From patchwork Thu Jul 4 15:24:00 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Filipe Manana X-Patchwork-Id: 11031645 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 74C71112C for ; Thu, 4 Jul 2019 15:24:07 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 6432B2894E for ; Thu, 4 Jul 2019 15:24:07 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 5881A28A6C; Thu, 4 Jul 2019 15:24:07 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.0 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 03F712894E for ; Thu, 4 Jul 2019 15:24:07 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727660AbfGDPYG (ORCPT ); Thu, 4 Jul 2019 11:24:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:38362 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727066AbfGDPYF (ORCPT ); Thu, 4 Jul 2019 11:24:05 -0400 Received: from localhost.localdomain (bl8-197-74.dsl.telepac.pt [85.241.197.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7DF6A2083B for ; Thu, 4 Jul 2019 15:24:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1562253845; bh=2D5hc6YueiAs+xbSdEl7paXWYfuHN9usgSH3+zbbyDY=; h=From:To:Subject:Date:From; b=MjDn4Sms+8LwBnGEXrAuN45To7ZUub5LPlbj1B/1uJ5Snxfizw9QuCjung3sYrYF7 zSSbWPY/lrq2ejrMgxH4I+N4fyuYKym5/8NWVWFCEaqyfrfi3iefxMpwilrAVPzp2S nky/d2lxgQ1Ss0zIDP98MZvkQP6Kanzd3sWIYek4= From: fdmanana@kernel.org To: linux-btrfs@vger.kernel.org Subject: [PATCH 0/5] Btrfs: fixes for inode cache (-o inode_cache) Date: Thu, 4 Jul 2019 16:24:00 +0100 Message-Id: <20190704152400.20614-1-fdmanana@kernel.org> X-Mailer: git-send-email 2.11.0 Sender: linux-btrfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-btrfs@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP From: Filipe Manana Just a small set of fixes for the inode cache feature, mostly hangs due to missing wakeups or incomplete error handling, as well as an inode block reserve leak when hitting ENOSPC. Filipe Manana (5): Btrfs: fix hang when loading existing inode cache off disk Btrfs: fix inode cache block reserve leak on failure to allocate data space Btrfs: fix inode cache waiters hanging on failure to start caching thread Btrfs: fix inode cache waiters hanging on path allocation failure Btrfs: wake up inode cache waiters sooner to reduce waiting time fs/btrfs/inode-map.c | 30 ++++++++++++++++++++++++------ 1 file changed, 24 insertions(+), 6 deletions(-)