From mboxrd@z Thu Jan 1 00:00:00 1970 From: Eric Wheeler Subject: Re: Can't register existing backing devices anymore Date: Thu, 24 Aug 2017 00:44:38 +0000 (UTC) Message-ID: References: <939a4d7b-add7-08d6-a68d-24c4dc8bd7e7@suse.de> <5eef4439-903f-c3f3-1a84-fb2eb8744026@suse.de> Mime-Version: 1.0 Content-Type: MULTIPART/MIXED; BOUNDARY="1641074820-771129937-1503535478=:13126" Return-path: Received: from mx.ewheeler.net ([66.155.3.69]:54606 "EHLO mail.ewheeler.net" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751061AbdHXAoj (ORCPT ); Wed, 23 Aug 2017 20:44:39 -0400 In-Reply-To: Sender: linux-bcache-owner@vger.kernel.org List-Id: linux-bcache@vger.kernel.org To: Jorg Bornschein Cc: Coly Li , linux-bcache@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --1641074820-771129937-1503535478=:13126 Content-Type: TEXT/PLAIN; charset=utf-8 Content-Transfer-Encoding: 8BIT On Mon, 14 Aug 2017, Jorg Bornschein wrote: > August 13, 2017 4:44 PM, "Coly Li" wrote: > > Hi Coly, > > > were you able to reproduce my problem? Hi Jorg, Can you convert those memory offsets to line numbers in the backtrace with something like `gdb vmlinuz` and `list *(bch_bucket_alloc+0xa5/0x350)` ? (Someone correct me if the gdb list command is slightly different, it has been a while.) It sounds like a registration race, maybe a simple spinlock or mutex is appropriate here. -- Eric Wheeler > > > j > > > > On 2017/8/13 下午11:40, Jorg Bornschein wrote: > > > >> August 13, 2017 4:27 PM, "Coly Li" wrote: > >> > >> Hi Coly, > >> > >>> Could you please give me some hint how the /dev/dm- nodes are created ? > >>> I will try to reproduce it on my hardware. > >>> > >>> Thanks for the report. > >> > >> I created them with 'cryptsetup luksFormat ...', IIRC. When I run 'cryptsetup luksDump' I get: > >> > >> Version: 1 > >> Cipher name: aes > >> Cipher mode: xts-plain64 > >> Hash spec: sha256 > >> Payload offset: 4096 > >> MK bits: 256 > >> MK digest: > >> MK salt: > >> MK iterations: 400000 > >> UUID: 81a8d12e-9309-4317-b447-ab3c86e2f7ea > >> > >> Key Slot 0: ENABLED > >> Iterations: 3200000 > >> Salt: > >> Key material offset: 8 > >> AF stripes: 4000 > >> > >> and this is the contents of my /etc/crypttab: > >> > >> # > >> crypted-sdb /dev/sdb1 /etc/cryptfs.key > >> crypted-sdc /dev/sdc1 /etc/cryptfs.key > >> crypted-sdd /dev/sdd1 /etc/cryptfs.key > >> crypted-sde /dev/sde1 /etc/cryptfs.key > > > > Oh, I don't use cryptsetup before, let me try ... Thanks for the hint :-) > > > > Coly Li > > -- > > To unsubscribe from this list: send the line "unsubscribe linux-bcache" in > > the body of a message to majordomo@vger.kernel.org > > More majordomo info at http://vger.kernel.org/majordomo-info.html > -- > To unsubscribe from this list: send the line "unsubscribe linux-bcache" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html > --1641074820-771129937-1503535478=:13126--