Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp31051907rwd; Thu, 6 Jul 2023 15:04:40 -0700 (PDT) X-Google-Smtp-Source: APBJJlGhsxfthwGD38F7zmB2C2DpJ09O/q/cC1ai9Lefx/1lPBqbO0B30BlBipKkfW6ZaZro4nBw X-Received: by 2002:a05:6a20:144c:b0:129:2c54:ac32 with SMTP id a12-20020a056a20144c00b001292c54ac32mr9908811pzi.12.1688681080004; Thu, 06 Jul 2023 15:04:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688681079; cv=none; d=google.com; s=arc-20160816; b=lz+72zYCaYG5SJqcpWkh1xn/3SfONpIzpIIvdxeZO9jvH6l3k1GtdTbFwjljnTFcYu Qg7W8tgQQMFUZ2eb1WD+R8PBzUern79lMcUbQqzKiK0w2A/5yoyd2GcqpQIQk0Ye2VDW MWV6YnnkTVa0SO8kY40tMS9/WweVeWWpaNsvvtAMhGXoia6OseYaEgv/DrJvV4mpFLOE atHs9CrTahid+NRakswiK269vpYu21MRM+WfBAK+KdEkH453Gx4hhx9cQHARuS0Pn4oA fg11KPjG3PMCAh/NxlBEP2LWa8tgsvwHK3N/KG+TkFqEevhGWHgmy+uhyoC3m1bisjsZ q/eQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:subject:cc:to:from:message-id:date :dkim-signature; bh=Mloc5wVRs5Xuf+witdCyrfrU9WN1oAVId9xyAtpb/1c=; fh=agpgQUERLRJ/s8YEI8GLvDa/7mEmELSFZX5a3WU1JE8=; b=QlFaSU3UeZ7UHofzPAVK7XJRU4IcSD0VHQg0rNf4zebeCcWhkKqYzRhUTk2MOmb6+b VHu/rx3NHKvPAfIN3rbThC3pFSRw1acjAK2IUalInHpxKk2rDj1J/QtCum17LNQPqS80 wP2JOf5UFZrJTm/b/B6p4tCRnJiyVHCj3JrdwDqVkvQwaxU7IykEJxDDG5iPJf/iWCa6 XtRl6+mIcCITg9IaKwB5aIUysDaFrZUEbm4NhX2H94d+0lk/V74CeXZWN2MnLb4SOOTA BkUZr+nCDcRGafyJC/F5D2kDhg5yiLmkgZTllMaGP2J/E5kOMi93nw7BPx58XlFcqcrc c4Fg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=RMtnQgPI; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t19-20020a63dd13000000b0055b6a782669si2206287pgg.261.2023.07.06.15.04.15; Thu, 06 Jul 2023 15:04:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=RMtnQgPI; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229490AbjGFV5i (ORCPT + 99 others); Thu, 6 Jul 2023 17:57:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36438 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229489AbjGFV5h (ORCPT ); Thu, 6 Jul 2023 17:57:37 -0400 Received: from mail-pf1-x431.google.com (mail-pf1-x431.google.com [IPv6:2607:f8b0:4864:20::431]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A02A01FC6 for ; Thu, 6 Jul 2023 14:57:31 -0700 (PDT) Received: by mail-pf1-x431.google.com with SMTP id d2e1a72fcca58-666edfc50deso852588b3a.0 for ; Thu, 06 Jul 2023 14:57:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1688680651; x=1691272651; h=in-reply-to:subject:cc:to:from:message-id:date:from:to:cc:subject :date:message-id:reply-to; bh=Mloc5wVRs5Xuf+witdCyrfrU9WN1oAVId9xyAtpb/1c=; b=RMtnQgPI2UkLqElEMuoguiPKLQYdNwyMoGIBnEdnWiyVM21IrwWW2xtPMfoD0fuxqL 2VdZPOXsSxHO906eGBJ8IVHtHeCHA8Dk3WnMD8XFFjoj0By/CHAR40l0HDRBIEU1LFWU im6hjRVZeGjpdrqJbRFsmSQTuiTBYiWf5BFlYyP+kQ2Oj9hVe/+sCam1VvhmZYhgXzNJ Ircf11qjEXvNmq3+KwhmahTex28OpxkyJFkIp0HydUfknEjpUjY3ogI7+OOnNvxh2Ydm wRD3PPY6IJzxTZRwcf7A+PQqUA1fOQX1nDyLWPzuj4qbPHWFi/b3SvlfYb5dapDrWM88 AZLQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1688680651; x=1691272651; h=in-reply-to:subject:cc:to:from:message-id:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=Mloc5wVRs5Xuf+witdCyrfrU9WN1oAVId9xyAtpb/1c=; b=eSGojdw6LQi/8W9EFogLJF3bO01WVWC1F/U8p+f6xpo9OKpwfqiMNOkrkZ2ocgXCOd mA9zPIVx7XaOY/ima52k6VDEV2s3WT4q9D7Bn+ZHx/C0x1ECFLD2fBFefJQhOTUcegVn RxCdWS3yfGSi9yzu3hl20IvldwkpGqgidp64u0WhlbkWb46l+sNhFEFME0I1+wdskQOD efNfG1qifH5S2ddNufMERxXxGPuXz1Pn5CAp6VViQeyozgIAYZS2gsiWocibVPlGDWHy PZh7dy7WxQ3ytX1GWh0SozeLRwkpa7erbPATLXfnWFOf0X1kLVdk4uT9uG6hN+/kn082 9YTQ== X-Gm-Message-State: ABy/qLZdmyBP0NrSralGrHdud+ed/3sWq8RBol1Hp6/z0g+axWssIgr1 kLLjAtFLLiNPBNlZNsPmx3YqeqRQHEw= X-Received: by 2002:a05:6a00:1da8:b0:682:93ce:4825 with SMTP id z40-20020a056a001da800b0068293ce4825mr9183815pfw.3.1688680650932; Thu, 06 Jul 2023 14:57:30 -0700 (PDT) Received: from dw-tp ([49.207.232.207]) by smtp.gmail.com with ESMTPSA id j13-20020a62b60d000000b006765cb3255asm1696658pff.68.2023.07.06.14.57.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 06 Jul 2023 14:57:30 -0700 (PDT) Date: Fri, 07 Jul 2023 03:27:27 +0530 Message-Id: <87edlkk8jc.fsf@doe.com> From: Ritesh Harjani (IBM) To: Eric Whitney , linux-ext4@vger.kernel.org Cc: tytso@mit.edu, ojaswin@linux.ibm.com Subject: Re: generic/269 failure on ext4 dev branch In-Reply-To: <87h6qgkant.fsf@doe.com> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Ritesh Harjani (IBM) writes: > Eric Whitney writes: > >> I've discovered that generic/269 will trigger a BUG_ON on line 5070 in > > Can you confirm in your tree what is line 5070 out of the two? > > BUG_ON(!S_ISREG(ac->ac_inode->i_mode)); > BUG_ON(ac->ac_pa == NULL); > > [1]: https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/tree/fs/ext4/mballoc.c?h=dev&id=ab8627e104696b8c1c6953ad5255def5b0821e06#n5070 > [2]: https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/tree/fs/ext4/mballoc.c?h=dev#n5070 > > Based on which tree you tested, it could differ I guess. > > I am assuming it is... > BUG_ON(!S_ISREG(ac->ac_inode->i_mode)); > >> ext4_mb_new_inode_pa when running kvm-xfstests on the 1k test case >> with a kernel built from the current ext4 dev branch. After hitting the >> BUG_ON, the kernel then reports persistent soft lockups. I mentioned this in >> today's concall, and Ted confirmed the current dev branch should reflect >> what's upstream at this time. >> >> This test reproduces for me 5 to 10% of the time, but reliably enough - I >> typically don't need more than 25 trials to see the failure, and 10 often >> suffices. (I haven't yet tried the 4k test case, but will do so.) >> >> The failure bisects to: >> 7e170922f06b ("ext4: Add allocation criteria 1.5 (CR1_5)") >> > > Thanks for the bisection. > >> Trace follows. >> >> Eric >> >> >> generic/269 24s ... [21:41:11][ 284.208474] run fstests generic/269 at 2023-07-03 21:41:11 >> [ 284.511484] EXT4-fs (vdc): mounted filesystem 2b1fbdd6-2724-47bc-b7b5-f4a73c9f19be r/w with ordered data mode. Quota mode: none. >> [ 284.950657] ------------[ cut here ]------------ >> [ 284.950901] kernel BUG at fs/ext4/mballoc.c:5070! >> [ 284.951104] invalid opcode: 0000 [#1] PREEMPT SMP >> [ 284.951296] CPU: 0 PID: 12039 Comm: fsstress Not tainted 6.4.0-rc5+ #6 >> [ 284.951567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 >> [ 284.951900] RIP: 0010:ext4_mb_new_inode_pa+0x2a6/0x2c0 >> [ 284.952124] Code: b5 7e 0f 85 b5 fe ff ff 0f 1f 44 00 00 e9 ab fe ff ff e8 9d 56 d3 ff 84 c0 0f 85 b5 fe ff ff 0f 0b e9 ae fe ff ff 0f 0b 0f 0b <0f> 0b 0f 0b 0f 0b 0f 0b 4c 89 c1 31 c0 e9 42 ff ff ff 0f 1f 84 00 >> [ 284.952891] RSP: 0018:ffffc90004053970 EFLAGS: 00010a87 >> [ 284.953124] RAX: 0000000000000002 RBX: ffff8880342d0720 RCX: 0000000000000001 >> [ 284.953420] RDX: 0000000000004000 RSI: 00001e4000000000 RDI: ffff8880342d0720 >> [ 284.953720] RBP: ffffc90004053a00 R08: ffff88800a5fc000 R09: 0000000000000000 >> [ 284.954020] R10: ffff888007964a98 R11: 0000000000000002 R12: 0000000000000003 >> [ 284.954321] R13: ffff8880342d0720 R14: ffff88800a5fc000 R15: ffff88800abfc000 >> [ 284.954610] FS: 00007f3d9db07740(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000 >> [ 284.954923] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >> [ 284.955148] CR2: 000055b54ce0fde8 CR3: 0000000006730006 CR4: 0000000000770ef0 >> [ 284.955443] PKRU: 55555554 >> [ 284.955559] Call Trace: >> [ 284.955669] >> [ 284.955760] ? die+0x33/0x90 >> [ 284.955887] ? do_trap+0xe0/0x110 >> [ 284.956031] ? ext4_mb_new_inode_pa+0x2a6/0x2c0 >> [ 284.956223] ? do_error_trap+0x65/0x80 >> [ 284.956385] ? ext4_mb_new_inode_pa+0x2a6/0x2c0 >> [ 284.956575] ? exc_invalid_op+0x4b/0x70 >> [ 284.956738] ? ext4_mb_new_inode_pa+0x2a6/0x2c0 >> [ 284.956929] ? asm_exc_invalid_op+0x16/0x20 >> [ 284.957112] ? ext4_mb_new_inode_pa+0x2a6/0x2c0 >> [ 284.957305] ext4_mb_complex_scan_group+0x2e0/0x3e0 >> [ 284.957512] ext4_mb_regular_allocator+0x3be/0xd80 >> [ 284.957716] ext4_mb_new_blocks+0x9dc/0x1040 >> [ 284.957895] ? __kmalloc+0xca/0x150 >> [ 284.958038] ? ext4_find_extent+0x3ec/0x450 >> [ 284.958204] ? _raw_write_unlock+0x29/0x50 >> [ 284.958369] ext4_ext_map_blocks+0x9a4/0x19d0 >> [ 284.958543] ? __kmem_cache_free+0x17d/0x2e0 >> [ 284.958723] ? find_held_lock+0x2b/0x80 >> [ 284.958889] ext4_map_blocks+0x230/0x5d0 >> [ 284.959056] ? lock_release+0x139/0x280 >> [ 284.959222] ext4_getblk+0x7b/0x2d0 >> [ 284.959369] ext4_bread+0xc/0x70 >> [ 284.959510] ext4_append+0x8d/0x190 >> [ 284.959665] ext4_init_new_dir+0xd5/0x1b0 >> [ 284.959835] ext4_mkdir+0x192/0x340 > > hmm.. looks like a allocation request for a directory inode. > >> [ 284.959987] vfs_mkdir+0x98/0x140 >> [ 284.960133] do_mkdirat+0x131/0x160 >> [ 284.960285] __x64_sys_mkdir+0x48/0x70 >> [ 284.960445] do_syscall_64+0x38/0x90 >> [ 284.960600] entry_SYSCALL_64_after_hwframe+0x72/0xdc >> [ 284.960814] RIP: 0033:0x7f3d9dbf8b07 >> [ 284.960967] Code: 1f 40 00 48 8b 05 89 f3 0c 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 59 f3 0c 00 f7 d8 64 89 01 48 >> [ 284.961741] RSP: 002b:00007ffcd5131098 EFLAGS: 00000206 ORIG_RAX: 0000000000000053 >> [ 284.962075] RAX: ffffffffffffffda RBX: 00007ffcd5131200 RCX: 00007f3d9dbf8b07 >> [ 284.962363] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 000055b54cdac240 >> [ 284.962647] RBP: 00000000000001ff R08: 0000000000000001 R09: 0000000000000003 >> [ 284.962928] R10: 00007ffcd5130d16 R11: 0000000000000206 R12: 00000000000000cb >> [ 284.963209] R13: 8f5c28f5c28f5c29 R14: 000055b54c8ec660 R15: 00000000000000cb >> [ 284.963492] >> [ 284.963586] Modules linked in: >> [ 284.963730] ---[ end trace 0000000000000000 ]--- > > > @Ojaswin, > > I was looking at the code. In function ext4_mb_choose_next_group_best_avail(), > we use fls() on goal len to calculate "order". But we never subtract 1 > from it. Then we set the goal len based on this "order". This might make > ac_g_ex.fe_len > ac_o_ex.fe_len in some cases where we really don't want > that (like the current case). > You have added some comments there, so I was not sure if that was > intentional. > > Now, IIUC, the overall concept of cr_1.5 is to trim the max len order > from goal len to something which is still larger than original length. > But this is only valid for regular files allocation request. Because we don't > normalize the request length for non-regular files. See > ext4_mb_normalize_request() function. As I also see from the current > bug_on, the request was for dir inode I guess. > > Although, I still think we should check the function logic in > ext4_mb_choose_next_group_best_avail(), but either ways I guess we don't > want to use CR_BEST_AVAIL_LEN criteria for non-regular files right, > given we anyways don't normalize the allocation request len for such files. > > In that case do you think below diff make sense? > > > mballoc: Don't use CR_BEST_AVAIL_LEN for non-regular files > > Using CR_BEST_AVAIL_LEN only make sense for regular files, as for > non-regular files we never normalize the allocation request length i.e. > goal len is same as original length (ac_g_ex.fe_len == ac_o_ex.fe_len). > > Hence there is no scope of trimming the goal length such that it can > still satisfy original request len. Thus this patch avoids using > CR_BEST_AVAIL_LEN criteria for non-regular files request. > > --- > fs/ext4/mballoc.c | 14 +++++++++++++- > 1 file changed, 13 insertions(+), 1 deletion(-) > > diff --git a/fs/ext4/mballoc.c b/fs/ext4/mballoc.c > index a2475b8c9fb5..5fbbd7344456 100644 > --- a/fs/ext4/mballoc.c > +++ b/fs/ext4/mballoc.c > @@ -974,7 +974,19 @@ static void ext4_mb_choose_next_group_goal_fast(struct ext4_allocation_context * > *group = grp->bb_group; > ac->ac_flags |= EXT4_MB_CR_GOAL_LEN_FAST_OPTIMIZED; > } else { > - *new_cr = CR_BEST_AVAIL_LEN; > + /* > + * CR_BEST_AVAIL_LEN works based on the concept that we have > + * a larger normalized goal len request which can be trimmed to > + * a smaller goal len such that it can still satisfy original > + * request len. However, allocation request for non-regular > + * files never gets normalized. > + * See function ext4_mb_normalize_request() (EXT4_MB_HINT_DATA). > + */ > + if ((ac->ac_criteria & EXT4_MB_HINT_DATA)) my bad. It should be if ((ac->ac_flags & EXT4_MB_HINT_DATA)) -ritesh