Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6234807rwb; Mon, 5 Dec 2022 09:29:37 -0800 (PST) X-Google-Smtp-Source: AA0mqf6iW/NBVlbQHpWAs+lyjIaWWptXvSM/h7UUG7q0rrPcjQttanfG5MRSDsZWAqGO8A10/CZR X-Received: by 2002:a63:4246:0:b0:477:98cc:3d01 with SMTP id p67-20020a634246000000b0047798cc3d01mr53596797pga.505.1670261377029; Mon, 05 Dec 2022 09:29:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670261377; cv=none; d=google.com; s=arc-20160816; b=RBKXB7CwsB+ry1zU6cxnhKidw6ZosipL6J5a8/RBjwoKW+YwjzCTtljMroxVnecOd2 s3KsF8rfpvvLk88D2SM3ZhzQiwW31Dk9Fr8w69II4slmlM8Z2rMnpv3HBKqXHVCtpcZZ mEaeoZhvZ2Z+lalFhxhBNV4EmbJViKbcCjXw3xxuAVymW7IH9MAudPSarbIvoZxS62oh 6oomVXYJuE76dfHGVKI4exTQQ5RgeVPZQEq+DMSrr6coj0UgGKOQi0fpU14qjAk6x2d6 KSQHYKLAV8MrczKmBxHlVmYvLkTiDCgZ1c+SIdxVxYfWBMQj6dweq6Z0cIp6rYg+15Jj 3Uxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:user-agent:mime-version:date :message-id; bh=PRupJn2uYlUnaBz6R5n/pa7S1cX1Uq525HapC2F2Ngs=; b=sU5IY50VEr/LMw3kW8cXVwRcclFUIw2/uZodKntYQ6WwaefTF6d9K7knznxdfWH0WG v7Gk7BK8FeTKjrmZK2zy+/j4DwCf/34Bony+tnch2ycM7cpa8u1rhFKWCDg5JY/3WPrA +2eYaowOjdd9WGUZSOnZaidZyWDUocZ7FVwm0Z5ANI6H7X15Oy/hnS+V38li8hS6PUb8 szzqN0+2w3KGtF3WAqBCxPMi0WzOKk3yDL/QPX6EiRhRLmHOVq/mamFtpJVTDzKIuGF0 izHCuH9XjT4nV8N71QiGsxcm4wNtv1fBxxOPyFFkHDM4TXwuZSgIpdUs8itzUpeMTrU0 j6qg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c16-20020a056a00249000b0057527c02551si15952095pfv.189.2022.12.05.09.29.19; Mon, 05 Dec 2022 09:29:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231834AbiLER13 (ORCPT + 99 others); Mon, 5 Dec 2022 12:27:29 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51522 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232206AbiLER1V (ORCPT ); Mon, 5 Dec 2022 12:27:21 -0500 Received: from us.icdsoft.com (us.icdsoft.com [192.252.146.184]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A1651218BD for ; Mon, 5 Dec 2022 09:27:19 -0800 (PST) Received: (qmail 3316 invoked by uid 1001); 5 Dec 2022 17:27:18 -0000 Received: from unknown (HELO ?94.155.37.249?) (famzah@icdsoft.com@94.155.37.249) by 192.252.159.165 with ESMTPA; 5 Dec 2022 17:27:18 -0000 Message-ID: <6f64edf8-2bed-4131-0042-6a2005ed6926@icdsoft.com> Date: Mon, 5 Dec 2022 19:27:16 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.5.1 Subject: Re: kernel BUG at fs/ext4/inode.c:1914 - page_buffers() Content-Language: en-US From: Ivan Zahariev To: linux-ext4@vger.kernel.org Cc: Theodore Ts'o , Greg Kroah-Hartman References: In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,NICE_REPLY_A, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Hello, I forgot to mention that the ext4 file system is mounted with "data=journal" and the crash happens on servers which have more than 20 GB RAM and are I/O busy. > Back to the problem! 99% of the difference between 4.14 and the latest > kernel for __ext4_journalled_writepage() in "fs/ext4/inode.c" comes > from the following commit: > https://github.com/torvalds/linux/commit/5c48a7df91499e371ef725895b2e2d21a126e227 > > Is it safe that we revert this patch on the latest 5.15 kernel, so > that we can confirm if this resolves the issue for us? If we can't or if it doesn't make sense to revert the patch, is there anything else we can do to assist in the debug of this rare kernel crash? The machines are Qemu/KVM guests but dumping the whole memory would take a couple of minutes, so it's not viable. Are there any debug statements we could add in __ext4_journalled_writepage() in "fs/ext4/inode.c" that may give a hint where the problem is? Best regards. --Ivan