-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
With zinject faults enabled, "ASSERT(!(zio->io_flags & (ZIO_FLAG_IO_REPAIR | ZIO_FLAG_IO_RETRY)));" in zio_dva_throttle_done() fails. #6383
Comments
sanjeevbagewadi
pushed a commit
to sanjeevbagewadi/zfs
that referenced
this issue
Jul 21, 2017
…penzfs#6383) zinject enables ZIO_FLAG_IO_RETRY to ensure FMA events are generated. These ZIOs could have ZIO_FLAG_IO_ALOCATING set. Hence, conditionally allow such ZIOs in zio_dva_throttle_done() and donot fail the ASSERT() for ZIO_FLAG_IO_RETRY. Signed-off-by: Sanjeev Bagewadi <sanjeev.bagewadi@gmail.com>
13 tasks
sanjeevbagewadi
pushed a commit
to sanjeevbagewadi/zfs
that referenced
this issue
Aug 10, 2017
zinject enables ZIO_FLAG_IO_RETRY to ensure FMA events are generated. Allow such ZIOs in zio_dva_throttle_done() and donot fail the ASSERT() for ZIO_FLAG_IO_RETRY. Signed-off-by: Sanjeev Bagewadi <sanjeev.bagewadi@gmail.com>
tonyhutter
pushed a commit
that referenced
this issue
Aug 22, 2017
If fault injection is enabled, the ZIO_FLAG_IO_RETRY could be set by zio_handle_device_injection() to generate the FMA events and update stats. Hence, ignore the flag and process such zios. A better fix would be to add another flag in the zio_t to indicate that the zio is failed because of a zinject rule. However, considering the fact that we do this in debug bits, we could do with the crude check using the global flag zio_injection_enabled which is set to 1 when zinject records are added. Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Signed-off-by: Sanjeev Bagewadi <sanjeev.bagewadi@gmail.com> Closes #6383 Closes #6384
Fabian-Gruenbichler
pushed a commit
to Fabian-Gruenbichler/zfs
that referenced
this issue
Sep 29, 2017
If fault injection is enabled, the ZIO_FLAG_IO_RETRY could be set by zio_handle_device_injection() to generate the FMA events and update stats. Hence, ignore the flag and process such zios. A better fix would be to add another flag in the zio_t to indicate that the zio is failed because of a zinject rule. However, considering the fact that we do this in debug bits, we could do with the crude check using the global flag zio_injection_enabled which is set to 1 when zinject records are added. Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Signed-off-by: Sanjeev Bagewadi <sanjeev.bagewadi@gmail.com> Closes openzfs#6383 Closes openzfs#6384
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
System information
Describe the problem you're observing
Describe how to reproduce the problem
Include any warning/errors/backtraces from the system logs
The text was updated successfully, but these errors were encountered: