Assuming the fix was in 2.6.24.5, the upcoming Intrepid Ibex 8.10 kernel should already have this fix incorporated. I'll go ahead and open the Hardy nomination for it to be backported. Also including the git commit it which I believe is the patch they are referencing from 2.6.24.5. Thanks.
ogasawara@yoji:~/linux-2.6$ git log -p bd2ab67030e9116f1e4aae1289220255412b37fd
commit bd2ab67030e9116f1e4aae1289220255412b37fd
Author: Dan Williams <email address hidden>
Date: Thu Apr 10 21:29:27 2008 -0700
md: close a livelock window in handle_parity_checks5
If a failure is detected after a parity check operation has been initiated,
but before it completes handle_parity_checks5 will never quiesce operations on
the stripe.
Explicitly handle this case by "canceling" the parity check, i.e. clear the
STRIPE_OP_CHECK flags and queue the stripe on the handle list again to refresh
any non-uptodate blocks.
Kernel versions >= 2.6.23 are susceptible.
Cc: <email address hidden>
Cc: NeilBrown <email address hidden>
Signed-off-by: Dan Williams <email address hidden>
Signed-off-by: Andrew Morton <email address hidden>
Signed-off-by: Linus Torvalds <email address hidden>
Hi Jorno,
Assuming the fix was in 2.6.24.5, the upcoming Intrepid Ibex 8.10 kernel should already have this fix incorporated. I'll go ahead and open the Hardy nomination for it to be backported. Also including the git commit it which I believe is the patch they are referencing from 2.6.24.5. Thanks.
ogasawara@ yoji:~/ linux-2. 6$ git log -p bd2ab67030e9116 f1e4aae12892202 55412b37fd f1e4aae12892202 55412b37fd
commit bd2ab67030e9116
Author: Dan Williams <email address hidden>
Date: Thu Apr 10 21:29:27 2008 -0700
md: close a livelock window in handle_ parity_ checks5
If a failure is detected after a parity check operation has been initiated, parity_ checks5 will never quiesce operations on
but before it completes handle_
the stripe.
Explicitly handle this case by "canceling" the parity check, i.e. clear the
STRIPE_OP_CHECK flags and queue the stripe on the handle list again to refresh
any non-uptodate blocks.
Kernel versions >= 2.6.23 are susceptible.
Cc: <email address hidden>
Cc: NeilBrown <email address hidden>
Signed-off-by: Dan Williams <email address hidden>
Signed-off-by: Andrew Morton <email address hidden>
Signed-off-by: Linus Torvalds <email address hidden>