Re: WARNING at fs/btrfs/disk-io.c:275 during xfstests run(4k block)

2023-05-29 Thread Christoph Hellwig
This should be fixed by

"btrfs: fix the uptodate assert in btree_csum_one_bio"

on the list.


WARNING at fs/btrfs/disk-io.c:275 during xfstests run(4k block)

2023-05-29 Thread Sachin Sant
While running xfstests against btrfs (with 4k block size) on IBM Power server
booted with 6.4.0-rc3-next-20230525, following warning is seen. This warning
Is seen several times during the test run.

This problem was first seen with 6.4.0-rc2-next-20230516

[ 365.885258] run fstests btrfs/001 at 2023-05-29 14:40:10
[ 366.070754] BTRFS: device fsid 0732-a1c0-452c-8409-4fa8f9b69e51 devid 1 
transid 6 /dev/sdb2 scanned by mkfs.btrfs (27139)
[ 366.076267] BTRFS info (device sdb2): using crc32c (crc32c-generic) checksum 
algorithm
[ 366.076286] BTRFS info (device sdb2): using free space tree
[ 366.076292] BTRFS warning (device sdb2): read-write for sector size 4096 with 
page size 65536 is experimental
[ 366.078153] BTRFS info (device sdb2): enabling ssd optimizations
[ 366.078319] BTRFS info (device sdb2): checking UUID tree
[ 366.084911] [ cut here ]
[ 366.084923] WARNING: CPU: 16 PID: 27174 at fs/btrfs/disk-io.c:275 
btree_csum_one_bio+0xdc/0x310 [btrfs]
[ 366.084962] Modules linked in: dm_mod nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 
nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct 
nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 bonding rfkill 
tls ip_set nf_tables nfnetlink sunrpc btrfs blake2b_generic xor raid6_pq 
zstd_compress nd_pmem libcrc32c nd_btt dax_pmem pseries_rng papr_scm libnvdimm 
vmx_crypto aes_gcm_p10_crypto ext4 mbcache jbd2 sd_mod t10_pi crc64_rocksoft 
crc64 sg ibmvscsi ibmveth scsi_transport_srp fuse
[ 366.085003] CPU: 16 PID: 27174 Comm: btrfs Tainted: G W 
6.4.0-rc3-next-20230525 #1
[ 366.085009] Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf06 
of:IBM,FW1030.00 (NH1030_026) hv:phyp pSeries
[ 366.085014] NIP: c00801a2eed4 LR: c00801b1b5a4 CTR: 
[ 366.085018] REGS: c0001a3bb030 TRAP: 0700 Tainted: G W 
(6.4.0-rc3-next-20230525)
[ 366.085023] MSR: 8282b033  CR: 
24002882 XER: 2004
[ 366.085033] CFAR: c00801a2ee78 IRQMASK: 0 
[ 366.085033] GPR00: c00801b1b5a4 c0001a3bb2d0 c0080165a700 
c000d18cca80 
[ 366.085033] GPR04: c001029da290  4000 
01d44000 
[ 366.085033] GPR08: c00c0021fd40   
ca19d890 
[ 366.085033] GPR12: 84002482 c00aa7cf6f00  
0001 
[ 366.085033] GPR16: c0001a3bb790  c0001a3bb770 
 
[ 366.085033] GPR20: c0001a3bb558 01d4  
c0001a3bb558 
[ 366.085033] GPR24: c000879ed000 c000d18cca80 c000fd947a80 
c000879ed000 
[ 366.085033] GPR28: c000d18ccb30 4000 c2c67490 
c000d1a0c558 
[ 366.085078] NIP [c00801a2eed4] btree_csum_one_bio+0xdc/0x310 [btrfs]
[ 366.085110] LR [c00801b1b5a4] btrfs_bio_csum+0x4c/0x70 [btrfs]
[ 366.085139] Call Trace:
[ 366.085141] [c0001a3bb2d0] [0006] 0x6 (unreliable)
[ 366.085146] [c0001a3bb380] [01d44000] 0x1d44000
[ 366.085150] [c0001a3bb3a0] [c00801b1c554] 
btrfs_submit_chunk+0x51c/0x560 [btrfs]
[ 366.085179] [c0001a3bb440] [c00801b1c67c] btrfs_submit_bio+0x44/0x70 
[btrfs]
[ 366.085207] [c0001a3bb470] [c00801a74ec0] write_one_eb+0x2f8/0x3c0 
[btrfs]
[ 366.085242] [c0001a3bb4d0] [c00801a75460] 
btree_write_cache_pages+0x4d8/0x7b0 [btrfs]
[ 366.085276] [c0001a3bb660] [c00801a2d04c] btree_writepages+0x94/0xe0 
[btrfs]
[ 366.085308] [c0001a3bb690] [c044df24] do_writepages+0x114/0x290
[ 366.085316] [c0001a3bb710] [c0436f58] 
filemap_fdatawrite_wbc+0xb8/0x140
[ 366.085322] [c0001a3bb750] [c043df60] 
__filemap_fdatawrite_range+0x80/0xc0
[ 366.085327] [c0001a3bb800] [c00801a37dc0] 
btrfs_write_marked_extents+0x78/0x1b0 [btrfs]
[ 366.085360] [c0001a3bb870] [c00801a37f60] 
btrfs_write_and_wait_transaction.isra.22+0x68/0x140 [btrfs]
[ 366.085393] [c0001a3bb8e0] [c00801a3a2d8] 
btrfs_commit_transaction+0x610/0x11f0 [btrfs]
[ 366.085425] [c0001a3bb9d0] [c00801a8ccf0] 
btrfs_mksubvol.isra.36+0x4e8/0x5b0 [btrfs]
[ 366.085460] [c0001a3bbab0] [c00801a8ce8c] btrfs_mksnapshot+0xd4/0x140 
[btrfs]
[ 366.085493] [c0001a3bbb20] [c00801a8d110] 
__btrfs_ioctl_snap_create+0x218/0x260 [btrfs]
[ 366.085526] [c0001a3bbbd0] [c00801a8d3fc] 
btrfs_ioctl_snap_create_v2+0x1a4/0x1f0 [btrfs]
[ 366.085559] [c0001a3bbc30] [c00801a910a4] btrfs_ioctl+0x1dac/0x3180 
[btrfs]
[ 366.085592] [c0001a3bbdc0] [c05a7098] sys_ioctl+0xf8/0x190
[ 366.085598] [c0001a3bbe10] [c00374b0] 
system_call_exception+0x140/0x350
[ 366.085604] [c0001a3bbe50] [c000d6a0] 
system_call_common+0x160/0x2e4
[ 366.085610] --- interrupt: c00 at 0x7fffa5f29b70
[ 366.085614] NIP: 7fffa5f29b70 LR: 1007a968 CTR: 
[ 366.085618] REGS: c0001a3bbe80 TRAP: 0c00 Tainted: G W 
(6.4.0-rc3-next-20230525)
[ 366.085625] MSR: 800