From: David Chinner <dgc@sgi.com>
To: David Chinner <dgc@sgi.com>
Cc: Nick Piggin <npiggin@suse.de>,
Linux Filesystems <linux-fsdevel@vger.kernel.org>,
Mark Fasheh <mark.fasheh@oracle.com>,
Steven Whitehouse <swhiteho@redhat.com>
Subject: Re: [ANNOUNCE] new new aops patchset
Date: Thu, 5 Apr 2007 12:43:50 +1000 [thread overview]
Message-ID: <20070405024350.GL32602149@melbourne.sgi.com> (raw)
In-Reply-To: <20070405001018.GK32602149@melbourne.sgi.com>
On Thu, Apr 05, 2007 at 10:10:18AM +1000, David Chinner wrote:
> On Mon, Apr 02, 2007 at 02:09:34PM +0200, Nick Piggin wrote:
> > Updated aops patchset against 2.6.21-rc5.
> >
> > http://www.kernel.org/pub/linux/kernel/people/npiggin/patches/new-aops/
> >
> > Files/dirs are 2.6.21-rc5-new-aops*
> >
> > Contains numerous fixes from Mark and myself -- I'd say the core code is
> > getting reasonably stable at this point.
> ......
>
> > (compile only) patches for NFS, XFS, FUSE, eCryptfs. OK, they're untested,
>
> Failed to compile in UDF and reiser for me, but no doubt you know
> that already. Don't have time to look at why - I just disabled them
> so I get some QA done on the XFS and core changes.
Nick - the XFSQA randholes test locks up. As you can probably guess
it creates holey files and does stuff to them ;)
Both pdflush and a write doing an a blocked waiting for a page to become unlocked.
They are both waiting on teh same page (0xa0007fffffe8bd68).
[0]kdb> btt 0xe0000039ec2b8000
Stack traceback for pid 113
0xe0000039ec2b8000 113 19 0 3 D 0xe0000039ec2b82f0 pdflush
0xa0000001008bcdb0 schedule+0x9b0
args (0xe0000039ec207020, 0xe0000039ec2070a8, 0xa0000001001f3fa0, 0x206, 0xa000000100eee5a0)
0xa0000001008bf4b0 io_schedule+0x50
args (0xe00000b0030258d4, 0xa0000001001338c0, 0x205, 0xa000000100eee5a0)
0xa0000001001338c0 sync_page+0x100
args (0xa0007fffffe8bd68, 0xa0000001008bfd20, 0x58e, 0xa000000100eee5a0)
0xa0000001008bfd20 __wait_on_bit_lock+0x160
args (0xe00000b005905e20, 0xe0000039ec2bfb40, 0xa000000100accf30, 0x2, 0xe0000039ec2bfb90)
0xa000000100133760 __lock_page+0x180
args (0xa0007fffffe8bd68, 0xa000000100143b30, 0x917, 0x917)
0xa000000100143b30 generic_writepages+0x450
args (0xe00000b47b2a65f0, 0xe0000039ec2bfcd8, 0xa0007fffffe8bd68, 0xe0000039ec2bfbe8, 0x2)
0xa00000010044be70 xfs_vm_writepages+0x50
args (0xe00000b47b2a65f0, 0xe0000039ec2bfcd8, 0xa000000100144030, 0x308, 0xa0000001000d1870)
0xa000000100144030 do_writepages+0xb0
args (0xe00000b47b2a65f0, 0xe0000039ec2bfcd8, 0xe0000039ec2bfd10, 0xa0000001001eb8e0, 0x691)
0xa0000001001eb8e0 __writeback_single_inode+0x140
args (0xe00000b47b2a64c8, 0xe0000039ec2bfcd8, 0x7, 0xe00000b47b2a6700, 0xe00000b47b2a65d8)
0xa0000001001ecbd0 sync_sb_inodes+0x490
args (0xe0000039eb96fb48, 0xe0000039ec2bfcd8, 0xe0000039ec207140, 0xe00000b47b2a64c8, 0xe0000039eb96fc30)
0xa0000001001ed940 writeback_inodes+0x160
args (0xe0000039ec2bfcd8, 0xe0000039eb96fb48, 0xe0000039eb96fbb8, 0xa000000100c51e48, 0xe0000039ec2bfcf0)
0xa0000001001452a0 wb_kupdate+0x280
args (0x34eb, 0xe0000039ec2bfcf0, 0xe0000039ec2bfd10, 0x1000036af, 0xe0000039ec2bfcd8)
0xa000000100145f70 pdflush+0x2d0
args (0xa000000100cbfa10, 0xe0000039ec2bfd88, 0xe0000039ec2bfd90, 0xe0000039ec2bfd78, 0xa000000100bb1a80)
0xa0000001000fb640 kthread+0x260
args (0xe0000039ee1c7d10, 0xffffffffffffffff, 0x0, 0xa000000100acd590, 0xfffffffffffffffc)
0xa0000001000124b0 kernel_thread_helper+0xd0
args (0xa000000100acead0, 0xe0000039ee1c7d10, 0xa0000001000094c0, 0x2, 0xa000000100eee5a0)
0xa0000001000094c0 start_kernel_thread+0x20
args (0xa000000100acead0, 0xe0000039ee1c7d10)
[0]kdb> btt 0xe0000030101d8000
Stack traceback for pid 8416
0xe0000030101d8000 8416 8242 0 3 D 0xe0000030101d82f0 randholes
0xa0000001008bcdb0 schedule+0x9b0
args (0xe0000039ec207020, 0xe0000039ec2070a8, 0xa0000001001f3fa0, 0x206, 0xa000000100eee5a0)
0xa0000001008bf4b0 io_schedule+0x50
args (0xe00000b0030258d4, 0xa0000001001338c0, 0x205, 0xa000000100eee5a0)
0xa0000001001338c0 sync_page+0x100
args (0xa0007fffffe8bd68, 0xa0000001008bfd20, 0x58e, 0xa000000100eee5a0)
0xa0000001008bfd20 __wait_on_bit_lock+0x160
args (0xe00000b005905e20, 0xe0000030101dfbb0, 0xa000000100accf30, 0x2, 0xa0000001008c2520)
0xa000000100133760 __lock_page+0x180
args (0xa0007fffffe8bd68, 0xa000000100133d10, 0x48b, 0x0)
0xa000000100133d10 find_lock_page+0xf0
args (0xe00000b47b2a65f0, 0x275a, 0xa0007fffffe8bd68, 0xe00000b47b2a6608, 0xe00000b47b2a65f8)
0xa000000100134550 __grab_cache_page+0x30
args (0xe00000b47b2a65f0, 0x275a, 0x3fff, 0xe00000b47b2a6660, 0xfffff)
0xa0000001001f9fa0 block_write_begin+0x1a0
args (0x0, 0xe00000b47b2a65f0, 0x9d69000, 0x3000, 0x1)
0xa000000100447630 xfs_vm_write_begin+0x50
args (0x0, 0xe00000b47b2a65f0, 0x9d69000, 0x3000, 0x1)
0xa000000100138d50 pagecache_write_begin+0x90
args (0x0, 0xe00000b47b2a65f0, 0x9d69000, 0x3000, 0x1)
0xa00000010045df90 xfs_iozero+0x90
args (0xe00000b47b2a65f0, 0x9d69000, 0x7000, 0xe00000300e23e0b8, 0x3000)
0xa00000010045eaa0 xfs_zero_eof+0x500
args (0xe00000b47b2a64c8, 0xe00000300e23e150, 0xad36000, 0x9d70000, 0xad35)
0xa0000001004611f0 xfs_write+0xc10
args (0xe00000300e23e018, 0xe0000030101dfd40, 0xe0000030101dfd30, 0x200, 0xe0000030101dfdc0)
0xa0000001004543e0 __xfs_file_write+0xe0
args (0xe0000030101dfd40, 0xe0000030101dfd30, 0x1, 0x1, 0xad36000)
0xa0000001004544e0 xfs_file_aio_write+0x40
args (0xe0000030101dfd40, 0xe0000030101dfd30, 0x1, 0xad36000, 0xa0000001001a11b0)
0xa0000001001a11b0 do_sync_write+0x170
args (0xa000000100cd7c78, 0xe00000b006679650, 0xa000000100cd7c50, 0xe0000030101dfe38, 0xe0000030101dfd40)
0xa0000001001a2860 vfs_write+0x1a0
args (0xe00000b006679630, 0x6000000000018020, 0x200, 0xe0000030101dfe38, 0xe00000b006679650)
0xa0000001001a3530 sys_write+0x70
args (0x3, 0x6000000000018020, 0x200, 0xc000000000000793, 0x250)
0xa00000010000bc40 ia64_ret_from_syscall
args (0x3, 0x6000000000018020, 0x200, 0xc000000000000793)
0xa000000000010620 __kernel_syscall_via_break
args (0x3, 0x6000000000018020, 0x200, 0xc000000000000793)
The page:
[0]kdb> md8c8 0xa0007fffffe8bd68
0xa0007fffffe8bd68 0100000000000835 ffffffff00000005 5...............
0xa0007fffffe8bd78 e00000b47aa88228 e00000b47b2a65f0 (..z.....e*{....
^^^^^^^^^^^^^^^^ buffers
0xa0007fffffe8bd88 000000000000275a a0007fffffe8a660 Z'......`.......
0xa0007fffffe8bd98 a0007ffff7aab928 0100000000080000 (...............
kdb> inode_pages 0xe00000b47b2a64c8
page_struct index cnt zone nid flags
e000003010324000 5274 3 0 0 0x824 Referenced LRU Private
bh 0xe000003479f8d0a8 bno 18446744073709551615 []
bh 0xe00000b47ad7d0a8 bno 53132 [Uptodate Mapped]
bh 0xe000003479f8e228 bno 18446744073709551615 []
bh 0xe00000b47ad7fca8 bno 18446744073709551615 []
mapping= e00000b47b2a65f0
e00000b079f80000 7637 3 0 1 0x100000000000824 Referenced LRU Private
bh 0xe00000b47ad7cc28 bno 18446744073709551615 []
bh 0xe000003479f8cfa8 bno 18446744073709551615 []
bh 0xe00000b47ad7f028 bno 18446744073709551615 []
bh 0xe000003479f8f7a8 bno 53082 [Uptodate Mapped]
mapping= e00000b47b2a65f0
e00000b9e56ac000 10074 5 0 1 0x100000000000835 Locked Referenced Dirty LRU Private
bh 0xe00000b47aa88228 bno 18446744073709551615 [Uptodate Dirty Mapped Delay]
^^^^^^^^^^^^^^^^^^
bh 0xe000003479f8e3a8 bno 18446744073709551615 []
bh 0xe00000b47aa882a8 bno 18446744073709551615 []
bh 0xe000003479f8fd28 bno 18446744073709551615 []
mapping= e00000b47b2a65f0
So the page is locked and it has a delalloc buffer on it that used to
be a hole. The problem page is at EOF....
No idea what is going write yet.....
Cheers,
Dave.
--
Dave Chinner
Principal Engineer
SGI Australian Software Group
next prev parent reply other threads:[~2007-04-05 2:44 UTC|newest]
Thread overview: 43+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-04-02 12:09 [ANNOUNCE] new new aops patchset Nick Piggin
2007-04-02 20:18 ` Badari Pulavarty
2007-04-03 0:45 ` Nick Piggin
2007-04-02 20:44 ` Badari Pulavarty
2007-04-02 23:58 ` Nick Piggin
2007-04-03 15:59 ` Badari Pulavarty
2007-04-04 2:33 ` Nick Piggin
2007-04-02 21:44 ` Badari Pulavarty
2007-04-02 23:08 ` Badari Pulavarty
2007-04-02 23:14 ` Badari Pulavarty
2007-04-02 23:49 ` Nick Piggin
2007-04-03 15:57 ` Badari Pulavarty
2007-04-04 2:31 ` Nick Piggin
2007-04-02 23:31 ` Badari Pulavarty
2007-04-02 23:35 ` Nick Piggin
2007-04-02 23:56 ` Badari Pulavarty
2007-04-03 0:02 ` Nick Piggin
2007-04-03 0:00 ` Badari Pulavarty
2007-04-03 0:08 ` Nick Piggin
2007-04-03 9:31 ` Nick Piggin
2007-04-03 16:03 ` Badari Pulavarty
2007-04-04 2:37 ` Nick Piggin
2007-04-03 17:35 ` Badari Pulavarty
2007-04-04 3:05 ` Nick Piggin
2007-04-04 22:10 ` Mark Fasheh
2007-04-04 22:39 ` Badari Pulavarty
2007-04-04 22:51 ` Mark Fasheh
2007-04-04 23:02 ` Badari Pulavarty
2007-04-04 23:05 ` Badari Pulavarty
2007-04-04 23:17 ` Mark Fasheh
2007-04-04 23:32 ` Badari Pulavarty
2007-04-05 2:08 ` Nick Piggin
2007-04-05 15:21 ` Badari Pulavarty
2007-04-06 1:38 ` Nick Piggin
2007-04-05 2:09 ` Nick Piggin
2007-04-05 0:10 ` David Chinner
2007-04-05 2:13 ` Nick Piggin
2007-04-05 7:45 ` Christoph Hellwig
2007-04-05 7:58 ` Nick Piggin
2007-04-05 2:43 ` David Chinner [this message]
2007-04-05 3:00 ` Nick Piggin
2007-04-05 6:18 ` David Chinner
2007-04-05 6:40 ` Nick Piggin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20070405024350.GL32602149@melbourne.sgi.com \
--to=dgc@sgi.com \
--cc=linux-fsdevel@vger.kernel.org \
--cc=mark.fasheh@oracle.com \
--cc=npiggin@suse.de \
--cc=swhiteho@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.