Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp6564773rwp; Tue, 18 Jul 2023 02:20:12 -0700 (PDT) X-Google-Smtp-Source: APBJJlEeVnjHSxteYx+igJRZadQ7srjp8BZTBuGZ+mriDJB0Mo7HkL6bUCl4g9mTEhFrAuNLaF5U X-Received: by 2002:a17:903:32c8:b0:1b8:a67f:1c15 with SMTP id i8-20020a17090332c800b001b8a67f1c15mr16445217plr.25.1689672012456; Tue, 18 Jul 2023 02:20:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689672012; cv=none; d=google.com; s=arc-20160816; b=iwl7wT8oROrW6cb6MYr/LfNcj8gLnh/1RJmlW8qjaHG04lQwSpNDGP/Hj/mZfafsDH LlKDxVQpefYz/hQCji2qFCpIsf2WibQqPT7x9Kr2ZC+/LSo/RTkZMJ48Fr0voJwwps7B VSU53jBy/v5AF2iUO8aWVBiILkLCNL13MDtKRLXO25O7qM05x9BpHClWnOx1yXMEykOl fCVrQzEkH3ZgNAPFqbYfWdg5J/zoZutUKN8Ij2yKDTkhcOcKpZqOMav4F4AQhBlxRrHa IradLQWeliwraqTLTQ2P7Lc2j5Bw/Ls5jAdWsECOG47AmatTkfkU+Vd/4dialmTHHBgE 5SOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:reply-to:message-id:subject:cc:to:from:date :dkim-signature:dkim-signature; bh=XjTjy8bD3w9DvRPImUgRpOPNPTrxRdwaCRNZC4ChKoU=; fh=1+VGJtkvdezunj014dxmA1mXJJwMy+E6BPI6Cbe6a4g=; b=uqBoinEXs5FJVkA+h6rQpXkXh3Mu6zcgJtb6mHI4ig6RlBos8Faw+z9Vh75YPGVuVx NBSmMxq43ZXYHd2uwdZn21hg/Zzv+jneUdLHC2qVuHPhyxOi28Ht5Hb1vLYeckXzYuS+ p4VLxWPb7sqL7SK0h6WHtX8+vG7ZG4Zgbfrz6V/huocImk+36Xd/qs5jmySZ4v2ZQUBN oIfDYRdbxjmynGmRpIc7WapsWZhTcYIjsGoVEslD2O+wxzReQqLtSv4pO+4MtVBYeilh oOdNkXxwnaXXIyki5OOxwz9MDWDyHmvBCyZL9xgWjP4GhU2wHjjYVjoWExDBhAJJ4xcT RmNg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=MBiFUahq; dkim=neutral (no key) header.i=@suse.cz; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n4-20020a170903110400b001b9eb5d1ea2si1405463plh.198.2023.07.18.02.19.52; Tue, 18 Jul 2023 02:20:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=MBiFUahq; dkim=neutral (no key) header.i=@suse.cz; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229779AbjGRJKl (ORCPT + 99 others); Tue, 18 Jul 2023 05:10:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50718 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231338AbjGRJKk (ORCPT ); Tue, 18 Jul 2023 05:10:40 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7669AE4C; Tue, 18 Jul 2023 02:10:35 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 2D5872195F; Tue, 18 Jul 2023 09:10:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1689671434; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=XjTjy8bD3w9DvRPImUgRpOPNPTrxRdwaCRNZC4ChKoU=; b=MBiFUahqa/MCGv/mqC8Ps52wf8DzczakgtxZMqZSuHa+5iNwPFoADR6fcr4EG1yKUWPXKP dKbUqMsQdrn6kpPmRpNonkieRdJw6CCcVbohvpQ8icnfTjl1CLsuxj78Fc/46+01ThCOVx 1iOGHQAlOVdJLIjOdYdNIiKRM/H6aPY= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1689671434; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=XjTjy8bD3w9DvRPImUgRpOPNPTrxRdwaCRNZC4ChKoU=; b=x8C9NF5/Qyg+tX17//LLcfNgr5MhVohJLIfu9eo4JqX0SUVHTURTy403q3dyWagM9jOx+j AS4rr9UdHBVxP7Dg== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 8486613494; Tue, 18 Jul 2023 09:10:33 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id 97IkHglXtmSGWgAAMHmgww (envelope-from ); Tue, 18 Jul 2023 09:10:33 +0000 Date: Tue, 18 Jul 2023 11:10:31 +0200 From: Petr Vorel To: Ritesh Harjani Cc: Theodore Ts'o , Arnd Bergmann , open list , lkft-triage@lists.linaro.org, linux-mm , Andreas Dilger , Dan Carpenter , Andrew Morton , linux-ext4 , LTP List , Ojaswin Mujoo Subject: Re: [LTP] next: kernel BUG at fs/ext4/mballoc.c:4369! Message-ID: <20230718091031.GB1140910@pevik> Reply-To: Petr Vorel References: <20230717213424.GB3842864@mit.edu> <87h6q2nfr7.fsf@doe.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87h6q2nfr7.fsf@doe.com> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org > "Theodore Ts'o" writes: > > On Mon, Jul 17, 2023 at 08:04:54PM +0530, Ritesh Harjani wrote: > >> These can basically trigger in extremely low memory space and only when > >> such ranges exist in the PA rbtree. Hence, I guess it is a little hard > >> to tigger race. > > Ritesh, thanks for looking into this! > > Naresh, how easy is it for you to trigger the BUG when using LTP? I > > did two xfstests runs using "gce-xfstests -c ext2/default -g auto", > > one on the ext4 dev branch, and one on linux-next 20230717, and I > > wasn't able to trigger the BUG. > > If you can trivially trigger it using LTP (perhaps with a low memory > > configuration in your test setup?), that would be useful to know. > Hi Ted, Hi Ted, Ritesh, all, > Sorry for wrong choice of words. By low memory space I meant low disk > space i.e. ENOSPC test (fs_fill). I reproduced it like this - > root@ubuntu:/opt/ltp# while [ 1 ]; do ./runltp -s fs_fill; sleep 1; done Late, but better than never: LTP C tests can be run without any wrapper. e.g. to reproduce the bug triggered by fs_fill, you can just: git clone https://github.com/linux-test-project/ltp.git && cd ltp ./ci/your-distro.sh # optionally install the dependencies make autotools ./configure cd testcases/kernel/fs/fs_fill/ make -j`nproc` while true; do ./fs_fill; sleep 1; done NOTE: runltp is 1) deprecated, replaced by runltp-ng [1] 2) again, there is no need to use this shell wrapper to run a single C binary Kind regards, Petr [1] https://github.com/linux-test-project/runltp-ng > For me it took around ~1-2 hours for it to reproduce when I tried again. > I am hoping if we run generic/269 (fsstress ENOSPC) in a while loop like > this maybe it can hit this bug. But I didn't give it a shot. > -ritesh