From patchwork Tue Jan 17 12:47:44 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jens Axboe X-Patchwork-Id: 9520843 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 964BF6020B for ; Tue, 17 Jan 2017 13:14:43 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 97BE928541 for ; Tue, 17 Jan 2017 13:14:43 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 895602854F; Tue, 17 Jan 2017 13:14:43 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_HI,T_DKIM_INVALID autolearn=unavailable version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 7C0E328541 for ; Tue, 17 Jan 2017 13:14:41 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750924AbdAQNOk (ORCPT ); Tue, 17 Jan 2017 08:14:40 -0500 Received: from mail-pg0-f48.google.com ([74.125.83.48]:33124 "EHLO mail-pg0-f48.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750803AbdAQNOj (ORCPT ); Tue, 17 Jan 2017 08:14:39 -0500 Received: by mail-pg0-f48.google.com with SMTP id 204so24937044pge.0 for ; Tue, 17 Jan 2017 05:14:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel-dk.20150623.gappssmtp.com; s=20150623; h=subject:to:references:cc:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding; bh=PIcnvUhefqawF1oRHCXLOAnpamFfrNtsh93rzc8s2pg=; b=GlM7HrNOhhSyjA+iCUw/TmuVbYE5fA2WQnaaIZdjp3ZaU5lgDuF2mbglcr++adcEQK b/iOdnuUEzMMSP2crGMI8corv+pbhN5OiTi5uMgsLNHek3u/2D+K+ejmYDydD+w9F/C+ s92Ve8aOfJ+R8EjKxLvJ9HOCMTbGfH8Rsu6kioRJTa+O3AUH3yHD2U5aPtG1D7T0Cr6Z 8Y0PlyadCblTdloeTjsGwvB9Zx4BjXOxYDr68xAvoF1lMCjbZJX2N/FiCLHg8s5kovL7 2U8r2G/2AMcCBsx3WImT4LU48dUc3nE1DdefcaJmVNzmC+PC0YIGfQ6uC/LsGXQ9RPni rU6g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:cc:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding; bh=PIcnvUhefqawF1oRHCXLOAnpamFfrNtsh93rzc8s2pg=; b=MLfSXjF/Wnc9a/VUXiG1ybpRtDj3dh1eLJgejjFLXe3knMsiXc9oLL0mTmWTqAmCq9 SjQ+yonMcwA/dwlhv9RWT8NgRtTIHENSbSt4eVI3PyGfi3gSW8awXHQtk65Nz1N15CT1 PThDgxMzfD7tiXAde3jZAtFRXUA3Umfby0PBkNojOz88VObbOIsPCnJlTMeG00H5mGvl wTIEYOXDc7pZ0kRqVDHH+rab2ilPeWtwP7i394axMJ6og1fROMsrvjVOD6x+HeGb0Flb 7k0TFZD+RO3M1zTL4XOXuESwslxXCNckCtqX1rRSZHSREecUxFOh8ujn1CeJCVE725+C G85g== X-Gm-Message-State: AIkVDXL9sBhPSj5xAVZZzQ+qyeGkPbbLamjHYIVnyPuwKUUZWH5i3EZBMcYGI8e8nh5Arw== X-Received: by 10.99.178.89 with SMTP id t25mr45950312pgo.183.1484657267029; Tue, 17 Jan 2017 04:47:47 -0800 (PST) Received: from [192.168.102.217] (50-233-49-230-static.hfc.comcastbusiness.net. [50.233.49.230]) by smtp.gmail.com with ESMTPSA id k78sm55634328pfb.93.2017.01.17.04.47.45 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 17 Jan 2017 04:47:46 -0800 (PST) Subject: Re: kernel oops with blk-mq-sched latest To: Hannes Reinecke References: Cc: "linux-block@vger.kernel.org" , Christoph Hellwig , device-mapper development From: Jens Axboe Message-ID: <55b21574-baf3-25d9-a920-299fa2d04d72@kernel.dk> Date: Tue, 17 Jan 2017 04:47:44 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.5.1 MIME-Version: 1.0 In-Reply-To: Sender: linux-block-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-block@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP On 01/17/2017 12:57 AM, Hannes Reinecke wrote: > Hi Jens, > > I gave your latest patchset from > > git.kernel.dk/linux-block blk-mq-sched > > I see a kernel oops when shutting down: > > [ 2132.708929] systemd-shutdown[1]: Detaching DM devices. > [ 2132.965107] BUG: unable to handle kernel NULL pointer dereference at > 00000000 > 00000001 > [ 2133.037182] IP: dd_merged_requests+0x6/0x60 > [ 2133.077816] PGD 0 > [ 2133.077818] > [ 2133.113087] Oops: 0000 [#1] SMP > [ list of modules removed ] > [ 2133.925265] CPU: 20 PID: 1 Comm: systemd-shutdow Not tainted > 4.10.0-rc4+ #543 > [ 2133.990034] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 09/18/2013 > [ 2134.050522] task: ffff88042d614040 task.stack: ffffc90003150000 > [ 2134.106915] RIP: 0010:dd_merged_requests+0x6/0x60 > [ 2134.150593] RSP: 0018:ffffc90003153b18 EFLAGS: 00010002 > [ 2134.198740] RAX: ffffffff81cc6de0 RBX: ffff8804296d5040 RCX: > 0000000000000001 > [ 2134.262708] RDX: 0000000000000001 RSI: 0000000000000001 RDI: > ffff8804296d5040 > [ 2134.326987] RBP: ffffc90003153b30 R08: 0000000000000000 R09: > 0000000000000000 > [ 2134.391054] R10: 0000000000000000 R11: 0001f8180001f815 R12: > 0000000000000000 > [ 2134.456095] R13: ffff8804296d5040 R14: ffff8804099801f0 R15: > 0000000000000004 > [ 2134.521196] FS: 00007fd64d3bf840(0000) GS:ffff88042f900000(0000) > knlGS:0000000000000000 > [ 2134.595178] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 2134.648637] CR2: 0000000000000001 CR3: 000000081b892000 CR4: > 00000000000406e0 > [ 2134.713349] Call Trace: > [ 2134.737168] ? elv_drain_elevator+0x29/0xa0 > [ 2134.775821] __blk_drain_queue+0x52/0x1a0 > [ 2134.812473] blk_queue_bypass_start+0x6e/0xa0 > [ 2134.854009] blkcg_deactivate_policy+0x30/0xf0 > [ 2134.894993] blk_throtl_exit+0x34/0x50 > [ 2134.929450] blkcg_exit_queue+0x35/0x40 > [ 2134.965089] blk_release_queue+0x33/0xe0 > [ 2135.001364] kobject_cleanup+0x63/0x170 > [ 2135.037412] kobject_put+0x25/0x50 > [ 2135.068622] blk_cleanup_queue+0x198/0x260 > [ 2135.107780] cleanup_mapped_device+0xb5/0xf0 [dm_mod] > [ 2135.154741] __dm_destroy+0x1a5/0x290 [dm_mod] > [ 2135.195009] dm_destroy+0x13/0x20 [dm_mod] > [ 2135.232149] dev_remove+0xde/0x120 [dm_mod] > [ 2135.270184] ? dev_suspend+0x210/0x210 [dm_mod] > [ 2135.311478] ctl_ioctl+0x20b/0x510 [dm_mod] > [ 2135.349680] ? terminate_walk+0xc3/0x140 > [ 2135.385442] ? kmem_cache_free+0x10/0x260 > [ 2135.422315] dm_ctl_ioctl+0x13/0x20 [dm_mod] > > Known issue? Try with this, looks like we're calling the old bypass path for the new path, which is now triggering because q->elevator is true. diff --git a/block/blk-cgroup.c b/block/blk-cgroup.c index 8ba0af780e88..1dd14c5b637a 100644 --- a/block/blk-cgroup.c +++ b/block/blk-cgroup.c @@ -1284,7 +1284,12 @@ void blkcg_deactivate_policy(struct request_queue *q, if (!blkcg_policy_enabled(q, pol)) return; - blk_queue_bypass_start(q); + if (q->mq_ops) { + blk_mq_freeze_queue(q); + blk_mq_quiesce_queue(q); + } else + blk_queue_bypass_start(q); + spin_lock_irq(q->queue_lock); __clear_bit(pol->plid, q->blkcg_pols); @@ -1304,7 +1309,11 @@ void blkcg_deactivate_policy(struct request_queue *q, } spin_unlock_irq(q->queue_lock); - blk_queue_bypass_end(q); + + if (q->mq_ops) + blk_mq_unfreeze_queue(q); + else + blk_queue_bypass_end(q); } EXPORT_SYMBOL_GPL(blkcg_deactivate_policy); diff --git a/block/elevator.c b/block/elevator.c index d14cb87e6564..464372840774 100644 --- a/block/elevator.c +++ b/block/elevator.c @@ -613,6 +613,9 @@ void elv_drain_elevator(struct request_queue *q) { static int printed; + if (WARN_ON_ONCE(q->mq_ops)) + return; + lockdep_assert_held(q->queue_lock); while (q->elevator->type->ops.sq.elevator_dispatch_fn(q, 1))