Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1283563ybp; Fri, 4 Oct 2019 12:14:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqx5KGq0TOuDtzfMWlAZtPwS0oxXOSfhgAZdM2qW+J2tVfJk0UB6Y7aWioSa/hzAPlsBcETZ X-Received: by 2002:a50:fa9a:: with SMTP id w26mr17082565edr.227.1570216466556; Fri, 04 Oct 2019 12:14:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570216466; cv=none; d=google.com; s=arc-20160816; b=rpU0XId36F0gpII5n66pCLJtJ6/hVYo8j4PaRz7BjvmW5uqartyPNcJIjYwcHckVym PpfaoDDYdw9OcHuoaSRSMAqBu9aV67FcOwk98mylLr5ewfTY7cJjAE7p8XQ7eGKEML52 xP50rQNnbXlNrxo5fJhlJw0Le8iP6cDyuIfysHGrYAtd6CnU/aW3cs8FOzjd6CoLbKvK Hzx/hE/QtCLQfTrxhgjNnhV30N6+3GTEQ1aaMPpYoj3fevDFKfJjtuQi0e5jd7D0Ce9N PTuLzSeuwN//5u7kq/2iEnv8DUMAfJo6JGhjF/6J3AeWBncEcVpLan8eQSBC6ibfpASP /ukQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=TL/CfD9VojOfOPaJR6uBdu0iXwfgPd2dbgVo/6Sa3ho=; b=Gwneu1SK0q8JeV8eFAfNuj7UmZC7SGHizK/TSvoIo/Ong1xXuZM7HBnpU2/MpURoFI 4tp5mdglfHDVAc9+UxHi01uffGDf7fe+i0NxgTvQT17Mtes1T1HWZrMxSo6nS9kcwGna ArK0PjIzudyiys4jkA0SY2TKqCfJlUQAWyZsGM/5Stb7ilgOseUxNcnqPjbTKgPESvgu qOYs6Qm2q1/oZ6pYhQciyRUOXT2fm/3nhNsa70kaO68oCqIfxOAmnP3ZwES5/GAXQwi4 UVT27L8qM07y4GsYoFaY9skFOJcHBPyuVah1mNPAzjex6Syqm+2UHyOc3en1nzdOpvzB E8DQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w12si3877797edx.223.2019.10.04.12.13.49; Fri, 04 Oct 2019 12:14:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729586AbfJDTMx (ORCPT + 99 others); Fri, 4 Oct 2019 15:12:53 -0400 Received: from outgoing-auth-1.mit.edu ([18.9.28.11]:55189 "EHLO outgoing.mit.edu" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728360AbfJDTMx (ORCPT ); Fri, 4 Oct 2019 15:12:53 -0400 Received: from callcc.thunk.org (guestnat-104-133-0-98.corp.google.com [104.133.0.98] (may be forged)) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x94JCmsL011818 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 4 Oct 2019 15:12:49 -0400 Received: by callcc.thunk.org (Postfix, from userid 15806) id E58EE42088C; Fri, 4 Oct 2019 15:12:47 -0400 (EDT) Date: Fri, 4 Oct 2019 15:12:47 -0400 From: "Theodore Y. Ts'o" To: Harshad Shirwadkar Cc: linux-ext4@vger.kernel.org Subject: Re: [PATCH v3 00/13] ext4: add fast commit support Message-ID: <20191004191247.GA12012@mit.edu> References: <20191001074101.256523-1-harshadshirwadkar@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191001074101.256523-1-harshadshirwadkar@gmail.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Tue, Oct 01, 2019 at 12:40:49AM -0700, Harshad Shirwadkar wrote: > > Testing > ------- > > e2fsprogs was updated to set fast commit feature flag and to ignore > fast commit blocks during e2fsck. > > https://github.com/harshadjs/e2fsprogs.git > > After applying all the patches in this series, following runs of > xfstests were performed: > > - kvm-xfstest.sh -g log -c 4k > - kvm-xfstests.sh smoke > > All the log tests were successful and smoke tests didn't introduce any > additional failures. You should probably also try running the shutdown tests, and eventually, run all of the auto group. I've added a fast_commit group to {kvm,gce}-xfstests, although to use it a modified e2fsprogs which understands the fast_commit feature. I can make kvm-xfstests and gce-xfstests image using an e2fsprogs package from debian/experimental which has fast_commit enabled. When I tried running all of the auto group tests, the following failure was found in generic/047 (which is a shutdown group test). - Ted BEGIN TEST fast_commit (1 test): Ext4 4k block w/fast_commit Fri Oct 4 13:44:45 EDT 2019 DEVICE: /dev/vdd EXT_MKFS_OPTIONS: -I 256 -O fast_commit,64bit EXT_MOUNT_OPTIONS: -o block_validity FSTYP -- ext4 PLATFORM -- Linux/x86_64 kvm-xfstests 5.3.0-rc4-xfstests-00012-gedca88337ca9 #1202 SMP Thu Oct 3 17:27:50 EDT 2019 MKFS_OPTIONS -- -q -I 256 -O fast_commit,64bit /dev/vdc MOUNT_OPTIONS -- -o acl,user_xattr -o block_validity /dev/vdc /vdc generic/047 [13:44:46][ 24.671344] run fstests generic/047 at 2019-10-04 13:44:46 [ 24.951140] EXT4-fs (vdc): shut down requested (1) [ 24.952280] Aborting journal on device vdc-8. [ 28.012724] EXT4-fs (vdc): shut down requested (2) [ 28.013639] Aborting journal on device vdc-8. [ 28.014486] [ 28.014845] ============================================ [ 28.015996] WARNING: possible recursive locking detected [ 28.017072] 5.3.0-rc4-xfstests-00012-gedca88337ca9 #1202 Not tainted [ 28.018374] -------------------------------------------- [ 28.019693] jbd2/vdc-8/1476 is trying to acquire lock: [ 28.020635] 000000005ce13aef (&(&sbi->s_fc_lock)->rlock){+.+.}, at: ext4_journal_fc_cleanup_cb+0x2f/0xa0 [ 28.022387] [ 28.022387] but task is already holding lock: [ 28.023414] 000000005ce13aef (&(&sbi->s_fc_lock)->rlock){+.+.}, at: ext4_journal_fc_commit_cb+0x83/0xa90 [ 28.025237] [ 28.025237] other info that might help us debug this: [ 28.026350] Possible unsafe locking scenario: [ 28.026350] [ 28.027336] CPU0 [ 28.027758] ---- [ 28.028240] lock(&(&sbi->s_fc_lock)->rlock); [ 28.029105] lock(&(&sbi->s_fc_lock)->rlock); [ 28.029937] [ 28.029937] *** DEADLOCK *** [ 28.029937] [ 28.031154] May be due to missing lock nesting notation [ 28.031154] [ 28.032780] 1 lock held by jbd2/vdc-8/1476: [ 28.033760] #0: 000000005ce13aef (&(&sbi->s_fc_lock)->rlock){+.+.}, at: ext4_journal_fc_commit_cb+0x83/0xa90 [ 28.035436] [ 28.035436] stack backtrace: [ 28.036197] CPU: 1 PID: 1476 Comm: jbd2/vdc-8 Not tainted 5.3.0-rc4-xfstests-00012-gedca88337ca9 #1202 [ 28.037868] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 28.039289] Call Trace: [ 28.039772] dump_stack+0x67/0x90 [ 28.040427] validate_chain.cold+0x1be/0x21b [ 28.041305] __lock_acquire+0x447/0x7c0 [ 28.042069] lock_acquire+0x9a/0x180 [ 28.042738] ? ext4_journal_fc_cleanup_cb+0x2f/0xa0 [ 28.043663] _raw_spin_lock+0x31/0x80 [ 28.044346] ? ext4_journal_fc_cleanup_cb+0x2f/0xa0 [ 28.045264] ext4_journal_fc_cleanup_cb+0x2f/0xa0 [ 28.046154] jbd2_journal_commit_transaction+0x243/0x24bb [ 28.047156] ? sched_clock_cpu+0xc/0xc0 [ 28.048099] ? lock_timer_base+0x10/0x80 [ 28.048935] ? kvm_sched_clock_read+0x14/0x30 [ 28.050022] ? sched_clock+0x5/0x10 [ 28.050853] ? sched_clock_cpu+0xc/0xc0 [ 28.051793] ? kjournald2+0x143/0x3f0 [ 28.052606] kjournald2+0x143/0x3f0 [ 28.053311] ? __wake_up_common_lock+0xc0/0xc0 [ 28.054935] kthread+0x108/0x140 [ 28.055975] ? __jbd2_debug+0x50/0x50 [ 28.057105] ? __kthread_create_on_node+0x1a0/0x1a0 [ 28.058346] ret_from_fork+0x3a/0x50