linux-xfs.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: bugzilla-daemon@bugzilla.kernel.org
To: linux-xfs@vger.kernel.org
Subject: [Bug 202077] xfs transaction log reservation overruns on 4.14.67
Date: Tue, 01 Jan 2019 22:30:34 +0000	[thread overview]
Message-ID: <bug-202077-201763-YRyzPgNLi5@https.bugzilla.kernel.org/> (raw)
In-Reply-To: <bug-202077-201763@https.bugzilla.kernel.org/>

https://bugzilla.kernel.org/show_bug.cgi?id=202077

--- Comment #2 from Dave Chinner (david@fromorbit.com) ---
On Wed, Dec 26, 2018 at 05:19:12PM +0000, bugzilla-daemon@bugzilla.kernel.org
wrote:
> We've encountered two recent examples of xfs transaction overruns on
> production
> systems running 4.14.67 kernels.  Both systems in this case are running
> docker
> with dozens of overlay mounts, using this xfs fs as both upper and lower.  In
> both cases the filesystem was able to successfully recover when the
> filesystem
> was unmounted and remounted again.

Inboth cases, it looks like there were two free space manipulations
in a single transaction, likely first modifying the free list
(pattern is EFD, XAGF, ABTB, ABTC, then AGFL) followed by freeing
the actual extent (more ABTB, ABTC buffers).

> It looks like there has been a good bit of work in 4.16+

The first fixes went into 4.18 with the deferred AGFL free
operations. Those were the commits associated with the patchset
titled "[PATCH v2 0/6] xfs: defer agfl block frees".

There were more fixes in 4.19 to always defer the AGFL free for all
operations. This was a much larger and more significant change, and
can be found from the series titled "[PATCH 00/24] xfs: broad
enablement of deferred agfl frees".

> addressing similar issues but none of it has made it back into the
> 4.14 LTS.  Any chance that any of the attached debug output points
> to anything specific that might be a candidate for backport?

Backporting the first series might be sufficient to avoid your
problem (both are from the inode inactivation path) but it is no
guarantee. I also have no idea what dependencies that patchset has
on the rest of the code (e.g. is there enough deferred op
infrastructure in place in 4.14?), and seeing as it touches core
allocation algorithms it would require a substantial amount of QA
before release....

Cheers,

Dave.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.

  parent reply	other threads:[~2019-01-01 22:30 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-12-26 17:19 [Bug 202077] New: xfs transaction overruns on 4.14.67 bugzilla-daemon
2018-12-26 17:19 ` [Bug 202077] " bugzilla-daemon
2019-01-01 22:30 ` [Bug 202077] New: " Dave Chinner
2019-01-01 22:30 ` bugzilla-daemon [this message]
2019-01-02 16:54 ` [Bug 202077] xfs transaction log reservation " bugzilla-daemon

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bug-202077-201763-YRyzPgNLi5@https.bugzilla.kernel.org/ \
    --to=bugzilla-daemon@bugzilla.kernel.org \
    --cc=linux-xfs@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).