From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.2 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MSGID_FROM_MTA_HEADER,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED, USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E9923C388F9 for ; Thu, 19 Nov 2020 19:34:29 +0000 (UTC) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id AD6E422201 for ; Thu, 19 Nov 2020 19:34:28 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b="GpHsaYGp" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org AD6E422201 Authentication-Results: mail.kernel.org; dmarc=fail (p=quarantine dis=none) header.from=virtuozzo.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Received: from localhost ([::1]:54270 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1kfphL-0006jj-Gi for qemu-devel@archiver.kernel.org; Thu, 19 Nov 2020 14:34:27 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:45602) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kfpei-0004lu-8E; Thu, 19 Nov 2020 14:31:45 -0500 Received: from mail-db8eur05on2132.outbound.protection.outlook.com ([40.107.20.132]:5600 helo=EUR05-DB8-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kfpef-00010w-69; Thu, 19 Nov 2020 14:31:43 -0500 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Dmbz0IuQfCd5aoc84aT3keTfBDMjPwtz35gV7Gu6gYF6ZDh3orGkwFc4G0CY0h1cZtxBn91J0KK95an67It8xtdAL8g3dRceJly/q3+VjRYzxX7WFRPJ8f1fqBGW9T3dmql2KPkVT7I7TRaAOZp5D1s82IUWj9v4/Ws4QQL2Pedeu8O4yPPoodL4OlMRfAD5jXCSzqVuZYmhNxEQfTVhB8Hnc2l6zQAchydPpOag/wWUllxZOpWggbC8YYVzErIN9V/oLH/1TIyoN/BYkq6xQdK16UYsaPBFlBxfwRqTiFZDwRfZeygHTRQA4ri/JDB4ZyVXkQ2NU6K/EEw9OP+uIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oMgyABUpopYj28gSyHlZs0wq8ba576BPJFFDB0zNbno=; b=KdfytnwNMnBmpY0mboXou/Y4thQIPUTLXXFSUpGOj3LJt2drpVglfC2RZe90Yon+JUO8jUIRe2eM2SMP9qstEQsIArzIY6hnyilUptIUPEqIOESRwNvCPd3R1H0CN7JfW6GeCCqeqDAWpwoc0KXOhKQHEFVg/4NoZyrYsHsZtAqcYGWzT07Zutpn/dC+p+TFc+UFJ/pori/QVjhgSBedcabQv4WwISd6gNuqHZHiwlU9fcVJvQsH9JU8Jdtj3Wk0IQrtPvQArNl2APUPUfIf4INltQPhikwEjBYNqvUUIf29fNeAMemlH1Qgan1JGV1NpMyeDDsJBB7KPM9M4f2h/w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=virtuozzo.com; dmarc=pass action=none header.from=virtuozzo.com; dkim=pass header.d=virtuozzo.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=virtuozzo.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oMgyABUpopYj28gSyHlZs0wq8ba576BPJFFDB0zNbno=; b=GpHsaYGpgAILVkG3h4jW4muPHGerHtY+Tgi3/J0e5IQ6ikwanruRjj+Bt6OJ3RlaZHNCsjg4WQmeFmCG6/k/daA5oG1K6QPxuhcZ1kG5sdVdxRMxk5iQycHbhT6dhZpGVCc/MdXCp++DmnuWmGGP/Qutq9mCeBBFspKxnkD85P0= Authentication-Results: nongnu.org; dkim=none (message not signed) header.d=none;nongnu.org; dmarc=none action=none header.from=virtuozzo.com; Received: from AM7PR08MB5494.eurprd08.prod.outlook.com (2603:10a6:20b:dc::15) by AM6PR08MB5256.eurprd08.prod.outlook.com (2603:10a6:20b:e7::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3564.28; Thu, 19 Nov 2020 19:31:38 +0000 Received: from AM7PR08MB5494.eurprd08.prod.outlook.com ([fe80::fd02:1330:f620:1243]) by AM7PR08MB5494.eurprd08.prod.outlook.com ([fe80::fd02:1330:f620:1243%9]) with mapi id 15.20.3589.021; Thu, 19 Nov 2020 19:31:38 +0000 Subject: Re: iotest 030 still occasionally intermittently failing From: Vladimir Sementsov-Ogievskiy To: Peter Maydell , Alberto Garcia Cc: QEMU Developers , Qemu-block References: <1f53f805-9367-d7c6-94ca-8d91e88f362f@virtuozzo.com> Message-ID: <33bb2781-2811-0bf7-cdbf-cb3544165276@virtuozzo.com> Date: Thu, 19 Nov 2020 22:31:36 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.4.3 In-Reply-To: <1f53f805-9367-d7c6-94ca-8d91e88f362f@virtuozzo.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Originating-IP: [185.215.60.89] X-ClientProxiedBy: AM3PR07CA0127.eurprd07.prod.outlook.com (2603:10a6:207:8::13) To AM7PR08MB5494.eurprd08.prod.outlook.com (2603:10a6:20b:dc::15) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from [192.168.100.5] (185.215.60.89) by AM3PR07CA0127.eurprd07.prod.outlook.com (2603:10a6:207:8::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3611.11 via Frontend Transport; Thu, 19 Nov 2020 19:31:37 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: a21b5498-31a5-4f44-21ea-08d88cc1bbc0 X-MS-TrafficTypeDiagnostic: AM6PR08MB5256: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:3383; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: lxIO1ox+S9IX8UfKZ+sYKBjnLQLQOHVoBDZfTQrxQpckw+LTcsBFdXNHx1BRq7PFCX8VeVVs45hp/uYDLZKt+nQrxds7aAkN1GN/dafb7fbEzJyr3GMWUk6u312KIEG4aD1xZQhwcs6f0L2IkhmzNIq6v/5+V+LwG1R8r74JgO7/ikxd1uVeh6W55nkRsGUANEONbOJc6jCU22M5pTxx8qw/COsIxqGF2RXo5ufwTHCmYTTtXn3YBt2f129O58929m4XQBTuwg98WGtJSoLpWan1uVP1ukZEpfAr+8XRHs/ziwtuT7mPF81R8IVZWz4brLZWdWhFdwPS8PbxtvkoxSyKmcprF8bMpOG4z2lj/brDXzA7ZlXbj6MxRTiJaflQ X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM7PR08MB5494.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(346002)(39840400004)(136003)(396003)(366004)(36756003)(8936002)(4326008)(16576012)(6486002)(8676002)(316002)(83380400001)(2616005)(110136005)(956004)(31686004)(86362001)(2906002)(54906003)(478600001)(5660300002)(186003)(16526019)(52116002)(66556008)(26005)(66946007)(66476007)(31696002)(43740500002); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData: 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 X-OriginatorOrg: virtuozzo.com X-MS-Exchange-CrossTenant-Network-Message-Id: a21b5498-31a5-4f44-21ea-08d88cc1bbc0 X-MS-Exchange-CrossTenant-AuthSource: AM7PR08MB5494.eurprd08.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Nov 2020 19:31:38.0358 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 0bc7f26d-0264-416e-a6fc-8352af79c58f X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: QOS/UJLlZFkuY7yEGE6w0W55GwcWAoQLU19Rbhdodzk4ovkVlX2cKOYPzw4Ay1TtNpjK5iU5bY7jFa8UP2JuAhVTUSI93gA37qrB0xIKkgc= X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB5256 Received-SPF: pass client-ip=40.107.20.132; envelope-from=vsementsov@virtuozzo.com; helo=EUR05-DB8-obe.outbound.protection.outlook.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: "Qemu-devel" 19.11.2020 22:30, Vladimir Sementsov-Ogievskiy wrote: > 19.11.2020 19:11, Vladimir Sementsov-Ogievskiy wrote: >> 16.11.2020 20:59, Peter Maydell wrote: >>> On Mon, 16 Nov 2020 at 17:34, Alberto Garcia wrote: >>>> Do you know if there is a core dump or stack trace available ? >>> >>> Nope, sorry. What you get is what the 'vm-build-netbsd' etc targets >>> produce, so if you want more diagnostics on failures you have to >>> arrange for the test harness to produce them... >>> >>> thanks >>> -- PMM >>> >> >> Hi! >> >> After some iterations I've reproduced on SIGABRT: >> >> #0  0x00007feb701bae35 in raise () at /lib64/libc.so.6 >> #1  0x00007feb701a5895 in abort () at /lib64/libc.so.6 >> #2  0x00007feb701a5769 in _nl_load_domain.cold () at /lib64/libc.so.6 >> #3  0x00007feb701b3566 in annobin_assert.c_end () at /lib64/libc.so.6 >> #4  0x000055a93374f7d3 in bdrv_replace_child (child=0x55a9363a3a00, new_bs=0x0) at ../block.c:2648 >> #5  0x000055a93374fd5a in bdrv_detach_child (child=0x55a9363a3a00) at ../block.c:2777 >> #6  0x000055a93374fd9c in bdrv_root_unref_child (child=0x55a9363a3a00) at ../block.c:2789 >> #7  0x000055a933722e8b in block_job_remove_all_bdrv (job=0x55a935f4f4b0) at ../blockjob.c:191 >> #8  0x000055a933722bb2 in block_job_free (job=0x55a935f4f4b0) at ../blockjob.c:88 >> #9  0x000055a9337755fa in job_unref (job=0x55a935f4f4b0) at ../job.c:380 >> #10 0x000055a9337767a6 in job_exit (opaque=0x55a935f4f4b0) at ../job.c:894 >> #11 0x000055a93386037e in aio_bh_call (bh=0x55a9352e16b0) at ../util/async.c:136 >> #12 0x000055a933860488 in aio_bh_poll (ctx=0x55a9351366f0) at ../util/async.c:164 >> #13 0x000055a93383151e in aio_dispatch (ctx=0x55a9351366f0) at ../util/aio-posix.c:381 >> #14 0x000055a9338608b9 in aio_ctx_dispatch (source=0x55a9351366f0, callback=0x0, user_data=0x0) >>      at ../util/async.c:306 >> #15 0x00007feb71349ecd in g_main_context_dispatch () at /lib64/libglib-2.0.so.0 >> #16 0x000055a933840300 in glib_pollfds_poll () at ../util/main-loop.c:221 >> #17 0x000055a93384037a in os_host_main_loop_wait (timeout=0) at ../util/main-loop.c:244 >> #18 0x000055a933840482 in main_loop_wait (nonblocking=0) at ../util/main-loop.c:520 >> #19 0x000055a933603979 in qemu_main_loop () at ../softmmu/vl.c:1678 >> #20 0x000055a933190046 in main (argc=20, argv=0x7ffd48c31138, envp=0x7ffd48c311e0) >> >> (gdb) fr 4 >> #4  0x000055a93374f7d3 in bdrv_replace_child (child=0x55a9363a3a00, new_bs=0x0) at ../block.c:2648 >> 2648            assert(tighten_restrictions == false); >> (gdb) list >> 2643            int ret; >> 2644 >> 2645            bdrv_get_cumulative_perm(old_bs, &perm, &shared_perm); >> 2646            ret = bdrv_check_perm(old_bs, NULL, perm, shared_perm, NULL, >> 2647                                  &tighten_restrictions, NULL); >> 2648            assert(tighten_restrictions == false); >> 2649            if (ret < 0) { >> 2650                /* We only tried to loosen restrictions, so errors are not fatal */ >> 2651                bdrv_abort_perm_update(old_bs); >> 2652            } else { >> (gdb) p tighten_restrictions >> $1 = true >> >> > > I've modified code a bit, to crash when we actually want to set tighten_restrictions to true, and get the following bt: > #0  0x00007f6dbb49ee35 in raise () at /lib64/libc.so.6 > #1  0x00007f6dbb489895 in abort () at /lib64/libc.so.6 > #2  0x000055b9174104d7 in bdrv_check_perm >     (bs=0x55b918f09720, q=0x0, cumulative_perms=1, cumulative_shared_perms=21, ignore_children=0x55b918a57b20 = {...}, tighten_restrictions=0x55b917b044f8 , errp=0x0) at ../block.c:2009 > #3  0x000055b917410ec0 in bdrv_check_update_perm >     (bs=0x55b918f09720, q=0x0, new_used_perm=1, new_shared_perm=21, ignore_children=0x55b918a57b20 = {...}, tighten_restrictions=0x55b917b044f8 , errp=0x0) at ../block.c:2280 > #4  0x000055b917410f38 in bdrv_child_check_perm >     (c=0x55b91921fcf0, q=0x0, perm=1, shared=21, ignore_children=0x55b918a57b20 = {...}, tighten_restrictions=0x55b917b044f8 , errp=0x0) at ../block.c:2294 > #5  0x000055b91741078c in bdrv_check_perm >     (bs=0x55b918defd90, q=0x0, cumulative_perms=1, cumulative_shared_perms=21, ignore_children=0x0, tighten_restrictions=0x55b917b044f8 , errp=0x0) at ../block.c:2076 > #6  0x000055b91741194e in bdrv_replace_child (child=0x55b919cf6200, new_bs=0x0) at ../block.c:2666 > #7  0x000055b917411f1d in bdrv_detach_child (child=0x55b919cf6200) at ../block.c:2798 > #8  0x000055b917411f5f in bdrv_root_unref_child (child=0x55b919cf6200) at ../block.c:2810 > #9  0x000055b9173e4d88 in block_job_remove_all_bdrv (job=0x55b918f06a60) at ../blockjob.c:191 > #10 0x000055b9173e4aaf in block_job_free (job=0x55b918f06a60) at ../blockjob.c:88 > #11 0x000055b917437aca in job_unref (job=0x55b918f06a60) at ../job.c:380 > #12 0x000055b917438c76 in job_exit (opaque=0x55b918f06a60) at ../job.c:894 > #13 0x000055b917522a57 in aio_bh_call (bh=0x55b919a2b3b0) at ../util/async.c:136 > #14 0x000055b917522b61 in aio_bh_poll (ctx=0x55b918a866f0) at ../util/async.c:164 > #15 0x000055b9174f3bf7 in aio_dispatch (ctx=0x55b918a866f0) at ../util/aio-posix.c:381 > #16 0x000055b917522f92 in aio_ctx_dispatch (source=0x55b918a866f0, callback=0x0, user_data=0x0) >     at ../util/async.c:306 > #17 0x00007f6dbc62decd in g_main_context_dispatch () at /lib64/libglib-2.0.so.0 > #18 0x000055b9175029d9 in glib_pollfds_poll () at ../util/main-loop.c:221 > #19 0x000055b917502a53 in os_host_main_loop_wait (timeout=0) at ../util/main-loop.c:244 > #20 0x000055b917502b5b in main_loop_wait (nonblocking=0) at ../util/main-loop.c:520 > #21 0x000055b9172c5979 in qemu_main_loop () at ../softmmu/vl.c:1678 > #22 0x000055b916e52046 in main (argc=20, argv=0x7fff7f81f208, envp=0x7fff7f81f2b0) > > > and the picture taken at the moment of abort (and it is the same as at the moment before bdrv_replace_child call) is attached. So, it looks like graph is already corrupted (you see that backing permissions are not propagated to node2-node0 child). > > How graph was corrupted it's still the question.. > additional info: it's all during test_stream_commit_1 in 30 iiotest -- Best regards, Vladimir