 May 2019 20:04:30 -0700 Message-Id: <20190530030450.301586277@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030446.953835040@linuxfoundation.org> References: <20190530030446.953835040@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Filipe Manana commit 72bd2323ec87722c115a5906bc6a1b31d11e8f54 upstream. Currently when we fail to COW a path at btrfs_update_root() we end up always aborting the transaction. However all the current callers of btrfs_update_root() are able to deal with errors returned from it, many do end up aborting the transaction themselves (directly or not, such as the transaction commit path), other BUG_ON() or just gracefully cancel whatever they were doing. When syncing the fsync log, we call btrfs_update_root() through tree-log.c:update_log_root(), and if it returns an -ENOSPC error, the log sync code does not abort the transaction, instead it gracefully handles the error and returns -EAGAIN to the fsync handler, so that it falls back to a transaction commit. Any other error different from -ENOSPC, makes the log sync code abort the transaction. So remove the transaction abort from btrfs_update_log() when we fail to COW a path to update the root item, so that if an -ENOSPC failure happens we avoid aborting the current transaction and have a chance of the fsync succeeding after falling back to a transaction commit. Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=203413 Fixes: 79787eaab46121 ("btrfs: replace many BUG_ONs with proper error handling") Cc: stable@vger.kernel.org # 4.4+ Signed-off-by: Filipe Manana Reviewed-by: Anand Jain Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/root-tree.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) --- a/fs/btrfs/root-tree.c +++ b/fs/btrfs/root-tree.c @@ -145,10 +145,8 @@ int btrfs_update_root(struct btrfs_trans return -ENOMEM; ret = btrfs_search_slot(trans, root, key, path, 0, 1); - if (ret < 0) { - btrfs_abort_transaction(trans, ret); + if (ret < 0) goto out; - } if (ret != 0) { btrfs_print_leaf(path->nodes[0]);