Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp666648ybv; Thu, 13 Feb 2020 07:27:00 -0800 (PST) X-Google-Smtp-Source: APXvYqyfFbXp3ZK9ancA102GiqSa3/2JcXsPm0tNP3RE95AZweP9Pnsw708Hwcf+JaOKFyG8avx/ X-Received: by 2002:aca:54cc:: with SMTP id i195mr3214569oib.126.1581607619976; Thu, 13 Feb 2020 07:26:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581607619; cv=none; d=google.com; s=arc-20160816; b=LRdOteEa+vi+tsc0rquKQt4dyDfE+g5OGzCeAFzHQKT4gSpf+ZYRdCN7KN8//a3o8/ wpvRyxBJJncFC520kUK9K9m7lhgbXhkVxtLNQDpZboS1gFxm8Vy578y7+db8sU+W8/9o sFJ5ywM3EAK8Z6BeHr+wHvT2CIZ4AUgPx3d7yHvsHOhZUJry7Vmkwc2kTpXPJfZzPnp/ kKNObGB7KL4lkbdLbmzm7d3YTnJwC6OBuZDxUUQk0SlrVrAwylQCxFyfLCT94YiS0sba SlITQ6Ww9fH+T1A+/tgKHjLjhJmBVjQ18Q76+XKOB7BNTxEGzMrtd6m3oRoZPpAvIpan OpkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=XBqC8vAnMz3vI74wWPjeYoRxadOqN4I1S01tPCkKEG4=; b=OLS00zleK/Gb1ZvWCXJo5DcykZOLfu6zjB7voc4qxb6w+kLWZj/lXGWlTkS1HJk26H eetIYajghc6Pu7bc6v/pyGXyi7nPYRoCeQpt/gorwTGQlypqGOnHl+nRoGbaU2smKnWO osnCiqR+CQuQMnfkkL2mNM9qcUyKJUPKr8/T3QSkcPAPTxs+KAQyOkLhtw7Dyrxb34D7 GK4aQ7oQtAkWNh/rnLFp7UGAVgIqR20zVI8zGVrZfGlZYQm/5zsz8+oOQaWDXjy+jE/A hh8UmBkmMB6v2RjtApwVN1VgmljjsCTm2NWf1S+Alv2bpqo28mBh8cdKy9EUb9lpPkKL mgmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DNx5HrrI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p13si1231860otq.210.2020.02.13.07.26.48; Thu, 13 Feb 2020 07:26:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DNx5HrrI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387503AbgBMP0D (ORCPT + 99 others); Thu, 13 Feb 2020 10:26:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:37116 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728639AbgBMPYP (ORCPT ); Thu, 13 Feb 2020 10:24:15 -0500 Received: from localhost (unknown [104.132.1.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5970C24689; Thu, 13 Feb 2020 15:24:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581607454; bh=XGihjVxIgskibkVAWS3CfHIBjo058JMWp6934itqryo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DNx5HrrIL06+b9Xhw7SjZhZFUx5aiE/f4+47DvxxVFpKQR4u7+zcoCFAsC2ADe5uE UJy9h2j4m/l9c7DWe+ixMSrNwbTo81km/U3NSVxwwDwGilPPl9QrPwmT17dSLcaD2c 0FrYF3cAo98xeV17q9mWcKcD4Vn6bjM281Hnrqr8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Josef Bacik , David Sterba , Sasha Levin Subject: [PATCH 4.9 083/116] btrfs: free block groups after freeing fs trees Date: Thu, 13 Feb 2020 07:20:27 -0800 Message-Id: <20200213151915.106400155@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200213151842.259660170@linuxfoundation.org> References: <20200213151842.259660170@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Josef Bacik [ Upstream commit 4e19443da1941050b346f8fc4c368aa68413bc88 ] Sometimes when running generic/475 we would trip the WARN_ON(cache->reserved) check when free'ing the block groups on umount. This is because sometimes we don't commit the transaction because of IO errors and thus do not cleanup the tree logs until at umount time. These blocks are still reserved until they are cleaned up, but they aren't cleaned up until _after_ we do the free block groups work. Fix this by moving the free after free'ing the fs roots, that way all of the tree logs are cleaned up and we have a properly cleaned fs. A bunch of loops of generic/475 confirmed this fixes the problem. CC: stable@vger.kernel.org # 4.9+ Signed-off-by: Josef Bacik Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Sasha Levin --- fs/btrfs/disk-io.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/fs/btrfs/disk-io.c b/fs/btrfs/disk-io.c index eab5a9065f093..439b5f5dc3274 100644 --- a/fs/btrfs/disk-io.c +++ b/fs/btrfs/disk-io.c @@ -3864,6 +3864,15 @@ void close_ctree(struct btrfs_root *root) clear_bit(BTRFS_FS_OPEN, &fs_info->flags); free_root_pointers(fs_info, true); + /* + * We must free the block groups after dropping the fs_roots as we could + * have had an IO error and have left over tree log blocks that aren't + * cleaned up until the fs roots are freed. This makes the block group + * accounting appear to be wrong because there's pending reserved bytes, + * so make sure we do the block group cleanup afterwards. + */ + btrfs_free_block_groups(fs_info); + iput(fs_info->btree_inode); #ifdef CONFIG_BTRFS_FS_CHECK_INTEGRITY -- 2.20.1