Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp1526117rwl; Mon, 26 Dec 2022 00:14:38 -0800 (PST) X-Google-Smtp-Source: AMrXdXtoRiZf+dm8n9Anmtj168KkDVaHEQMDCZIw8s2P6UCOEmnfB0B/DWGZ33gkqjJUSoO55P5h X-Received: by 2002:a17:902:f201:b0:189:377c:9ab with SMTP id m1-20020a170902f20100b00189377c09abmr16937504plc.51.1672042478230; Mon, 26 Dec 2022 00:14:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672042478; cv=none; d=google.com; s=arc-20160816; b=J027u4taT4iO0oLwsmKsOW1880RIZBADQlr4zsDprUDAF80CJwhb8UcfVOqrzQQjfF 659MYZM8pEyn91EjHztvnG7Px7l6lyxP8rm8sgQe3etjLqQMLIRJAn9orVT9vSpgD1Gm 8W2OccIzvG2ZaA8C4ZrhIFig6DJS8nKc5flAj3IVEeffp4w+Zv+7RCZFoWNqqiexca6y d/8bSCkfMphaHcPYOro+mQ6vWEK0FTYeWDcJF4Rgxk2xrG86d40T2S5JVwCuAX6j3JCA +x3U4AFlDQNMokDPsbQ/gjVuQBbFSOKpI95+vowhNsIm2epmBvEQ9HRoQf2Ey3PERTO6 s15g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=dP72i4CcDh2rKEionT3YCj4UXoTugJn0vbnCuqxPfo8=; b=P0FJ/89bLLk5/DE98FTj6C/r9F6A/RHp9E6VjnCMFLfA6GM+A4klymLeqT/j7IFlBQ Cz/NCptaKliZ5M2B2BdhEe0L+po1hbCvu0zPQJlXljwKACi2C+MmL1BsQQttiOpC4Jgo u0zhnBn5t5XlrTi/2Sd+0zSx4M/iYQmLzQKO55t3ZOVjt5x4l7hPdUdVLGtlSGTk5Dk3 tKRQ3gMDFpEnXaPuYxeuuvQc38OewAB2ne4NCiRzUhC82HuWixaRMXCfYTr0DCTw/90r RP7v79UykyoWi7DEt4BVXKuhSCRsatjiqnq25zZ0is4CsOVMc6tT8c0GmMJ7g7fR2gwg hWTw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w20-20020a170902d71400b001926fc5007bsi4426554ply.506.2022.12.26.00.14.29; Mon, 26 Dec 2022 00:14:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231636AbiLZHog (ORCPT + 67 others); Mon, 26 Dec 2022 02:44:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59814 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229486AbiLZHod (ORCPT ); Mon, 26 Dec 2022 02:44:33 -0500 X-Greylist: delayed 600 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Sun, 25 Dec 2022 23:44:32 PST Received: from ns2.prnet.org (ns2.prnet.org [188.165.43.41]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 674B1256; Sun, 25 Dec 2022 23:44:32 -0800 (PST) Received: from secure.prnet.org (mail.intern.prnet.org [192.168.1.206]) by ns2.prnet.org (Postfix) with ESMTP id D9109DF7B4; Mon, 26 Dec 2022 08:26:43 +0100 (CET) Received: from [192.168.1.2] (unknown [213.135.240.128]) by secure.prnet.org (Postfix) with ESMTPSA id 8CA7013E36E; Mon, 26 Dec 2022 08:26:06 +0100 (CET) Message-ID: Date: Mon, 26 Dec 2022 08:25:40 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.6.1 Subject: Re: [6.2][regression] after commit 947a629988f191807d2d22ba63ae18259bb645c5 btrfs volume periodical forced switch to readonly after a lot of disk writes Content-Language: en-US To: Qu Wenruo , Mikhail Gavrilov Cc: wqu@suse.com, dsterba@suse.com, Btrfs BTRFS , Linux List Kernel Mailing References: <18b5fa1e-7d1e-4560-c98b-d7ac5fc87c3a@gmx.com> From: David Arendt In-Reply-To: <18b5fa1e-7d1e-4560-c98b-d7ac5fc87c3a@gmx.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-3.0 required=5.0 tests=BAYES_00,NICE_REPLY_A, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, I am experiencing I similiar issue using kernel 6.1.1. The problem has started in kernel 6.1. It never happend before. A btrfs scrub and a btrfs check --readonly returned 0 errors. 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - BTRFS critical (device sda2): corrupt leaf: root=18446744073709551610 block=203366612992 slot=73, bad key order, prev (484119 96 1312873) current (484119 96 1312849) 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - BTRFS info (device sda2): leaf 203366612992 gen 5068802 total ptrs 105 free space 10820 owner 18446744073709551610 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 0 key (484119 1 0) itemoff 16123 itemsize 160 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09inode generation 45 size 2250 mode 40700 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 1 key (484119 12 484118) itemoff 16097 itemsize 26 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 2 key (484119 72 15) itemoff 16089 itemsize 8 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 3 key (484119 72 20) itemoff 16081 itemsize 8 ... 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 82 key (484119 96 1312873) itemoff 14665 itemsize 51 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 83 key (484119 96 1312877) itemoff 14609 itemsize 56 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 84 key (484128 1 0) itemoff 14449 itemsize 160 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09inode generation 45 size 98304 mode 100644 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 85 key (484128 108 0) itemoff 14396 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10674830381056 nr 65536 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 65536 ram 65536 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 86 key (484129 1 0) itemoff 14236 itemsize 160 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09inode generation 45 size 26214400 mode 100644 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 87 key (484129 108 589824) itemoff 14183 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10665699962880 nr 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 32768 ram 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 88 key (484129 108 2850816) itemoff 14130 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10665848733696 nr 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 32768 ram 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 89 key (484129 108 11042816) itemoff 14077 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10660869349376 nr 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 32768 ram 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 90 key (484129 108 13402112) itemoff 14024 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10660207378432 nr 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 32768 ram 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 91 key (484129 108 19628032) itemoff 13971 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10665835618304 nr 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 32768 ram 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 92 key (484129 108 21266432) itemoff 13918 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10661222666240 nr 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 32768 ram 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 93 key (484129 108 22740992) itemoff 13865 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10665565814784 nr 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 32768 ram 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 94 key (484129 108 23101440) itemoff 13812 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10665836371968 nr 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 32768 ram 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 95 key (484129 108 24084480) itemoff 13759 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10665836404736 nr 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 32768 ram 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 96 key (484129 108 24150016) itemoff 13706 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10665849159680 nr 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 32768 ram 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 97 key (484129 108 24313856) itemoff 13653 itemsize 53 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data disk bytenr 10665849192448 nr 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09extent data offset 0 nr 32768 ram 32768 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 98 key (484147 1 0) itemoff 13493 itemsize 160 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09\x09inode generation 45 size 886 mode 40755 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 99 key (484147 72 4) itemoff 13485 itemsize 8 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 100 key (484147 72 27) itemoff 13477 itemsize 8 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 101 key (484147 72 35) itemoff 13469 itemsize 8 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 102 key (484147 72 40) itemoff 13461 itemsize 8 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 103 key (484147 72 45) itemoff 13453 itemsize 8 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - \x09item 104 key (484147 72 52) itemoff 13445 itemsize 8 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - BTRFS error (device sda2): block=203366612992 write time tree block corruption detected 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - BTRFS: error (device sda2: state AL) in free_log_tree:3284: errno=-5 IO failure 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - BTRFS info (device sda2: state EAL): forced readonly 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - BTRFS warning (device sda2: state EAL): Skipping commit of aborted transaction. 2022-12-26T07:44:45.000000+01:00 server02 kernel - - - BTRFS: error (device sda2: state EAL) in cleanup_transaction:1958: errno=-5 IO failure There are no SSD access errors in the kernel logs. Smart data for the SSD is normal. I also did a 12 hour memtest to rule out bad RAM. The filesystem consists of a single 480GB SATA SSD (Corsair Neutron XTI). Like for the original poster, the problems occurs only on one machine. The error appears about every few days and seems to be triggered by a combination specially under high cpu utilization combined with some disk IO. CPU temperature never exceeds 60 degrees. On 26/12/2022 04:29, Qu Wenruo wrote: > > > On 2022/12/26 10:47, Mikhail Gavrilov wrote: >> On Mon, Dec 26, 2022 at 5:15 AM Qu Wenruo >> wrote: >>> >>> Thanks a lot for the full kernel log. >>> >>> It indeed shows something is wrong in the run_one_delayed_ref(). >>> But surprisingly, if there is something wrong, I'd expect more output >>> from btrfs, as normally if one tree block failed to pass whatever the >>> checks, it should cause an error message at least. >>> >>> Since you can reproduce the bug (although I don't think this is easy to >>> reproduce), mind to apply the extra debug patch and then try to >>> reproduce? >> >> Of course I am still able to reproduce. >> The number of messages foreshadowing readonly has become somewhat more: >> [ 2295.155437] BTRFS error (device nvme0n1p3): level check failed on >> logical 4957418700800 mirror 1 wanted 0 found 1 > > OK, indeed a level mismatch. > > From the remaining lines, it shows we're failing at > do_free_extent_accounting(), which failed at the btrfs_del_csums(). > > And inside btrfs_del_csums(), what we do are all regular btree > operations, thus the tree level check should work without problem. > > Thus it seems to be a corrupted csum tree. > >> [ 2295.155831] BTRFS error (device nvme0n1p3: state A): Transaction >> aborted (error -5) >> [ 2295.155946] BTRFS: error (device nvme0n1p3: state A) in >> do_free_extent_accounting:2849: errno=-5 IO failure >> [ 2295.155978] BTRFS info (device nvme0n1p3: state EA): forced readonly >> [ 2295.155985] BTRFS error (device nvme0n1p3: state EA): >> run_one_delayed_ref returned -5 >> [ 2295.156051] BTRFS: error (device nvme0n1p3: state EA) in >> btrfs_run_delayed_refs:2153: errno=-5 IO failure >> >> Of course full logs are also attached. >> >>> Another thing is, mind to run "btrfs check --readonly" on the fs? >> Result of check attached too. >> > Could you please run "btrfs check --readonly" from a liveCD? > There are tons of possible false alerts if ran on a RW mounted fs. > > Thanks, > Qu