On Mon, Jul 23, 2018 at 03:52:59PM +0800, Anand Jain wrote:
>
>
>On 07/21/2018 02:01 PM, Lu Fengqi wrote:
>> On Tue, Jul 03, 2018 at 05:07:24PM +0800, Anand Jain wrote:
>> > When a device is deleted, the btrfs_super_block::number_devices is
>> > reduced by 1, but we do that after the commit transaction, so this
>> > change did not made it to the disk and waits for the next commit
>> > transaction whenever it happens.
>> > 
>> > This can be easily demonstrated using the following test case where I
>> > use the btrfs device ready cli to read the disk and report.
>> > 
>> >   mkfs.btrfs -fq -dsingle -msingle $dev1 $dev2
>> >   mount $dev1 /btrfs
>> >   btrfs dev del $dev2 /btrfs
>> >   btrfs dev ready $dev1; echo RESULT=$? <-- 1
>> >    Without this patch RESULT returns 1, indicating not ready!
>> > 
>> >   Testing with a seed device:
>> > 
>> >   mkfs.btrfs -fq $dev1
>> >   btrfstune -S1 $dev1
>> >   mount $dev1 /btrfs
>> >   btrfs dev add -f $dev2 /btrfs
>> >   umount /btrfs
>> >   mount $dev2 /btrfs
>> >   btrfs dev del $dev1 /btrfs
>> >   btrfs dev ready $dev2; echo RESULT=$? <-- 1
>> > 
>> >   Fix this by bringing in the num_devices update with in the
>> >   current commit transaction.
>> >   Also align the local variable declarations in the function
>> >   btrfs_rm_dev_item()
>> >   Delete a todo comment about transient inconsistent state
>> 
>> Hi, Anand
>> 
>> The btrfs/164 failed when I run xfstests with kdave/misc-next.
>
> And the
>> result of git bisect shows this patch may be the cause. Please see the
>> following log and dmesg.
>> 
>> xfstests log:
>> # sudo ./check btrfs/164
>> FSTYP         -- btrfs
>> PLATFORM      -- Linux/x86_64 larch 4.18.0-rc5+
>> MKFS_OPTIONS  -- /dev/vdb2
>> MOUNT_OPTIONS -- /dev/vdb2 /mnt/scratch
>> 
>> btrfs/164 14s ... [failed, exit status 1]
>> 
>> dmesg:
>> [  212.009967] general protection fault: 0000 [#1] SMP PTI
>> [  212.015834] CPU: 1 PID: 5665 Comm: btrfs Tainted: G           O      
>> 4.18.0-rc5+ #2
>> [  212.021985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 
>> 0.0.0 02/06/2015
>> [  212.031137] RIP: 0010:btrfs_update_commit_device_size+0x74/0xd0 [btrfs]
>
>
>Thanks for the report.
>
>
>--------------
>void btrfs_update_commit_device_size(struct btrfs_fs_info *fs_info)
>{
>        struct btrfs_fs_devices *fs_devices = fs_info->fs_devices;
>        struct btrfs_device *curr, *next;
>
>        if (list_empty(&fs_devices->resized_devices))
>                return;
>
>        mutex_lock(&fs_devices->device_list_mutex);
>        mutex_lock(&fs_info->chunk_mutex);
>        list_for_each_entry_safe(curr, next, &fs_devices->resized_devices,
>                                 resized_list) {
>                list_del_init(&curr->resized_list); <----  GPF
>                curr->commit_total_bytes = curr->disk_total_bytes;
>        }
>        mutex_unlock(&fs_info->chunk_mutex);
>        mutex_unlock(&fs_devices->device_list_mutex);
>}
>--------------
>
>
>I can't reproduce the issue. Do you reproduce consistently? and I

Sorry I've taken so long to reply.

There are four virtual machines with the different storage backend here.
And I can reproduce this issue consistently on the virtual machines (with
HDD or qcow2 file in HDD), however, I can't reproduce on the virtual machine
(with SSD or qcow2 file in SSD). So this may depend on the disk IO speed.

>wonder if your workspace contains the latest changes from
>kdave/misc-next? Because last weeks kdave/misc had some issues.
>Can you please give a try?

I used the latest kdave/misc-next branch on July 21, 2018, when I send
the previous mail. Just as David replied to Nikolay's thread, the current
latest kdave/misc-next still has the same problem.

In addition, this case will not fail when I enable KASAN. But the something
found in dmesg may help you to investigate. I attached them below.

-- 
Thanks,
Lu

log:
# sudo ./check btrfs/164
FSTYP         -- btrfs
PLATFORM      -- Linux/x86_64 localhost 4.18.0-rc6+
MKFS_OPTIONS  -- /dev/vdc1
MOUNT_OPTIONS -- /dev/vdc1 /mnt/scratch

btrfs/164 15s ... _check_dmesg: something found in dmesg (see 
/home/luke/workspace/xfstests-dev/results//btrfs/164.dmesg)

Ran: btrfs/164
Failures: btrfs/164
Failed 1 of 1 tests

dmesg(KASAN enabled):
  444.636617] ==================================================================
[  444.639206] BUG: KASAN: use-after-free in 
btrfs_update_commit_device_size+0x124/0x2c0 [btrfs]
[  444.641234] Read of size 8 at addr ffff8801542ad1d0 by task btrfs/4575

[  444.645210] CPU: 0 PID: 4575 Comm: btrfs Not tainted 4.18.0-rc6+ #4
[  444.647150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 
02/06/2015
[  444.649351] Call Trace:
[  444.650715]  dump_stack+0xd1/0x16c
[  444.652201]  ? dump_stack_print_info.cold.1+0x2f/0x2f
[  444.653924]  ? kmsg_dump_rewind_nolock+0x59/0x59
[  444.655637]  ? btrfs_update_commit_device_size+0x124/0x2c0 [btrfs]
[  444.657492]  print_address_description+0x6c/0x23c
[  444.659257]  ? btrfs_update_commit_device_size+0x124/0x2c0 [btrfs]
[  444.661083]  kasan_report.cold.6+0x241/0x2fd
[  444.662759]  btrfs_update_commit_device_size+0x124/0x2c0 [btrfs]
[  444.664598]  ? btrfs_destroy_dev_replace_tgtdev+0x1f0/0x1f0 [btrfs]
[  444.666573]  ? btrfs_wait_block_group_reservations+0x280/0x280 [btrfs]
[  444.668441]  ? _raw_spin_unlock+0x24/0x30
[  444.670091]  ? btrfs_first_delayed_node+0xbd/0x100 [btrfs]
[  444.672007]  ? btrfs_reloc_post_snapshot+0x8d0/0x8d0 [btrfs]
[  444.673941]  ? kmem_cache_free+0x2a8/0x320
[  444.675692]  ? __btrfs_run_delayed_items+0x213/0x250 [btrfs]
[  444.677600]  btrfs_commit_transaction+0xce1/0x1540 [btrfs]
[  444.679539]  ? btrfs_apply_pending_changes+0x80/0x80 [btrfs]
[  444.681363]  ? rcu_is_watching+0x98/0xe0
[  444.683032]  ? check_chain_key+0x13b/0x200
[  444.684649]  ? check_flags.part.42+0x210/0x210
[  444.686406]  ? do_raw_spin_unlock+0x157/0x1e0
[  444.688034]  ? do_raw_spin_trylock+0x120/0x120
[  444.689647]  ? do_raw_spin_trylock+0xa0/0x120
[  444.691271]  ? mark_lock+0x116/0xb60
[  444.692742]  ? _raw_spin_unlock_irqrestore+0x43/0x50
[  444.694471]  ? depot_save_stack+0x288/0x470
[  444.696018]  ? save_stack+0x8c/0xb0
[  444.697448]  ? __kasan_slab_free+0x12e/0x180
[  444.699023]  ? kfree+0xf0/0x2f0
[  444.700447]  ? free_fs_devices+0x1e4/0x240 [btrfs]
[  444.702288]  ? btrfs_rm_device+0xbbd/0xc70 [btrfs]
[  444.703983]  ? btrfs_ioctl+0x4f7f/0x5470 [btrfs]
[  444.705558]  ? do_vfs_ioctl+0x134/0xac0
[  444.707081]  ? ksys_ioctl+0x60/0x90
[  444.708419]  ? __x64_sys_ioctl+0x3d/0x50
[  444.709828]  ? do_syscall_64+0x16b/0xc30
[  444.711292]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  444.712846]  ? do_raw_spin_trylock+0x120/0x120
[  444.714321]  ? do_raw_spin_trylock+0xa0/0x120
[  444.715791]  ? mark_held_locks+0x92/0xb0
[  444.717183]  ? _raw_spin_unlock_irqrestore+0x43/0x50
[  444.718701]  ? trace_hardirqs_on_caller+0x18c/0x280
[  444.720240]  ? quarantine_put+0xb7/0x150
[  444.721585]  ? __kasan_slab_free+0x143/0x180
[  444.723060]  ? free_fs_devices+0x1e4/0x240 [btrfs]
[  444.724453]  ? kfree+0xf0/0x2f0
[  444.725685]  ? free_fs_devices+0x1e4/0x240 [btrfs]
[  444.727129]  ? __blkdev_put+0x2f8/0x400
[  444.728430]  ? btrfs_free_device+0x50/0x50 [btrfs]
[  444.729872]  ? bd_set_size+0x170/0x170
[  444.731190]  btrfs_rm_device+0xbc6/0xc70 [btrfs]
[  444.733412]  ? btrfs_scratch_superblocks+0x170/0x170 [btrfs]
[  444.735040]  ? check_chain_key+0x13b/0x200
[  444.736394]  ? check_flags.part.42+0x210/0x210
[  444.737738]  ? ___might_sleep+0x184/0x250
[  444.739078]  ? cpu_extra_stat_show+0x10/0x10
[  444.740449]  ? _copy_from_user+0x7d/0xb0
[  444.741759]  btrfs_ioctl+0x4f7f/0x5470 [btrfs]
[  444.743188]  ? mark_lock+0x116/0xb60
[  444.744426]  ? print_usage_bug+0xf0/0xf0
[  444.745760]  ? cyc2ns_read_begin.part.1+0x67/0x90
[  444.747225]  ? btrfs_ioctl_get_supported_features+0x30/0x30 [btrfs]
[  444.748844]  ? alloc_set_pte+0x495/0x560
[  444.750221]  ? reacquire_held_locks+0xa8/0x1d0
[  444.751612]  ? alloc_set_pte+0x495/0x560
[  444.752933]  ? cyc2ns_read_begin.part.1+0x67/0x90
[  444.754386]  ? native_sched_clock+0xa9/0x130
[  444.755773]  ? cyc2ns_read_end+0x10/0x10
[  444.757055]  ? check_flags.part.42+0x210/0x210
[  444.758457]  ? check_chain_key+0x13b/0x200
[  444.759812]  ? __lock_acquire+0x779/0x2a10
[  444.761175]  ? lock_release+0x8a0/0x8a0
[  444.763263]  ? find_get_entries_tag+0x800/0x800
[  444.764711]  ? check_chain_key+0x13b/0x200
[  444.766088]  ? check_chain_key+0x13b/0x200
[  444.767395]  ? __lock_acquire+0x779/0x2a10
[  444.768718]  ? cyc2ns_read_begin.part.1+0x67/0x90
[  444.770209]  ? native_sched_clock+0xa9/0x130
[  444.771541]  ? cyc2ns_read_end+0x10/0x10
[  444.772840]  ? lock_release+0x8a0/0x8a0
[  444.774159]  ? check_chain_key+0x13b/0x200
[  444.775485]  ? check_flags.part.42+0x210/0x210
[  444.776852]  ? do_raw_spin_unlock+0x157/0x1e0
[  444.778232]  ? do_raw_spin_trylock+0x120/0x120
[  444.779595]  ? cyc2ns_read_begin.part.1+0x67/0x90
[  444.780946]  ? native_sched_clock+0xa9/0x130
[  444.782319]  ? cyc2ns_read_end+0x10/0x10
[  444.783596]  ? _raw_spin_unlock+0x24/0x30
[  444.784875]  ? check_chain_key+0x13b/0x200
[  444.786205]  ? check_flags.part.42+0x210/0x210
[  444.787512]  ? do_vfs_ioctl+0x134/0xac0
[  444.788791]  ? btrfs_ioctl_get_supported_features+0x30/0x30 [btrfs]
[  444.790438]  do_vfs_ioctl+0x134/0xac0
[  444.791758]  ? native_sched_clock+0xa9/0x130
[  444.793248]  ? ioctl_preallocate+0x180/0x180
[  444.794629]  ? ktime_get_coarse_real_ts64+0x140/0x190
[  444.796134]  ? __fget_light+0x198/0x220
[  444.797368]  ? fget_raw+0x10/0x10
[  444.798634]  ? ktime_mono_to_any+0x170/0x170
[  444.800044]  ? __audit_syscall_entry+0x22d/0x2a0
[  444.801455]  ksys_ioctl+0x60/0x90
[  444.802741]  __x64_sys_ioctl+0x3d/0x50
[  444.803965]  do_syscall_64+0x16b/0xc30
[  444.805173]  ? syscall_return_slowpath+0x610/0x610
[  444.806651]  ? handle_mm_fault+0x3da/0x590
[  444.807919]  ? rcu_note_context_switch+0x4e0/0x4e0
[  444.809343]  ? vmacache_find+0xbc/0x110
[  444.810615]  ? vmacache_update+0x68/0x80
[  444.811869]  ? up_read+0x3b/0x90
[  444.813094]  ? __do_page_fault+0x432/0x6d0
[  444.814406]  ? bad_area_access_error+0xf0/0xf0
[  444.815807]  ? lockdep_sys_exit+0x16/0x31
[  444.817050]  ? syscall_return_slowpath+0x18d/0x610
[  444.818445]  ? do_page_fault+0xa9/0x420
[  444.819753]  ? __do_page_fault+0x6d0/0x6d0
[  444.821001]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  444.823102]  ? prepare_exit_to_usermode+0x23e/0x310
[  444.824555]  ? lockdep_sys_exit+0x16/0x31
[  444.825872]  ? prepare_exit_to_usermode+0x119/0x310
[  444.827361]  ? tracehook_report_syscall_exit+0x180/0x180
[  444.828806]  ? mark_held_locks+0x23/0xb0
[  444.830215]  ? retint_user+0x18/0x18
[  444.831436]  ? page_fault+0x8/0x30
[  444.832692]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  444.834107]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  444.835591] RIP: 0033:0x7f2626a8f667
[  444.836885] Code: 00 00 90 48 8b 05 e9 67 2c 00 64 c7 00 26 00 00 00 48 c7 
c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 
f0 ff ff 73 01 c3 48 8b 0d b9 67 2c 00 f7 d8 64 89 01 48
[  444.842256] RSP: 002b:00007ffc4470ed58 EFLAGS: 00000202 ORIG_RAX: 
0000000000000010
[  444.844204] RAX: ffffffffffffffda RBX: 00007ffc44710f20 RCX: 00007f2626a8f667
[  444.846120] RDX: 00007ffc4470fd80 RSI: 000000005000943a RDI: 0000000000000003
[  444.847938] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  444.849817] R10: fffffffffffff807 R11: 0000000000000202 R12: 00007ffc44710f20
[  444.851761] R13: 0000000000000000 R14: 0000000000000003 R15: 00007ffc44710f28

[  444.855000] Allocated by task 4534:
[  444.856353]  kasan_kmalloc+0xbf/0xe0
[  444.857700]  kmem_cache_alloc_trace+0x141/0x350
[  444.859314]  btrfs_alloc_device+0xe8/0x4d0 [btrfs]
[  444.860867]  close_fs_devices.part.44+0x282/0x4d0 [btrfs]
[  444.862597]  btrfs_close_devices+0x53/0xf0 [btrfs]
[  444.864138]  btrfs_mount_root+0xb2c/0xe80 [btrfs]
[  444.865637]  mount_fs+0x5c/0x1a3
[  444.867064]  vfs_kern_mount.part.38+0xa8/0x260
[  444.868569]  btrfs_mount+0x352/0x1170 [btrfs]
[  444.870127]  mount_fs+0x5c/0x1a3
[  444.871471]  vfs_kern_mount.part.38+0xa8/0x260
[  444.873018]  do_mount+0x36a/0x16b0
[  444.874425]  ksys_mount+0xba/0xd0
[  444.875852]  __x64_sys_mount+0x62/0x70
[  444.877252]  do_syscall_64+0x16b/0xc30
[  444.878682]  entry_SYSCALL_64_after_hwframe+0x49/0xbe

[  444.881439] Freed by task 4575:
[  444.883336]  __kasan_slab_free+0x12e/0x180
[  444.884812]  kfree+0xf0/0x2f0
[  444.886153]  rcu_process_callbacks+0x9d9/0x1ae0
[  444.887633]  __do_softirq+0x1cf/0x788

[  444.890150] The buggy address belongs to the object at ffff8801542ad0a8
                which belongs to the cache kmalloc-1024 of size 1024
[  444.893597] The buggy address is located 296 bytes inside of
                1024-byte region [ffff8801542ad0a8, ffff8801542ad4a8)
[  444.897004] The buggy address belongs to the page:
[  444.898486] page:ffffea000550aa00 count:1 mapcount:0 
mapping:ffff88015a40ea40 index:0xffff8801542a8568 compound_mapcount: 0
[  444.901682] flags: 0x8000000000008100(slab|head)
[  444.903299] raw: 8000000000008100 ffffea00055c3e08 ffffea00055a3e08 
ffff88015a40ea40
[  444.905207] raw: ffff8801542a8568 0000000000170014 00000001ffffffff 
0000000000000000
[  444.907218] page dumped because: kasan: bad access detected

[  444.910036] Memory state around the buggy address:
[  444.911771]  ffff8801542ad080: fc fc fc fc fc fb fb fb fb fb fb fb fb fb fb 
fb
[  444.913922]  ffff8801542ad100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
fb
[  444.915898] >ffff8801542ad180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
fb
[  444.917769]                                                  ^
[  444.919606]  ffff8801542ad200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
fb
[  444.921517]  ffff8801542ad280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
fb
[  444.923485] 
==================================================================
[  444.925350] Disabling lock debugging due to kernel taint


>
>Also I found another issue - if the device being deleted is a seed
>device as in btrfs/164, we don't have to call
>btrfs_update_commit_device_size() as because we don't write its super.
>But this isn't related to this commit nor the GPF that you saw.
>
>Thanks, Anand
>
>
>
>> [  212.036659] Code: ef e8 60 cc 72 e1 49 8b 96 08 01 00 00 48 8b 0a 48 8d 
>> 82 d8 fe ff ff 48 8d b1 d8 fe ff ff 49 39 d4 74 47 48 8b b8 30 01 00 00 <48> 
>> 89 79 08 48 89 0f 48 89 90 28 01 00 00 48 89 90 30 01 00 00 48
>> [  212.052862] RSP: 0018:ffffc90000c3bbc0 EFLAGS: 00010202
>> [  212.057537] RAX: ffff88004d45ea88 RBX: ffff88005f246820 RCX: 
>> 6b6b6b6b6b6b6b6b
>> [  212.066491] RDX: ffff88004d45ebb0 RSI: 6b6b6b6b6b6b6a43 RDI: 
>> 6b6b6b6b6b6b6b6b
>> [  212.072735] RBP: ffffc90000c3bbe0 R08: 0000000000000000 R09: 
>> 0000000000000001
>> [  212.078961] R10: ffffc90000c3bbb0 R11: ffffffff82ea2800 R12: 
>> ffff88005f2468d0
>> [  212.084967] R13: ffff880066e4c910 R14: ffff88005f2467c8 R15: 
>> ffff880066e4d138
>> [  212.093457] FS:  00007fca3f6e08c0(0000) GS:ffff88007f800000(0000) 
>> knlGS:0000000000000000
>> [  212.099305] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>> [  212.103643] CR2: 00007fdd21385f88 CR3: 0000000075c4e000 CR4: 
>> 00000000000006e0
>> [  212.108514] Call Trace:
>> [  212.110829]  btrfs_commit_transaction+0x525/0x980 [btrfs]
>> [  212.114745]  btrfs_rm_device+0x527/0x560 [btrfs]
>> [  212.118082]  btrfs_ioctl+0x2e99/0x31e0 [btrfs]
>> [  212.123417]  ? __lock_acquire+0x396/0x1910
>> [  212.126360]  ? __might_fault+0x3e/0x90
>> [  212.128924]  ? __might_fault+0x85/0x90
>> [  212.131398]  ? _copy_to_user+0x65/0x80
>> [  212.133870]  ? cp_new_stat+0x120/0x150
>> [  212.136354]  ? native_sched_clock+0x3e/0xa0
>> [  212.138825]  do_vfs_ioctl+0xa9/0x6c0
>> [  212.141175]  ? btrfs_ioctl_get_supported_features+0x30/0x30 [btrfs]
>> [  212.144476]  ? do_vfs_ioctl+0xa9/0x6c0
>> [  212.146889]  ? trace_hardirqs_on+0xd/0x10
>> [  212.149210]  ksys_ioctl+0x67/0x90
>> [  212.151499]  __x64_sys_ioctl+0x1a/0x20
>> [  212.154064]  do_syscall_64+0x6d/0x690
>> [  212.156146]  ? trace_hardirqs_off_thunk+0x1a/0x1c
>> [  212.158720]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
>> [  212.161363] RIP: 0033:0x7fca3e4c1667
>> [  212.163437] Code: 00 00 90 48 8b 05 e9 67 2c 00 64 c7 00 26 00 00 00 48 
>> c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 
>> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b9 67 2c 00 f7 d8 64 89 01 48
>> [  212.172921] RSP: 002b:00007ffffaf1ba08 EFLAGS: 00000202 ORIG_RAX: 
>> 0000000000000010
>> [  212.176599] RAX: ffffffffffffffda RBX: 00007ffffaf1dbd0 RCX: 
>> 00007fca3e4c1667
>> [  212.179912] RDX: 00007ffffaf1ca30 RSI: 000000005000943a RDI: 
>> 0000000000000003
>> [  212.184742] RBP: 0000000000000000 R08: 0000000000000000 R09: 
>> 0000000000000000
>> [  212.188250] R10: fffffffffffff807 R11: 0000000000000202 R12: 
>> 00007ffffaf1dbd0
>> [  212.191810] R13: 0000000000000000 R14: 0000000000000003 R15: 
>> 00007ffffaf1dbd8
>> [  212.195309] Modules linked in: btrfs(O) xor zstd_decompress zstd_compress 
>> xxhash raid6_pq efivarfs xfs virtio_scsi [last unloaded: xor]
>> [  212.201294] ---[ end trace d9007c0cfa00d04e ]---
>> [  212.203760] RIP: 0010:btrfs_update_commit_device_size+0x74/0xd0 [btrfs]
>> [  212.207008] Code: ef e8 60 cc 72 e1 49 8b 96 08 01 00 00 48 8b 0a 48 8d 
>> 82 d8 fe ff ff 48 8d b1 d8 fe ff ff 49 39 d4 74 47 48 8b b8 30 01 00 00 <48> 
>> 89 79 08 48 89 0f 48 89 90 28 01 00 00 48 89 90 30 01 00 00 48
>> [  212.221356] RSP: 0018:ffffc90000c3bbc0 EFLAGS: 00010202
>> [  212.224982] RAX: ffff88004d45ea88 RBX: ffff88005f246820 RCX: 
>> 6b6b6b6b6b6b6b6b
>> [  212.229116] RDX: ffff88004d45ebb0 RSI: 6b6b6b6b6b6b6a43 RDI: 
>> 6b6b6b6b6b6b6b6b
>> [  212.233170] RBP: ffffc90000c3bbe0 R08: 0000000000000000 R09: 
>> 0000000000000001
>> [  212.237057] R10: ffffc90000c3bbb0 R11: ffffffff82ea2800 R12: 
>> ffff88005f2468d0
>> [  212.240578] R13: ffff880066e4c910 R14: ffff88005f2467c8 R15: 
>> ffff880066e4d138
>> [  212.244531] FS:  00007fca3f6e08c0(0000) GS:ffff88007f800000(0000) 
>> knlGS:0000000000000000
>> [  212.249183] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>> [  212.252270] CR2: 00007fdd21385f88 CR3: 0000000075c4e000 CR4: 
>> 00000000000006e0
>> [  513.015417] kworker/dying (7) used greatest stack depth: 10056 bytes left
>> 
>
>


--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to