Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1924794imm; Tue, 10 Jul 2018 10:04:43 -0700 (PDT) X-Google-Smtp-Source: AAOMgpeCUe6KYgMCuFqYS+OsAStBBqdttrrfcCiPRLRQyhbQehokE1pzVcppFkYa749AF5xuen+y X-Received: by 2002:a63:5d58:: with SMTP id o24-v6mr22068760pgm.349.1531242283029; Tue, 10 Jul 2018 10:04:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531242282; cv=none; d=google.com; s=arc-20160816; b=kBCm6n0W347rAKaec/BW5Eu8pcj9CLEebkJ7pD49MIJxytRkVjWIInJXQqrdlUVVoE 2SVJQeKE2YQhfC9RicV+hKEap+hWTGFdhXYEHnCscKX1NdSH0AXHFeAYDXjbW+iLe0ky dsFC5vaQdxeqCXfDlUJ5haYqC30quSqAAMOL+LM1mSfUeN9SL2dsEAOxLEMjtptSXhhv fovgrRwt68Xjk3e+VIcX3TlDSCi4vKj9UuTBNkgzf77XhorHhZkhPnkFmFk8S46SYNO0 PULPS1MtcvvBhUikc3o7XhomMdI3Z0V7g2APdUHbozdazs+H1FAsBDRCEIhAZ9UGvC8m nEug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:to :from:date:arc-authentication-results; bh=3mndQoYi14B369Wpm0UYVgYVBnj9/cNyxoFcn+YEq3s=; b=alJAduDQsCWQY/Cg91uGJaXPBikU9N4azexy9jatVs9K8+cYwozF7BD0J7BR4B2uJj aqqQLjalgQHAnMSVOT6DISZ3CzTTh35pGEs5yu/NkuPEs2BHsms+tjj57kI5wMgPaOad kENkiJz72KmW9SUbK6e1GQzdG4igS2M/DOKIMyVbnXqkJV/olZ/yLYmcUUat7wuKck5i wFsF668TE3b/YS5rKeiMnM3D+AjNApIKJ+zhUzlNVyPF/uBdKKjB3gikWytZYyTl8b2V 2MeyxRf/uPyInS1eggH2BPAcazrQ6O5/4OxWGsVVT8IQufF4J+MCIt+Pq0jfCODpDmS5 4dVA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e9-v6si17686261plk.130.2018.07.10.10.04.26; Tue, 10 Jul 2018 10:04:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934714AbeGJQvr (ORCPT + 99 others); Tue, 10 Jul 2018 12:51:47 -0400 Received: from complete.lackof.org ([198.49.126.79]:35750 "EHLO complete.lackof.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933256AbeGJQvp (ORCPT ); Tue, 10 Jul 2018 12:51:45 -0400 Received: from localhost (c-73-78-137-212.hsd1.co.comcast.net [73.78.137.212]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by complete.lackof.org (Postfix) with ESMTPSA id BE3A433E0027; Tue, 10 Jul 2018 10:51:43 -0600 (MDT) Date: Tue, 10 Jul 2018 10:51:43 -0600 From: dann frazier To: "Theodore Y. Ts'o" , linux-ext4@vger.kernel.org, linux-kernel@vger.kernel.org, yanaijie@huawei.com, colin.king@canonical.com, kamal.mostafa@canonical.com, ike.pan@canonical.com Subject: Re: [Bisect] ext4_validate_inode_bitmap:98: comm stress-ng: Corrupt inode bitmap Message-ID: <20180710165143.GA20459@xps13.dannf> References: <20180706174324.GA3049@xps13.dannf> <20180707041018.GB3546@thunk.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180707041018.GB3546@thunk.org> User-Agent: Mutt/1.10.0 (2018-05-17) X-Virus-Scanned: clamav-milter 0.100.0 at complete.lackof.org X-Virus-Status: Clean X-Spam-Status: No, score=0.2 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on complete.lackof.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jul 07, 2018 at 12:10:18AM -0400, Theodore Y. Ts'o wrote: > On Fri, Jul 06, 2018 at 11:43:24AM -0600, dann frazier wrote: > > Hi, > > We're seeing a regression triggered by the stress-ng[*] "chdir" test > > that I've bisected to: > > > > 044e6e3d74a3 ext4: don't update checksum of new initialized bitmaps > > > > So far we've only seen failures on servers based on HiSilicon's family > > of ARM64 SoCs (D05/Hi1616 SoC, D06/Hi1620 SoC). On these systems it is > > very reproducible. > > Thanks for the report. Can you verify whether or not this patch fixes > things for you? hey Ted, Sorry for the delayed response - was afk for a long weekend. Your patch does seem to fix the issue for me - after applying the patch, I was able to survive 20 iterations (and counting), where previously it would always fail the first time. However, I've received a conflicting report from a colleague who appears to still be seeing errors. I'll get back to you ASAP once I am able to (in-?)validate that observation. -dann > - Ted > > diff --git a/fs/ext4/ialloc.c b/fs/ext4/ialloc.c > index da6c10c1e37a..1cfb74bc4dca 100644 > --- a/fs/ext4/ialloc.c > +++ b/fs/ext4/ialloc.c > @@ -90,6 +90,8 @@ static int ext4_validate_inode_bitmap(struct super_block *sb, > return -EFSCORRUPTED; > > ext4_lock_group(sb, block_group); > + if (buffer_verified(bh)) > + goto verified; > blk = ext4_inode_bitmap(sb, desc); > if (!ext4_inode_bitmap_csum_verify(sb, block_group, desc, bh, > EXT4_INODES_PER_GROUP(sb) / 8)) { > @@ -101,6 +103,7 @@ static int ext4_validate_inode_bitmap(struct super_block *sb, > return -EFSBADCRC; > } > set_buffer_verified(bh); > +verified: > ext4_unlock_group(sb, block_group); > return 0; > }