Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp2142483rwi; Tue, 11 Oct 2022 05:29:06 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6d0inctphTLow0bS31KFca/enGYzgnJjCtDUWc5dPhLRAS3jlEqCovs716lcYm+Ve92pph X-Received: by 2002:a17:90b:1a84:b0:20d:5086:3694 with SMTP id ng4-20020a17090b1a8400b0020d50863694mr8767670pjb.74.1665491335856; Tue, 11 Oct 2022 05:28:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665491335; cv=none; d=google.com; s=arc-20160816; b=cpiwzfjE+xQiNABSGdrKwnRHp/kTEkv4bw/ERb0JVoRvetK/zHAr18g2H0bpfvtX50 xsqMcygZDQzzRV8wOz1EzKFFER/DFg2z50ZUxRH+YW2vXChzCltBw6T5EwU5BECL5MYS 1RJW0oBMPY2ELmkmB0wio77pn7PjR0bCzKS/icSRE1rp0L9v75jgPI3GrYyFnv335BBN KTQh0+CBJaV9NgXqjk+9UwElLie+qPowwjZgngnR/ByAwL2joOi42loIphw1zMmy6zMl cESrxEpfbnQYJyQuUNJGSMy+6mQAnaNVF27NLssiwtnOVi7tyKBbakFaO3c8OiphDAPw Gw+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:subject:from:to:cc :content-language:user-agent:mime-version:date:message-id; bh=WiRbM5KbtsuD/ZgwKZO+kOtmo+nMkZgqF6ENuNiHLoM=; b=e+JGDJO1nA1r8FcpxNlNfZRLscPsYuqYSpbrKwcE+ee7+7YwE2h65egXdm1mOpzAZT 5XD8jkOAeRZlB1isRpsVwSXIYZ7tr3timLE3CJwoe80aoT9a1gkkX6BUT6WNl5bXVUrN XbrxwG9hNNmBYsM9dexIWM6p8FNV4vZE80reehZJhlvS4ECM7JoxxP3ot8dZ/QZPsY0u +/GXdETRzmRQrCNiwt2f6ds+Ret1nDti+81wlZ2RHdrVRUh0Rd3KDqRMCApx5D5dHaY1 gzjgBIpNrbKBlxxjRItmQN0jro6nOUzW/tkQOoEcYx1b2P47eP3Lum3exX7rge/hLr4B MbqA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q2-20020a170902f34200b001751d0ac52asi12914957ple.435.2022.10.11.05.28.44; Tue, 11 Oct 2022 05:28:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229543AbiJKMJ7 (ORCPT + 99 others); Tue, 11 Oct 2022 08:09:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53744 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229700AbiJKMJ5 (ORCPT ); Tue, 11 Oct 2022 08:09:57 -0400 Received: from wp530.webpack.hosteurope.de (wp530.webpack.hosteurope.de [80.237.130.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 473021276D for ; Tue, 11 Oct 2022 05:09:53 -0700 (PDT) Received: from [2a02:8108:963f:de38:eca4:7d19:f9a2:22c5]; authenticated by wp530.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) id 1oiE50-0002YD-LE; Tue, 11 Oct 2022 14:09:50 +0200 Message-ID: <8be1e839-2eb8-43d0-9ecb-6ff8c3aa3f2d@leemhuis.info> Date: Tue, 11 Oct 2022 14:09:50 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.3.1 Content-Language: en-US, de-DE Cc: Chris Mason , Josef Bacik , linux-btrfs , LKML , "regressions@lists.linux.dev" , Viktor Kuzmin To: David Sterba From: Thorsten Leemhuis Subject: Bug 216559 - btrfs crash root mount RAID0 caused by ac0677348f3c2 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-bounce-key: webpack.hosteurope.de;regressions@leemhuis.info;1665490195;2d16efa1; X-HE-SMSGID: 1oiE50-0002YD-LE X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, this is your Linux kernel regression tracker speaking. David, I noticed a regression report in bugzilla.kernel.org apparently caused by a changed of yours. As many (most?) kernel developer don't keep an eye on the bug-tracker, I decided to forward the report by mail. Quoting from https://bugzilla.kernel.org/show_bug.cgi?id=216559 : > [reply] [−] Description Viktor Kuzmin 2022-10-08 20:41:32 UTC > > In linux 6.0.0 there was change in block-group.c file in function btrfs_rmap_block: > [...] FWIW, the reporter (CCed) here meant change ac0677348f3c2 ("btrfs: merge calculations for simple striped profiles in btrfs_rmap_block"). Reverting it fixes the problem. > After this change I have a crash with DIVIDE by ZERO error. It seems that map->sub_stripes can be zero. > > My setup is 2x 1TB nvme with space_cache=v2 and discard=async btrfs raid0. See the ticket for more details and screenshots from the crash. BTW, let me use this mail to also add the report to the list of tracked regressions to ensure it's doesn't fall through the cracks: #regzbot introduced: ac0677348f3c2 https://bugzilla.kernel.org/show_bug.cgi?id=216559 #regzbot ignore-activity Ciao, Thorsten (wearing his 'the Linux kernel's regression tracker' hat) P.S.: As the Linux kernel's regression tracker I deal with a lot of reports and sometimes miss something important when writing mails like this. If that's the case here, don't hesitate to tell me in a public reply, it's in everyone's interest to set the public record straight.