Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2053453pxb; Fri, 29 Jan 2021 11:46:51 -0800 (PST) X-Google-Smtp-Source: ABdhPJxGFIftlWU2B9GNFbCuq9PCNgZKRWSzFu4CVCxEbI7izjGKVX/iOVarUXgBuLrjizMm8uel X-Received: by 2002:aa7:d603:: with SMTP id c3mr6910256edr.337.1611949611613; Fri, 29 Jan 2021 11:46:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611949611; cv=none; d=google.com; s=arc-20160816; b=ibYAiWmrpIoyXUgegyCMbsdpX+oMKyM9EUPybwvlDaVw0Z/3S+KSl2UCaQrq2ojIh9 RI1Gg7FoD1EDRVRUrVi/fPcQUTB5nZinVJeJwvH7tzN6EWGMpVWN+czinca9YaB5U6UJ nb+SbU7zr+4G5oECz3K8M3RTfc0UIvrEsBLAaLyOhMaEXslA65Jj7O+HkODRydyv357m ww2wpgDUDQd1IU/bCn/glPSMeK3VosDI80eno/n4UaFbnIBXspLWKmApa2eXqCjGk2lr LQzLM0/BjE9f3wJYuXQdkDbme3xl5R5ILt0GICaNkNrj0CInewL4a2AfZMvHa70Ew0Lf IisA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:mail-followup-to:reply-to:message-id :subject:cc:to:from:date; bh=YhqfwnHBkFQ47+N4yV5/JlYLOcI64Pz+BleVgV6u+Q0=; b=z6I2N7ggQNaiCyHPEirN0KDrYl3bbI5YqIuRtx4HQF9raec+suhY5FxLVs/yMBw+Tl Nxxwj9gjlnFzRJxffG+h76CGknJ2eGG1b/Fj6/suBTu9+QSH8kVk9MlhgksBPqjqHMuy pdi9TPlSrVOFriDPEUfX9ZGfYc1Yz0Hjm8ouFjTi7uKwT8/9YTqhqlWguUP9dfWMtMlm QpnagSSXhGAr9cTPHDAobO3069cMYNTPn5+17fYqW31Q3jnfGd7XOJf7uFc2KVA+7GEt B/S8XSGM1McsePtcncJCD9fUtDpHljMZwjx3e5WY/bi61dZuizyXeBmHE5F3l1IgAu4l sXMg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x20si6148776eds.7.2021.01.29.11.46.27; Fri, 29 Jan 2021 11:46:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233024AbhA2Tow (ORCPT + 99 others); Fri, 29 Jan 2021 14:44:52 -0500 Received: from mx2.suse.de ([195.135.220.15]:42478 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232888AbhA2Tol (ORCPT ); Fri, 29 Jan 2021 14:44:41 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id B4D38ACB0; Fri, 29 Jan 2021 19:43:56 +0000 (UTC) Received: by ds.suse.cz (Postfix, from userid 10065) id 6435BDA7C3; Fri, 29 Jan 2021 20:42:08 +0100 (CET) Date: Fri, 29 Jan 2021 20:42:08 +0100 From: David Sterba To: Michal Rostecki Cc: dsterba@suse.cz, Josef Bacik , Chris Mason , David Sterba , linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org, Michal Rostecki Subject: Re: [PATCH v2] btrfs: Avoid calling btrfs_get_chunk_map() twice Message-ID: <20210129194208.GM1993@twin.jikos.cz> Reply-To: dsterba@suse.cz Mail-Followup-To: dsterba@suse.cz, Michal Rostecki , Josef Bacik , Chris Mason , David Sterba , linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org, Michal Rostecki References: <20210127135728.30276-1-mrostecki@suse.de> <18dab74b-aea9-0e34-1be5-39d62f44cfd2@toxicpanda.com> <20210129171521.GB22949@wotan.suse.de> <20210129174753.GL1993@twin.jikos.cz> <20210129190241.GA18188@wotan.suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210129190241.GA18188@wotan.suse.de> User-Agent: Mutt/1.5.23.1-rc1 (2014-03-12) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 29, 2021 at 07:02:41PM +0000, Michal Rostecki wrote: > On Fri, Jan 29, 2021 at 06:47:53PM +0100, David Sterba wrote: > > On Fri, Jan 29, 2021 at 05:15:21PM +0000, Michal Rostecki wrote: > > > On Fri, Jan 29, 2021 at 11:22:48AM -0500, Josef Bacik wrote: > > > > On 1/27/21 8:57 AM, Michal Rostecki wrote: > > > > it happens when you run btrfs/060. Please make sure to run xfstests against > > > > patches before you submit them upstream. Thanks, > > > > > > > > Josef > > > > > > Umm... I ran the xftests against v1 patch and didn't get that panic. > > > > It could have been caused by my fixups to v2 and I can reproduce the > > crash now too. I can't see any difference besides the u64/int switch and > > the 'goto out' removal in btrfs_bio_fits_in_stripe. > > I was able to fix the issue by the following diff. I will send it as the > patch after confirming that all fstests are passing. Thanks, can't reproduce the crash with that at least on test btrfs/060.