Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp225223pxa; Tue, 11 Aug 2020 01:01:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw69e+CmYNWDVjAzs8Z035lPfVgzhmFOJ4qYMcF5IZI8MSgE6qscwmrQKmGGKP1l4RduhO0 X-Received: by 2002:a17:906:2ed1:: with SMTP id s17mr25256936eji.52.1597132879650; Tue, 11 Aug 2020 01:01:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597132879; cv=none; d=google.com; s=arc-20160816; b=KvyVbDTMASXfbq/DtJoC1VhmotddEJhvR4U468SRggAYQxgHDXCD5iaNjjeWc6wR2s WWZ1jtY2aqdqkmTNJCHU+hhopS4iYQfcJu098DUuqaP2mBVLI4/i97MDrbUFIsdlps8O W9PgbpEzgbD6m+C2y1paK7Ft7n+vTJu2BF38qdl5NtiTfq+NJ84qKyjSACXh4L5UQgHi YmDU60aGD6obmr64kDYuFJyKxCMIoG8NywDOQOa1cDBNPQJ/5DTRpWipENicQV56dv1b LipCfxIP66gAITk44l0WsEDk8PX+cuoLSeAISEEo88Fq2TN5/VgSS0Vuj03Bh9ua53CC 34tg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :reply-to:message-id:subject:cc:to:from:date; bh=3r24hsmRU1XSuYR3P3zNOaWGiyPsDH2qboghZqi82nA=; b=Hz34PSK0sJl+STa+i/3cIHjSDhEGqv7xVzs5mjRLtUvAPDs/KKhpVwcTz2+6NM05mb 634jusGwfDO2B7V+SFpXh19AfIojHBW1lvmoBNa9e2FHWnw7G6B7T6A73WescgUzXNGa HewwA66ejqZ2bByZpwcmscHA2RSfcxIr0GUXeSgt+t+ZeKQ9yRSLnwApdA38O4L/6q7Q 3NAas/UOA8sxMK9m1E2G8sU0iBCrKcRkYiEGGh1hb+R2e8cSfePORjfSqzF0HEfM0oYQ TKsjoRWh18Th2lML1HcJARZY3cl8IMDUFl4djsF78ZwR+HV6yhvXKWN8iwL+IAgnaXmy Eh2A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n12si12145031edt.4.2020.08.11.01.00.54; Tue, 11 Aug 2020 01:01:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728310AbgHKH6Y (ORCPT + 99 others); Tue, 11 Aug 2020 03:58:24 -0400 Received: from mx2.suse.de ([195.135.220.15]:59894 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726397AbgHKH6X (ORCPT ); Tue, 11 Aug 2020 03:58:23 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id DF995AB9F; Tue, 11 Aug 2020 07:58:42 +0000 (UTC) Received: by ds.suse.cz (Postfix, from userid 10065) id 14D22DAFD3; Tue, 11 Aug 2020 09:57:21 +0200 (CEST) Date: Tue, 11 Aug 2020 09:57:20 +0200 From: David Sterba To: "Paul E. McKenney" Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Sasha Levin , linux-btrfs@vger.kernel.org Subject: Re: [PATCH AUTOSEL 4.4 03/16] fs/btrfs: Add cond_resched() for try_release_extent_mapping() stalls Message-ID: <20200811075720.GL2026@twin.jikos.cz> Reply-To: dsterba@suse.cz Mail-Followup-To: dsterba@suse.cz, "Paul E. McKenney" , linux-kernel@vger.kernel.org, stable@vger.kernel.org, Sasha Levin , linux-btrfs@vger.kernel.org References: <20200810191443.3795581-1-sashal@kernel.org> <20200810191443.3795581-3-sashal@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200810191443.3795581-3-sashal@kernel.org> User-Agent: Mutt/1.5.23.1-rc1 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Aug 10, 2020 at 03:14:30PM -0400, Sasha Levin wrote: > From: "Paul E. McKenney" > > [ Upstream commit 9f47eb5461aaeb6cb8696f9d11503ae90e4d5cb0 ] > > Very large I/Os can cause the following RCU CPU stall warning: > > RIP: 0010:rb_prev+0x8/0x50 > Code: 49 89 c0 49 89 d1 48 89 c2 48 89 f8 e9 e5 fd ff ff 4c 89 48 10 c3 4c = > 89 06 c3 4c 89 40 10 c3 0f 1f 00 48 8b 0f 48 39 cf 74 38 <48> 8b 47 10 48 85 c0 74 22 48 8b 50 08 48 85 d2 74 0c 48 89 d0 48 > RSP: 0018:ffffc9002212bab0 EFLAGS: 00000287 ORIG_RAX: ffffffffffffff13 > RAX: ffff888821f93630 RBX: ffff888821f93630 RCX: ffff888821f937e0 > RDX: 0000000000000000 RSI: 0000000000102000 RDI: ffff888821f93630 > RBP: 0000000000103000 R08: 000000000006c000 R09: 0000000000000238 > R10: 0000000000102fff R11: ffffc9002212bac8 R12: 0000000000000001 > R13: ffffffffffffffff R14: 0000000000102000 R15: ffff888821f937e0 > __lookup_extent_mapping+0xa0/0x110 > try_release_extent_mapping+0xdc/0x220 > btrfs_releasepage+0x45/0x70 > shrink_page_list+0xa39/0xb30 > shrink_inactive_list+0x18f/0x3b0 > shrink_lruvec+0x38e/0x6b0 > shrink_node+0x14d/0x690 > do_try_to_free_pages+0xc6/0x3e0 > try_to_free_mem_cgroup_pages+0xe6/0x1e0 > reclaim_high.constprop.73+0x87/0xc0 > mem_cgroup_handle_over_high+0x66/0x150 > exit_to_usermode_loop+0x82/0xd0 > do_syscall_64+0xd4/0x100 > entry_SYSCALL_64_after_hwframe+0x44/0xa9 > > On a PREEMPT=n kernel, the try_release_extent_mapping() function's > "while" loop might run for a very long time on a large I/O. This commit > therefore adds a cond_resched() to this loop, providing RCU any needed > quiescent states. > > Signed-off-by: Paul E. McKenney Paul, this patch was well hidden in some huge RCU pile (https://lore.kernel.org/lkml/20200623002147.25750-11-paulmck@kernel.org/) I wonder why you haven't CCed linux-btrfs, I spotted the patch queued for stable by incidentally. The timestamp is from June, that's quite some time ago. We can deal with one more patch and I tend to reply with acks quickly for easy patches like this to not block other peoples work but I'm a bit disappointed by sidestepping maintained subsystems. It's not just this patch, it happens from time time only to increase the disapointement.