Received: by 2002:a05:7412:3784:b0:e2:908c:2ebd with SMTP id jk4csp1178451rdb; Mon, 2 Oct 2023 01:13:06 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHPTjMV8yk4nLsmJixJ2p+wAWY5VlJOMwa4DZ34qmfte4+0MalQrz15BymuSiZWp2g5L06Y X-Received: by 2002:a05:6a21:606:b0:15d:149f:95ef with SMTP id ll6-20020a056a21060600b0015d149f95efmr10825611pzb.51.1696234385546; Mon, 02 Oct 2023 01:13:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696234385; cv=none; d=google.com; s=arc-20160816; b=uk+30kWandMAJXwhTBLJr6lqizcrmzd9Vd8TS5Obi35gcFrfJKIkFqSIdpMnmWw4r0 qpDm9+6goBJk/bit89nUnqL1/tBu05TlyVFWYtTdV24oAZD2q7SGTvhfo2RFRrPWcOC3 oJEtI/WbnhDQM6atYU+H5PCH0mNaT2swusK0vKyN+16pZZdD6IDWT/j6vCpHIucrge2x pvlVww7j8LtXFCiELCjk+Wyioc+xvCr4HNWJIXzkrBFd2F+L1gVoVz8kGNLavURDDHjv 23qIvoaFmIntyQkgiw+4JoqClDcGj/cvwY3C5CfnxFrcYQ+w2udTZMappCLE5zdpL2sE iRMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:auto-submitted :content-transfer-encoding:message-id:date:subject:to:from :dkim-signature; bh=BuzqYYbjgz7oFI+jthkjHv74d6GxQKJ/Dzl55DOQm00=; fh=lfmAJNlsrgVlLfgmf+xa0zOkAKc6VKVRczifYgkRnAY=; b=gsmE0jAVMVsW9apbGxtVv557h14cfMLrybOpomMi/KMTOKjjo9skD2nQng8PTVCQ6e Gf2nHMVWKpqM0unsLO1wNrWmQ2uGQP0CMwLFM+/B+RgoZKXJAeDz8IQktQHynnVjXgZs xYccj1sQWXWmE+yeguSyw0PlPeztCKve84Len61Y3QKAS3gi9DNQFslbe0i2wGNEyu/y vYiKSe8NVvSW921DS9Pi+67HL+p6RvoV9rA/pJdhZQaHw7iG76nF9AcKTqbg8+vb5Ex4 u8YCCGlNU5ol2NvEnXKiVEmR5FoURzHgyO1Fo2TwoC9gkTFYyFyJxcEsbcYSxHjOWogd 6G1A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="O5Dw9R/f"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id l5-20020a170903120500b001b84335fb90si28068424plh.286.2023.10.02.01.13.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 Oct 2023 01:13:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="O5Dw9R/f"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 5F3F5807973A; Mon, 2 Oct 2023 01:10:34 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235805AbjJBIKZ (ORCPT + 99 others); Mon, 2 Oct 2023 04:10:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60878 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235773AbjJBIKY (ORCPT ); Mon, 2 Oct 2023 04:10:24 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 35ABBBC for ; Mon, 2 Oct 2023 01:10:22 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPS id 886A2C433C8 for ; Mon, 2 Oct 2023 08:10:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1696234221; bh=mFTxSvWKyyju5dTnOPbaXI7TspflrHiWvORUdO4g7Zo=; h=From:To:Subject:Date:From; b=O5Dw9R/fg/bkdziK40TfsSjsNGHgBUe293kwUim1XE6lHJliHpNPlvTsLuox46VKb qv5kXtn5QPjQashbYTZhIy0/FggYzV26Dz6nAQGM96xMe65oRXO/zXgNdoNclNNzd0 Gb+mzHP5s6x7uTS8MUwl2WwYPMyfNtwP2ctuCRf2qUbMBrIPj/dpwMMVS5oGOLlAeI 2wL3hOTMQa287PQeLbzBpcJuKGSValowoYjQRzrHkO34mtF5DIepRC8IucvxMVSAPT mhIIKOFGJUIoIf7jEfUNHuSYL1TnO4rkh1a1UfT4+SKoR55tNO6dqmdp5RTfz4M3UW RtByznySELNhg== Received: by aws-us-west-2-korg-bugzilla-1.web.codeaurora.org (Postfix, from userid 48) id 6772BC53BCD; Mon, 2 Oct 2023 08:10:21 +0000 (UTC) From: bugzilla-daemon@kernel.org To: linux-ext4@vger.kernel.org Subject: [Bug 217965] New: ext4(?) regression since 6.5.0 on sata hdd Date: Mon, 02 Oct 2023 08:10:21 +0000 X-Bugzilla-Reason: None X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: AssignedTo fs_ext4@kernel-bugs.osdl.org X-Bugzilla-Product: File System X-Bugzilla-Component: ext4 X-Bugzilla-Version: 2.5 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: iivanich@gmail.com X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: fs_ext4@kernel-bugs.osdl.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter cf_regression Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugzilla.kernel.org/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Mon, 02 Oct 2023 01:10:34 -0700 (PDT) https://bugzilla.kernel.org/show_bug.cgi?id=3D217965 Bug ID: 217965 Summary: ext4(?) regression since 6.5.0 on sata hdd Product: File System Version: 2.5 Hardware: All OS: Linux Status: NEW Severity: normal Priority: P3 Component: ext4 Assignee: fs_ext4@kernel-bugs.osdl.org Reporter: iivanich@gmail.com Regression: No Since kernel 6.5.x and 6.6-rc* I'm getting weird kworker flush activity when building openwrt from sources. 91 root 20 0 0 0 0 R 99,7 0,0 18:06.57 kworker/u16:4+flush-8:16 Openwrt sources resides on the sata hdd drive with ext4 fs,I'm using this s= etup for a last 5 years, the problem is that since 6.5 kernels after the openwrt kernel patch make step(https://git.openwrt.org/?p=3Dopenwrt/openwrt.git;a=3Dblob;f=3Dscripts/= patch-kernel.sh;h=3Dc2b7e7204952f93946a6075d546cbeae32c2627f;hb=3DHEAD which probably involves a lot of copy and write operations) kworker/u16:4+flush-8:16 uses 100% of one core for a while(5-15 minutes) ev= en after I canceling openwrt build. I tried to move this openwrt sources folder to an ssd drive where my system= is resides and run openwrt build from there and getting no issues with kworker flush cpu usage. Also I have no such behavior with 6.4.x and older kernels= so it looks like regression to me, not sure if this is a fs, vfs or even block subsystem issue. This is how it looks in perf Samples: 320K of event 'cycles:P', Event count (approx.): 363448649248 Children Self Command Shared Object=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20 Symbol + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] ret_from_fork_asm + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] ret_from_fork + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] kthread + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] worker_thread + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] process_one_work + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] wb_workfn + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] wb_writeback + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] __writeback_inodes_wb + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] writeback_sb_inodes + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] __writeback_single_inode + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] do_writepages + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] ext4_writepages + 12,40% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] ext4_do_writepages + 12,39% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] ext4_map_blocks + 12,39% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] ext4_ext_map_blocks + 12,38% 0,00% kworker/u16:2+f [kernel.vmlinux] = [k] ext4_mb_new_blocks + 12,38% 0,93% kworker/u16:2+f [kernel.vmlinux] = [k] ext4_mb_regular_allocator + 9,42% 0,00% cc1 [unknown] = [.] 0000000000000000 + 5,42% 0,53% kworker/u16:2+f [kernel.vmlinux] = [k] ext4_mb_scan_aligned + 4,88% 0,69% kworker/u16:2+f [kernel.vmlinux] = [k] mb_find_extent + 3,99% 3,95% kworker/u16:2+f [kernel.vmlinux] = [k] mb_find_order_for_block + 3,51% 0,61% kworker/u16:2+f [kernel.vmlinux] = [k] ext4_mb_load_buddy_gfp + 2,95% 0,01% cc1 [kernel.vmlinux] = [k] asm_exc_page_fault + 2,67% 0,18% kworker/u16:2+f [kernel.vmlinux] = [k] pagecache_get_page + 2,41% 0,40% kworker/u16:2+f [kernel.vmlinux] = [k] __filemap_get_folio + 2,33% 2,10% cc1 cc1 = [.] cpp_get_token_1 + 2,12% 0,05% cc1 [kernel.vmlinux] = [k] exc_page_fault + 2,07% 0,04% cc1 [kernel.vmlinux] = [k] do_user_addr_fault + 1,81% 0,52% kworker/u16:2+f [kernel.vmlinux] = [k] filemap_get_entry 1,80% 1,71% cc1 cc1 = [.] ht_lookup_with_hash + 1,77% 0,08% cc1 [kernel.vmlinux] = [k] handle_mm_fault + 1,65% 0,14% cc1 [kernel.vmlinux] = [k] __handle_mm_fault 1,60% 1,49% cc1 cc1 = [.] _cpp_lex_direct + 1,54% 0,73% kworker/u16:2+f [kernel.vmlinux] = [k] ext4_mb_good_group + 1,49% 1,46% cc1 cc1 = [.] ggc_internal_alloc + 1,28% 0,05% cc1 [kernel.vmlinux] = [k] do_anonymous_page + 1,28% 0,04% cc1 [kernel.vmlinux] = [k] entry_SYSCALL_64 --=20 You may reply to this email to add a comment. You are receiving this mail because: You are watching the assignee of the bug.=