Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1769839ybl; Sat, 11 Jan 2020 02:27:42 -0800 (PST) X-Google-Smtp-Source: APXvYqy3P2GboHPcjLWVo6SlSSTUbvKW4K5wcWEkdRllsDhwBNLjmD5MGn39hiIP0GCNaIZFXuaB X-Received: by 2002:aca:8d5:: with SMTP id 204mr5537175oii.141.1578738462191; Sat, 11 Jan 2020 02:27:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578738462; cv=none; d=google.com; s=arc-20160816; b=tM0Dkf+tt9vCmEQSd8eUxT+OPAvbBSgGs8nHoD3MjwPixtaP/6bZJ9nSz6ybfu1npT CrvHpPhKyBiNjArDeVZR1oCbw0HvUbGKgkwcZ6MrwT5EBQhKDjiKrqb8Lg9HHjZx4/mz y8EjJO7QDBQHHJ1+mD0hXca7leN1MzgWmlyWqErPHzYIGYWuXZ0mVr9AYBD8DTKbgWc7 EdIYa2YMFwerRe+9l2mZ6Q8RGsd9RNgqbQs2ij5spSLUxkdCo1w7qPiHAeEfAfE1RTRn gPsWxvcwlZmGPk+ngGakDoM4iOyUBeHNUGooG1eiBRWxoxUHz76QEg1T4NI/P/bkukMf sbkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=B8IYxpRUr/jr3qSYDQ/dpX3xJ7BOaPVOdwWNNAzYYV0=; b=th9M8Jp66n0wSBuHhGXu7OiYPtaA2bYOyebNJO2RLGUv160Z2VIkgtad5nuj2rOS0P LizFfbl3yeH+gJ0UVddjdAnrBgnZ/bqfkCRXur/KYCUsGWxs39KVTCm0jO979eyDsQV9 qXzW6uy3iqESNFCQOOUFb6XdZtZRGffKxKgjJ6tW/D/hTviWA7d24EuXzoEklXjWz4fY SmVdKRehENPX1TB8yW3qPfJC/J7WfN6OlRcqjTPKjS8mikh1cTQ2vmI6z2diYGiwW2GO gvVImX0g7kR3f4fxruAl++ImCP7RAP5hIVuF1FWsWtd4yet+8RtyYgpbfbLRw0lzkfCS xwHg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OmIpYRno; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d9si590858otf.81.2020.01.11.02.27.31; Sat, 11 Jan 2020 02:27:42 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OmIpYRno; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731091AbgAKKZp (ORCPT + 99 others); Sat, 11 Jan 2020 05:25:45 -0500 Received: from mail.kernel.org ([198.145.29.99]:57122 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729245AbgAKKZo (ORCPT ); Sat, 11 Jan 2020 05:25:44 -0500 Received: from localhost (unknown [62.119.166.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EDE0920848; Sat, 11 Jan 2020 10:25:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578738344; bh=gFGpe93+udtJL3IRuqv7gvEvTZ38Dbi175XlBDXH+/A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=OmIpYRno8ymqITYFNeNOg3YFdLWIsaa16VzC6vE7+cflFpyx+8War1g2idhRtLwUz N/ow4tdib/8Z4CM9ldiO8Anddp6RGFiQNxEmwnxyUIyQQo1uyt9Mw40fxPYPhA5bSP N1cY1CrB1D03C1kSlf2IaamBkukRoCrjq9/Zr8AE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johannes Thumshirn , Josef Bacik , David Sterba , Sasha Levin Subject: [PATCH 5.4 077/165] btrfs: handle error in btrfs_cache_block_group Date: Sat, 11 Jan 2020 10:49:56 +0100 Message-Id: <20200111094927.634167726@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200111094921.347491861@linuxfoundation.org> References: <20200111094921.347491861@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Josef Bacik [ Upstream commit db8fe64f9ce61d1d89d3c3c34d111a43afb9f053 ] We have a BUG_ON(ret < 0) in find_free_extent from btrfs_cache_block_group. If we fail to allocate our ctl we'll just panic, which is not good. Instead just go on to another block group. If we fail to find a block group we don't want to return ENOSPC, because really we got a ENOMEM and that's the root of the problem. Save our return from btrfs_cache_block_group(), and then if we still fail to make our allocation return that ret so we get the right error back. Tested with inject-error.py from bcc. Reviewed-by: Johannes Thumshirn Signed-off-by: Josef Bacik Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Sasha Levin --- fs/btrfs/extent-tree.c | 20 ++++++++++++++++++-- 1 file changed, 18 insertions(+), 2 deletions(-) diff --git a/fs/btrfs/extent-tree.c b/fs/btrfs/extent-tree.c index eb95ed78a18e..dc50605ecbda 100644 --- a/fs/btrfs/extent-tree.c +++ b/fs/btrfs/extent-tree.c @@ -3781,6 +3781,7 @@ static noinline int find_free_extent(struct btrfs_fs_info *fs_info, u64 flags, int delalloc) { int ret = 0; + int cache_block_group_error = 0; struct btrfs_free_cluster *last_ptr = NULL; struct btrfs_block_group_cache *block_group = NULL; struct find_free_extent_ctl ffe_ctl = {0}; @@ -3940,7 +3941,20 @@ static noinline int find_free_extent(struct btrfs_fs_info *fs_info, if (unlikely(!ffe_ctl.cached)) { ffe_ctl.have_caching_bg = true; ret = btrfs_cache_block_group(block_group, 0); - BUG_ON(ret < 0); + + /* + * If we get ENOMEM here or something else we want to + * try other block groups, because it may not be fatal. + * However if we can't find anything else we need to + * save our return here so that we return the actual + * error that caused problems, not ENOSPC. + */ + if (ret < 0) { + if (!cache_block_group_error) + cache_block_group_error = ret; + ret = 0; + goto loop; + } ret = 0; } @@ -4027,7 +4041,7 @@ static noinline int find_free_extent(struct btrfs_fs_info *fs_info, if (ret > 0) goto search; - if (ret == -ENOSPC) { + if (ret == -ENOSPC && !cache_block_group_error) { /* * Use ffe_ctl->total_free_space as fallback if we can't find * any contiguous hole. @@ -4038,6 +4052,8 @@ static noinline int find_free_extent(struct btrfs_fs_info *fs_info, space_info->max_extent_size = ffe_ctl.max_extent_size; spin_unlock(&space_info->lock); ins->offset = ffe_ctl.max_extent_size; + } else if (ret == -ENOSPC) { + ret = cache_block_group_error; } return ret; } -- 2.20.1