Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3791985ybz; Mon, 20 Apr 2020 09:31:29 -0700 (PDT) X-Google-Smtp-Source: APiQypJtGaoCUmdNDjMJM6WO4qpHxJ0gFEGx9eSrYidKY76n0kwuBOhcWRAGpOEcC1UkH73RoTM+ X-Received: by 2002:aa7:ce0f:: with SMTP id d15mr13026090edv.290.1587400289054; Mon, 20 Apr 2020 09:31:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587400289; cv=none; d=google.com; s=arc-20160816; b=Cvzv3CP0YqikS19j/87aDiznNg2BxGOcGzJTBtSLxvu/P638070frJBfcQ9gK1VkzD ef3mewJZDyqRxBgzcy8u6gfuanKB9sy0Vzr+je8l8P2KwlwjM9YZeA2ITr/lsjX4J1cy zovDKr2Ddj1EH76KRtgicnUj7NWRAtNjFziGxdoP/mBHISWM7yERI3xYxaxoBf3jnaHR 56smq+rJoZwzWWsMJIjcGLbkjawf4up2S4doTrjkHqB71bvLcnUvj0268eYYW+KKEIW1 ZolLPNiQOhtdRdbkmxOGpYkCYLWSS46+kJ3+g610nB4sCcpjAsUV3WKthFOR0L32LkOU NpUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/1hgeCGUaGMHxXHS7NJ2v71ZccR0O98WNClnlzIAoEw=; b=ohqd7YBFcWeZVIQMUOL1Qm4dqxCg1K1M4tnpOzUskp2krnidVyu5pXWs85lSWQg7h0 +x6RPzZNyBszT4UZwlt1WPSufL0UggJAkRsul6sdGM+iTg/y1M3sqqnxmVUocw7pu7fR Qp29R0Doweb/fiRCZRT7V8LheuL3tVOw3K32r8/OMGuDn1LQS//450k3QKTluJUMlT9u wlArkR4Pz+31G0QdcdSSKeueyPk0kS/GWGiavGVwreH/Tat4qMO6nQzvVe2MU/N9FO2i qFU5spU/CZYvH/bMjTf+WypbUN8wYdSpkoDs+vCTiWnZ4fXV0heOwFDYNwu0Ivhy/uRY BOoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SWIwfujA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q7si813531ejz.377.2020.04.20.09.31.06; Mon, 20 Apr 2020 09:31:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SWIwfujA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729098AbgDTMra (ORCPT + 99 others); Mon, 20 Apr 2020 08:47:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:43484 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729091AbgDTMr2 (ORCPT ); Mon, 20 Apr 2020 08:47:28 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C7DFC2072B; Mon, 20 Apr 2020 12:47:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587386848; bh=bAe1FRdeDniFj9uG2cgsWCRDVxEI8geVgSonvd04wvw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SWIwfujAh7t4TtNYACzNIWVfLwbh1IIEQxW1K4r5YQo0IGm+AG2NT48yFEfWpczYJ x5yvrNmYg4qVUxZ+OagOj1AdBBT/Jf8Y8kkMM8pWbaAGzGOyb18vSZWCkhzPoUmW1Y OAJkfpuQqtLKtDkX1NDC9GKombTihmYDs+tUNb6o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Filipe Manana , Josef Bacik , David Sterba Subject: [PATCH 5.4 44/60] btrfs: check commit root generation in should_ignore_root Date: Mon, 20 Apr 2020 14:39:22 +0200 Message-Id: <20200420121512.405048995@linuxfoundation.org> X-Mailer: git-send-email 2.26.1 In-Reply-To: <20200420121500.490651540@linuxfoundation.org> References: <20200420121500.490651540@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Josef Bacik commit 4d4225fc228e46948486d8b8207955f0c031b92e upstream. Previously we would set the reloc root's last snapshot to transid - 1. However there was a problem with doing this, and we changed it to setting the last snapshot to the generation of the commit node of the fs root. This however broke should_ignore_root(). The assumption is that if we are in a generation newer than when the reloc root was created, then we would find the reloc root through normal backref lookups, and thus can ignore any fs roots we find with an old enough reloc root. Now that the last snapshot could be considerably further in the past than before, we'd end up incorrectly ignoring an fs root. Thus we'd find no nodes for the bytenr we were searching for, and we'd fail to relocate anything. We'd loop through the relocate code again and see that there were still used space in that block group, attempt to relocate those bytenr's again, fail in the same way, and just loop like this forever. This is tricky in that we have to not modify the fs root at all during this time, so we need to have a block group that has data in this fs root that is not shared by any other root, which is why this has been difficult to reproduce. Fixes: 054570a1dc94 ("Btrfs: fix relocation incorrectly dropping data references") CC: stable@vger.kernel.org # 4.9+ Reviewed-by: Filipe Manana Signed-off-by: Josef Bacik Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/relocation.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/fs/btrfs/relocation.c +++ b/fs/btrfs/relocation.c @@ -561,8 +561,8 @@ static int should_ignore_root(struct btr if (!reloc_root) return 0; - if (btrfs_root_last_snapshot(&reloc_root->root_item) == - root->fs_info->running_transaction->transid - 1) + if (btrfs_header_generation(reloc_root->commit_root) == + root->fs_info->running_transaction->transid) return 0; /* * if there is reloc tree and it was created in previous