From: Zygo Blaxell <ce3g8jdj@umail.furryterror.org>
To: linux-btrfs@vger.kernel.org
Subject: misc-next a646ddc2bba2: kernel BUG at fs/btrfs/ctree.c:1210! tree mod log
Date: Sat, 27 Feb 2021 10:50:38 -0500 [thread overview]
Message-ID: <20210227155037.GN28049@hungrycats.org> (raw)
Hit this twice so far, while running the usual
balance/dedupe/rsync/snapshots/all at once on:
a646ddc2bba2 (kdave-gitlab/misc-next) btrfs: unlock extents in btrfs_zero_range in case of quota reservation errors
Looks like tree mod log bugs are back (or never went away?).
[40422.398920][T28995] BTRFS info (device dm-0): balance: canceled
[40607.394003][T11577] BTRFS info (device dm-0): balance: start -dlimit=9
[40607.398597][T11577] BTRFS info (device dm-0): relocating block group 315676950528 flags data
[40643.279661][T11577] BTRFS info (device dm-0): found 12686 extents, loops 1, stage: move data extents
[40692.752695][T11577] BTRFS info (device dm-0): found 12686 extents, loops 2, stage: update data pointers
[40704.860522][T11577] BTRFS info (device dm-0): relocating block group 314603208704 flags data
[40704.919977][T19054] ------------[ cut here ]------------
[40704.921895][T19054] kernel BUG at fs/btrfs/ctree.c:1210!
[40704.923497][T19054] invalid opcode: 0000 [#1] SMP KASAN PTI
[40704.925549][T19054] CPU: 1 PID: 19054 Comm: crawl_335 Tainted: G W 5.11.0-2d11c0084b02-misc-next+ #89
[40704.929192][T19054] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[40704.931640][T19054] RIP: 0010:__tree_mod_log_rewind+0x3b1/0x3c0
[40704.933301][T19054] Code: 05 48 8d 74 10 65 ba 19 00 00 00 e8 89 f3 06 00 e9 a7 fd ff ff 4c 8d 7b 2c 4c 89 ff e8 f8 bd c8 ff 48 63 43 2c e9 a2 fe ff ff <0f> 0b 0f 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48
[40704.938566][T19054] RSP: 0018:ffffc90001eb70b8 EFLAGS: 00010297
[40704.940483][T19054] RAX: 0000000000000000 RBX: ffff88812344e400 RCX: ffffffffb28933b6
[40704.942668][T19054] RDX: 0000000000000007 RSI: dffffc0000000000 RDI: ffff88812344e42c
[40704.945002][T19054] RBP: ffffc90001eb7108 R08: 1ffff11020b60a20 R09: ffffed1020b60a20
[40704.948513][T19054] R10: ffff888105b050f9 R11: ffffed1020b60a1f R12: 00000000000000ee
[40704.951601][T19054] R13: ffff8880195520c0 R14: ffff8881bc958500 R15: ffff88812344e42c
[40704.954607][T19054] FS: 00007fd1955e8700(0000) GS:ffff8881f5600000(0000) knlGS:0000000000000000
[40704.957704][T19054] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[40704.960125][T19054] CR2: 00007efdb7928718 CR3: 000000010103a006 CR4: 0000000000170ee0
[40704.963186][T19054] Call Trace:
[40704.964229][T19054] btrfs_search_old_slot+0x265/0x10d0
[40704.967068][T19054] ? lock_acquired+0xbb/0x600
[40704.969148][T19054] ? btrfs_search_slot+0x1090/0x1090
[40704.971106][T19054] ? free_extent_buffer.part.61+0xd7/0x140
[40704.973020][T19054] ? free_extent_buffer+0x13/0x20
[40704.974537][T19054] resolve_indirect_refs+0x3e9/0xfc0
[40704.976154][T19054] ? lock_downgrade+0x3d0/0x3d0
[40704.977602][T19054] ? __kasan_check_read+0x11/0x20
[40704.980765][T19054] ? add_prelim_ref.part.11+0x150/0x150
[40704.983136][T19054] ? lock_downgrade+0x3d0/0x3d0
[40704.985206][T19054] ? __kasan_check_read+0x11/0x20
[40704.987403][T19054] ? lock_acquired+0xbb/0x600
[40704.989309][T19054] ? __kasan_check_write+0x14/0x20
[40704.991385][T19054] ? do_raw_spin_unlock+0xa8/0x140
[40704.993454][T19054] ? rb_insert_color+0x30/0x360
[40704.995402][T19054] ? prelim_ref_insert+0x12d/0x430
[40704.997247][T19054] find_parent_nodes+0x5c3/0x1830
[40704.999305][T19054] ? resolve_indirect_refs+0xfc0/0xfc0
[40705.000951][T19054] ? lock_release+0xc8/0x620
[40705.002748][T19054] ? fs_reclaim_acquire+0x67/0xf0
[40705.004753][T19054] ? lock_acquire+0xc7/0x510
[40705.006233][T19054] ? lock_downgrade+0x3d0/0x3d0
[40705.007683][T19054] ? lockdep_hardirqs_on_prepare+0x160/0x210
[40705.009677][T19054] ? lock_release+0xc8/0x620
[40705.011405][T19054] ? fs_reclaim_acquire+0x67/0xf0
[40705.012937][T19054] ? lock_acquire+0xc7/0x510
[40705.014293][T19054] ? poison_range+0x38/0x40
[40705.015635][T19054] ? unpoison_range+0x14/0x40
[40705.017166][T19054] ? trace_hardirqs_on+0x55/0x120
[40705.018827][T19054] btrfs_find_all_roots_safe+0x142/0x1e0
[40705.020610][T19054] ? find_parent_nodes+0x1830/0x1830
[40705.022573][T19054] ? btrfs_inode_flags_to_xflags+0x50/0x50
[40705.024743][T19054] iterate_extent_inodes+0x20e/0x580
[40705.026839][T19054] ? tree_backref_for_extent+0x230/0x230
[40705.029021][T19054] ? lock_downgrade+0x3d0/0x3d0
[40705.030432][T19054] ? read_extent_buffer+0xdd/0x110
[40705.031909][T19054] ? lock_downgrade+0x3d0/0x3d0
[40705.033274][T19054] ? __kasan_check_read+0x11/0x20
[40705.034782][T19054] ? lock_acquired+0xbb/0x600
[40705.036234][T19054] ? __kasan_check_write+0x14/0x20
[40705.037670][T19054] ? _raw_spin_unlock+0x22/0x30
[40705.039014][T19054] ? __kasan_check_write+0x14/0x20
[40705.040419][T19054] iterate_inodes_from_logical+0x129/0x170
[40705.044668][T19054] ? iterate_inodes_from_logical+0x129/0x170
[40705.047340][T19054] ? btrfs_inode_flags_to_xflags+0x50/0x50
[40705.049936][T19054] ? iterate_extent_inodes+0x580/0x580
[40705.051938][T19054] ? __vmalloc_node+0x92/0xb0
[40705.053270][T19054] ? init_data_container+0x34/0xb0
[40705.054903][T19054] ? init_data_container+0x34/0xb0
[40705.056876][T19054] ? kvmalloc_node+0x60/0x80
[40705.058372][T19054] btrfs_ioctl_logical_to_ino+0x158/0x230
[40705.060233][T19054] btrfs_ioctl+0x205e/0x4040
[40705.061465][T19054] ? __might_sleep+0x71/0xe0
[40705.063108][T19054] ? btrfs_ioctl_get_supported_features+0x30/0x30
[40705.065188][T19054] ? getrusage+0x4b6/0x9c0
[40705.066678][T19054] ? __kasan_check_read+0x11/0x20
[40705.071937][T19054] ? lock_release+0xc8/0x620
[40705.075584][T19054] ? __might_fault+0x64/0xd0
[40705.084175][T19054] ? lock_acquire+0xc7/0x510
[40705.091566][T19054] ? lock_downgrade+0x3d0/0x3d0
[40705.095180][T19054] ? lockdep_hardirqs_on_prepare+0x210/0x210
[40705.099880][T19054] ? lockdep_hardirqs_on_prepare+0x210/0x210
[40705.101645][T19054] ? __kasan_check_read+0x11/0x20
[40705.103977][T19054] ? do_vfs_ioctl+0xfc/0x9d0
[40705.105936][T19054] ? ioctl_file_clone+0xe0/0xe0
[40705.107658][T19054] ? lock_downgrade+0x3d0/0x3d0
[40705.109423][T19054] ? lockdep_hardirqs_on_prepare+0x210/0x210
[40705.119233][T19054] ? __kasan_check_read+0x11/0x20
[40705.123581][T19054] ? lock_release+0xc8/0x620
[40705.125226][T19054] ? __task_pid_nr_ns+0xd3/0x250
[40705.126984][T19054] ? lock_acquire+0xc7/0x510
[40705.128678][T19054] ? __fget_files+0x160/0x230
[40705.130365][T19054] ? __fget_light+0xf2/0x110
[40705.131959][T19054] __x64_sys_ioctl+0xc3/0x100
[40705.133637][T19054] do_syscall_64+0x37/0x80
[40705.138627][T19054] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[40705.140552][T19054] RIP: 0033:0x7fd1976e2427
[40705.142005][T19054] Code: 00 00 90 48 8b 05 69 aa 0c 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 39 aa 0c 00 f7 d8 64 89 01 48
[40705.148519][T19054] RSP: 002b:00007fd1955e5cf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[40705.151247][T19054] RAX: ffffffffffffffda RBX: 00007fd1955e5f40 RCX: 00007fd1976e2427
[40705.153903][T19054] RDX: 00007fd1955e5f48 RSI: 00000000c038943b RDI: 0000000000000004
[40705.156554][T19054] RBP: 0000000001000000 R08: 0000000000000000 R09: 00007fd1955e6120
[40705.159228][T19054] R10: 0000557835366b00 R11: 0000000000000246 R12: 0000000000000004
[40705.161902][T19054] R13: 00007fd1955e5f48 R14: 00007fd1955e5f40 R15: 00007fd1955e5ef8
[40705.164567][T19054] Modules linked in:
[40705.165991][T19054] ---[ end trace ec8931a1c36e57be ]---
(gdb) l *(__tree_mod_log_rewind+0x3b1)
0xffffffff81893521 is in __tree_mod_log_rewind (fs/btrfs/ctree.c:1210).
1205 * the modification. as we're going backwards, we do the
1206 * opposite of each operation here.
1207 */
1208 switch (tm->op) {
1209 case MOD_LOG_KEY_REMOVE_WHILE_FREEING:
1210 BUG_ON(tm->slot < n);
1211 fallthrough;
1212 case MOD_LOG_KEY_REMOVE_WHILE_MOVING:
1213 case MOD_LOG_KEY_REMOVE:
1214 btrfs_set_node_key(eb, &tm->key, tm->slot);
next reply other threads:[~2021-02-27 15:51 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-02-27 15:50 Zygo Blaxell [this message]
2021-03-02 16:24 ` misc-next a646ddc2bba2: kernel BUG at fs/btrfs/ctree.c:1210! tree mod log Filipe Manana
2021-03-05 1:08 ` Zygo Blaxell
2021-03-05 12:45 ` Filipe Manana
2021-03-10 17:52 ` Zygo Blaxell
2021-03-11 14:36 ` Filipe Manana
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20210227155037.GN28049@hungrycats.org \
--to=ce3g8jdj@umail.furryterror.org \
--cc=linux-btrfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).