Received: by 10.213.65.68 with SMTP id h4csp969012imn; Sat, 31 Mar 2018 15:04:21 -0700 (PDT) X-Google-Smtp-Source: AIpwx4925/zdnNvAYixR+Zdq/I8oL9MLIAQVQoFGKmgAw2OB8sYZ4yp9tFonkvUDwKSc5VwCbXOw X-Received: by 10.99.138.202 with SMTP id y193mr2700149pgd.224.1522533861330; Sat, 31 Mar 2018 15:04:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522533861; cv=none; d=google.com; s=arc-20160816; b=FfHSyHZrS3d8bW59wfnKLYY/wmzOT+j4MEo2JIxac/XmdIaVDFQcmujck47LW1yJgk ws3GnhF6vb9Xokjvv1ShLyCRSESRS0X8UevQlhb1y9StR2ioxYiTIITGlSChIpBai3+8 Q/BZxAH5DHry4fPHV7ZDryjIQSKzxpPdAq7chIyPtPF+7f7ZPOyfX+m141dURPD4vVBZ qUXUvBODDNt4AByzC961t79ne3HBfHa+CQ5aZg9i4Qy49v1K19G/K734e2XS+nDjqEEi KMM7Gv9aGqwXOUChzAcpQEwRvkrKhN1dZmjq6F2T6n6xuJ4WKAFSDeKssx6oSGjsrTrN 6xKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=c0aHYuNJSwS/Z0Ua6moBuEWrZjTd4NSXWizlqWo+gts=; b=ZsXjV3FyppXqVg3DX9WjtlCL9ocswyiF67JZqQUHsdYh3C93Pu9tHOs8CtLbLCFvKY tzuqbfbaLHq8EvUe2N6GIBQaM+5E8bPK8AqCuiypJJYDf5dK5Z+HE33bhb3UAuzpRfoa pq//Px4sMfAbPIN4GOv7G5u3UKKPMo/qk89ahKeWzMugcF0GDQ+2S4PL4lj2zZh3vo0m kxvYGov71jozMybGgcxaHuqzxvsqt67tdUInRdmkzcD1+2oTF1se2zYqDiJtjUWvcxja y26DFtAJuw6irhUNfKZNNizacKJLt3g8/oE+HZppY6X+7OhaZtY+u4RQ7lItfyhscRSf yK6w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i81si8605796pfd.261.2018.03.31.15.04.07; Sat, 31 Mar 2018 15:04:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752827AbeCaWCv (ORCPT + 99 others); Sat, 31 Mar 2018 18:02:51 -0400 Received: from ipmail06.adl2.internode.on.net ([150.101.137.129]:13318 "EHLO ipmail06.adl2.internode.on.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752366AbeCaWCt (ORCPT ); Sat, 31 Mar 2018 18:02:49 -0400 Received: from ppp59-167-129-252.static.internode.on.net (HELO dastard) ([59.167.129.252]) by ipmail06.adl2.internode.on.net with ESMTP; 01 Apr 2018 07:32:46 +0930 Received: from dave by dastard with local (Exim 4.80) (envelope-from ) id 1f2OaD-0001gA-PD; Sun, 01 Apr 2018 08:02:45 +1000 Date: Sun, 1 Apr 2018 08:02:45 +1000 From: Dave Chinner To: Sasha Levin Cc: Sasha Levin , "Luis R. Rodriguez" , "Darrick J. Wong" , Christoph Hellwig , xfs , "linux-kernel@vger.kernel.org List" , Greg Kroah-Hartman , Julia Lawall , Josh Triplett , Takashi Iwai , Michal Hocko , Joerg Roedel Subject: Re: [PATCH] xfs: always free inline data before resetting inode fork during ifree Message-ID: <20180331220245.GG1150@dastard> References: <20180323034145.GH4818@magnolia> <20180323170813.GD30543@wotan.suse.de> <20180323172620.GK4818@magnolia> <20180323182302.GB9190@wotan.suse.de> <20180325223357.GJ18129@dastard> <20180328033228.GA18129@dastard> <20180328193004.GB7561@sasha-vm> <20180328230535.GE18129@dastard> <20180330024704.GE7561@sasha-vm> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180330024704.GE7561@sasha-vm> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 30, 2018 at 02:47:05AM +0000, Sasha Levin wrote: > On Thu, Mar 29, 2018 at 10:05:35AM +1100, Dave Chinner wrote: > >On Wed, Mar 28, 2018 at 07:30:06PM +0000, Sasha Levin wrote: > > This commit has been processed by the -stable helper bot and determined > > to be a high probability candidate for -stable trees. (score: 6.4845) > > > > The bot has tested the following trees: v4.15.12, v4.14.29, v4.9.89, v4.4.123, v4.1.50, v3.18.101. > > > > v4.15.12: Build OK! > > v4.14.29: Build OK! > > v4.9.89: Build OK! > > v4.4.123: Build OK! > > v4.1.50: Build OK! > > v3.18.101: Build OK! > > > > XFS Specific tests: > > > > v4.15.12 (http://stable-bot.westus2.cloudapp.azure.com/test/v4.15.12/tests/): > > No tests completed! Can you capture the actual check command output into it's own file? That tells us at a glance which tests succeed or failed. So I'm looking at the v5.log file: .... echo 'export MKFS_OPTIONS='\''-m crc=0,reflink=0,rmapbt=0, -i sparse=0,'\''' .... FSTYP -- xfs (debug) PLATFORM -- Linux/x86_64 autosel 4.15.12+ MKFS_OPTIONS -- -f -m crc=0,reflink=0,rmapbt=0, -i sparse=0, /dev/vdb MOUNT_OPTIONS -- /dev/vdb /mnt2 That's not testing v5 filesystems. That's turned off crcs, and so is testing a v4 filesystem. You'll see this on filesysetms that don't support reflink: [not run] Reflink not supported by test filesystem type: xfs Also, you need to make the test filesystem to match the options the test run is configured with (i.e. v4, v5, reflink, etc) otherwise half the tests don't exercise the expected config. [not run] src/dbtest not built [not run] chacl command not found [not run] xfs_io set_encpolicy support is missing You need to update your userspace. And the test run has not completed. It's run to: generic/430 [11172.480621] run fstests generic/430 at 2018-03-30 00:20:12 + scp -i /home/sasha/ssh/id_rsa -P 10022 -r root@10.3.38.7:/root/xfstests-dev/results /home/sasha/data/results/test/v4.15.12/tests//v5/ + az vm delete -y --resource-group sasha-auto-stable --name sasha-worker-629016242-vm generic/430 and then stopped. There's still another ~50 tests in the generic group to run, and then there's the shared and XFS subdirs to run, too. So there's still something wrong in the way you are setting up/installing fstests here.... > > v4.14.29 (http://stable-bot.westus2.cloudapp.azure.com/test/v4.14.29/tests/): > > No tests completed! > > v4.9.89 (http://stable-bot.westus2.cloudapp.azure.com/test/v4.9.89/tests/): > > No tests completed! > > v4.4.123 (http://stable-bot.westus2.cloudapp.azure.com/test/v4.4.123/tests/): > > v4: > > Thu Mar 29 21:23:57 UTC 2018 > > Interrupted! > > Passed all 0 tests > > v4_reflink: There's no such configuration as "v4 reflink". reflink is only available on v5 (crc enabled) filesystems on kernels >=4.10 (IIRC). Perhaps you've mislabelled them? > Let me know if this would be good enough for now, and if there's > anything else to add that'll be useful. > > This brings me to the sad part of this mail: not a single stable kernel > survived a run. Most are paniced, some are hanging, and some were killed > because of KASan. > > All have hit various warnings in fs/iomap.c, Normal - the dmesg filter in the test harness catches those and ignores them if they are known/expected to occur. > and kernels accross several > versions hit the BUG at fs/xfs/xfs_message.c:113 (+-1 line) That's an ASSERT() failure, indicating a fatal error. e.g: Stuff like this (from http://stable-bot.westus2.cloudapp.azure.com/test/v4.9.89/tests/v4_reflink.log) ..... generic/083 [ 4443.536212] run fstests generic/083 at 2018-03-29 22:32:17 [ 4444.557989] XFS (vdb): Unmounting Filesystem [ 4445.498461] XFS (vdb): EXPERIMENTAL reverse mapping btree feature enabled. Use at your own risk! [ 4445.505860] XFS (vdb): EXPERIMENTAL reflink feature enabled. Use at your own risk! [ 4445.513090] XFS (vdb): Mounting V5 Filesystem [ 4445.531284] XFS (vdb): Ending clean mount [ 4458.087406] XFS: Assertion failed: xfs_is_reflink_inode(ip), file: fs/xfs/xfs_reflink.c, line: 509 [snip stack trace] Indicate a problem that should not be occurring. It's debug an triage time - there's some problem that needs backports to fix. I doubt anyone in XFS land has time to do this on top of everything else we alreayd have to do... > 4.15.12 is hitting a use-after-free in xfs_efi_release(). Debug and triage time. > 4.14.29 and 4.9.89 seems to end up with corrupted memory (KASAN > warnings) at or before generic/027. More debug and triage time. > And finally, 3.18.101 is pretty unhappy with sleeping functions called > from atomic context. Needle in a haystack :/ So this is just basic XFS validation, and it's throwing problems up all over the place. Now do you see why we've been saying maintaining stable backports for XFS is pretty much a full time job for someone? And keep in mind this is just one filesystem. You're going to end up with the same issues on ext4 and btrfs - the regression tests are going to show up all sorts of problems that have been fixed in the upstream kernels but never backported.... Cheers, Dave. -- Dave Chinner david@fromorbit.com