From: "Michael L. Semon" <mlsemon35@gmail.com>
To: "xfs@oss.sgi.com" <xfs@oss.sgi.com>
Subject: xfs_setattr_size is mid-stack during log-flooding stack traces
Date: Sun, 26 Oct 2014 23:21:04 -0400 [thread overview]
Message-ID: <544DBA20.5040206@gmail.com> (raw)
Hi! I was having fantastic luck with v5/finobt XFS and kernel
3.18.0-rc1, so I decided to disable quota support and debug support
in XFS...
[ 0.000000] Linux version 3.18.0-rc1+ (root@kyhorse) (gcc version 4.8.3 (GCC) ) #5 SMP Sun Oct 26 14:43:09 EDT 2014
# i686 Pentium 4, BTW.
[ 0.857655] SGI XFS with ACLs, security attributes, no debug enabled
Some other debug items were shut off as well.
Now, my logs are getting pelted with items that look like this (first trace,
on boot):
[ 14.549583] XFS (sda1): Mounting V5 Filesystem
[ 14.810908] XFS (sda1): Ending clean mount
[ 14.826918] mount (155) used greatest stack depth: 6056 bytes left
[ 15.139152] rc.S (64) used greatest stack depth: 5948 bytes left
[ 29.443780] ------------[ cut here ]------------
[ 29.443801] WARNING: CPU: 0 PID: 387 at mm/truncate.c:758 pagecache_isize_extended+0x124/0x129()
[ 29.443809] CPU: 0 PID: 387 Comm: gtk-query-immod Not tainted 3.18.0-rc1+ #5
[ 29.443813] Hardware name: Gateway E-2000 /D845GRG , BIOS RG84510A.15A.0009.P03.020
[ 29.443817] 00000000 00000000 ee1e9e20 c144939c 00000000 ee1e9e50 c1031b03 c154f66c
[ 29.443828] 00000000 00000183 c1553739 000002f6 c1098458 c1098458 e849ed54 00000000
[ 29.443838] 00001000 ee1e9e60 c1031bb8 00000009 00000000 ee1e9e98 c1098458 efd69100
[ 29.443848] Call Trace:
[ 29.443858] [<c144939c>] dump_stack+0x41/0x52
[ 29.443867] [<c1031b03>] warn_slowpath_common+0x6f/0x86
[ 29.443873] [<c1098458>] ? pagecache_isize_extended+0x124/0x129
[ 29.443878] [<c1098458>] ? pagecache_isize_extended+0x124/0x129
[ 29.443884] [<c1031bb8>] warn_slowpath_null+0x1d/0x1f
[ 29.443889] [<c1098458>] pagecache_isize_extended+0x124/0x129
[ 29.443895] [<c1098494>] truncate_setsize+0x37/0x50
[ 29.443902] [<c117c534>] xfs_setattr_size+0x13d/0x3d6
[ 29.443909] [<c116a2ed>] ? __xfs_get_blocks+0x5ff/0x5ff
[ 29.443916] [<c1172c13>] xfs_file_fallocate+0x2fe/0x340
[ 29.443922] [<c1444ccc>] ? kmemleak_free+0x20/0x43
[ 29.443931] [<c10ba00d>] ? kmem_cache_free+0x76/0xc4
[ 29.443938] [<c10bd802>] do_fallocate+0x111/0x18a
[ 29.443943] [<c10bd8cb>] SyS_fallocate+0x50/0x70
[ 29.443950] [<c144f6ef>] syscall_call+0x7/0x7
[ 29.443954] ---[ end trace 281f0f955c16f86c ]---
In an xfstests run, it seemed to start with generic/012 and hit a
great many tests after that. The actual BUG_ON is somewhere in
mm/truncate.c, though...
WARN_ON(!mutex_is_locked(&inode->i_mutex));
Is this an XFS issue at all? Or is there some kind of extra
precaution that has to be taken on the XFS side? Feel free to toss
me over to mm to ask, "What is this?"
Thanks!
Michael
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
next reply other threads:[~2014-10-27 3:21 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-10-27 3:21 Michael L. Semon [this message]
2014-10-27 5:06 ` xfs_setattr_size is mid-stack during log-flooding stack traces Eric Sandeen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=544DBA20.5040206@gmail.com \
--to=mlsemon35@gmail.com \
--cc=xfs@oss.sgi.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox