Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp3985439rdh; Tue, 28 Nov 2023 08:47:44 -0800 (PST) X-Google-Smtp-Source: AGHT+IFigH/5ui1W6bnLPdJUNGFHKmqSTmYH2F2jQ7ev1oRQQoNfzEwozqX0IguyG4PgHCS82l/+ X-Received: by 2002:a17:902:da84:b0:1cf:e9c5:7382 with SMTP id j4-20020a170902da8400b001cfe9c57382mr4977383plx.68.1701190064224; Tue, 28 Nov 2023 08:47:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701190064; cv=none; d=google.com; s=arc-20160816; b=rDn7sIIpbN63iyZCbghc124e/Hdg44tM3Le93/y4hmyHLS7DZzuJQWfKARmEfeS3F3 QS9yYTqCFEgyYpra1MFlQF8ox2xzD3k0j2UTGCghfOAP8euIqECFAXy5QQKdXCOUYO1t xoyF026/FzBN2MGoYIBETbvSMJ2Lpt3usHebTOICOuHYw+yqyT4D7L2NtBp7CpYhWTOy 6CrDEKVjtA3qrroTe4OLglAt+DbKDoAFp0ln3RreY/mKaRQYcZActC/VgDSAdtUly5dn tkhohpsw2yZM9W5s7eI47VmPGHORN/Rwd3pl3gwxNksi2YQ0B/sy18LrI30T5EJMUltg SDCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:reply-to:message-id:subject:cc:to:from:date; bh=EEzTQ+kX6i3quk/v+QDzaPrPUDGTenLspOafld9hJhs=; fh=s4NhJbTOkHT7IkhlMliab8Bag2IoVyPdIyp7OcgXYbk=; b=UNPD1nuLKcYVMMXweTJURa/QFeyeQQmYNV14ECd5LB0L9Q+fkNWvbXfKjNnmqyCuAE iiQrTSXxsprabB344QtTrbsDlawuae6oZvspTvA5g5xlW1VbQCroYxGbGHTnIkoRihQm nB3lCWHdm+7I8p272Dj8/+gcK9ca+4ONZtBoN6JiEPvufoFA6V+26znuCgZ/4lnsflnn netMAPSGUl8OD0124gvbMLlqNPqmlKmHyTI2Tak0T2YSBpEgwRF2c0FJW3FXNdSLUAzo iFQZ8PaG6hETTI+ED5nJBGe5HYFUpg85XG9hbraNKEgZHhnk7B1w50JqRGP86YokeVPH mlKw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id s4-20020a170902ea0400b001cfec9dcd7fsi2763835plg.408.2023.11.28.08.47.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Nov 2023 08:47:44 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 05DB880A0DCC; Tue, 28 Nov 2023 08:47:41 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344723AbjK1QrX (ORCPT + 99 others); Tue, 28 Nov 2023 11:47:23 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54818 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229716AbjK1QrW (ORCPT ); Tue, 28 Nov 2023 11:47:22 -0500 Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2a07:de40:b251:101:10:150:64:1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 82A7ED5D; Tue, 28 Nov 2023 08:47:28 -0800 (PST) Received: from imap2.dmz-prg2.suse.org (imap2.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:98]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 067CB219A1; Tue, 28 Nov 2023 16:47:27 +0000 (UTC) Received: from imap2.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap2.dmz-prg2.suse.org (Postfix) with ESMTPS id D1EA6133B5; Tue, 28 Nov 2023 16:47:26 +0000 (UTC) Received: from dovecot-director2.suse.de ([10.150.64.162]) by imap2.dmz-prg2.suse.org with ESMTPSA id uh4GM54ZZmUUXgAAn2gu4w (envelope-from ); Tue, 28 Nov 2023 16:47:26 +0000 Date: Tue, 28 Nov 2023 17:40:10 +0100 From: David Sterba To: Anand Jain Cc: syzbot , clm@fb.com, dsterba@suse.com, josef@toxicpanda.com, linux-btrfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Subject: Re: [syzbot] [btrfs?] WARNING in btrfs_use_block_rsv Message-ID: <20231128164010.GM18929@twin.jikos.cz> Reply-To: dsterba@suse.cz References: <0000000000004d4716060af08a45@google.com> <531f8f07-6c4c-66bb-1d8e-7637222154af@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <531f8f07-6c4c-66bb-1d8e-7637222154af@oracle.com> User-Agent: Mutt/1.5.23.1-rc1 (2014-03-12) X-Spamd-Bar: ++++++++ X-Spam-Score: 9.00 X-Rspamd-Server: rspamd1 Authentication-Results: smtp-out1.suse.de; dkim=none; spf=softfail (smtp-out1.suse.de: 2a07:de40:b281:104:10:150:64:98 is neither permitted nor denied by domain of dsterba@suse.cz) smtp.mailfrom=dsterba@suse.cz; dmarc=none X-Rspamd-Queue-Id: 067CB219A1 X-Spamd-Result: default: False [9.00 / 50.00]; HAS_REPLYTO(0.30)[dsterba@suse.cz]; RCVD_VIA_SMTP_AUTH(0.00)[]; BAYES_SPAM(0.00)[40.64%]; TO_DN_SOME(0.00)[]; REPLYTO_ADDR_EQ_FROM(0.00)[]; R_SPF_SOFTFAIL(4.60)[~all]; RCVD_COUNT_THREE(0.00)[3]; MX_GOOD(-0.01)[]; NEURAL_HAM_SHORT(-0.20)[-0.984]; RCPT_COUNT_SEVEN(0.00)[9]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(2.20)[]; MIME_TRACE(0.00)[0:+]; SUBJECT_HAS_QUESTION(0.00)[]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; URI_HIDDEN_PATH(1.00)[https://syzkaller.appspot.com/x/.config?x=6ae1a4ee971a7305]; TAGGED_RCPT(0.00)[10d5b62a8d7046b86d22]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(1.20)[suse.cz]; NEURAL_HAM_LONG(-1.00)[-1.000]; FUZZY_BLOCKED(0.00)[rspamd.com]; RCVD_IN_DNSWL_HI(-0.50)[2a07:de40:b281:104:10:150:64:98:from]; RCVD_TLS_ALL(0.00)[]; SUSPICIOUS_RECIPS(1.50)[] X-Spam-Status: No, score=0.1 required=5.0 tests=GB_FAKE_RF_SHORT, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Tue, 28 Nov 2023 08:47:41 -0800 (PST) On Sun, Nov 26, 2023 at 06:59:41AM +0800, Anand Jain wrote: > > > On 25/11/2023 10:08, syzbot wrote: > > syzbot has bisected this issue to: > > > > commit a5b8a5f9f8355d27a4f8d0afa93427f16d2f3c1e > > Author: Anand Jain > > Date: Thu Sep 28 01:09:47 2023 +0000 > > > > btrfs: support cloned-device mount capability > > > > bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=1446d344e80000 > > start commit: d3fa86b1a7b4 Merge tag 'net-6.7-rc3' of git://git.kernel.o.. > > git tree: upstream > > final oops: https://syzkaller.appspot.com/x/report.txt?x=1646d344e80000 > > console output: https://syzkaller.appspot.com/x/log.txt?x=1246d344e80000 > > kernel config: https://syzkaller.appspot.com/x/.config?x=6ae1a4ee971a7305 > > dashboard link: https://syzkaller.appspot.com/bug?extid=10d5b62a8d7046b86d22 > > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1431040ce80000 > > > > Reported-by: syzbot+10d5b62a8d7046b86d22@syzkaller.appspotmail.com > > Fixes: a5b8a5f9f835 ("btrfs: support cloned-device mount capability") > > > > For information about bisection process see: https://goo.gl/tpsmEJ#bisection > > > It is completely strange that this issue bisects to the commit > a5b8a5f9f835 ('btrfs: support cloned-device mount capability'). > I am unable to reproduce this as well. I think it's because of changed timing or it can be an inconclusive bisect. Things around space handling depend on timing, the test would need to be run a few times to be sure. The report provides an image so it may be good to analyze if it's scaled properly or if the reproducer does something strange. > ------------------- > WARNING: CPU: 1 PID: 58 at fs/btrfs/block-rsv.c:523 > btrfs_use_block_rsv+0x60d/0x860 fs/btrfs/block-rsv.c:523 > > Call Trace: > > btrfs_alloc_tree_block+0x1e0/0x12c0 fs/btrfs/extent-tree.c:5114 > btrfs_force_cow_block+0x3e5/0x19e0 fs/btrfs/ctree.c:563 > btrfs_cow_block+0x2b6/0xb30 fs/btrfs/ctree.c:741 > push_leaf_left+0x315/0x4d0 fs/btrfs/ctree.c:3485 > split_leaf+0x9c3/0x13b0 fs/btrfs/ctree.c:3681 > search_leaf fs/btrfs/ctree.c:1944 [inline] > btrfs_search_slot+0x24ba/0x2fd0 fs/btrfs/ctree.c:2131 > btrfs_insert_empty_items+0xb6/0x1b0 fs/btrfs/ctree.c:4285 > btrfs_insert_empty_item fs/btrfs/ctree.h:657 [inline] > insert_reserved_file_extent+0x7aa/0x950 fs/btrfs/inode.c:2907 > insert_ordered_extent_file_extent fs/btrfs/inode.c:3005 [inline] > btrfs_finish_one_ordered+0x12dc/0x20d0 fs/btrfs/inode.c:3113 > btrfs_work_helper+0x210/0xbf0 fs/btrfs/async-thread.c:315 > process_one_work+0x886/0x15d0 kernel/workqueue.c:2630 > process_scheduled_works kernel/workqueue.c:2703 [inline] > worker_thread+0x8b9/0x1290 kernel/workqueue.c:2784 > kthread+0x2c6/0x3a0 kernel/kthread.c:388 > ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 > ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242 > ----------------- > > btrfs_use_block_rsv() > > /* > * The global reserve still exists to save us from ourselves, > so don't > * warn_on if we are short on our delayed refs reserve. > */ > if (block_rsv->type != BTRFS_BLOCK_RSV_DELREFS && > btrfs_test_opt(fs_info, ENOSPC_DEBUG)) { > static DEFINE_RATELIMIT_STATE(_rs, > DEFAULT_RATELIMIT_INTERVAL * 10, > /*DEFAULT_RATELIMIT_BURST*/ 1); > if (__ratelimit(&_rs)) > WARN(1, KERN_DEBUG > "BTRFS: block rsv %d returned %d\n", > block_rsv->type, ret); > } > ----------