lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 14 Jan 2022 16:23:31 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Josef Bacik <josef@...icpanda.com>
Cc:     David Sterba <dsterba@...e.com>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        lkp@...el.com, linux-btrfs@...r.kernel.org
Subject: [btrfs]  [confidence: ] c2e3930529:
 WARNING:at_fs/btrfs/block-group.c:#btrfs_put_block_group[btrfs]


(please be noted we tested on head of mainline and linux-next, also a fix
commit, still fail:
# extra tests on linus/master
# bad: [455e73a07f6e288b0061dfcf4fcf54fa9fe06458] Merge tag 'clk-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/clk/linux
# extra tests on linux-next/master
# bad: [27c9d5b3c24af29de643533984f1ba3e650c7c78] Add linux-next specific files for 20220113
# extra tests on fix commit
# bad: [651740a502411793327e2f0741104749c4eedcd1] btrfs: check WRITE_ERR when trying to read an extent buffer
)


Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: c2e39305299f0118298c2201f6d6cc7d3485f29e ("btrfs: clear extent buffer uptodate when we fail to write it")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

in testcase: xfstests
version: xfstests-x86_64-972d710-1_20220111
with following parameters:

	disk: 4HDD
	fs: btrfs
	test: generic-group-23
	ucode: 0xe2

test-description: xfstests is a regression test suite for xfs and other files ystems.
test-url: git://git.kernel.org/pub/scm/fs/xfs/xfstests-dev.git


on test machine: 4 threads Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz with 32G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>



[  124.802690][ T8441] ------------[ cut here ]------------
[  124.810264][ T8441] WARNING: CPU: 0 PID: 8441 at fs/btrfs/block-group.c:127 btrfs_put_block_group+0x15c/0x200 [btrfs]
[  124.823140][ T8441] Modules linked in: dm_mod btrfs blake2b_generic xor zstd_compress raid6_pq libcrc32c sd_mod t10_pi sg ipmi_devintf ipmi_msghandler intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp coretemp mei_wdt wmi_bmof kvm_intel i915 joydev kvm irqbypass crct10dif_pclmul ahci crc32_pclmul crc32c_intel ghash_clmulni_intel rapl intel_cstate intel_gtt ttm libahci drm_kms_helper syscopyarea sysfillrect mei_me sysimgblt intel_uncore libata fb_sys_fops mei intel_pch_thermal drm wmi video acpi_pad intel_pmc_core ip_tables
[  124.880435][ T8441] CPU: 0 PID: 8441 Comm: umount Tainted: G          I       5.15.0-rc7-00150-gc2e39305299f #1
[  124.892975][ T8441] Hardware name: Dell Inc. OptiPlex 7040/0Y7WYT, BIOS 1.1.1 10/07/2015
[  124.903439][ T8441] RIP: 0010:btrfs_put_block_group+0x15c/0x200 [btrfs]
[  124.912516][ T8441] Code: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 8b 00 00 00 48 8b bd 48 02 00 00 e8 af e4 be c0 48 89 ef 5d 41 5c e9 a4 e4 be c0 <0f> 0b e9 2e ff ff ff 0f 0b e9 fd fe ff ff 4c 89 e7 5d be 03 00 00
[  124.936699][ T8441] RSP: 0018:ffffc9000aedfc88 EFLAGS: 00010206
[  124.945050][ T8441] RAX: dffffc0000000000 RBX: dffffc0000000000 RCX: ffffffffc0c9bedf
[  124.955250][ T8441] RDX: 1ffff1102703a006 RSI: 0000000000000004 RDI: ffff8881381d0030
[  124.965446][ T8441] RBP: ffff8881381d0000 R08: 0000000000000001 R09: ffffed102703a01f
[  124.975616][ T8441] R10: ffff8881381d00f3 R11: ffffed102703a01e R12: ffff8881381d00f0
[  124.985809][ T8441] R13: ffff8881381d0000 R14: ffff88885bde2098 R15: ffff8881381d00c8
[  124.995975][ T8441] FS:  00007fcba0daa080(0000) GS:ffff888724000000(0000) knlGS:0000000000000000
[  125.007116][ T8441] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  125.015903][ T8441] CR2: 00007fcba11269f0 CR3: 000000086534a001 CR4: 00000000003706f0
[  125.026085][ T8441] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  125.036265][ T8441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  125.046347][ T8441] Call Trace:
[  125.051798][ T8441]  btrfs_free_block_groups+0x5eb/0xf00 [btrfs]
[  125.060184][ T8441]  close_ctree+0x562/0x605 [btrfs]
[  125.067491][ T8441]  ? btrfs_start_pre_rw_mount.cold+0x100/0x100 [btrfs]
[  125.076496][ T8441]  ? mutex_unlock+0x40/0x100
[  125.083171][ T8441]  ? __mutex_unlock_slowpath+0x300/0x300
[  125.091482][ T8441]  ? wait_rcu_exp_gp+0x40/0x40
[  125.098310][ T8441]  generic_shutdown_super+0x136/0x340
[  125.105798][ T8441]  kill_anon_super+0x36/0x80
[  125.112489][ T8441]  btrfs_kill_super+0x38/0x80 [btrfs]
[  125.119964][ T8441]  deactivate_locked_super+0x85/0x100
[  125.127353][ T8441]  cleanup_mnt+0x2bc/0x480
[  125.133802][ T8441]  task_work_run+0xdb/0x180
[  125.140273][ T8441]  exit_to_user_mode_prepare+0x205/0x240
[  125.147885][ T8441]  syscall_exit_to_user_mode+0x12/0x40
[  125.155261][ T8441]  do_syscall_64+0x48/0xc0
[  125.161626][ T8441]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[  125.169391][ T8441] RIP: 0033:0x7fcba11d0507
[  125.175660][ T8441] Code: 19 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 59 19 0c 00 f7 d8 64 89 01 48
[  125.199102][ T8441] RSP: 002b:00007ffc7df36bb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[  125.209405][ T8441] RAX: 0000000000000000 RBX: 00005617a5168970 RCX: 00007fcba11d0507
[  125.219282][ T8441] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 00005617a5168b80
[  125.229142][ T8441] RBP: 0000000000000000 R08: 00005617a5168ba0 R09: 00007fcba1251e80
[  125.238986][ T8441] R10: 0000000000000000 R11: 0000000000000246 R12: 00005617a5168b80
[  125.248846][ T8441] R13: 00007fcba12f61c4 R14: 00005617a5168a68 R15: 0000000000000000
[  125.258673][ T8441] ---[ end trace 472f488092ad402d ]---
[  125.266186][ T8441] ------------[ cut here ]------------
[  125.273583][ T8441] WARNING: CPU: 1 PID: 8441 at fs/btrfs/block-group.c:3981 btrfs_free_block_groups+0x7e6/0xf00 [btrfs]
[  125.286545][ T8441] Modules linked in: dm_mod btrfs blake2b_generic xor zstd_compress raid6_pq libcrc32c sd_mod t10_pi sg ipmi_devintf ipmi_msghandler intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp coretemp mei_wdt wmi_bmof kvm_intel i915 joydev kvm irqbypass crct10dif_pclmul ahci crc32_pclmul crc32c_intel ghash_clmulni_intel rapl intel_cstate intel_gtt ttm libahci drm_kms_helper syscopyarea sysfillrect mei_me sysimgblt intel_uncore libata fb_sys_fops mei intel_pch_thermal drm wmi video acpi_pad intel_pmc_core ip_tables
[  125.343092][ T8441] CPU: 1 PID: 8441 Comm: umount Tainted: G        W I       5.15.0-rc7-00150-gc2e39305299f #1
[  125.355381][ T8441] Hardware name: Dell Inc. OptiPlex 7040/0Y7WYT, BIOS 1.1.1 10/07/2015
[  125.365758][ T8441] RIP: 0010:btrfs_free_block_groups+0x7e6/0xf00 [btrfs]
[  125.374877][ T8441] Code: 00 4d 89 ec 48 8b 85 98 06 00 00 49 be 00 00 00 00 00 fc ff df 49 c1 ec 03 4d 01 f4 49 39 c5 0f 85 03 01 00 00 e9 7c 01 00 00 <0f> 0b 31 c9 31 d2 4c 89 fe 48 89 ef e8 c9 88 fe ff 48 8d 7b 40 48
[  125.399168][ T8441] RSP: 0018:ffffc9000aedfca0 EFLAGS: 00010206
[  125.407369][ T8441] RAX: 1ffff11021576304 RBX: ffff88810abb1870 RCX: ffff88810abb3800
[  125.417462][ T8441] RDX: 0000000000000028 RSI: ffff8881040b30b8 RDI: ffff88810abb1820
[  125.427555][ T8441] RBP: ffff88885bde2000 R08: 000000008d12fd33 R09: ffffed10e4816115
[  125.437604][ T8441] R10: ffff8887240b08a3 R11: ffffed10e4816114 R12: ffffed110b7bc4d3
[  125.447651][ T8441] R13: ffff88885bde2698 R14: dffffc0000000000 R15: ffff88810abb1800
[  125.457665][ T8441] FS:  00007fcba0daa080(0000) GS:ffff888724080000(0000) knlGS:0000000000000000
[  125.468604][ T8441] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  125.477195][ T8441] CR2: 00007f99d9138000 CR3: 000000086534a001 CR4: 00000000003706e0
[  125.487079][ T8441] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  125.496919][ T8441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  125.506826][ T8441] Call Trace:
[  125.512016][ T8441]  close_ctree+0x562/0x605 [btrfs]
[  125.519043][ T8441]  ? btrfs_start_pre_rw_mount.cold+0x100/0x100 [btrfs]
[  125.527798][ T8441]  ? mutex_unlock+0x40/0x100
[  125.534206][ T8441]  ? __mutex_unlock_slowpath+0x300/0x300
[  125.542235][ T8441]  ? wait_rcu_exp_gp+0x40/0x40
[  125.548839][ T8441]  generic_shutdown_super+0x136/0x340
[  125.556013][ T8441]  kill_anon_super+0x36/0x80
[  125.562410][ T8441]  btrfs_kill_super+0x38/0x80 [btrfs]
[  125.569634][ T8441]  deactivate_locked_super+0x85/0x100
[  125.576696][ T8441]  cleanup_mnt+0x2bc/0x480
[  125.582867][ T8441]  task_work_run+0xdb/0x180
[  125.589080][ T8441]  exit_to_user_mode_prepare+0x205/0x240
[  125.596418][ T8441]  syscall_exit_to_user_mode+0x12/0x40
[  125.603645][ T8441]  do_syscall_64+0x48/0xc0
[  125.609754][ T8441]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[  125.617353][ T8441] RIP: 0033:0x7fcba11d0507
[  125.623493][ T8441] Code: 19 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 59 19 0c 00 f7 d8 64 89 01 48
[  125.646695][ T8441] RSP: 002b:00007ffc7df36bb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[  125.656891][ T8441] RAX: 0000000000000000 RBX: 00005617a5168970 RCX: 00007fcba11d0507
[  125.666668][ T8441] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 00005617a5168b80
[  125.676483][ T8441] RBP: 0000000000000000 R08: 00005617a5168ba0 R09: 00007fcba1251e80
[  125.686246][ T8441] R10: 0000000000000000 R11: 0000000000000246 R12: 00005617a5168b80
[  125.696059][ T8441] R13: 00007fcba12f61c4 R14: 00005617a5168a68 R15: 0000000000000000
[  125.705877][ T8441] ---[ end trace 472f488092ad402e ]---



To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        sudo bin/lkp install job.yaml           # job file is attached in this email
        bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
        sudo bin/lkp run generated-yaml-file

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



---
0DAY/LKP+ Test Infrastructure                   Open Source Technology Center
https://lists.01.org/hyperkitty/list/lkp@lists.01.org       Intel Corporation

Thanks,
Oliver Sang


View attachment "config-5.15.0-rc7-00150-gc2e39305299f" of type "text/plain" (176678 bytes)

View attachment "job-script" of type "text/plain" (5623 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (40596 bytes)

View attachment "xfstests" of type "text/plain" (1516 bytes)

View attachment "job.yaml" of type "text/plain" (4774 bytes)

View attachment "reproduce" of type "text/plain" (871 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ