Return-Path: Received: from smtp-o-1.desy.de ([131.169.56.154]:50187 "EHLO smtp-o-1.desy.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751847AbeBUVLA (ORCPT ); Wed, 21 Feb 2018 16:11:00 -0500 Received: from smtp-map-1.desy.de (smtp-map-1.desy.de [131.169.56.66]) by smtp-o-1.desy.de (DESY-O-1) with ESMTP id 13843280A5B for ; Wed, 21 Feb 2018 22:10:58 +0100 (CET) Date: Wed, 21 Feb 2018 22:10:57 +0100 (CET) From: "Mkrtchyan, Tigran" To: David Wysochanski Cc: linux-nfs Message-ID: <1893693060.8058967.1519247457534.JavaMail.zimbra@desy.de> In-Reply-To: <1519242250.3719.9.camel@redhat.com> References: <1894283666.7881272.1519209992729.JavaMail.zimbra@desy.de> <1519242250.3719.9.camel@redhat.com> Subject: Re: question on kernel stack trace MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Sender: linux-nfs-owner@vger.kernel.org List-ID: Hi Dave, Thanks for the reply. I am confused by line: ext4_mark_inode_dirty+0x83/0x1d0 [ext4] Is it in ext4 module or just an unfortunate stack trace? Thanks, Tigran. ----- Original Message ----- > From: "David Wysochanski" > To: "Tigran Mkrtchyan" , "linux-nfs" > Sent: Wednesday, February 21, 2018 8:44:10 PM > Subject: Re: question on kernel stack trace > On Wed, 2018-02-21 at 11:46 +0100, Mkrtchyan, Tigran wrote: >> On one of our nodes we got the following stack trace: >>=20 >>=20 >> Feb 19 16:55:53 nafhh kernel: updatedb=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0D 000000000000000f=C2=A0=C2=A0=C2=A0=C2=A0=C2=A00 >> 32087=C2=A0=C2=A032081 0x00000080 >> Feb 19 16:55:53 nafhh kernel: ffff880852d13a88 0000000000000082 >> 0000000000000000 ffffffffa00bfe13 >> Feb 19 16:55:53 nafhh kernel: 0000000000000050 0000000300000001 >> 000d5a7576495a7a 0000000000000286 >> Feb 19 16:55:53 nafhh kernel: 0000000000000286 00000001dfd51213 >> ffff8810207c5068 ffff880852d13fd8 >> Feb 19 16:55:53 nafhh kernel: Call Trace: >> Feb 19 16:55:53 nafhh kernel: [] ? >> ext4_mark_inode_dirty+0x83/0x1d0 [ext4] >> Feb 19 16:55:53 nafhh kernel: [] ? >> __rpc_sleep_on_priority+0xf4/0x330 [sunrpc] >> Feb 19 16:55:53 nafhh kernel: [] ? >> rpc_wait_bit_killable+0x0/0xa0 [sunrpc] >> Feb 19 16:55:53 nafhh kernel: [] >> rpc_wait_bit_killable+0x42/0xa0 [sunrpc] >> Feb 19 16:55:53 nafhh kernel: [] >> __wait_on_bit+0x5f/0x90 >> Feb 19 16:55:53 nafhh kernel: [] ? >> xprt_reserve_xprt+0x87/0x110 [sunrpc] >> Feb 19 16:55:53 nafhh kernel: [] ? >> rpc_wait_bit_killable+0x0/0xa0 [sunrpc] >> Feb 19 16:55:53 nafhh kernel: [] >> out_of_line_wait_on_bit+0x78/0x90 >> Feb 19 16:55:53 nafhh kernel: [] ? >> wake_bit_function+0x0/0x50 >> Feb 19 16:55:53 nafhh kernel: [] >> __rpc_execute+0xf5/0x350 [sunrpc] >> Feb 19 16:55:53 nafhh kernel: [] ? >> bit_waitqueue+0x17/0xd0 >> Feb 19 16:55:53 nafhh kernel: [] >> rpc_execute+0x61/0xa0 [sunrpc] >> Feb 19 16:55:53 nafhh kernel: [] >> rpc_run_task+0x75/0x90 [sunrpc] >> Feb 19 16:55:53 nafhh kernel: [] >> rpc_call_sync+0x42/0x70 [sunrpc] >> Feb 19 16:55:53 nafhh kernel: [] >> _nfs4_call_sync+0x3e/0x40 [nfs] >> Feb 19 16:55:53 nafhh kernel: [] >> _nfs4_proc_getattr+0xac/0xc0 [nfs] >> Feb 19 16:55:53 nafhh kernel: [] >> nfs4_proc_getattr+0x56/0x80 [nfs] >> Feb 19 16:55:53 nafhh kernel: [] >> __nfs_revalidate_inode+0xe3/0x220 [nfs] >> Feb 19 16:55:53 nafhh kernel: [] >> nfs_getattr+0xde/0x210 [nfs] >> Feb 19 16:55:53 nafhh kernel: [] >> vfs_getattr+0x51/0x80 >> Feb 19 16:55:53 nafhh kernel: [] ? >> cp_new_stat+0xe4/0x100 >> Feb 19 16:55:53 nafhh kernel: [] >> vfs_fstatat+0x64/0xa0 >> Feb 19 16:55:53 nafhh kernel: [] >> vfs_lstat+0x1e/0x20 >> Feb 19 16:55:53 nafhh kernel: [] >> sys_newlstat+0x24/0x50 >> Feb 19 16:55:53 nafhh kernel: [] ? >> system_call_after_swapgs+0x187/0x220 >> Feb 19 16:55:53 nafhh kernel: [] ? >> system_call_after_swapgs+0x180/0x220 >> Feb 19 16:55:53 nafhh kernel: [] ? >> audit_syscall_entry+0x1d7/0x200 >> Feb 19 16:55:53 nafhh kernel: [] ? >> system_call_after_swapgs+0x16b/0x220 >> Feb 19 16:55:53 nafhh kernel: [] ? >> system_call_after_swapgs+0x164/0x220 >> Feb 19 16:55:53 nafhh kernel: [] ? >> system_call_after_swapgs+0x15d/0x220 >> Feb 19 16:55:53 nafhh kernel: [] ? >> system_call_after_swapgs+0x156/0x220 >> Feb 19 16:55:53 nafhh kernel: [] ? >> system_call_after_swapgs+0x14f/0x220 >> Feb 19 16:55:53 nafhh kernel: [] >> system_call_fastpath+0x16/0x1b >> Feb 19 16:55:53 nafhh kernel: [] ? >> system_call_after_swapgs+0xca/0x220 >>=20 >>=20 >> I am surprised, that top of the stack trace is in ext4 module. Can >> some one put a light on it? >>=20 >=20 > Ignore the symbols with '?' next to them as they are not reliable. >=20 > If you want to map this to code use something like 'eu-addr2line' and > see if the symbols make sense in terms of source code lines. >=20 > This looks like the process is just blocked for a long time waiting on > an NFS4 GETATTR to complete, and does not look unusual to me. >=20 > -- > To unsubscribe from this list: send the line "unsubscribe linux-nfs" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html