[dm-devel] kernel oops with blk-mq-sched latest
Hannes Reinecke
hare at suse.de
Wed Jan 18 11:48:36 UTC 2017
On 01/17/2017 02:00 PM, Jens Axboe wrote:
> On 01/17/2017 04:47 AM, Jens Axboe wrote:
>> On 01/17/2017 12:57 AM, Hannes Reinecke wrote:
>>> Hi Jens,
>>>
>>> I gave your latest patchset from
>>>
>>> git.kernel.dk/linux-block blk-mq-sched
>>>
>>> I see a kernel oops when shutting down:
>>>
>>> [ 2132.708929] systemd-shutdown[1]: Detaching DM devices.
>>> [ 2132.965107] BUG: unable to handle kernel NULL pointer dereference at
>>> 00000000
>>> 00000001
>>> [ 2133.037182] IP: dd_merged_requests+0x6/0x60
>>> [ 2133.077816] PGD 0
>>> [ 2133.077818]
>>> [ 2133.113087] Oops: 0000 [#1] SMP
>>> [ list of modules removed ]
>>> [ 2133.925265] CPU: 20 PID: 1 Comm: systemd-shutdow Not tainted
>>> 4.10.0-rc4+ #543
>>> [ 2133.990034] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 09/18/2013
>>> [ 2134.050522] task: ffff88042d614040 task.stack: ffffc90003150000
>>> [ 2134.106915] RIP: 0010:dd_merged_requests+0x6/0x60
>>> [ 2134.150593] RSP: 0018:ffffc90003153b18 EFLAGS: 00010002
>>> [ 2134.198740] RAX: ffffffff81cc6de0 RBX: ffff8804296d5040 RCX:
>>> 0000000000000001
>>> [ 2134.262708] RDX: 0000000000000001 RSI: 0000000000000001 RDI:
>>> ffff8804296d5040
>>> [ 2134.326987] RBP: ffffc90003153b30 R08: 0000000000000000 R09:
>>> 0000000000000000
>>> [ 2134.391054] R10: 0000000000000000 R11: 0001f8180001f815 R12:
>>> 0000000000000000
>>> [ 2134.456095] R13: ffff8804296d5040 R14: ffff8804099801f0 R15:
>>> 0000000000000004
>>> [ 2134.521196] FS: 00007fd64d3bf840(0000) GS:ffff88042f900000(0000)
>>> knlGS:0000000000000000
>>> [ 2134.595178] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>>> [ 2134.648637] CR2: 0000000000000001 CR3: 000000081b892000 CR4:
>>> 00000000000406e0
>>> [ 2134.713349] Call Trace:
>>> [ 2134.737168] ? elv_drain_elevator+0x29/0xa0
>>> [ 2134.775821] __blk_drain_queue+0x52/0x1a0
>>> [ 2134.812473] blk_queue_bypass_start+0x6e/0xa0
>>> [ 2134.854009] blkcg_deactivate_policy+0x30/0xf0
>>> [ 2134.894993] blk_throtl_exit+0x34/0x50
>>> [ 2134.929450] blkcg_exit_queue+0x35/0x40
>>> [ 2134.965089] blk_release_queue+0x33/0xe0
>>> [ 2135.001364] kobject_cleanup+0x63/0x170
>>> [ 2135.037412] kobject_put+0x25/0x50
>>> [ 2135.068622] blk_cleanup_queue+0x198/0x260
>>> [ 2135.107780] cleanup_mapped_device+0xb5/0xf0 [dm_mod]
>>> [ 2135.154741] __dm_destroy+0x1a5/0x290 [dm_mod]
>>> [ 2135.195009] dm_destroy+0x13/0x20 [dm_mod]
>>> [ 2135.232149] dev_remove+0xde/0x120 [dm_mod]
>>> [ 2135.270184] ? dev_suspend+0x210/0x210 [dm_mod]
>>> [ 2135.311478] ctl_ioctl+0x20b/0x510 [dm_mod]
>>> [ 2135.349680] ? terminate_walk+0xc3/0x140
>>> [ 2135.385442] ? kmem_cache_free+0x10/0x260
>>> [ 2135.422315] dm_ctl_ioctl+0x13/0x20 [dm_mod]
>>>
>>> Known issue?
>>
>> Try with this, looks like we're calling the old bypass path for the new
>> path, which is now triggering because q->elevator is true.
>
> Should have grepped, there's one more path that uses the old bypass
> path for q->mq_ops, potentially. This one handles that one, too.
>
>
> diff --git a/block/blk-cgroup.c b/block/blk-cgroup.c
> index 8ba0af780e88..2630f64bed19 100644
> --- a/block/blk-cgroup.c
> +++ b/block/blk-cgroup.c
> @@ -1223,7 +1223,11 @@ int blkcg_activate_policy(struct request_queue *q,
> if (blkcg_policy_enabled(q, pol))
> return 0;
>
> - blk_queue_bypass_start(q);
> + if (q->mq_ops) {
> + blk_mq_freeze_queue(q);
> + blk_mq_quiesce_queue(q);
> + } else
> + blk_queue_bypass_start(q);
> pd_prealloc:
> if (!pd_prealloc) {
> pd_prealloc = pol->pd_alloc_fn(GFP_KERNEL, q->node);
> @@ -1261,7 +1265,10 @@ int blkcg_activate_policy(struct request_queue *q,
>
> spin_unlock_irq(q->queue_lock);
> out_bypass_end:
> - blk_queue_bypass_end(q);
> + if (q->mq_ops)
> + blk_mq_unfreeze_queue(q);
> + else
> + blk_queue_bypass_end(q);
> if (pd_prealloc)
> pol->pd_free_fn(pd_prealloc);
> return ret;
> @@ -1284,7 +1291,12 @@ void blkcg_deactivate_policy(struct request_queue *q,
> if (!blkcg_policy_enabled(q, pol))
> return;
>
> - blk_queue_bypass_start(q);
> + if (q->mq_ops) {
> + blk_mq_freeze_queue(q);
> + blk_mq_quiesce_queue(q);
> + } else
> + blk_queue_bypass_start(q);
> +
> spin_lock_irq(q->queue_lock);
>
> __clear_bit(pol->plid, q->blkcg_pols);
> @@ -1304,7 +1316,11 @@ void blkcg_deactivate_policy(struct request_queue *q,
> }
>
> spin_unlock_irq(q->queue_lock);
> - blk_queue_bypass_end(q);
> +
> + if (q->mq_ops)
> + blk_mq_unfreeze_queue(q);
> + else
> + blk_queue_bypass_end(q);
> }
> EXPORT_SYMBOL_GPL(blkcg_deactivate_policy);
>
> diff --git a/block/elevator.c b/block/elevator.c
> index d14cb87e6564..464372840774 100644
> --- a/block/elevator.c
> +++ b/block/elevator.c
> @@ -613,6 +613,9 @@ void elv_drain_elevator(struct request_queue *q)
> {
> static int printed;
>
> + if (WARN_ON_ONCE(q->mq_ops))
> + return;
> +
> lockdep_assert_held(q->queue_lock);
>
> while (q->elevator->type->ops.sq.elevator_dispatch_fn(q, 1))
>
Nearly there.
You're missing a 'blk_mq_start_hw_queues(q)' after
blk_mq_unfreeze_queue(); without it the queue will stall after switching
the scheduler.
Also what's quite suspicious is this:
struct blkcg_gq *blkg_lookup_create(struct blkcg *blkcg,
struct request_queue *q)
{
struct blkcg_gq *blkg;
WARN_ON_ONCE(!rcu_read_lock_held());
lockdep_assert_held(q->queue_lock);
/*
* This could be the first entry point of blkcg implementation and
* we shouldn't allow anything to go through for a bypassing queue.
*/
if (unlikely(blk_queue_bypass(q)))
return ERR_PTR(blk_queue_dying(q) ? -ENODEV : -EBUSY);
which now won't work as the respective flags aren't set anymore.
Not sure if that's a problem, though.
But you might want to look at that, too.
Nevertheless, with the mentioned modifications to your patch the crashes
don't occur anymore.
Sad news is that it doesn't help _that_ much on spinning rust mpt3sas;
there I still see a ~50% performance penalty on reads.
Write's slightly better than sq performance, though.
Cheers,
Hannes
--
Dr. Hannes Reinecke Teamlead Storage & Networking
hare at suse.de +49 911 74053 688
SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nürnberg
GF: F. Imendörffer, J. Smithard, J. Guild, D. Upmanyu, G. Norton
HRB 21284 (AG Nürnberg)
More information about the dm-devel
mailing list