Bug 2000482
Summary: | BTRFS error: Unsupported V0 extent filesystem detected | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Dan Horák <dan> |
Component: | kernel | Assignee: | fedora-kernel-btrfs |
Status: | CLOSED EOL | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 34 | CC: | acaringi, adscvr, airlied, alciregi, bskeggs, bugzilla, hdegoede, jarodwilson, jeremy, jglisse, jonathan, josef, kernel-maint, lgoncalv, linville, masami256, mchehab, ptalbert, pwhalen, steved |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | aarch64 | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-06-07 21:08:14 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 245418 |
Description
Dan Horák
2021-09-02 08:51:09 UTC
Does the problem happen with 5.13.11? Or 5.14.6? Upstream report: https://lore.kernel.org/linux-btrfs/CAJCQCtQsqsDwzUegUgYAo2PccUP9q=DKKA7kUNtRcbttW-nQrw@mail.gmail.com/T/#u We could use more information how to reproduce the bug. What version btrfs-progs was used for mkfs? And what kernel version first mounted and wrote to this file system, if it wasn't kernel 5.13.12? Was it ever written to by any other architecture? Thanks. The system was a fresh installation of F-34 on the hw and then updated. So the filesystem was created by the F-34 GA versions of kernel and btrfs-progs. The system is part of our production CI and got re-provisioned (with ext4) since then. But there is a suspicion that the 5.13 kernels brought some instability for the APM Mustang systems, because we saw a number of issues even with ext4 on them. I mean this report might be only a symptom of some other underlying issue that specific to the Mustangs ... Theoretically it could be even a hw issue, but the 5.11 or 5.12 kernels seems to work OK there. Unfortunately we don't have a spare Mustang currently for further experiments. IMO it would be good to know if there are any similar reports for 5.13 kernels from the same aarch64 hw (APM Mustang). FWIW the ext4 related issue looks like this Sep 08 11:14:52 apm-mustang-ev3-05 kernel: watchdog: BUG: soft lockup - CPU#5 stuck for 50557s! [tar:3389598] Sep 08 11:14:52 apm-mustang-ev3-05 kernel: Modules linked in: crypto_user nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_> Sep 08 11:14:53 apm-mustang-ev3-05 kernel: CPU: 5 PID: 3389598 Comm: tar Tainted: G D W L 5.13.12-200.fc34.aarch64 #1 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: Hardware name: AppliedMicro X-Gene Mustang Board/X-Gene Mustang Board, BIOS 3.06.25 Oct 17 2016 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: pstate: 00400005 (nzcv daif +PAN -UAO -TCO BTYPE=--) Sep 08 11:14:53 apm-mustang-ev3-05 kernel: pc : queued_spin_lock_slowpath+0x204/0x390 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: lr : locked_inode_to_wb_and_lock_list+0xf0/0x174 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: sp : ffff800019843930 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: x29: ffff800019843930 x28: ffff0000d2d885d8 x27: ffff0000c2a94620 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: x26: ffff800019843af8 x25: 0000000000000000 x24: ffff0000d2d88660 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: x23: 0000000000000000 x22: 0000000000000001 x21: 0000000000000001 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: x20: ffff0000d2d885d8 x19: ffff00000c4ba800 x18: 0000000023b9dafb Sep 08 11:14:53 apm-mustang-ev3-05 kernel: x17: 0000000030e349b1 x16: 0000000000001800 x15: 0000000000000007 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: x14: 0000000000001400 x13: 0000000000001c00 x12: 0000000000000040 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: x11: ffff0001487ef230 x10: 0000000000000000 x9 : 0000000000180000 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: x8 : 0000000000000000 x7 : ffff0003fdeeba40 x6 : ffff800011da5a40 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: x5 : ffff0003fdeeba40 x4 : 0000000000180101 x3 : ffff00000c4ba858 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: x2 : 0000000000000000 x1 : 0000000000180101 x0 : 0000000000000000 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: Call trace: Sep 08 11:14:53 apm-mustang-ev3-05 kernel: queued_spin_lock_slowpath+0x204/0x390 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: __mark_inode_dirty+0x2e8/0x3c0 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: ext4_mb_new_blocks+0x108/0x660 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: ext4_ext_map_blocks+0x64c/0x8c0 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: ext4_map_blocks+0x180/0x5ac Sep 08 11:14:53 apm-mustang-ev3-05 kernel: ext4_getblk+0x58/0x280 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: ext4_bread+0x20/0xd0 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: ext4_append+0x58/0x110 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: ext4_init_new_dir+0x78/0x1c0 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: ext4_mkdir+0x19c/0x370 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: vfs_mkdir+0x140/0x1ec Sep 08 11:14:53 apm-mustang-ev3-05 kernel: do_mkdirat+0x12c/0x14c Sep 08 11:14:53 apm-mustang-ev3-05 kernel: __arm64_sys_mkdirat+0x2c/0x40 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: invoke_syscall+0x50/0x120 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: el0_svc_common.constprop.0+0x4c/0x100 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: do_el0_svc+0x34/0xa0 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: el0_svc+0x2c/0x54 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: el0_sync_handler+0xa4/0x130 Sep 08 11:14:53 apm-mustang-ev3-05 kernel: el0_sync+0x19c/0x1c0 This message is a reminder that Fedora Linux 34 is nearing its end of life. Fedora will stop maintaining and issuing updates for Fedora Linux 34 on 2022-06-07. It is Fedora's policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as EOL if it remains open with a 'version' of '34'. Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, change the 'version' to a later Fedora Linux version. Thank you for reporting this issue and we are sorry that we were not able to fix it before Fedora Linux 34 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora Linux, you are encouraged to change the 'version' to a later version prior to this bug being closed. Also looks like a dup: https://bugzilla.redhat.com/show_bug.cgi?id=2000482 Fedora Linux 34 entered end-of-life (EOL) status on 2022-06-07. Fedora Linux 34 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of Fedora please feel free to reopen this bug against that version. If you are unable to reopen this bug, please file a new report against the current release. Thank you for reporting this bug and we are sorry it could not be fixed. |