Re: [ANNOUNCE] new new aops patchset

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Apr 05, 2007 at 10:10:18AM +1000, David Chinner wrote:
> On Mon, Apr 02, 2007 at 02:09:34PM +0200, Nick Piggin wrote:
> > Updated aops patchset against 2.6.21-rc5.
> > 
> > http://www.kernel.org/pub/linux/kernel/people/npiggin/patches/new-aops/
> > 
> > Files/dirs are 2.6.21-rc5-new-aops*
> > 
> > Contains numerous fixes from Mark and myself -- I'd say the core code is
> > getting reasonably stable at this point.
> ......
> 
> > (compile only) patches for NFS, XFS, FUSE, eCryptfs. OK, they're untested,
> 
> Failed to compile in UDF and reiser for me, but no doubt you know
> that already. Don't have time to look at why - I just disabled them
> so I get some QA done on the XFS and core changes.

Nick - the XFSQA randholes test locks up. As you can probably guess
it creates holey files and does stuff to them ;)

Both pdflush and a write doing an a blocked waiting for a page to become unlocked. 
They are both waiting on teh same page (0xa0007fffffe8bd68).



[0]kdb> btt 0xe0000039ec2b8000
Stack traceback for pid 113
0xe0000039ec2b8000      113       19  0    3   D  0xe0000039ec2b82f0  pdflush
0xa0000001008bcdb0 schedule+0x9b0
        args (0xe0000039ec207020, 0xe0000039ec2070a8, 0xa0000001001f3fa0, 0x206, 0xa000000100eee5a0)
0xa0000001008bf4b0 io_schedule+0x50
        args (0xe00000b0030258d4, 0xa0000001001338c0, 0x205, 0xa000000100eee5a0)
0xa0000001001338c0 sync_page+0x100
        args (0xa0007fffffe8bd68, 0xa0000001008bfd20, 0x58e, 0xa000000100eee5a0)
0xa0000001008bfd20 __wait_on_bit_lock+0x160
        args (0xe00000b005905e20, 0xe0000039ec2bfb40, 0xa000000100accf30, 0x2, 0xe0000039ec2bfb90)
0xa000000100133760 __lock_page+0x180
        args (0xa0007fffffe8bd68, 0xa000000100143b30, 0x917, 0x917)
0xa000000100143b30 generic_writepages+0x450
        args (0xe00000b47b2a65f0, 0xe0000039ec2bfcd8, 0xa0007fffffe8bd68, 0xe0000039ec2bfbe8, 0x2)
0xa00000010044be70 xfs_vm_writepages+0x50
        args (0xe00000b47b2a65f0, 0xe0000039ec2bfcd8, 0xa000000100144030, 0x308, 0xa0000001000d1870)
0xa000000100144030 do_writepages+0xb0
        args (0xe00000b47b2a65f0, 0xe0000039ec2bfcd8, 0xe0000039ec2bfd10, 0xa0000001001eb8e0, 0x691)
0xa0000001001eb8e0 __writeback_single_inode+0x140
        args (0xe00000b47b2a64c8, 0xe0000039ec2bfcd8, 0x7, 0xe00000b47b2a6700, 0xe00000b47b2a65d8)
0xa0000001001ecbd0 sync_sb_inodes+0x490
        args (0xe0000039eb96fb48, 0xe0000039ec2bfcd8, 0xe0000039ec207140, 0xe00000b47b2a64c8, 0xe0000039eb96fc30)
0xa0000001001ed940 writeback_inodes+0x160
        args (0xe0000039ec2bfcd8, 0xe0000039eb96fb48, 0xe0000039eb96fbb8, 0xa000000100c51e48, 0xe0000039ec2bfcf0)
0xa0000001001452a0 wb_kupdate+0x280
        args (0x34eb, 0xe0000039ec2bfcf0, 0xe0000039ec2bfd10, 0x1000036af, 0xe0000039ec2bfcd8)
0xa000000100145f70 pdflush+0x2d0
        args (0xa000000100cbfa10, 0xe0000039ec2bfd88, 0xe0000039ec2bfd90, 0xe0000039ec2bfd78, 0xa000000100bb1a80)
0xa0000001000fb640 kthread+0x260
        args (0xe0000039ee1c7d10, 0xffffffffffffffff, 0x0, 0xa000000100acd590, 0xfffffffffffffffc)
0xa0000001000124b0 kernel_thread_helper+0xd0
        args (0xa000000100acead0, 0xe0000039ee1c7d10, 0xa0000001000094c0, 0x2, 0xa000000100eee5a0)
0xa0000001000094c0 start_kernel_thread+0x20
        args (0xa000000100acead0, 0xe0000039ee1c7d10)
[0]kdb> btt 0xe0000030101d8000
Stack traceback for pid 8416
0xe0000030101d8000     8416     8242  0    3   D  0xe0000030101d82f0  randholes
0xa0000001008bcdb0 schedule+0x9b0
        args (0xe0000039ec207020, 0xe0000039ec2070a8, 0xa0000001001f3fa0, 0x206, 0xa000000100eee5a0)
0xa0000001008bf4b0 io_schedule+0x50
        args (0xe00000b0030258d4, 0xa0000001001338c0, 0x205, 0xa000000100eee5a0)
0xa0000001001338c0 sync_page+0x100
        args (0xa0007fffffe8bd68, 0xa0000001008bfd20, 0x58e, 0xa000000100eee5a0)
0xa0000001008bfd20 __wait_on_bit_lock+0x160
        args (0xe00000b005905e20, 0xe0000030101dfbb0, 0xa000000100accf30, 0x2, 0xa0000001008c2520)
0xa000000100133760 __lock_page+0x180
        args (0xa0007fffffe8bd68, 0xa000000100133d10, 0x48b, 0x0)
0xa000000100133d10 find_lock_page+0xf0
        args (0xe00000b47b2a65f0, 0x275a, 0xa0007fffffe8bd68, 0xe00000b47b2a6608, 0xe00000b47b2a65f8)
0xa000000100134550 __grab_cache_page+0x30
        args (0xe00000b47b2a65f0, 0x275a, 0x3fff, 0xe00000b47b2a6660, 0xfffff)
0xa0000001001f9fa0 block_write_begin+0x1a0
        args (0x0, 0xe00000b47b2a65f0, 0x9d69000, 0x3000, 0x1)
0xa000000100447630 xfs_vm_write_begin+0x50
        args (0x0, 0xe00000b47b2a65f0, 0x9d69000, 0x3000, 0x1)
0xa000000100138d50 pagecache_write_begin+0x90
        args (0x0, 0xe00000b47b2a65f0, 0x9d69000, 0x3000, 0x1)
0xa00000010045df90 xfs_iozero+0x90
        args (0xe00000b47b2a65f0, 0x9d69000, 0x7000, 0xe00000300e23e0b8, 0x3000)
0xa00000010045eaa0 xfs_zero_eof+0x500
        args (0xe00000b47b2a64c8, 0xe00000300e23e150, 0xad36000, 0x9d70000, 0xad35)
0xa0000001004611f0 xfs_write+0xc10
        args (0xe00000300e23e018, 0xe0000030101dfd40, 0xe0000030101dfd30, 0x200, 0xe0000030101dfdc0)
0xa0000001004543e0 __xfs_file_write+0xe0
        args (0xe0000030101dfd40, 0xe0000030101dfd30, 0x1, 0x1, 0xad36000)
0xa0000001004544e0 xfs_file_aio_write+0x40
        args (0xe0000030101dfd40, 0xe0000030101dfd30, 0x1, 0xad36000, 0xa0000001001a11b0)
0xa0000001001a11b0 do_sync_write+0x170
        args (0xa000000100cd7c78, 0xe00000b006679650, 0xa000000100cd7c50, 0xe0000030101dfe38, 0xe0000030101dfd40)
0xa0000001001a2860 vfs_write+0x1a0
        args (0xe00000b006679630, 0x6000000000018020, 0x200, 0xe0000030101dfe38, 0xe00000b006679650)
0xa0000001001a3530 sys_write+0x70
        args (0x3, 0x6000000000018020, 0x200, 0xc000000000000793, 0x250)
0xa00000010000bc40 ia64_ret_from_syscall
        args (0x3, 0x6000000000018020, 0x200, 0xc000000000000793)
0xa000000000010620 __kernel_syscall_via_break
        args (0x3, 0x6000000000018020, 0x200, 0xc000000000000793)

The page:

[0]kdb> md8c8 0xa0007fffffe8bd68
0xa0007fffffe8bd68 0100000000000835 ffffffff00000005   5...............
0xa0007fffffe8bd78 e00000b47aa88228 e00000b47b2a65f0   (..z.....e*{....
                   ^^^^^^^^^^^^^^^^ buffers
0xa0007fffffe8bd88 000000000000275a a0007fffffe8a660   Z'......`.......
0xa0007fffffe8bd98 a0007ffff7aab928 0100000000080000   (...............

kdb> inode_pages 0xe00000b47b2a64c8
page_struct       index   cnt zone nid flags
e000003010324000   5274     3   0   0 0x824 Referenced LRU Private
        bh 0xe000003479f8d0a8 bno 18446744073709551615 []
        bh 0xe00000b47ad7d0a8 bno    53132 [Uptodate Mapped]
        bh 0xe000003479f8e228 bno 18446744073709551615 []
        bh 0xe00000b47ad7fca8 bno 18446744073709551615 []
 mapping= e00000b47b2a65f0
e00000b079f80000   7637     3   0   1 0x100000000000824 Referenced LRU Private
        bh 0xe00000b47ad7cc28 bno 18446744073709551615 []
        bh 0xe000003479f8cfa8 bno 18446744073709551615 []
        bh 0xe00000b47ad7f028 bno 18446744073709551615 []
        bh 0xe000003479f8f7a8 bno    53082 [Uptodate Mapped]
 mapping= e00000b47b2a65f0
e00000b9e56ac000  10074     5   0   1 0x100000000000835 Locked Referenced Dirty LRU Private
        bh 0xe00000b47aa88228 bno 18446744073709551615 [Uptodate Dirty Mapped Delay]
           ^^^^^^^^^^^^^^^^^^
        bh 0xe000003479f8e3a8 bno 18446744073709551615 []
        bh 0xe00000b47aa882a8 bno 18446744073709551615 []
        bh 0xe000003479f8fd28 bno 18446744073709551615 []
 mapping= e00000b47b2a65f0

So the page is locked and it has a delalloc buffer on it that used to
be a hole. The problem page is at EOF....

No idea what is going write yet.....

Cheers,

Dave.
-- 
Dave Chinner
Principal Engineer
SGI Australian Software Group
-
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux