From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Chinner Subject: Re: [ANNOUNCE] new new aops patchset Date: Thu, 5 Apr 2007 12:43:50 +1000 Message-ID: <20070405024350.GL32602149@melbourne.sgi.com> References: <20070402120934.GA19626@wotan.suse.de> <20070405001018.GK32602149@melbourne.sgi.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Nick Piggin , Linux Filesystems , Mark Fasheh , Steven Whitehouse To: David Chinner Return-path: Received: from netops-testserver-4-out.sgi.com ([192.48.171.29]:35129 "EHLO relay.sgi.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753049AbXDECoH (ORCPT ); Wed, 4 Apr 2007 22:44:07 -0400 Content-Disposition: inline In-Reply-To: <20070405001018.GK32602149@melbourne.sgi.com> Sender: linux-fsdevel-owner@vger.kernel.org List-Id: linux-fsdevel.vger.kernel.org On Thu, Apr 05, 2007 at 10:10:18AM +1000, David Chinner wrote: > On Mon, Apr 02, 2007 at 02:09:34PM +0200, Nick Piggin wrote: > > Updated aops patchset against 2.6.21-rc5. > > > > http://www.kernel.org/pub/linux/kernel/people/npiggin/patches/new-aops/ > > > > Files/dirs are 2.6.21-rc5-new-aops* > > > > Contains numerous fixes from Mark and myself -- I'd say the core code is > > getting reasonably stable at this point. > ...... > > > (compile only) patches for NFS, XFS, FUSE, eCryptfs. OK, they're untested, > > Failed to compile in UDF and reiser for me, but no doubt you know > that already. Don't have time to look at why - I just disabled them > so I get some QA done on the XFS and core changes. Nick - the XFSQA randholes test locks up. As you can probably guess it creates holey files and does stuff to them ;) Both pdflush and a write doing an a blocked waiting for a page to become unlocked. They are both waiting on teh same page (0xa0007fffffe8bd68). [0]kdb> btt 0xe0000039ec2b8000 Stack traceback for pid 113 0xe0000039ec2b8000 113 19 0 3 D 0xe0000039ec2b82f0 pdflush 0xa0000001008bcdb0 schedule+0x9b0 args (0xe0000039ec207020, 0xe0000039ec2070a8, 0xa0000001001f3fa0, 0x206, 0xa000000100eee5a0) 0xa0000001008bf4b0 io_schedule+0x50 args (0xe00000b0030258d4, 0xa0000001001338c0, 0x205, 0xa000000100eee5a0) 0xa0000001001338c0 sync_page+0x100 args (0xa0007fffffe8bd68, 0xa0000001008bfd20, 0x58e, 0xa000000100eee5a0) 0xa0000001008bfd20 __wait_on_bit_lock+0x160 args (0xe00000b005905e20, 0xe0000039ec2bfb40, 0xa000000100accf30, 0x2, 0xe0000039ec2bfb90) 0xa000000100133760 __lock_page+0x180 args (0xa0007fffffe8bd68, 0xa000000100143b30, 0x917, 0x917) 0xa000000100143b30 generic_writepages+0x450 args (0xe00000b47b2a65f0, 0xe0000039ec2bfcd8, 0xa0007fffffe8bd68, 0xe0000039ec2bfbe8, 0x2) 0xa00000010044be70 xfs_vm_writepages+0x50 args (0xe00000b47b2a65f0, 0xe0000039ec2bfcd8, 0xa000000100144030, 0x308, 0xa0000001000d1870) 0xa000000100144030 do_writepages+0xb0 args (0xe00000b47b2a65f0, 0xe0000039ec2bfcd8, 0xe0000039ec2bfd10, 0xa0000001001eb8e0, 0x691) 0xa0000001001eb8e0 __writeback_single_inode+0x140 args (0xe00000b47b2a64c8, 0xe0000039ec2bfcd8, 0x7, 0xe00000b47b2a6700, 0xe00000b47b2a65d8) 0xa0000001001ecbd0 sync_sb_inodes+0x490 args (0xe0000039eb96fb48, 0xe0000039ec2bfcd8, 0xe0000039ec207140, 0xe00000b47b2a64c8, 0xe0000039eb96fc30) 0xa0000001001ed940 writeback_inodes+0x160 args (0xe0000039ec2bfcd8, 0xe0000039eb96fb48, 0xe0000039eb96fbb8, 0xa000000100c51e48, 0xe0000039ec2bfcf0) 0xa0000001001452a0 wb_kupdate+0x280 args (0x34eb, 0xe0000039ec2bfcf0, 0xe0000039ec2bfd10, 0x1000036af, 0xe0000039ec2bfcd8) 0xa000000100145f70 pdflush+0x2d0 args (0xa000000100cbfa10, 0xe0000039ec2bfd88, 0xe0000039ec2bfd90, 0xe0000039ec2bfd78, 0xa000000100bb1a80) 0xa0000001000fb640 kthread+0x260 args (0xe0000039ee1c7d10, 0xffffffffffffffff, 0x0, 0xa000000100acd590, 0xfffffffffffffffc) 0xa0000001000124b0 kernel_thread_helper+0xd0 args (0xa000000100acead0, 0xe0000039ee1c7d10, 0xa0000001000094c0, 0x2, 0xa000000100eee5a0) 0xa0000001000094c0 start_kernel_thread+0x20 args (0xa000000100acead0, 0xe0000039ee1c7d10) [0]kdb> btt 0xe0000030101d8000 Stack traceback for pid 8416 0xe0000030101d8000 8416 8242 0 3 D 0xe0000030101d82f0 randholes 0xa0000001008bcdb0 schedule+0x9b0 args (0xe0000039ec207020, 0xe0000039ec2070a8, 0xa0000001001f3fa0, 0x206, 0xa000000100eee5a0) 0xa0000001008bf4b0 io_schedule+0x50 args (0xe00000b0030258d4, 0xa0000001001338c0, 0x205, 0xa000000100eee5a0) 0xa0000001001338c0 sync_page+0x100 args (0xa0007fffffe8bd68, 0xa0000001008bfd20, 0x58e, 0xa000000100eee5a0) 0xa0000001008bfd20 __wait_on_bit_lock+0x160 args (0xe00000b005905e20, 0xe0000030101dfbb0, 0xa000000100accf30, 0x2, 0xa0000001008c2520) 0xa000000100133760 __lock_page+0x180 args (0xa0007fffffe8bd68, 0xa000000100133d10, 0x48b, 0x0) 0xa000000100133d10 find_lock_page+0xf0 args (0xe00000b47b2a65f0, 0x275a, 0xa0007fffffe8bd68, 0xe00000b47b2a6608, 0xe00000b47b2a65f8) 0xa000000100134550 __grab_cache_page+0x30 args (0xe00000b47b2a65f0, 0x275a, 0x3fff, 0xe00000b47b2a6660, 0xfffff) 0xa0000001001f9fa0 block_write_begin+0x1a0 args (0x0, 0xe00000b47b2a65f0, 0x9d69000, 0x3000, 0x1) 0xa000000100447630 xfs_vm_write_begin+0x50 args (0x0, 0xe00000b47b2a65f0, 0x9d69000, 0x3000, 0x1) 0xa000000100138d50 pagecache_write_begin+0x90 args (0x0, 0xe00000b47b2a65f0, 0x9d69000, 0x3000, 0x1) 0xa00000010045df90 xfs_iozero+0x90 args (0xe00000b47b2a65f0, 0x9d69000, 0x7000, 0xe00000300e23e0b8, 0x3000) 0xa00000010045eaa0 xfs_zero_eof+0x500 args (0xe00000b47b2a64c8, 0xe00000300e23e150, 0xad36000, 0x9d70000, 0xad35) 0xa0000001004611f0 xfs_write+0xc10 args (0xe00000300e23e018, 0xe0000030101dfd40, 0xe0000030101dfd30, 0x200, 0xe0000030101dfdc0) 0xa0000001004543e0 __xfs_file_write+0xe0 args (0xe0000030101dfd40, 0xe0000030101dfd30, 0x1, 0x1, 0xad36000) 0xa0000001004544e0 xfs_file_aio_write+0x40 args (0xe0000030101dfd40, 0xe0000030101dfd30, 0x1, 0xad36000, 0xa0000001001a11b0) 0xa0000001001a11b0 do_sync_write+0x170 args (0xa000000100cd7c78, 0xe00000b006679650, 0xa000000100cd7c50, 0xe0000030101dfe38, 0xe0000030101dfd40) 0xa0000001001a2860 vfs_write+0x1a0 args (0xe00000b006679630, 0x6000000000018020, 0x200, 0xe0000030101dfe38, 0xe00000b006679650) 0xa0000001001a3530 sys_write+0x70 args (0x3, 0x6000000000018020, 0x200, 0xc000000000000793, 0x250) 0xa00000010000bc40 ia64_ret_from_syscall args (0x3, 0x6000000000018020, 0x200, 0xc000000000000793) 0xa000000000010620 __kernel_syscall_via_break args (0x3, 0x6000000000018020, 0x200, 0xc000000000000793) The page: [0]kdb> md8c8 0xa0007fffffe8bd68 0xa0007fffffe8bd68 0100000000000835 ffffffff00000005 5............... 0xa0007fffffe8bd78 e00000b47aa88228 e00000b47b2a65f0 (..z.....e*{.... ^^^^^^^^^^^^^^^^ buffers 0xa0007fffffe8bd88 000000000000275a a0007fffffe8a660 Z'......`....... 0xa0007fffffe8bd98 a0007ffff7aab928 0100000000080000 (............... kdb> inode_pages 0xe00000b47b2a64c8 page_struct index cnt zone nid flags e000003010324000 5274 3 0 0 0x824 Referenced LRU Private bh 0xe000003479f8d0a8 bno 18446744073709551615 [] bh 0xe00000b47ad7d0a8 bno 53132 [Uptodate Mapped] bh 0xe000003479f8e228 bno 18446744073709551615 [] bh 0xe00000b47ad7fca8 bno 18446744073709551615 [] mapping= e00000b47b2a65f0 e00000b079f80000 7637 3 0 1 0x100000000000824 Referenced LRU Private bh 0xe00000b47ad7cc28 bno 18446744073709551615 [] bh 0xe000003479f8cfa8 bno 18446744073709551615 [] bh 0xe00000b47ad7f028 bno 18446744073709551615 [] bh 0xe000003479f8f7a8 bno 53082 [Uptodate Mapped] mapping= e00000b47b2a65f0 e00000b9e56ac000 10074 5 0 1 0x100000000000835 Locked Referenced Dirty LRU Private bh 0xe00000b47aa88228 bno 18446744073709551615 [Uptodate Dirty Mapped Delay] ^^^^^^^^^^^^^^^^^^ bh 0xe000003479f8e3a8 bno 18446744073709551615 [] bh 0xe00000b47aa882a8 bno 18446744073709551615 [] bh 0xe000003479f8fd28 bno 18446744073709551615 [] mapping= e00000b47b2a65f0 So the page is locked and it has a delalloc buffer on it that used to be a hole. The problem page is at EOF.... No idea what is going write yet..... Cheers, Dave. -- Dave Chinner Principal Engineer SGI Australian Software Group