Received: by 2002:a05:7412:3784:b0:e2:908c:2ebd with SMTP id jk4csp1774878rdb; Mon, 2 Oct 2023 23:50:18 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFwytHRhaOCONbSTfEfRhBCV7UGtOXr/TmvKctV7mv74mOSrYgdM+TXin0AjJ9xCv0h4cye X-Received: by 2002:a05:6808:23c6:b0:3a3:b39d:a8bf with SMTP id bq6-20020a05680823c600b003a3b39da8bfmr17809951oib.45.1696315818355; Mon, 02 Oct 2023 23:50:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696315818; cv=none; d=google.com; s=arc-20160816; b=nhJRwRFULE7Od5f6yxnpmEdwfXTlOXeO7+nnsrrtP85c36/uSoz9IOcE7zpG8hn8nJ RSyMolLK6xkrjYD1TN5bw7o3NRR8Ba6mgKpAspK6X0MuRqOXWPCmBFXrHRnLVzYTuoS0 4nnMvkqYxjeBC+NyMixk1liwUHsbMGnZsaEtkEnTvUndpyMhRuJJnhk5RLN+Dm6Ss5yW Oj/NB2QS/bGvBUspykSuYeVuRAwP2p2uPeciRn7jaOtlSn5B5Dr2/4XjYQV6VzmBT0l6 lamIaWFDAcLzhNVSeF14Ngu9MG6GbRZvxEuTXSuVJIhOi2F41lAI0FRyi6/dgAIrMxJU p81Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:auto-submitted :content-transfer-encoding:references:in-reply-to:message-id:date :subject:to:from:dkim-signature; bh=5RgpqwuyL1EdLacOne4IrN2+HqyoSoEfZNEozLXaJXA=; fh=lfmAJNlsrgVlLfgmf+xa0zOkAKc6VKVRczifYgkRnAY=; b=x5MtBfi5/DobkIHN7W+vFZWyuYd2N49qrsvi+OxOFd8xqNJqpFIk7ukv1UnTcNAiCI VuedEE7p66Evm87BR18suOsSZgNQDsJ43QNjAES+WGumZbUYH3m4aBLmWpo/UPdxJkUF yNJQpL7VvD5DevBJH7yovxDJ2UYslz/UHyo6rYbLdRNKuzqcfgrpyUMcKP9Wv9QvTLOw jLvYz3aPRsdrr0vBSUgQjF055rn1hK11t527UvyRAtNbqJM6QG1P96m3ThEK0UKqvtP3 1RkNceTdutWflF3qmL8gN510TkLg2RjNv442VSXpxInM8f33wiJOUZXdSxqpZMKc+YNO I7Lg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="hl/lllSK"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id j35-20020a634a63000000b00565335587absi738806pgl.802.2023.10.02.23.50.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 Oct 2023 23:50:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="hl/lllSK"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id A2B528028B76; Mon, 2 Oct 2023 23:50:15 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230399AbjJCGuQ (ORCPT + 99 others); Tue, 3 Oct 2023 02:50:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35914 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229453AbjJCGuP (ORCPT ); Tue, 3 Oct 2023 02:50:15 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5F643AC for ; Mon, 2 Oct 2023 23:50:13 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPS id EAA89C433CA for ; Tue, 3 Oct 2023 06:50:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1696315813; bh=Pa7huweICdqzg+qr1Zo79huZUs41deJGtNow42HjGkg=; h=From:To:Subject:Date:In-Reply-To:References:From; b=hl/lllSKJjIle74rsBe/4QDWkRMyntTsHaJyMJwxW+v/D6gxj24OmnTFSep1jACc8 rFtXR4iKCgrjORQHIqy4BQ+h2yS+a6R73qcLkxkIm8vfDClUkJ09cIY51aRKjaGj1I OswYtVMM7Qa5cf1QeVOcxUwA5Q83paIXPff4S52cZ9yPREhzrmyY2kMuFC7QC0Ml/B Q4ifAiW0p+B19tH7YAJ/NJHZZQrojyg+LSQ00OX2C0oA6KNYC8xvtMgDJxvpiO7DzD Ps2a7yuAuJNB+SyoXcmewHe8vSSEB2UIbqRv2UY32tR6Rrjc/aCKAtmiFdJulEolHL Gep/lzhVXo9yg== Received: by aws-us-west-2-korg-bugzilla-1.web.codeaurora.org (Postfix, from userid 48) id CD7BCC53BD0; Tue, 3 Oct 2023 06:50:12 +0000 (UTC) From: bugzilla-daemon@kernel.org To: linux-ext4@vger.kernel.org Subject: [Bug 217965] ext4(?) regression since 6.5.0 on sata hdd Date: Tue, 03 Oct 2023 06:50:12 +0000 X-Bugzilla-Reason: None X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: AssignedTo fs_ext4@kernel-bugs.osdl.org X-Bugzilla-Product: File System X-Bugzilla-Component: ext4 X-Bugzilla-Version: 2.5 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: ojaswin.mujoo@ibm.com X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: fs_ext4@kernel-bugs.osdl.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugzilla.kernel.org/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Mon, 02 Oct 2023 23:50:15 -0700 (PDT) https://bugzilla.kernel.org/show_bug.cgi?id=3D217965 Ojaswin Mujoo (ojaswin.mujoo@ibm.com) changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |ojaswin.mujoo@ibm.com --- Comment #5 from Ojaswin Mujoo (ojaswin.mujoo@ibm.com) --- Hi Ivan,=20 Thanks for sharing the additional information. So I can see that you are passing stripe=3D32752 and from the backtrace and I do see some of the func= tions in the trace that indicate that a striped allocation was taking place. There were some changes in the allocator in 6.5 kernel if I'm not wrong but I'll = need to try to replicate this to confirm if the issue is related to those and up= date here. Meanwhile, can you provide some more info on the following: 1. I want to check if this issue is related to the striped allocation code = path or if its also seen in the usual path. To check that, will it be possible f= or you to run the same workload without passing "stripe=3D32752" option during= mount time?=20 2. How often do you see this issue, is it noticeable 100% of times?=20 Regards, ojaswin --=20 You may reply to this email to add a comment. You are receiving this mail because: You are watching the assignee of the bug.=