hi, Chris

On Fri, 28 Nov 2014 16:32:03 -0500, Chris Mason wrote:
> On Wed, Nov 26, 2014 at 10:00 PM, Miao Xie <mi...@cn.fujitsu.com> wrote:
>> On Thu, 27 Nov 2014 09:39:56 +0800, Miao Xie wrote:
>>>  On Wed, 26 Nov 2014 10:02:23 -0500, Chris Mason wrote:
>>>>  On Wed, Nov 26, 2014 at 8:04 AM, Miao Xie <mi...@cn.fujitsu.com> wrote:
>>>>>  The increase/decrease of bio counter is on the I/O path, so we should
>>>>>  use io_schedule() instead of schedule(), or the deadlock might be
>>>>>  triggered by the pending I/O in the plug list. io_schedule() can help
>>>>>  us because it will flush all the pending I/O before the task is going
>>>>>  to sleep.
>>>>
>>>>  Can you please describe this deadlock in more detail?  schedule() also 
>>>> triggers
>>>>  a flush of the plug list, and if that's no longer sufficient we can run 
>>>> into other
>>>>  problems (especially with preemption on).
>>>
>>>  Sorry for my miss. I forgot to check the current implementation of 
>>> schedule(), which flushes the plug list unconditionally. Please ignore this 
>>> patch.
>>
>> I have updated my raid56-scrub-replace branch, please re-pull the branch.
>>
>>   https://github.com/miaoxie/linux-btrfs.git raid56-scrub-replace
> 
> Sorry, I wasn't clear.  I do like the patch because it uses a slightly better 
> trigger mechanism for the flush.  I was just worried about a larger deadlock.
> 
> I ran the raid56 work with stress.sh overnight, then scrubbed the resulting 
> filesystem and ran balance when the scrub completed.  All of these passed 
> without errors (excellent!).
> 
> Then I zero'd 4GB of one drive and ran scrub again.  This was the result.  
> Please make sure CONFIG_DEBUG_PAGEALLOC is enabled and you should be able to 
> reproduce.

I sent out the 4th version of the patchset, please try it.

I have pushed the new patchset to my git tree, you can re-pull it.
  https://github.com/miaoxie/linux-btrfs.git raid56-scrub-replace

Thanks
Miao

> 
> [192392.495260] BUG: unable to handle kernel paging request at 
> ffff880303062f80
> [192392.495279] IP: [<ffffffffa05fe77a>] lock_stripe_add+0xba/0x390 [btrfs]
> [192392.495281] PGD 2bdb067 PUD 107e7fd067 PMD 107e7e4067 PTE 8000000303062060
> [192392.495283] Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
> [192392.495307] Modules linked in: ipmi_devintf loop fuse k10temp coretemp 
> hwmon btrfs raid6_pq zlib_deflate lzo_compress xor xfs exportfs libcrc32c 
> tcp_diag inet_diag nfsv4 ip6table_filter ip6_tables xt_NFLOG nfnetlink_log 
> nfnetlink xt_comment xt_statistic iptable_filter ip_tables x_tables mptctl 
> netconsole autofs4 nfsv3 nfs lockd grace rpcsec_gss_krb5 auth_rpcgss 
> oid_registry sunrpc ipv6 ext3 jbd dm_mod rtc_cmos ipmi_si ipmi_msghandler 
> iTCO_wdt iTCO_vendor_support pcspkr i2c_i801 lpc_ich mfd_core shpchp ehci_pci 
> ehci_hcd mlx4_en ptp pps_core mlx4_core sg ses enclosure button megaraid_sas
> [192392.495310] CPU: 0 PID: 11992 Comm: kworker/u65:2 Not tainted 
> 3.18.0-rc6-mason+ #7
> [192392.495310] Hardware name: ZTSYSTEMS Echo Ridge T4  /A9DRPF-10D, BIOS 
> 1.07 05/10/2012
> [192392.495323] Workqueue: btrfs-btrfs-scrub btrfs_scrub_helper [btrfs]
> [192392.495324] task: ffff88013dae9110 ti: ffff8802296a0000 task.ti: 
> ffff8802296a0000
> [192392.495335] RIP: 0010:[<ffffffffa05fe77a>]  [<ffffffffa05fe77a>] 
> lock_stripe_add+0xba/0x390 [btrfs]
> [192392.495335] RSP: 0018:ffff8802296a3ac8  EFLAGS: 00010006
> [192392.495336] RAX: ffff880577e85018 RBX: ffff880497f0b2f8 RCX: 
> ffff8801190fb000
> [192392.495337] RDX: 000000000000013d RSI: ffff880303062f80 RDI: 
> 0000040c275a0000
> [192392.495338] RBP: ffff8802296a3b48 R08: ffff880497f00000 R09: 
> 0000000000000001
> [192392.495339] R10: 0000000000000000 R11: 0000000000000000 R12: 
> 0000000000000282
> [192392.495339] R13: 000000000000b250 R14: ffff880577e85000 R15: 
> ffff880497f0b2a0
> [192392.495340] FS:  0000000000000000(0000) GS:ffff88085fc00000(0000) 
> knlGS:0000000000000000
> [192392.495341] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [192392.495342] CR2: ffff880303062f80 CR3: 0000000005289000 CR4: 
> 00000000000407f0
> [192392.495342] Stack:
> [192392.495344]  ffff880755e28000 ffff880497f00000 000000000000013d 
> ffff8801190fb000
> [192392.495346]  0000000000000000 ffff88013dae9110 ffffffff81090d40 
> ffff8802296a3b00
> [192392.495347]  ffff8802296a3b00 0000000000000010 ffff8802296a3b68 
> ffff8801190fb000
> [192392.495348] Call Trace:
> [192392.495353]  [<ffffffff81090d40>] ? bit_waitqueue+0xa0/0xa0
> [192392.495363]  [<ffffffffa05fea66>] 
> raid56_parity_submit_scrub_rbio+0x16/0x30 [btrfs]
> [192392.495372]  [<ffffffffa05e2f0e>] 
> scrub_parity_check_and_repair+0x15e/0x1e0 [btrfs]
> [192392.495380]  [<ffffffffa05e301d>] scrub_block_put+0x8d/0x90 [btrfs]
> [192392.495388]  [<ffffffffa05e6ed7>] ? scrub_bio_end_io_worker+0xd7/0x870 
> [btrfs]
> [192392.495396]  [<ffffffffa05e6ee9>] scrub_bio_end_io_worker+0xe9/0x870 
> [btrfs]
> [192392.495405]  [<ffffffffa05b8c44>] normal_work_helper+0x84/0x330 [btrfs]
> [192392.495414]  [<ffffffffa05b8f42>] btrfs_scrub_helper+0x12/0x20 [btrfs]
> [192392.495417]  [<ffffffff8106c50f>] process_one_work+0x1bf/0x520
> [192392.495419]  [<ffffffff8106c48d>] ? process_one_work+0x13d/0x520
> [192392.495421]  [<ffffffff8106c98e>] worker_thread+0x11e/0x4b0
> [192392.495424]  [<ffffffff81653ac9>] ? __schedule+0x389/0x880
> [192392.495426]  [<ffffffff8106c870>] ? process_one_work+0x520/0x520
> [192392.495428]  [<ffffffff81071e2e>] kthread+0xde/0x100
> [192392.495430]  [<ffffffff81071d50>] ? __init_kthread_worker+0x70/0x70
> [192392.495431]  [<ffffffff81659eac>] ret_from_fork+0x7c/0xb0
> [192392.495433]  [<ffffffff81071d50>] ? __init_kthread_worker+0x70/0x70
> [192392.495449] Code: 45 88 49 89 c4 4f 8d 7c 28 50 4b 8b 44 28 50 48 8b 55 
> 90 4c 8d 70 e8 4c 39 f8 48 8b 4d 98 74 32 48 8b 71 10 48 8b 3e 48 8b 70 f8 
> <48> 39 3e 75 12 eb 6f 0f 1f 80 00 00 00 00 48 8b 76 f8 48 39 3e
> [192392.495458] RIP  [<ffffffffa05fe77a>] lock_stripe_add+0xba/0x390 [btrfs]
> [192392.495458]  RSP <ffff8802296a3ac8>
> [192392.495458] CR2: ffff880303062f80
> [192392.496389] ---[ end trace c04c23ee0d843df0 ]---
> 
> 
> 
> .
> 

--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to