Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp5039300pxu; Tue, 13 Oct 2020 13:12:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwEsSnf2bmxAHKw5x8e9akdAuXUXJ0KBcUe8O4tBtGsD/jM0BHmu7+IZ+qBfWAwTyHtzCFW X-Received: by 2002:a17:906:8401:: with SMTP id n1mr1479243ejx.215.1602619964587; Tue, 13 Oct 2020 13:12:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602619964; cv=none; d=google.com; s=arc-20160816; b=JLXAbsdGGHSoqgQ8pNmxDKFORrLB+eHUy93sJtia3Z5P/24G8x4EA48Th4ac7ODhfX 91LI+Wii2QwH8dtbS3e/UTOp+NSlvCSIZveKHKxcqLbWuYTa4y1hZxeeHZgxD8ayPyfZ 1Xle3v2/E6RhzHytrKo+1nzyISMOKu2pQfep+1Am9C2ZzqKz1w9wzrs5/84uQzu8km1v S67XA49/0QTvxAAJ/K8/UYvwBLDL4EtKxvcZn4WxrBuvFP/lSdGpNwYfu34kaPFpgWdh EGhI3wgjGqS4De2r/bAyS97Yoti7iZqOHxv8FaWQnRH+NPqYKJaAT8k3RqZ/JpaQ6sU9 APXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature; bh=M4AsuAeW43yYH580MNgHZBroKVMxw341h9un2tF2+5Y=; b=sK0ZEiYGojjjtLUM2s415cLIXcvQdW2Hnx7gS2l7T8HcwZtDnZIXc48YMoV6cx05R3 Z3AVSot7K5f7zRE3RRSYd9jNDADmXJxo90/5pU2ThHJHGcvh0w76LwmJ2dqaw8wQzMuu PGEk9YLylbUpEohhemfMBiIp3xAK6Pa1VQ5gRh1P39nOsMoshj2gZ+/pJqWFpqVUr2TB +SgyoMYpF7/RGX9VoL4RS9ysVQ3NAjlOy0ILI4jnboasecjwh5qPY1dMw27pbDzYF1sN UmkrIlwys4AIdmP9Ze+86GdbuhTrsxP3Ja+0k4UgdooPCvq3FIfMmKlSSorDW8kTV7X/ kKdQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=R8RRVpwN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f3si563600ejt.743.2020.10.13.13.12.21; Tue, 13 Oct 2020 13:12:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=R8RRVpwN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729898AbgJMUK5 (ORCPT + 99 others); Tue, 13 Oct 2020 16:10:57 -0400 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:38117 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727778AbgJMUK4 (ORCPT ); Tue, 13 Oct 2020 16:10:56 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1602619855; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=M4AsuAeW43yYH580MNgHZBroKVMxw341h9un2tF2+5Y=; b=R8RRVpwNMzdUfI+S4BhvK/EiScr2X/NJLFP7XbfWhtf3MZzvsJ3HFXNmG0Kfa7pjr5iofh uvd0YSz7h+Qpf0DxpalGqSNyGz/OxaMHaKaxZMXXBXd5B3woFP+8jvGIw9JUxoKggwpLUl Rc/qANu03qSNpTppX4pBxq+K/DRxIto= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-194-7qAJ9brcNluHxBWpjaV3Tw-1; Tue, 13 Oct 2020 16:10:53 -0400 X-MC-Unique: 7qAJ9brcNluHxBWpjaV3Tw-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 663FA1015CAE; Tue, 13 Oct 2020 20:10:52 +0000 (UTC) Received: from ovpn-118-16.rdu2.redhat.com (ovpn-118-16.rdu2.redhat.com [10.10.118.16]) by smtp.corp.redhat.com (Postfix) with ESMTP id 05FCB10013C4; Tue, 13 Oct 2020 20:10:45 +0000 (UTC) Message-ID: <0e2424983d6772f24374c9f3b06295bed8327b96.camel@redhat.com> Subject: Re: Unbreakable loop in fuse_fill_write_pages() From: Qian Cai To: Vivek Goyal Cc: Miklos Szeredi , Alexander Viro , Stefan Hajnoczi , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, virtio-fs@redhat.com Date: Tue, 13 Oct 2020 16:10:45 -0400 In-Reply-To: <20201013195719.GD142988@redhat.com> References: <7d350903c2aa8f318f8441eaffafe10b7796d17b.camel@redhat.com> <20201013184026.GC142988@redhat.com> <20201013185808.GA164772@redhat.com> <20201013195719.GD142988@redhat.com> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2020-10-13 at 15:57 -0400, Vivek Goyal wrote: > Hmm..., So how do I reproduce it. Just run trinity as root and it will > reproduce after some time? Only need to run it as unprivileged user after mounting virtiofs on /tmp (trinity will need to create and use files there) as many as CPUs as possible. Also, make sure your guest's memory usage does not exceed the host's /dev/shm size. Otherwise, horrible things could happen. $ trinity -C 48 --arch 64 It might get coredump or exit due to some other unrelated reasons, so just keep retrying. It is best to apply your recent patch for the virtiofs false positive warning first, so it won't taint the kernel which will stop the trinity. Today, I had been able to reproduce it twice within half-hour each.