Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp259609ybi; Wed, 29 May 2019 20:51:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqw+sD+YWp5UFMLM6mgx8swHZwt9lMBfsW91A+W6k/gD5nWI3wfbI4AgrF6ncW2pZpTT5pxE X-Received: by 2002:a63:1c54:: with SMTP id c20mr1704529pgm.283.1559188275061; Wed, 29 May 2019 20:51:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559188275; cv=none; d=google.com; s=arc-20160816; b=H83IAynzr3VNF30mNDh8d/kuU9zEkOqqCth09gtR+giOKzSzNAgptA2DFbfbuo1fHQ 5KRtlf9/XNhBpfeKR9BI0DltWoVUvc9kwinpb9dJ5hstKezL6RSjC3mMyl9OVKnHlTnp jdunL3PWlNZ3oAX16nxk+pR9eTZDbhVx6rPnIBxS/6dLMafeddBx9xgMT+Jh4hnruYlA 1lgLrt7xS+O4uHuaEr0y/bRpQspv+mDOcrBvvKYnqe02D+5lPo08xEXM4IM5BohbRnPb ZhcFfZkp9yPlCg1ah8qBtomMmcKvaqlZISBhgPJMTcRWW4MifRE/jifK60UCWMNYKRca SEDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=6VN4f7M2WbYg40RR57fhUI0QFO0Nh6YungpfdvZKWKU=; b=q3EPDYIbtEbILU4PswvHWt538GmuTaDPXtL24Fp5yTzkAxSgwdJxx5unjqvCux3j0W FmmDWFsgfk42tWEpefeL1E4SGmaXzuPpaeeqWclPjerXh0jvw3V/PuDWTGzOdqMd+w0P jqPI3LHvbfMkqP0KdeLokEO0HcnbmhOxqYonxE+JxJ0yu7Sf3rfRB6LrBrG/X5p8hqae mYK/vCU6lPQT6hWOotXxQtIzF7ToVNIk/mtW8SogxMwuGLrVUFEXV/nT3kWQ+4fwrQOj XbsDUjmMlIqtVK5XccPVvcGmlIvR6Oo6YnvPpuozVmVGeZoly4Kr5xONS4Pg/WJ0aiQk w3hg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kdz3NWub; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z33si1888906pgk.516.2019.05.29.20.50.58; Wed, 29 May 2019 20:51:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kdz3NWub; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733311AbfE3DsE (ORCPT + 99 others); Wed, 29 May 2019 23:48:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:58408 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732184AbfE3DUX (ORCPT ); Wed, 29 May 2019 23:20:23 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3732C24934; Thu, 30 May 2019 03:20:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559186423; bh=bp+FKhsPpaUv+Z2jl2+x8XsPlCB1XpCj2NmslC4+y3c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kdz3NWubUQz0GgU4v+ndatvIiumNJzpU0NmJik1J1m/qDNP0ggVqZO/zkg7i939u2 bEQbLCOayWKPI9elScFG/rwiVbHBQNoH2q6jxdkHXq0fEp/WbW/VCrMqIrCFtYfBpA UtA0hShudQOgw2d2Y5pKDBJ6hQj+GybGTK1GfGwI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Filipe Manana , Anand Jain , David Sterba Subject: [PATCH 4.9 010/128] Btrfs: do not abort transaction at btrfs_update_root() after failure to COW path Date: Wed, 29 May 2019 20:05:42 -0700 Message-Id: <20190530030435.413618973@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030432.977908967@linuxfoundation.org> References: <20190530030432.977908967@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Filipe Manana commit 72bd2323ec87722c115a5906bc6a1b31d11e8f54 upstream. Currently when we fail to COW a path at btrfs_update_root() we end up always aborting the transaction. However all the current callers of btrfs_update_root() are able to deal with errors returned from it, many do end up aborting the transaction themselves (directly or not, such as the transaction commit path), other BUG_ON() or just gracefully cancel whatever they were doing. When syncing the fsync log, we call btrfs_update_root() through tree-log.c:update_log_root(), and if it returns an -ENOSPC error, the log sync code does not abort the transaction, instead it gracefully handles the error and returns -EAGAIN to the fsync handler, so that it falls back to a transaction commit. Any other error different from -ENOSPC, makes the log sync code abort the transaction. So remove the transaction abort from btrfs_update_log() when we fail to COW a path to update the root item, so that if an -ENOSPC failure happens we avoid aborting the current transaction and have a chance of the fsync succeeding after falling back to a transaction commit. Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=203413 Fixes: 79787eaab46121 ("btrfs: replace many BUG_ONs with proper error handling") Cc: stable@vger.kernel.org # 4.4+ Signed-off-by: Filipe Manana Reviewed-by: Anand Jain Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/root-tree.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) --- a/fs/btrfs/root-tree.c +++ b/fs/btrfs/root-tree.c @@ -144,10 +144,8 @@ int btrfs_update_root(struct btrfs_trans return -ENOMEM; ret = btrfs_search_slot(trans, root, key, path, 0, 1); - if (ret < 0) { - btrfs_abort_transaction(trans, ret); + if (ret < 0) goto out; - } if (ret != 0) { btrfs_print_leaf(root, path->nodes[0]);