From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.3 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,NICE_REPLY_A, SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7DD1CC433E7 for ; Thu, 15 Oct 2020 06:05:07 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 2DE8822247 for ; Thu, 15 Oct 2020 06:05:06 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725977AbgJOGFG (ORCPT ); Thu, 15 Oct 2020 02:05:06 -0400 Received: from szxga01-in.huawei.com ([45.249.212.187]:3642 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725922AbgJOGFF (ORCPT ); Thu, 15 Oct 2020 02:05:05 -0400 Received: from DGGEMM406-HUB.china.huawei.com (unknown [172.30.72.54]) by Forcepoint Email with ESMTP id DC5AEF1298654590F1DD; Thu, 15 Oct 2020 14:05:02 +0800 (CST) Received: from dggema772-chm.china.huawei.com (10.1.198.214) by DGGEMM406-HUB.china.huawei.com (10.3.20.214) with Microsoft SMTP Server (TLS) id 14.3.487.0; Thu, 15 Oct 2020 14:05:02 +0800 Received: from [10.169.42.93] (10.169.42.93) by dggema772-chm.china.huawei.com (10.1.198.214) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1913.5; Thu, 15 Oct 2020 14:05:01 +0800 Subject: Re: [PATCH] block: re-introduce blk_mq_complete_request_sync To: Ming Lei CC: Sagi Grimberg , Jens Axboe , Yi Zhang , , , Keith Busch , "Christoph Hellwig" References: <23f19725-f46b-7de7-915d-b97fd6d69cdc@redhat.com> <7a7aca6e-30f5-0754-fb7f-599699b97108@redhat.com> <6f2a5ae2-2e6a-0386-691c-baefeecb5478@huawei.com> <20201012081306.GB556731@T590> <5e05fc3b-ad81-aacc-1f8e-7ff0d1ad58fe@huawei.com> <20201014010813.GA775684@T590> <20201014033434.GC775684@T590> <20201014095642.GE775684@T590> From: Chao Leng Message-ID: Date: Thu, 15 Oct 2020 14:05:01 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Thunderbird/68.9.0 MIME-Version: 1.0 In-Reply-To: <20201014095642.GE775684@T590> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.169.42.93] X-ClientProxiedBy: dggeme706-chm.china.huawei.com (10.1.199.102) To dggema772-chm.china.huawei.com (10.1.198.214) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-block@vger.kernel.org On 2020/10/14 17:56, Ming Lei wrote: > On Wed, Oct 14, 2020 at 05:39:12PM +0800, Chao Leng wrote: >> >> >> On 2020/10/14 11:34, Ming Lei wrote: >>> On Wed, Oct 14, 2020 at 09:08:28AM +0800, Ming Lei wrote: >>>> On Tue, Oct 13, 2020 at 03:36:08PM -0700, Sagi Grimberg wrote: >>>>> >>>>>>>> This may just reduce the probability. The concurrency of timeout >>>>>>>> and teardown will cause the same request >>>>>>>> be treated repeatly, this is not we expected. >>>>>>> >>>>>>> That is right, not like SCSI, NVME doesn't apply atomic request >>>>>>> completion, so >>>>>>> request may be completed/freed from both timeout & nvme_cancel_request(). >>>>>>> >>>>>>> .teardown_lock still may cover the race with Sagi's patch because >>>>>>> teardown >>>>>>> actually cancels requests in sync style. >>>>>> In extreme scenarios, the request may be already retry success(rq state >>>>>> change to inflight). >>>>>> Timeout processing may wrongly stop the queue and abort the request. >>>>>> teardown_lock serialize the process of timeout and teardown, but do not >>>>>> avoid the race. >>>>>> It might not be safe. >>>>> >>>>> Not sure I understand the scenario you are describing. >>>>> >>>>> what do you mean by "In extreme scenarios, the request may be already retry >>>>> success(rq state change to inflight)"? >>>>> >>>>> What will retry the request? only when the host will reconnect >>>>> the request will be retried. >>>>> >>>>> We can call nvme_sync_queues in the last part of the teardown, but >>>>> I still don't understand the race here. >>>> >>>> Not like SCSI, NVME doesn't complete request atomically, so double >>>> completion/free can be done from both timeout & nvme_cancel_request()(via teardown). >>>> >>>> Given request is completed remotely or asynchronously in the two code paths, >>>> the teardown_lock can't protect the case. >>> >>> Thinking of the issue further, the race shouldn't be between timeout and >>> teardown. >>> >>> Both nvme_cancel_request() and nvme_tcp_complete_timed_out() are called >>> with .teardown_lock, and both check if the request is completed before >>> calling blk_mq_complete_request() which marks the request as COMPLETE state. >>> So the request shouldn't be double-freed in the two code paths. >>> >>> Another possible reason is that between timeout and normal completion(fail >>> fast pending requests after ctrl state is updated to CONNECTING). >>> >>> Yi, can you try the following patch and see if the issue is fixed? >>> >>> diff --git a/drivers/nvme/host/tcp.c b/drivers/nvme/host/tcp.c >>> index d6a3e1487354..fab9220196bd 100644 >>> --- a/drivers/nvme/host/tcp.c >>> +++ b/drivers/nvme/host/tcp.c >>> @@ -1886,7 +1886,6 @@ static int nvme_tcp_configure_admin_queue(struct nvme_ctrl *ctrl, bool new) >>> static void nvme_tcp_teardown_admin_queue(struct nvme_ctrl *ctrl, >>> bool remove) >>> { >>> - mutex_lock(&to_tcp_ctrl(ctrl)->teardown_lock); >>> blk_mq_quiesce_queue(ctrl->admin_q); >>> nvme_tcp_stop_queue(ctrl, 0); >>> if (ctrl->admin_tagset) { >>> @@ -1897,15 +1896,13 @@ static void nvme_tcp_teardown_admin_queue(struct nvme_ctrl *ctrl, >>> if (remove) >>> blk_mq_unquiesce_queue(ctrl->admin_q); >>> nvme_tcp_destroy_admin_queue(ctrl, remove); >>> - mutex_unlock(&to_tcp_ctrl(ctrl)->teardown_lock); >>> } >>> static void nvme_tcp_teardown_io_queues(struct nvme_ctrl *ctrl, >>> bool remove) >>> { >>> - mutex_lock(&to_tcp_ctrl(ctrl)->teardown_lock); >>> if (ctrl->queue_count <= 1) >>> - goto out; >>> + return; >>> blk_mq_quiesce_queue(ctrl->admin_q); >>> nvme_start_freeze(ctrl); >>> nvme_stop_queues(ctrl); >>> @@ -1918,8 +1915,6 @@ static void nvme_tcp_teardown_io_queues(struct nvme_ctrl *ctrl, >>> if (remove) >>> nvme_start_queues(ctrl); >>> nvme_tcp_destroy_io_queues(ctrl, remove); >>> -out: >>> - mutex_unlock(&to_tcp_ctrl(ctrl)->teardown_lock); >>> } >>> static void nvme_tcp_reconnect_or_remove(struct nvme_ctrl *ctrl) >>> @@ -2030,11 +2025,11 @@ static void nvme_tcp_error_recovery_work(struct work_struct *work) >>> struct nvme_ctrl *ctrl = &tcp_ctrl->ctrl; >>> nvme_stop_keep_alive(ctrl); >>> + >>> + mutex_lock(&tcp_ctrl->teardown_lock); >>> nvme_tcp_teardown_io_queues(ctrl, false); >>> - /* unquiesce to fail fast pending requests */ >>> - nvme_start_queues(ctrl); >>> nvme_tcp_teardown_admin_queue(ctrl, false); >>> - blk_mq_unquiesce_queue(ctrl->admin_q); >> Delete blk_mq_unquiesce_queue will cause a bug which may cause reconnect failed. >> Delete nvme_start_queues may cause another bug. > > nvme_tcp_setup_ctrl() will re-start io and admin queue, and only .connect_q > and .fabrics_q are required during reconnect.I check the code. Unquiesce the admin queue in nvme_tcp_configure_admin_queue, so reconnect can work well. > > So can you explain in detail about the bug? First if reconnect failed, quiesce the io queue and admin queue will cause IO pause long time. Second if reconnect failed more than max_reconnects, delete ctrl will hang. Second, I'm not sure. you can check it. The hang function is nvme_remove_namespaces in nvme_do_delete_ctrl. > > Thanks, > Ming > > . >