Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp572715ybe; Wed, 11 Sep 2019 01:06:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqwAyCJ7xc1Edx2MdYSMpYc8vWqgRz6U4iv494bR8ezRHHEIfJEEJ9IihqT59T/Tg+6vZawG X-Received: by 2002:a17:906:6b0f:: with SMTP id q15mr28473342ejr.200.1568189186221; Wed, 11 Sep 2019 01:06:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568189186; cv=none; d=google.com; s=arc-20160816; b=pAhviDK0H4S5CvbVamchFGoXpONQoQB9hRdJ0uU8Go0J0SjixHFMO+3JG2TXr9gn+e iAwB1l4DhosmZxHpE8Lio70vNU14TtAHtsNhUBC01S9giLRl7zsG0LON2BfHjR3QX82l M8hahkREU2BTKirIwooyurWRJUQhQxX4dUM9YZaTTRl9fWxl6+iqg1bf4jaX/GW0n4X6 1ji0TaL/D9OMcBunMwD1mXUUWYZxLbZEbLouaWIo829bvzHuR3YDgF/2xKZouyT7PmQi JhpYDgNPFI8FQG2WF2s6AtvtDo8PSou07zt6bO2eJ7stXnlAW+Fiiet3eSsxIJe29lfS 8Eow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id; bh=Oygbdgs3g9RRqK14FaywUA6scZSf36vQfnsIFwKiQKs=; b=AP2etwCVY+5g6szVM/tdu5bmmV9DLG94rBxXhzlGTyQZt9Pb4iRaSUTQ1sLrlgvkFk lddYkeKHZudgKPs7AdeRIhMAqsjdF1b89UzcVVncUkjrxhcl11A69dC+D/c1yHVjcx8K 9xkEL5y4HULwGoUA1moRQTYOff7hpE3ez5tnYUm3wD5Pk3uNgdns7zj8YMvDJPwJQKCk 7zjfzxa3k8297gSF6BITU8nklTb1VSHnBAH2Vq6xlxpJqShLNP9xuineSp6MFXoiZ7i1 0syAloy1NDRuhW6QzIPrJej5nRvMyeJ75XD/gNdchSHKcNw69L/SWdHr9Mof423QQMPy OSgA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f9si13360841edd.245.2019.09.11.01.06.02; Wed, 11 Sep 2019 01:06:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727121AbfIKIAn (ORCPT + 99 others); Wed, 11 Sep 2019 04:00:43 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:65362 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726657AbfIKIAn (ORCPT ); Wed, 11 Sep 2019 04:00:43 -0400 Received: from pps.filterd (m0187473.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x8B7vV2Q044782; Wed, 11 Sep 2019 04:00:26 -0400 Received: from ppma03dal.us.ibm.com (b.bd.3ea9.ip4.static.sl-reverse.com [169.62.189.11]) by mx0a-001b2d01.pphosted.com with ESMTP id 2uxc00d8mv-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 11 Sep 2019 04:00:25 -0400 Received: from pps.filterd (ppma03dal.us.ibm.com [127.0.0.1]) by ppma03dal.us.ibm.com (8.16.0.27/8.16.0.27) with SMTP id x8B7saxg007677; Wed, 11 Sep 2019 08:00:14 GMT Received: from b03cxnp07028.gho.boulder.ibm.com (b03cxnp07028.gho.boulder.ibm.com [9.17.130.15]) by ppma03dal.us.ibm.com with ESMTP id 2uv468ht5h-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 11 Sep 2019 08:00:13 +0000 Received: from b03ledav001.gho.boulder.ibm.com (b03ledav001.gho.boulder.ibm.com [9.17.130.232]) by b03cxnp07028.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x8B80CP334865604 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 11 Sep 2019 08:00:12 GMT Received: from b03ledav001.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id EA2C46E05D; Wed, 11 Sep 2019 08:00:11 +0000 (GMT) Received: from b03ledav001.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id D57F96E07D; Wed, 11 Sep 2019 08:00:08 +0000 (GMT) Received: from [9.124.31.108] (unknown [9.124.31.108]) by b03ledav001.gho.boulder.ibm.com (Postfix) with ESMTP; Wed, 11 Sep 2019 08:00:08 +0000 (GMT) Message-ID: <1568188807.30609.6.camel@abdul.in.ibm.com> Subject: Re: [mainline][BUG][PPC][btrfs][bisected 00801a] kernel BUG at fs/btrfs/locking.c:71! From: Abdul Haleem To: Nikolay Borisov Cc: linuxppc-dev , mpe , Brian King , chandan , sachinp , David Sterba , josef@toxicpanda.com, linux-btrfs@vger.kernel.org, linux-kernel Date: Wed, 11 Sep 2019 13:30:07 +0530 In-Reply-To: <7139ac07-db63-b984-c416-d1c94337c9bf@suse.com> References: <1567500907.5082.12.camel@abdul> <7139ac07-db63-b984-c416-d1c94337c9bf@suse.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.10.4-0ubuntu1 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-09-11_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1906280000 definitions=main-1909110074 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2019-09-03 at 13:39 +0300, Nikolay Borisov wrote: > > On 3.09.19 г. 11:55 ч., Abdul Haleem wrote: > > Greeting's > > > > Mainline kernel panics with LTP/fs_fill-dir tests for btrfs file system on my P9 box running mainline kernel 5.3.0-rc5 > > > > BUG_ON was first introduced by below commit > > > > commit 00801ae4bb2be5f5af46502ef239ac5f4b536094 > > Author: David Sterba > > Date: Thu May 2 16:53:47 2019 +0200 > > > > btrfs: switch extent_buffer write_locks from atomic to int > > > > The write_locks is either 0 or 1 and always updated under the lock, > > so we don't need the atomic_t semantics. > > > > Reviewed-by: Nikolay Borisov > > Signed-off-by: David Sterba > > > > diff --git a/fs/btrfs/locking.c b/fs/btrfs/locking.c > > index 2706676279..98fccce420 100644 > > --- a/fs/btrfs/locking.c > > +++ b/fs/btrfs/locking.c > > @@ -58,17 +58,17 @@ static void btrfs_assert_tree_read_locked(struct > > extent_buffer *eb) > > > > static void btrfs_assert_tree_write_locks_get(struct extent_buffer *eb) > > { > > - atomic_inc(&eb->write_locks); > > + eb->write_locks++; > > } > > > > static void btrfs_assert_tree_write_locks_put(struct extent_buffer *eb) > > { > > - atomic_dec(&eb->write_locks); > > + eb->write_locks--; > > } > > > > void btrfs_assert_tree_locked(struct extent_buffer *eb) > > { > > - BUG_ON(!atomic_read(&eb->write_locks)); > > + BUG_ON(!eb->write_locks); > > } > > > > > > tests logs: > > avocado-misc-tests/io/disk/ltp_fs.py:LtpFs.test_fs_run;fs_fill-dir-ext3-61cd: [ 3376.022096] EXT4-fs (nvme0n1): mounting ext3 file system using the ext4 subsystem > > EXT4-fs (nvme0n1): mounted filesystem with ordered data mode. Opts: (null) > > EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem > > EXT4-fs (loop1): mounted filesystem without journal. Opts: (null) > > EXT4-fs (loop1): mounting ext3 file system using the ext4 subsystem > > EXT4-fs (loop1): mounted filesystem with ordered data mode. Opts: (null) > > EXT4-fs (loop1): mounted filesystem with ordered data mode. Opts: (null) > > XFS (loop1): Mounting V5 Filesystem > > XFS (loop1): Ending clean mount > > XFS (loop1): Unmounting Filesystem > > BTRFS: device fsid 7c08f81b-6642-4a06-9182-2884e80d56ee devid 1 transid 5 /dev/loop1 > > BTRFS info (device loop1): disk space caching is enabled > > BTRFS info (device loop1): has skinny extents > > BTRFS info (device loop1): enabling ssd optimizations > > BTRFS info (device loop1): creating UUID tree > > ------------[ cut here ]------------ > > kernel BUG at fs/btrfs/locking.c:71! > > Oops: Exception in kernel mode, sig: 5 [#1] > > LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries > > Dumping ftrace buffer: > > (ftrace buffer empty) > > Modules linked in: fuse(E) vfat(E) fat(E) btrfs(E) xor(E) > > zstd_decompress(E) zstd_compress(E) raid6_pq(E) xfs(E) raid0(E) > > linear(E) dm_round_robin(E) dm_queue_length(E) dm_service_time(E) > > dm_multipath(E) loop(E) rpadlpar_io(E) rpaphp(E) lpfc(E) bnx2x(E) > > xt_CHECKSUM(E) xt_MASQUERADE(E) tun(E) bridge(E) stp(E) llc(E) kvm_pr(E) > > kvm(E) tcp_diag(E) udp_diag(E) inet_diag(E) unix_diag(E) > > af_packet_diag(E) netlink_diag(E) ip6t_rpfilter(E) ipt_REJECT(E) > > nf_reject_ipv4(E) ip6t_REJECT(E) nf_reject_ipv6(E) xt_conntrack(E) > > ip_set(E) nfnetlink(E) ebtable_nat(E) ebtable_broute(E) ip6table_nat(E) > > ip6table_mangle(E) ip6table_security(E) ip6table_raw(E) iptable_nat(E) > > nf_nat(E) nf_conntrack(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E) > > iptable_mangle(E) iptable_security(E) iptable_raw(E) ebtable_filter(E) > > ebtables(E) ip6table_filter(E) ip6_tables(E) iptable_filter(E) sunrpc(E) > > raid10(E) xts(E) pseries_rng(E) vmx_crypto(E) sg(E) uio_pdrv_genirq(E) > > uio(E) binfmt_misc(E) sch_fq_codel(E) ip_tables(E) > > ext4(E) mbcache(E) jbd2(E) sr_mod(E) cdrom(E) sd_mod(E) ibmvscsi(E) > > scsi_transport_srp(E) ibmveth(E) nvmet_fc(E) nvmet(E) nvme_fc(E) > > nvme_fabrics(E) scsi_transport_fc(E) mdio(E) libcrc32c(E) ptp(E) > > pps_core(E) nvme(E) nvme_core(E) dm_mirror(E) dm_region_hash(E) > > dm_log(E) dm_mod(E) [last unloaded: lpfc] > > CPU: 14 PID: 1803 Comm: kworker/u32:8 Tainted: G E 5.3.0-rc5-autotest-autotest #1 > > Workqueue: btrfs-endio-write btrfs_endio_write_helper [btrfs] > > NIP: c00800000164dd70 LR: c00800000164df00 CTR: c000000000a817a0 > > REGS: c00000000260b5d0 TRAP: 0700 Tainted: G E (5.3.0-rc5-autotest-autotest) > > MSR: 8000000102029033 CR: 22444082 XER: 00000000 > > CFAR: c00800000164defc IRQMASK: 0 > > GPR00: c0080000015c55f4 c00000000260b860 c008000001703b00 c000000267a29af0 > > GPR04: 0000000000000000 0000000000000001 0000000000000000 0000000000000000 > > GPR08: 0000000000000000 0000000000000001 0000000000000000 0000000000000004 > > GPR12: 0000000000004000 c00000001ec58e00 0000000000000000 0000000000000000 > > GPR16: 0000000000010000 0000000000000004 0000000000000001 0000000000000001 > > GPR20: 0000000000000000 0000000000000001 000000003e0f83e1 c00000025a7cbef0 > > GPR24: c00000000260ba26 0000000040000000 c0000000014a26e8 0000000000000003 > > GPR28: 0000000000000004 c00000025f2010a0 c000000267a29af0 0000000000000000 > > NIP [c00800000164dd70] btrfs_assert_tree_locked+0x10/0x20 [btrfs] > > LR [c00800000164df00] btrfs_set_lock_blocking_write+0x60/0x100 [btrfs] > > Call Trace: > > [c00000000260b860] [c00000000260b8e0] 0xc00000000260b8e0 (unreliable) > > [c00000000260b890] [c0080000015c55f4] btrfs_set_path_blocking+0xb4/0xc0 [btrfs] > > [c00000000260b8e0] [c0080000015cb808] btrfs_search_slot+0x8e8/0xb80 [btrfs] > > Can you provide the line numbers btrfs_search_slot+0x8e8/0xb80 > corresponds to? btrfs_search_slot+0x8e8/0xb80 maps to fs/btrfs/ctree.c:2751 write_lock_level = BTRFS_MAX_LEVEL; 9a70: 08 00 40 39 li r10,8 9a74: 08 00 a0 3a li r21,8 > 9a78: 6c 00 41 91 stw r10,108(r1) 9a7c: 1c f8 ff 4b b 9298 b = btrfs_root_node(root); and btrfs_assert_tree_locked+0x10/0x20 maps to ./fs/btrfs/locking.c:71 void btrfs_assert_tree_locked(struct extent_buffer *eb) { BUG_ON(!eb->write_locks); 80: 14 01 23 81 lwz r9,276(r3) 84: 34 00 29 7d cntlzw r9,r9 88: 7e d9 29 55 rlwinm r9,r9,27,5,31 8c: 20 00 29 79 clrldi r9,r9,32 > 90: 00 00 09 0b tdnei r9,0 94: 20 00 80 4e blr 98: 00 00 00 60 nop 9c: 00 00 42 60 ori r2,r2,0 I have sent direct message attaching vmlinux and the obj dump for ctree.c and locking.c -- Regard's Abdul Haleem IBM Linux Technology Centre