From nobody Tue Dec 2 01:30:04 2025 Received: from mail-wr1-f53.google.com (mail-wr1-f53.google.com [209.85.221.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3F6AA31770F for ; Fri, 21 Nov 2025 07:40:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.53 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763710846; cv=none; b=dJVcMrtZHicRv8LAbeWIMaZsZHFbEftr3Uua4QIjeCjWSpcSQcByNa0W1GROkU7TdLt1HE4t1tZ76u0wfdK8BZKcgEzu30QIy4dgHfJtqhG6LOCRnsGgryzAb+c1FNrXAC0MMTDEFd53jgauccrJttVxmGQO5utORSfoRffEgmM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763710846; c=relaxed/simple; bh=jzpdVgcWhI1BiaFeT26VJqC0oJV3Mbha8IXXpw9WnAA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=KkTYcir8rLiKNfGpdEb+pOn07/UMqElozVxpwPMon8JDJyViS/CZ8yy4T8YieZZ4U4utqvYd/uZEKsG3ykiDgr0roMX1U6F0BDtQLHdnELZWDmI8qy/iSncLly8vciGIPw5UxW/6buDB5pkdNC1qsawvCq7aGazwHPwRJZsmCGI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com; spf=pass smtp.mailfrom=suse.com; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b=dc0IFM5q; arc=none smtp.client-ip=209.85.221.53 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b="dc0IFM5q" Received: by mail-wr1-f53.google.com with SMTP id ffacd0b85a97d-429cbdab700so210132f8f.1 for ; Thu, 20 Nov 2025 23:40:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=google; t=1763710842; x=1764315642; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=8k/aHSJ5y3EQVvgtWu6J+LK331e28G7eJ5wJTbMn3Fw=; b=dc0IFM5qdYjaZoOaGtO49vJe+VXq7BWdF1WaMdjs3Rr4hu/7l0MSZ34tUJT/sLYjG4 qAzX7qRT6NVnbQu+hUY8QWOX0MgeRMAhb697vhmBTylgceaWNom5V8ItdV6lHWVY+PjM Lr+ss9/BcM2ikFADtcPm3XDsvCuUcbSDI5HytvocekN6INTmRZjrOBN8J8Z01AO0n3OP Fa/ARLcCeHG6P+N+XZ7uaitwoeD/m0msa0jMWPWP3dqyoO9E5n95V9k1VVO3fEZ1gp6b D+VAfDMAN3+T6u46/pnxm6BvWu6aM/DcIArx/6fnm0z6EAVKyP461PxJ/dNT5D9s8wvf fGXw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763710842; x=1764315642; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=8k/aHSJ5y3EQVvgtWu6J+LK331e28G7eJ5wJTbMn3Fw=; b=OBiRxPOL1/biOJCfc+LQwLjEf0oEcimE86GLjZB5eKqeBBX1zmr7W18vvfBxMB7hvl TjCm12HX9DIxlk2jS5zi/t5VMWaJeA0w+IwjDYZN9zpnnJmDo/Ii4onAkQIDPvqsIJju 7ByhsOOmnh9RdPrMrQ6nhDvnxBpsW7JA9s7VHBsSj8UYdaBEvmdm1sn2tRh8Mqa98/M0 ZCA40/beakANxktfgiEmwHd6ms3lzMMPyJnAMPSLcp0Awnf7iLo03Hb1pktBhEbbxle1 9uQgq6PdKZnh9kzDX0lx+XVKJ6nDTfGYEZmFcT8Catge6y3G8nxw40PJ9dBSMAvE6r/V 1Kbw== X-Forwarded-Encrypted: i=1; AJvYcCVPTS5m7KBdpi/2fFxkA8YodKLg7QLb3BQ1BUMrw9sNe3oZkg7yJpJ5+66g/Kz7SZTltcx7Er/8zgFYeQA=@vger.kernel.org X-Gm-Message-State: AOJu0YwNci/OZkTRMZFYJKPwTe4Ji4IMZfKTG+To63QS5N9OzDvMEKkN wRJDFPRLx4p0pLjyiD9Ax2FVyzy4BN5K+WdPjRj+83gBM/fNKxKWjPnQrHSRCn1Q558= X-Gm-Gg: ASbGncuqUJSus0gkhy2HwVfNHMlFGcBkgDb+kbq+O12q9Mfy4FgDfnzz4LVzSwRrNXi X9nmluRdEBL4jlFnL19opZGCCXR0rn6wCpY/8eilN94jcQfScszWXyWfolUBik4bgR1l/4xAiCt WW6w7Grx6/1byUk3WsH2oQTIdIpa5r3UgWQqPKH+w5tC4JwPbONmY/aSAkf1boMCl0brjMQje4+ iBdmQ5Sh6x8z8h/vaNJzm0UeRsA0u5vENuAbbEzepJT2qJyqFlo1IFVCt0jWZaME10HWaDS/Btp 8j5f6dpIkzZuI/lF95IszGdbbjd4i+B1L49nesIzL4JWzhHUgTTUtmVRDWz4Jnd373tQuLx8vsk VgoP8k/eueMaHNJASybAp9KlP/VW9gnJ6LJubg+htBPB5YSv3JFoKMiF7Va7H0OTgLseznAtwM3 X+bsLq164HEBvONm7eMD4Lr1r7 X-Google-Smtp-Source: AGHT+IEOCNSLp4USQ3IbILIF9/CRDBl64jBdeElEJETGIULBrLRo8uj6TLcwaX6NYIFZt20NYemJIA== X-Received: by 2002:a05:600c:1396:b0:477:a478:3f94 with SMTP id 5b1f17b1804b1-477c316e614mr2619735e9.5.1763710842408; Thu, 20 Nov 2025 23:40:42 -0800 (PST) Received: from localhost.localdomain ([202.127.77.110]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7c3f023fba8sm5081295b3a.41.2025.11.20.23.40.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 20 Nov 2025 23:40:41 -0800 (PST) From: Heming Zhao To: joseph.qi@linux.alibaba.com, mark@fasheh.com, jlbec@evilplan.org Cc: Heming Zhao , ocfs2-devel@lists.linux.dev, linux-kernel@vger.kernel.org, glass.su@suse.com Subject: [PATCH v4 1/2] ocfs2: give ocfs2 the ability to reclaim suballocator free bg Date: Fri, 21 Nov 2025 15:40:24 +0800 Message-ID: <20251121074030.12014-2-heming.zhao@suse.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251121074030.12014-1-heming.zhao@suse.com> References: <20251121074030.12014-1-heming.zhao@suse.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The current ocfs2 code can't reclaim suballocator block group space. In some cases, this causes ocfs2 to hold onto a lot of space. For example, when creating lots of small files, the space is held/managed by the '//inode_alloc'. After the user deletes all the small files, the space never returns to the '//global_bitmap'. This issue prevents ocfs2 from providing the needed space even when there is enough free space in a small ocfs2 volume. This patch gives ocfs2 the ability to reclaim suballocator free space when the block group is freed. For performance reasons, this patch keeps the first suballocator block group active. Signed-off-by: Heming Zhao Reviewed-by: Su Yue --- fs/ocfs2/suballoc.c | 308 ++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 299 insertions(+), 9 deletions(-) diff --git a/fs/ocfs2/suballoc.c b/fs/ocfs2/suballoc.c index 6ac4dcd54588..de2f09217142 100644 --- a/fs/ocfs2/suballoc.c +++ b/fs/ocfs2/suballoc.c @@ -294,6 +294,74 @@ static int ocfs2_validate_group_descriptor(struct supe= r_block *sb, return ocfs2_validate_gd_self(sb, bh, 0); } =20 +/* + * The hint group descriptor (gd) may already have been released + * in _ocfs2_free_suballoc_bits(). We first check the gd signature, + * then perform the standard ocfs2_read_group_descriptor() jobs. + * + * If the gd signature is invalid, we return 'rc=3D0' and set + * '*released=3D1'. The caller is expected to handle this specific case. + * Otherwise, we return the actual error code. + * + * We treat gd signature corruption case as a release case. The + * caller ocfs2_claim_suballoc_bits() will use ocfs2_search_chain() + * to search each gd block. The code will eventually find this + * corrupted gd block - Late, but not missed. + * + * Note: + * The caller is responsible for initializing the '*released' status. + */ +static int ocfs2_read_hint_group_descriptor(struct inode *inode, + struct ocfs2_dinode *di, u64 gd_blkno, + struct buffer_head **bh, int *released) +{ + int rc; + struct buffer_head *tmp =3D *bh; + struct ocfs2_group_desc *gd; + + rc =3D ocfs2_read_block(INODE_CACHE(inode), gd_blkno, &tmp, NULL); + if (rc) + goto out; + + gd =3D (struct ocfs2_group_desc *) tmp->b_data; + if (!OCFS2_IS_VALID_GROUP_DESC(gd)) { + /* + * Invalid gd cache was set in ocfs2_read_block(), + * which will affect block_group allocation. + * Path: + * ocfs2_reserve_suballoc_bits + * ocfs2_block_group_alloc + * ocfs2_block_group_alloc_contig + * ocfs2_set_new_buffer_uptodate + */ + ocfs2_remove_from_cache(INODE_CACHE(inode), tmp); + *released =3D 1; /* we return 'rc=3D0' for this case */ + goto free_bh; + } + + /* below jobs same with ocfs2_read_group_descriptor() */ + if (!buffer_jbd(tmp)) { + rc =3D ocfs2_validate_group_descriptor(inode->i_sb, tmp); + if (rc) + goto free_bh; + } + + rc =3D ocfs2_validate_gd_parent(inode->i_sb, di, tmp, 0); + if (rc) + goto free_bh; + + /* If ocfs2_read_block() got us a new bh, pass it up. */ + if (!*bh) + *bh =3D tmp; + + return rc; + +free_bh: + brelse(tmp); +out: + return rc; +} + int ocfs2_read_group_descriptor(struct inode *inode, struct ocfs2_dinode *= di, u64 gd_blkno, struct buffer_head **bh) { @@ -1724,7 +1792,7 @@ static int ocfs2_search_one_group(struct ocfs2_alloc_= context *ac, u32 bits_wanted, u32 min_bits, struct ocfs2_suballoc_result *res, - u16 *bits_left) + u16 *bits_left, int *released) { int ret; struct buffer_head *group_bh =3D NULL; @@ -1732,9 +1800,11 @@ static int ocfs2_search_one_group(struct ocfs2_alloc= _context *ac, struct ocfs2_dinode *di =3D (struct ocfs2_dinode *)ac->ac_bh->b_data; struct inode *alloc_inode =3D ac->ac_inode; =20 - ret =3D ocfs2_read_group_descriptor(alloc_inode, di, - res->sr_bg_blkno, &group_bh); - if (ret < 0) { + ret =3D ocfs2_read_hint_group_descriptor(alloc_inode, di, + res->sr_bg_blkno, &group_bh, released); + if (*released) { + return 0; + } else if (ret < 0) { mlog_errno(ret); return ret; } @@ -1949,6 +2019,7 @@ static int ocfs2_claim_suballoc_bits(struct ocfs2_all= oc_context *ac, struct ocfs2_suballoc_result *res) { int status; + int released =3D 0; u16 victim, i; u16 bits_left =3D 0; u64 hint =3D ac->ac_last_group; @@ -1975,6 +2046,7 @@ static int ocfs2_claim_suballoc_bits(struct ocfs2_all= oc_context *ac, goto bail; } =20 + /* the hint bg may already be released, we quiet search this group. */ res->sr_bg_blkno =3D hint; if (res->sr_bg_blkno) { /* Attempt to short-circuit the usual search mechanism @@ -1982,7 +2054,12 @@ static int ocfs2_claim_suballoc_bits(struct ocfs2_al= loc_context *ac, * allocation group. This helps us maintain some * contiguousness across allocations. */ status =3D ocfs2_search_one_group(ac, handle, bits_wanted, - min_bits, res, &bits_left); + min_bits, res, &bits_left, + &released); + if (released) { + res->sr_bg_blkno =3D 0; + goto chain_search; + } if (!status) goto set_hint; if (status < 0 && status !=3D -ENOSPC) { @@ -1990,7 +2067,7 @@ static int ocfs2_claim_suballoc_bits(struct ocfs2_all= oc_context *ac, goto bail; } } - +chain_search: cl =3D (struct ocfs2_chain_list *) &fe->id2.i_chain; =20 victim =3D ocfs2_find_victim_chain(cl); @@ -2102,6 +2179,12 @@ int ocfs2_claim_metadata(handle_t *handle, return status; } =20 +/* + * after ocfs2 has the ability to release block group unused space, + * the ->ip_last_used_group may be invalid. so this function returns + * ac->ac_last_group need to verify. + * refer the 'hint' in ocfs2_claim_suballoc_bits() for more details. + */ static void ocfs2_init_inode_ac_group(struct inode *dir, struct buffer_head *parent_di_bh, struct ocfs2_alloc_context *ac) @@ -2540,6 +2623,198 @@ static int ocfs2_block_group_clear_bits(handle_t *h= andle, return status; } =20 +/* + * Reclaim the suballocator managed space to main bitmap. + * This function first works on the suballocator to perform the + * cleanup rec/alloc_inode job, then switches to the main bitmap + * to reclaim released space. + * + * handle: The transaction handle + * alloc_inode: The suballoc inode + * alloc_bh: The buffer_head of suballoc inode + * group_bh: The group descriptor buffer_head of suballocator managed. + * Caller should release the input group_bh. + */ +static int _ocfs2_reclaim_suballoc_to_main(handle_t *handle, + struct inode *alloc_inode, + struct buffer_head *alloc_bh, + struct buffer_head *group_bh) +{ + int idx, status =3D 0; + int i, next_free_rec, len =3D 0; + __le16 old_bg_contig_free_bits =3D 0; + u16 start_bit; + u32 tmp_used; + u64 bg_blkno, start_blk; + unsigned int count; + struct ocfs2_chain_rec *rec; + struct buffer_head *main_bm_bh =3D NULL; + struct inode *main_bm_inode =3D NULL; + struct ocfs2_super *osb =3D OCFS2_SB(alloc_inode->i_sb); + struct ocfs2_dinode *fe =3D (struct ocfs2_dinode *) alloc_bh->b_data; + struct ocfs2_chain_list *cl =3D &fe->id2.i_chain; + struct ocfs2_group_desc *group =3D (struct ocfs2_group_desc *) group_bh->= b_data; + + idx =3D le16_to_cpu(group->bg_chain); + rec =3D &(cl->cl_recs[idx]); + + status =3D ocfs2_extend_trans(handle, + ocfs2_calc_group_alloc_credits(osb->sb, + le16_to_cpu(cl->cl_cpg))); + if (status) { + mlog_errno(status); + goto bail; + } + status =3D ocfs2_journal_access_di(handle, INODE_CACHE(alloc_inode), + alloc_bh, OCFS2_JOURNAL_ACCESS_WRITE); + if (status < 0) { + mlog_errno(status); + goto bail; + } + + /* + * Only clear the suballocator rec item in-place. + * + * If idx is not the last, we don't compress (remove the empty item) + * the cl_recs[]. If not, we need to do lots jobs. + * + * Compress cl_recs[] code example: + * if (idx !=3D cl->cl_next_free_rec - 1) + * memmove(&cl->cl_recs[idx], &cl->cl_recs[idx + 1], + * sizeof(struct ocfs2_chain_rec) * + * (cl->cl_next_free_rec - idx - 1)); + * for(i =3D idx; i < cl->cl_next_free_rec-1; i++) { + * group->bg_chain =3D "later group->bg_chain"; + * group->bg_blkno =3D xxx; + * ... ... + * } + */ + + tmp_used =3D le32_to_cpu(fe->id1.bitmap1.i_total); + fe->id1.bitmap1.i_total =3D cpu_to_le32(tmp_used - le32_to_cpu(rec->c_tot= al)); + + /* Substraction 1 for the block group itself */ + tmp_used =3D le32_to_cpu(fe->id1.bitmap1.i_used); + fe->id1.bitmap1.i_used =3D cpu_to_le32(tmp_used - 1); + + tmp_used =3D le32_to_cpu(fe->i_clusters); + fe->i_clusters =3D cpu_to_le32(tmp_used - le16_to_cpu(cl->cl_cpg)); + + spin_lock(&OCFS2_I(alloc_inode)->ip_lock); + OCFS2_I(alloc_inode)->ip_clusters -=3D le32_to_cpu(fe->i_clusters); + fe->i_size =3D cpu_to_le64(ocfs2_clusters_to_bytes(alloc_inode->i_sb, + le32_to_cpu(fe->i_clusters))); + spin_unlock(&OCFS2_I(alloc_inode)->ip_lock); + i_size_write(alloc_inode, le64_to_cpu(fe->i_size)); + alloc_inode->i_blocks =3D ocfs2_inode_sector_count(alloc_inode); + + ocfs2_journal_dirty(handle, alloc_bh); + ocfs2_update_inode_fsync_trans(handle, alloc_inode, 0); + + start_blk =3D le64_to_cpu(rec->c_blkno); + count =3D le32_to_cpu(rec->c_total) / le16_to_cpu(cl->cl_bpc); + + /* + * If the rec is the last one, let's compress the chain list by + * removing the empty cl_recs[] at the end. + */ + next_free_rec =3D le16_to_cpu(cl->cl_next_free_rec); + if (idx =3D=3D (next_free_rec - 1)) { + len++; /* the last item should be counted first */ + for (i =3D (next_free_rec - 2); i > 0; i--) { + if (cl->cl_recs[i].c_free =3D=3D cl->cl_recs[i].c_total) + len++; + else + break; + } + } + le16_add_cpu(&cl->cl_next_free_rec, -len); + + rec->c_free =3D 0; + rec->c_total =3D 0; + rec->c_blkno =3D 0; + ocfs2_remove_from_cache(INODE_CACHE(alloc_inode), group_bh); + memset(group, 0, sizeof(struct ocfs2_group_desc)); + + /* prepare job for reclaim clusters */ + main_bm_inode =3D ocfs2_get_system_file_inode(osb, + GLOBAL_BITMAP_SYSTEM_INODE, + OCFS2_INVALID_SLOT); + if (!main_bm_inode) + goto bail; /* ignore the error in reclaim path */ + + inode_lock(main_bm_inode); + + status =3D ocfs2_inode_lock(main_bm_inode, &main_bm_bh, 1); + if (status < 0) + goto free_bm_inode; /* ignore the error in reclaim path */ + + ocfs2_block_to_cluster_group(main_bm_inode, start_blk, &bg_blkno, + &start_bit); + fe =3D (struct ocfs2_dinode *) main_bm_bh->b_data; + cl =3D &fe->id2.i_chain; + /* reuse group_bh, caller will release the input group_bh */ + group_bh =3D NULL; + + /* reclaim clusters to global_bitmap */ + status =3D ocfs2_read_group_descriptor(main_bm_inode, fe, bg_blkno, + &group_bh); + if (status < 0) { + mlog_errno(status); + goto free_bm_bh; + } + group =3D (struct ocfs2_group_desc *) group_bh->b_data; + + if ((count + start_bit) > le16_to_cpu(group->bg_bits)) { + ocfs2_error(alloc_inode->i_sb, + "reclaim length (%d) beyands block group length (%d)", + count + start_bit, le16_to_cpu(group->bg_bits)); + goto free_group_bh; + } + + old_bg_contig_free_bits =3D group->bg_contig_free_bits; + status =3D ocfs2_block_group_clear_bits(handle, main_bm_inode, + group, group_bh, + start_bit, count, 0, + _ocfs2_clear_bit); + if (status < 0) { + mlog_errno(status); + goto free_group_bh; + } + + status =3D ocfs2_journal_access_di(handle, INODE_CACHE(main_bm_inode), + main_bm_bh, OCFS2_JOURNAL_ACCESS_WRITE); + if (status < 0) { + mlog_errno(status); + ocfs2_block_group_set_bits(handle, main_bm_inode, group, group_bh, + start_bit, count, + le16_to_cpu(old_bg_contig_free_bits), 1); + goto free_group_bh; + } + + idx =3D le16_to_cpu(group->bg_chain); + rec =3D &(cl->cl_recs[idx]); + + le32_add_cpu(&rec->c_free, count); + tmp_used =3D le32_to_cpu(fe->id1.bitmap1.i_used); + fe->id1.bitmap1.i_used =3D cpu_to_le32(tmp_used - count); + ocfs2_journal_dirty(handle, main_bm_bh); + +free_group_bh: + brelse(group_bh); + +free_bm_bh: + ocfs2_inode_unlock(main_bm_inode, 1); + brelse(main_bm_bh); + +free_bm_inode: + inode_unlock(main_bm_inode); + iput(main_bm_inode); + +bail: + return status; +} + /* * expects the suballoc inode to already be locked. */ @@ -2552,12 +2827,13 @@ static int _ocfs2_free_suballoc_bits(handle_t *hand= le, void (*undo_fn)(unsigned int bit, unsigned long *bitmap)) { - int status =3D 0; + int idx, status =3D 0; u32 tmp_used; struct ocfs2_dinode *fe =3D (struct ocfs2_dinode *) alloc_bh->b_data; struct ocfs2_chain_list *cl =3D &fe->id2.i_chain; struct buffer_head *group_bh =3D NULL; struct ocfs2_group_desc *group; + struct ocfs2_chain_rec *rec; __le16 old_bg_contig_free_bits =3D 0; =20 /* The alloc_bh comes from ocfs2_free_dinode() or @@ -2603,12 +2879,26 @@ static int _ocfs2_free_suballoc_bits(handle_t *hand= le, goto bail; } =20 - le32_add_cpu(&cl->cl_recs[le16_to_cpu(group->bg_chain)].c_free, - count); + idx =3D le16_to_cpu(group->bg_chain); + rec =3D &(cl->cl_recs[idx]); + + le32_add_cpu(&rec->c_free, count); tmp_used =3D le32_to_cpu(fe->id1.bitmap1.i_used); fe->id1.bitmap1.i_used =3D cpu_to_le32(tmp_used - count); ocfs2_journal_dirty(handle, alloc_bh); =20 + /* + * Reclaim suballocator free space. + * Bypass: global_bitmap, non empty rec, first rec in cl_recs[] + */ + if (ocfs2_is_cluster_bitmap(alloc_inode) || + (le32_to_cpu(rec->c_free) !=3D (le32_to_cpu(rec->c_total) - 1)) || + (le16_to_cpu(cl->cl_next_free_rec) =3D=3D 1)) { + goto bail; + } + + _ocfs2_reclaim_suballoc_to_main(handle, alloc_inode, alloc_bh, group_bh); + bail: brelse(group_bh); return status; --=20 2.43.0 From nobody Tue Dec 2 01:30:04 2025 Received: from mail-wm1-f51.google.com (mail-wm1-f51.google.com [209.85.128.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1ECC6283683 for ; Fri, 21 Nov 2025 07:40:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.51 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763710849; cv=none; b=C4fQjPFFHDkNXU/lewV+q6z/7x5mG734lf2bFKC2EgOOcZC0LrE39b/3tD/Xq0OH5UNKsuO6QPH7MITBuojALoqwy9cygSofTM+M1xs4TFR5UaenVk1dAw90znKaneTvi/uaiLeQHIw5VG4UHLdwJByXurQ2OKZWYzYHBJtV/DY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763710849; c=relaxed/simple; bh=u3tF8zKd7NcYJDtduBDGjGpk5WLn+y3aUQFW19+tjRo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=TPO6bo+PEVcItoPYpXRKoMXJUjgTyX5vFseON4wB22Nw63eX0JM/xPFsGoSQdnR4JY0wN9THm7Kb3i9MG4gl1iqTWdL2oxoRfMbZPIALLqhwng5m+nSwVGf5BrnPz849Wxo29qNDxVJbkDGhN81S6rmcxIzD1aoEZMZ5Kg1OIAg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com; spf=pass smtp.mailfrom=suse.com; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b=VRIfdh4C; arc=none smtp.client-ip=209.85.128.51 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b="VRIfdh4C" Received: by mail-wm1-f51.google.com with SMTP id 5b1f17b1804b1-4779c9109ceso1008745e9.1 for ; Thu, 20 Nov 2025 23:40:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=google; t=1763710845; x=1764315645; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=W9MWQEkUmssQH7h8+ZJJJrAiWh1kVuLIvHyNZDUo2Ps=; b=VRIfdh4CenBxkaCubmOCsHKjpISA4E6bFZnX9DLf/Nn4l0EbiBcdFd3LOFQ1MoDy+z RtFd94gokTXlfN4gOgLdLWjhAweTo/gGhtFbv1SlryAja1dRwFlI7fgjCKhhlEfGxgCA mao/+Mg7N+O3wNjnxWCuZI9C+HVnAn1Sfc6GiCzBzByjVV46SQy5Jqvl26SVZ5Nt80Q1 1g3YuNUWHGYBt/+FR6HCRbR1uVnqlL1QC/lnnHspl3D2kw5KNsV9sKK8+fmRxpzxMoNZ VtaTa6hO7RvuDvXctOraL2zow5B6nglUaawy72VkZx4QFMTHyn19t/aRUtQPkFAPwdxw SRwQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763710845; x=1764315645; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=W9MWQEkUmssQH7h8+ZJJJrAiWh1kVuLIvHyNZDUo2Ps=; b=USuS5kLu2KvMwAxHC7YPwkBGKZoYNw9TCMOjyCFsxHCHKnxHF93n6KW6c6Z3uzloN2 Du089usF4FH81PpesW0x2pkZP5f+2rsuieBQfLbIRm2OoO/PMpPzIys+11fZmnfBFm0O uL3WsCbOwQ1+Z6dnfpo3+LU9hJq72o5BOlp6do7ONIK2huAd/9VSbzIvUNx2hqlJVGlB t2CfcmDTTNlJJajmJn3P3ODdDuQmMJGzkI/Ug/RcnoTtIzJaeIuuDN5ytcKWXvRpR400 IqTyrui12u1lCXZweIopWzfvMD99py4JaSctVt/Up7h7km4ul/5WLhpt9ZUlhLi/m0mN +dHw== X-Forwarded-Encrypted: i=1; AJvYcCUoMKhhEwg+UmzkMN0/3QCpfyO0kxlM8k06lMyBBqiuOp7faPjt20yaNJyhNueFkofZmIPVxJtUgRM4hek=@vger.kernel.org X-Gm-Message-State: AOJu0YwFDnLB0XCibHxkHFh/EprZ5F/sBvaF/vG8yp74rlm+MUem62hc GRkKz5Qjz8s9aEzcPNKDfSulhhzRPyINCIckcBwmmltL/fOoOytppz37O6LKAXzYUq4= X-Gm-Gg: ASbGncu6NZIBWRdzhgnuwPL4vQUsDVJOAlRQ6sXdO9rIXnwwzQban/GQ7LJ6NiRsuTW 0500rgBQp6RPPDs8nicXG2DnudZ02NyMYH4EhoaMzm7DKq5xpozpiw6dyKwYmwYCpstpWiBzhBa Hr5LzzVg7wBz8uUEBfXhVBWNVHhfgSM88O56qywyQ9MYbwN2Q7CJCXJAZZ0/qJ8HsRUFMQqQlgR 48QaAEVIZQtFiwmo2uV77EXwz7N1al73XljL/apuiWhef7AQRFE61Z8AfBMWTfo8R61fw2OKBXo O3FRCOLk0vG1WNuRF7oYBIHRCzoKnRhlIRV6IiJ0iUlZMUupwZBFdBwPorRtQAdJgb1ZcoIiQTF +LqSLoNsxIpRuVnIIKei5vDVRntQUnMNRT+fQnBQBRbICRzci6YiC6teA8e++1Bx/shBOZhqK7U HE2kbeSgO/DYMSOAMuoDcQRQXv X-Google-Smtp-Source: AGHT+IGPfilu/kbgZV9dVq6wCfMGv8hTMKmEAShf3TykDi7bNAfE5BRENmfv20DM+MDzIz2SzorcxA== X-Received: by 2002:a05:600c:46c4:b0:477:5ca6:4d51 with SMTP id 5b1f17b1804b1-477c01bdd6cmr8525255e9.3.1763710845317; Thu, 20 Nov 2025 23:40:45 -0800 (PST) Received: from localhost.localdomain ([202.127.77.110]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7c3f023fba8sm5081295b3a.41.2025.11.20.23.40.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 20 Nov 2025 23:40:44 -0800 (PST) From: Heming Zhao To: joseph.qi@linux.alibaba.com, mark@fasheh.com, jlbec@evilplan.org Cc: Heming Zhao , ocfs2-devel@lists.linux.dev, linux-kernel@vger.kernel.org, glass.su@suse.com Subject: [PATCH v4 2/2] ocfs2: detect released suballocator BG for fh_to_[dentry|parent] Date: Fri, 21 Nov 2025 15:40:25 +0800 Message-ID: <20251121074030.12014-3-heming.zhao@suse.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251121074030.12014-1-heming.zhao@suse.com> References: <20251121074030.12014-1-heming.zhao@suse.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" After ocfs2 gained the ability to reclaim suballocator free block group (BGs), a suballocator block group may be released. This change causes the xfstest case generic/426 to fail. generic/426 expects return value -ENOENT or -ESTALE, but the current code triggers -EROFS. Call stack before ocfs2 gained the ability to reclaim bg: ocfs2_fh_to_dentry //or ocfs2_fh_to_parent ocfs2_get_dentry + ocfs2_test_inode_bit | ocfs2_test_suballoc_bit | + ocfs2_read_group_descriptor //Since ocfs2 never releases the bg, | | //the bg block was always found. | + *res =3D ocfs2_test_bit //unlink was called, and the bit is zero | + if (!set) //because the above *res is 0 status =3D -ESTALE //the generic/426 expected return value Current call stack that triggers -EROFS: ocfs2_get_dentry ocfs2_test_inode_bit ocfs2_test_suballoc_bit ocfs2_read_group_descriptor + if reading a released bg, validation fails and triggers -EROFS How to fix: Since the read BG is already released, we must avoid triggering -EROFS. With this commit, we use ocfs2_read_hint_group_descriptor() to detect the released BG block. This approach quietly handles this type of error and returns -EINVAL, which triggers the caller's existing conversion path to -ESTALE. Signed-off-by: Heming Zhao Reviewed-by: Su Yue --- fs/ocfs2/suballoc.c | 28 ++++++++++++++++++---------- 1 file changed, 18 insertions(+), 10 deletions(-) diff --git a/fs/ocfs2/suballoc.c b/fs/ocfs2/suballoc.c index de2f09217142..a126d83ddb1c 100644 --- a/fs/ocfs2/suballoc.c +++ b/fs/ocfs2/suballoc.c @@ -3152,7 +3152,7 @@ static int ocfs2_test_suballoc_bit(struct ocfs2_super= *osb, struct ocfs2_group_desc *group; struct buffer_head *group_bh =3D NULL; u64 bg_blkno; - int status; + int status, quiet =3D 0, released; =20 trace_ocfs2_test_suballoc_bit((unsigned long long)blkno, (unsigned int)bit); @@ -3168,11 +3168,15 @@ static int ocfs2_test_suballoc_bit(struct ocfs2_sup= er *osb, =20 bg_blkno =3D group_blkno ? group_blkno : ocfs2_which_suballoc_group(blkno, bit); - status =3D ocfs2_read_group_descriptor(suballoc, alloc_di, bg_blkno, - &group_bh); - if (status < 0) { + status =3D ocfs2_read_hint_group_descriptor(suballoc, alloc_di, bg_blkno, + &group_bh, &released); + if (released) { + quiet =3D 1; + status =3D -EINVAL; + goto bail; + } else if (status < 0) { mlog(ML_ERROR, "read group %llu failed %d\n", - (unsigned long long)bg_blkno, status); + (unsigned long long)bg_blkno, status); goto bail; } =20 @@ -3182,7 +3186,7 @@ static int ocfs2_test_suballoc_bit(struct ocfs2_super= *osb, bail: brelse(group_bh); =20 - if (status) + if (status && (!quiet)) mlog_errno(status); return status; } @@ -3202,7 +3206,7 @@ static int ocfs2_test_suballoc_bit(struct ocfs2_super= *osb, */ int ocfs2_test_inode_bit(struct ocfs2_super *osb, u64 blkno, int *res) { - int status; + int status, quiet =3D 0; u64 group_blkno =3D 0; u16 suballoc_bit =3D 0, suballoc_slot =3D 0; struct inode *inode_alloc_inode; @@ -3244,8 +3248,12 @@ int ocfs2_test_inode_bit(struct ocfs2_super *osb, u6= 4 blkno, int *res) =20 status =3D ocfs2_test_suballoc_bit(osb, inode_alloc_inode, alloc_bh, group_blkno, blkno, suballoc_bit, res); - if (status < 0) - mlog(ML_ERROR, "test suballoc bit failed %d\n", status); + if (status < 0) { + if (status =3D=3D -EINVAL) + quiet =3D 1; + else + mlog(ML_ERROR, "test suballoc bit failed %d\n", status); + } =20 ocfs2_inode_unlock(inode_alloc_inode, 0); inode_unlock(inode_alloc_inode); @@ -3253,7 +3261,7 @@ int ocfs2_test_inode_bit(struct ocfs2_super *osb, u64= blkno, int *res) iput(inode_alloc_inode); brelse(alloc_bh); bail: - if (status) + if (status && !quiet) mlog_errno(status); return status; } --=20 2.43.0