Return-Path: Received: from mail.kernel.org ([198.145.29.99]:48678 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755658AbeAHTPe (ORCPT ); Mon, 8 Jan 2018 14:15:34 -0500 Message-ID: <1515438929.3486.48.camel@kernel.org> Subject: Re: [PATCH v4 19/19] fs: handle inode->i_version more efficiently From: Jeff Layton To: Krzysztof Kozlowski Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, viro@zeniv.linux.org.uk, linux-nfs@vger.kernel.org, bfields@fieldses.org, neilb@suse.de, jack@suse.de, linux-ext4@vger.kernel.org, tytso@mit.edu, adilger.kernel@dilger.ca, linux-xfs@vger.kernel.org, darrick.wong@oracle.com, david@fromorbit.com, linux-btrfs@vger.kernel.org, clm@fb.com, jbacik@fb.com, dsterba@suse.com, linux-integrity@vger.kernel.org, zohar@linux.vnet.ibm.com, dmitry.kasatkin@gmail.com, linux-afs@lists.infradead.org, dhowells@redhat.com, jaltman@auristor.com, linux-samsung-soc@vger.kernel.org, Marek Szyprowski , =?UTF-8?Q?Bart=C5=82omiej_?= =?UTF-8?Q?=C5=BBo=C5=82nierkiewicz?= , Sylwester Nawrocki Date: Mon, 08 Jan 2018 14:15:29 -0500 In-Reply-To: <20180108183353.emiwsd4aic4gmytr@kozik-lap> References: <20171222120556.7435-1-jlayton@kernel.org> <20171222120556.7435-20-jlayton@kernel.org> <1515416208.3486.14.camel@kernel.org> <1515418164.3486.18.camel@kernel.org> <20180108172928.aqndozcpljb73uj6@kozik-lap> <1515434419.3486.41.camel@kernel.org> <20180108183353.emiwsd4aic4gmytr@kozik-lap> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Sender: linux-nfs-owner@vger.kernel.org List-ID: On Mon, 2018-01-08 at 19:33 +0100, Krzysztof Kozlowski wrote: > On Mon, Jan 08, 2018 at 01:00:19PM -0500, Jeff Layton wrote: > > On Mon, 2018-01-08 at 18:29 +0100, Krzysztof Kozlowski wrote: > > (...) > > > > > Ok, thanks. If you're seeing hangs then that might imply that we have > > > > some sort of excessive looping going on in the cmpxchg loops. > > > > > > > > Could you apply the patch below and let me know if it causes either of > > > > the warnings to pop? That might at least point us in the right > > > > direction: > > > > > > No new warnings with attached patch (except existing already lockdep: > > > "INFO: trying to register non-static key."). > > > > > > > Yeah, I saw that in the original logs and it looks unrelated (and > > harmless). > > > > > Systemd timeouts on mounting /home but after entering rescue shell there > > > is no problem running mount /home: > > > Give root password for maintenance > > > (or press Control-D to continue): > > > root@odroidxu3:~# mount /home > > > [ 220.659331] EXT4-fs (mmcblk1p2): mounted filesystem with ordered data mode. Opts: (null) > > > > > > > Ok, thanks for testing it. So I guess we can probably rule out excessive > > looping in those functions as the issue. > > > > To make sure I understand the problem: When systemd tries to do the > > initial mount of /home (which is an ext4 filesystem), it hangs. But once > > it drops to the shell, it works, if you do the mount by hand. > > > > Is that correct? > > Yes, although it also timeouts on setting up /dev/ttySAC2 (serial > console). > > > If so, then is it possible to trigger sysrq commands during the hanging > > mount attempt? Maybe you could use e.g. sysrq-l, sysrq-w, etc. to > > determine what it's blocking on? (trimming the output) Thanks. I don't really see anything obvious in that info, unfortunately. What we really need to do is find the systemd task performing the mount, and see what it's doing. We do have one questionable bug in the NFS changes though. Does this patch help at all? -------------------------------8<--------------------------------- SQUASH: nfs: fix i_version increment when adding a request NFS treats this value as an opaque value with no flag, so we must increment it as such instead of using inode_inc_iversion. Signed-off-by: Jeff Layton --- fs/nfs/write.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/nfs/write.c b/fs/nfs/write.c index a03fbac1f88c..48837b6250e9 100644 --- a/fs/nfs/write.c +++ b/fs/nfs/write.c @@ -755,7 +755,7 @@ static void nfs_inode_add_request(struct inode *inode, struct nfs_page *req) spin_lock(&mapping->private_lock); if (!nfs_have_writebacks(inode) && NFS_PROTO(inode)->have_delegation(inode, FMODE_WRITE)) - inode_inc_iversion(inode); + atomic64_inc(&inode->i_version); if (likely(!PageSwapCache(req->wb_page))) { set_bit(PG_MAPPED, &req->wb_flags); SetPagePrivate(req->wb_page); -- 2.14.3