Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2122970imm; Tue, 10 Jul 2018 13:45:21 -0700 (PDT) X-Google-Smtp-Source: AAOMgpeTZNIZctq2Z2zDgu2WYVhUSJF1dWqWkezi1hhjntYLCrE8Hls/Dixl4l1DCLmZo2w2gjb0 X-Received: by 2002:a62:1e81:: with SMTP id e123-v6mr26964275pfe.188.1531255521660; Tue, 10 Jul 2018 13:45:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531255521; cv=none; d=google.com; s=arc-20160816; b=Mog+18PMsoA5axUS8lLF1vyS13YIics0ZUVLq2SpTMQcDeMZW3609BxKRRiHa9pauG aEqlwJ6IgVukzvj5WeHjuMfh94FmTBSWpjwju/f2wAb89+3XNQpTTgUg+l45bIHZifZB 9x5LGQoK7z8Y4Yv+tAOhu5yuh8n2LstOs73lz3RQTSoVGxImwP4GJrBUGYIDG+AxgGwK wnMfT4C5IdTpuJCWuYgNfhQH2GZSpCmlBBkyqF0C0dea0netIkkJWGMO5ccQRqXb0M43 HlAJOk/KBBVKMTsLCDrpBNGRtLBkJc3kB4evNpC0hbWlhp7Yc1RYFdHMYrlfuwNhvlXi hQYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:to :from:date:arc-authentication-results; bh=IxtGK8IJxwCMHumwFY1UBnmON+nNrfmJh6GqQyDV/UY=; b=Yhmlk20m7xQ80h/qgIVhMDssOK6iLc8beIOJAWjD49gH4b1sOcflIGPzLqOf6irL/I Rg+Q5Kz/EhaomzIfs/m/qUnH4KXwSpmt4QvHwD7yx53UsuLAGBRdDw1RjWtVRMKsa/4E 54NZCIuBhhZ/bHj9fcC2gZcHeqm+/NC/jWVoihHgiM/8iG0UkRY5S8xorKsfet+d8P7Q bGxryiFGc9bejLBgdVHvQ4RxymGFh68bo8orQixXZzEfNk45BEMgBTeN30klEQEMS7o1 B9LauzB3+8kEAsPCCnvcOfUVYF8xYZxaluCVxVqe/v3Qz3c1Evt7KGhwQlpMO3kvGJ0/ 9rtA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v1-v6si16428621pgr.469.2018.07.10.13.45.06; Tue, 10 Jul 2018 13:45:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732364AbeGJUoU (ORCPT + 99 others); Tue, 10 Jul 2018 16:44:20 -0400 Received: from complete.lackof.org ([198.49.126.79]:38868 "EHLO complete.lackof.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732263AbeGJUoT (ORCPT ); Tue, 10 Jul 2018 16:44:19 -0400 Received: from localhost (c-73-78-137-212.hsd1.co.comcast.net [73.78.137.212]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by complete.lackof.org (Postfix) with ESMTPSA id EBE1133E0027; Tue, 10 Jul 2018 14:43:29 -0600 (MDT) Date: Tue, 10 Jul 2018 14:43:29 -0600 From: dann frazier To: "Theodore Y. Ts'o" , linux-ext4@vger.kernel.org, linux-kernel@vger.kernel.org, yanaijie@huawei.com, colin.king@canonical.com, kamal.mostafa@canonical.com, ike.pan@canonical.com Subject: Re: [Bisect] ext4_validate_inode_bitmap:98: comm stress-ng: Corrupt inode bitmap Message-ID: <20180710204329.GB20459@xps13.dannf> References: <20180706174324.GA3049@xps13.dannf> <20180707041018.GB3546@thunk.org> <20180710165143.GA20459@xps13.dannf> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180710165143.GA20459@xps13.dannf> User-Agent: Mutt/1.10.0 (2018-05-17) X-Virus-Scanned: clamav-milter 0.100.0 at complete.lackof.org X-Virus-Status: Clean X-Spam-Status: No, score=0.2 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on complete.lackof.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 10, 2018 at 10:51:43AM -0600, dann frazier wrote: > On Sat, Jul 07, 2018 at 12:10:18AM -0400, Theodore Y. Ts'o wrote: > > On Fri, Jul 06, 2018 at 11:43:24AM -0600, dann frazier wrote: > > > Hi, > > > We're seeing a regression triggered by the stress-ng[*] "chdir" test > > > that I've bisected to: > > > > > > 044e6e3d74a3 ext4: don't update checksum of new initialized bitmaps > > > > > > So far we've only seen failures on servers based on HiSilicon's family > > > of ARM64 SoCs (D05/Hi1616 SoC, D06/Hi1620 SoC). On these systems it is > > > very reproducible. > > > > Thanks for the report. Can you verify whether or not this patch fixes > > things for you? > > hey Ted, > Sorry for the delayed response - was afk for a long weekend. > Your patch does seem to fix the issue for me - after applying the > patch, I was able to survive 20 iterations (and counting), where > previously it would always fail the first time. > > However, I've received a conflicting report from a colleague who > appears to still be seeing errors. I'll get back to you ASAP once I am > able to (in-?)validate that observation. OK - I believe I found an explanation for my colleague's continued test failures after applying the patch. The filesystem being used may have already been corrupted from a previous run, and the test w/ your patch just tripped over it. Details are here starting in comment #9 if you'd like to look them over: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1780137 -dann