lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202210111304.d369bc32-yujie.liu@intel.com>
Date:   Tue, 11 Oct 2022 13:40:35 +0800
From:   kernel test robot <yujie.liu@...el.com>
To:     Stefan Roesch <shr@...com>
CC:     <lkp@...ts.01.org>, <lkp@...el.com>,
        David Sterba <dsterba@...e.com>,
        Filipe Manana <fdmanana@...e.com>,
        <linux-kernel@...r.kernel.org>, <linux-btrfs@...r.kernel.org>
Subject: [btrfs] 926078b21d:
 WARNING:at_fs/btrfs/inode.c:#btrfs_destroy_inode[btrfs]

Greeting,

FYI, we noticed the following commit (built with gcc-11):

commit: 926078b21db91b72b444277fdc2166914cf113fc ("btrfs: enable nowait async buffered writes")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

in testcase: fio-basic
version: fio-x86_64-3.15-1_20221001
with following parameters:

	disk: 2pmem
	fs: btrfs
	runtime: 200s
	nr_task: 50%
	time_based: tb
	rw: randwrite
	bs: 2M
	ioengine: io_uring
	test_size: 100G
	cpufreq_governor: performance

test-description: Fio is a tool that will spawn a number of threads or processes doing a particular type of I/O action as specified by the user.
test-url: https://github.com/axboe/fio

on test machine: 96 threads 2 sockets Intel(R) Xeon(R) Gold 6252 CPU @ 2.10GHz (Cascade Lake) with 512G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


[  249.065437][T12271] ------------[ cut here ]------------
[  249.071222][T12271] WARNING: CPU: 0 PID: 12271 at fs/btrfs/inode.c:8854 btrfs_destroy_inode+0x1e5/0x240 [btrfs]
[  249.081746][T12271] Modules linked in: dm_mod intel_rapl_msr intel_rapl_common btrfs blake2b_generic xor raid6_pq zstd_compress libcrc32c sd_mod t10_pi crc64_rocksoft_generic crc64_rocksoft skx_edac crc64 nfit ast sg drm_vram_helper x86_pkg_temp_thermal drm_ttm_helper intel_powerclamp coretemp kvm_intel ipmi_ssif nd_pmem kvm irqbypass crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel nd_btt dax_pmem ttm rapl drm_kms_helper ahci intel_cstate nd_e820 syscopyarea libahci sysfillrect acpi_ipmi mei_me sysimgblt libnvdimm ipmi_si intel_uncore fb_sys_fops mei ioatdma libata ipmi_devintf joydev intel_pch_thermal dca wmi ipmi_msghandler acpi_pad acpi_power_meter drm fuse ip_tables
[  249.144374][T12271] CPU: 0 PID: 12271 Comm: umount Not tainted 6.0.0-rc7-00162-g926078b21db9 #1
[  249.153440][T12271] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019
[  249.164933][T12271] RIP: 0010:btrfs_destroy_inode+0x1e5/0x240 [btrfs]
[  249.171788][T12271] Code: 4c 89 ef e8 3d a7 fe ff e9 68 ff ff ff 0f 0b 48 83 bb f8 01 00 00 00 0f 84 68 fe ff ff 0f 0b 48 83 7b 80 00 0f 84 66 fe ff ff <0f> 0b 48 83 bb 78 ff ff ff 00 0f 84 64 fe ff ff 0f 0b 8b 93 70 ff
[  249.191956][T12271] RSP: 0018:ffffc9002ee4fd90 EFLAGS: 00010206
[  249.198243][T12271] RAX: 0000000000000000 RBX: ffff8881beccce88 RCX: 0000000080330026
[  249.206444][T12271] RDX: 0000000000031b00 RSI: 0000000000000001 RDI: ffff8881beccce88
[  249.214644][T12271] RBP: ffff8881becccc80 R08: 0000000000000001 R09: ffffffff828076c8
[  249.222832][T12271] R10: ffff8881c8e0a300 R11: ffff8881013f2fe8 R12: ffff88c08966b000
[  249.231020][T12271] R13: ffff88c088d19090 R14: ffff88810d3d0c30 R15: ffff8881becccb10
[  249.239208][T12271] FS:  00007f70ee4b5840(0000) GS:ffff88c04f600000(0000) knlGS:0000000000000000
[  249.248343][T12271] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  249.255142][T12271] CR2: 0000557de3e5ae58 CR3: 0000001d68292001 CR4: 00000000007706f0
[  249.263330][T12271] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  249.271503][T12271] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  249.279685][T12271] PKRU: 55555554
[  249.283438][T12271] Call Trace:
[  249.286929][T12271]  <TASK>
[  249.290067][T12271]  destroy_inode+0x38/0x80
[  249.294676][T12271]  dispose_list+0x48/0x80
[  249.299192][T12271]  evict_inodes+0x17c/0x200
[  249.303888][T12271]  generic_shutdown_super+0x37/0x140
[  249.309346][T12271]  kill_anon_super+0x14/0x40
[  249.314105][T12271]  btrfs_kill_super+0x12/0x40 [btrfs]
[  249.319660][T12271]  deactivate_locked_super+0x2e/0xc0
[  249.325098][T12271]  cleanup_mnt+0x100/0x180
[  249.329670][T12271]  task_work_run+0x62/0xc0
[  249.334244][T12271]  exit_to_user_mode_loop+0x122/0x140
[  249.339776][T12271]  exit_to_user_mode_prepare+0x8d/0x100
[  249.345471][T12271]  syscall_exit_to_user_mode+0x12/0x40
[  249.351083][T12271]  do_syscall_64+0x48/0xc0
[  249.355651][T12271]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  249.361677][T12271] RIP: 0033:0x7f70ee6f3b27
[  249.366239][T12271] Code: 23 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 39 23 0d 00 f7 d8 64 89 01 48
[  249.386264][T12271] RSP: 002b:00007ffdaa01d1e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[  249.394830][T12271] RAX: 0000000000000000 RBX: 00007f70ee828264 RCX: 00007f70ee6f3b27
[  249.402950][T12271] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055ef5a95e370
[  249.411066][T12271] RBP: 000055ef5a95e140 R08: 0000000000000000 R09: 00007ffdaa01bf90
[  249.419186][T12271] R10: 000055ef5a95e390 R11: 0000000000000246 R12: 0000000000000000
[  249.427301][T12271] R13: 000055ef5a95e370 R14: 000055ef5a95e250 R15: 0000000000000000
[  249.435406][T12271]  </TASK>
[  249.438562][T12271] ---[ end trace 0000000000000000 ]---


If you fix the issue, kindly add following tag
| Reported-by: kernel test robot <yujie.liu@...el.com>
| Link: https://lore.kernel.org/all/202210111304.d369bc32-yujie.liu@intel.com


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        sudo bin/lkp install job.yaml           # job file is attached in this email
        bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
        sudo bin/lkp run generated-yaml-file

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.


-- 
0-DAY CI Kernel Test Service
https://01.org/lkp

View attachment "config-6.0.0-rc7-00162-g926078b21db9" of type "text/plain" (163959 bytes)

View attachment "job-script" of type "text/plain" (8705 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (57176 bytes)

View attachment "job.yaml" of type "text/plain" (5868 bytes)

View attachment "reproduce" of type "text/plain" (916 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ