lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 05 Dec 2008 08:32:33 -0500
From:	"Alan D. Brunelle" <Alan.Brunelle@...com>
To:	Jens Axboe <jens.axboe@...cle.com>
CC:	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	LKML-scsi <linux-scsi@...r.kernel.org>
Subject: Re: kernel BUG at block/blk-timeout.c:178!

Jens Axboe wrote:
>>
>> I've pushed the BUG ON check into blk_execute_rq, and it's finding it
>> set there. Could we be getting SCSI_DH_IMM_RETRYs and that's causing the
>> same request to be used without being re-initialized, and on error the
>> bit is not being cleaned up properly?
>>
>> I'm checking that out next...
> 
> That does indeed look problematic, we only init the timer stuff when
> getting the request initially. So you could either make your retry loop
> do blk_put_request() and jump to the very beginning again, or this
> should fix the current usage.
> 
> diff --git a/block/elevator.c b/block/elevator.c
> index a6951f7..0a2f378 100644
> --- a/block/elevator.c
> +++ b/block/elevator.c
> @@ -590,6 +590,12 @@ void elv_insert(struct request_queue *q, struct request *rq, int where)
>  
>  	rq->q = q;
>  
> +	/*
> +	 * This could happen on a request requeue, init the timer here as well
> +	 */
> +	blk_delete_timer(rq);
> +	blk_clear_rq_complete(rq);
> +
>  	switch (where) {
>  	case ELEVATOR_INSERT_FRONT:
>  		rq->cmd_flags |= REQ_SOFTBARRIER;
> 

Hi Jens -

I was able to determine we were getting retries on TURs, and then right
(soon?) thereafter was when we triggered the problem. I put some
slightly different code than what you suggest above, and that triggered
a problem elsewhere in SCSI. I backed out what I did, inserted your code
(after updating my tree to:)

commit bbeba4c35c252b2e961f09ce6ebe76b2cd5e7e3e
Merge: 6df944c... 2cbed89...
Author: Linus Torvalds <torvalds@...ux-foundation.org>
Date:   Thu Dec 4 21:45:44 2008 -0800

    Merge branch 'for-linus' of
git://git.kernel.org/pub/scm/linux/kernel/git/vi

    * 'for-linus' of
git://git.kernel.org/pub/scm/linux/kernel/git/viro/bdev:
      [PATCH] fix bogus argument of blkdev_put() in pktcdvd
      [PATCH 2/2] documnt FMODE_ constants
      [PATCH 1/2] kill FMODE_NDELAY_NOW
      [PATCH] clean up blkdev_get a little bit
      [PATCH] Fix block dev compat ioctl handling
      [PATCH] kill obsolete temporary comment in swsusp_close()

and I get the following SCSI-related problem (the same error I got with
code I tried last night - basically just clearing out the atomic value).
This has now happened repeatedly 3 times. [I've cc'd linux-scsi as well,
just to make sure to cover all the bases...]

------------[ cut here ]------------
kernel BUG at drivers/scsi/scsi.c:347!
invalid opcode: 0000 [#1] SMP
last sysfs file:
CPU 0
Pid: 0, comm: swapper Not tainted 2.6.28-rc7 #7
RIP: 0010:[<ffffffff80d3df3e>]  [<ffffffff80d3df3e>]
scsi_put_command+0x27/0x65
RSP: 0018:ffffffff827b3d80  EFLAGS: 00010046
RAX: 0000000000000282 RBX: ffff88087b68dec0 RCX: ffff88087b68dec8
RDX: ffff88087b68dec8 RSI: 0000000000000282 RDI: ffff88087b35d834
RBP: ffffffff827b3d90 R08: ffffffff827b3d30 R09: 00000000827b3d60
R10: 0000000000000246 R11: ffff88087b16042c R12: ffff88087b35d800
R13: ffff88087b35d920 R14: 0000000000000000 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffffffff82535500(0000) knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 0000000000000000 CR3: 0000000000201000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process swapper (pid: 0, threadinfo ffffffff82548000, task ffffffff82049380)
Stack:
 ffff88087b68dec0 ffff88087b36b230 ffffffff827b3dc0 ffffffff80d43793
 0000000000000000 ffff88087b68dec0 ffff88087b35b658 0000000000000000
 ffffffff827b3e00 ffffffff80d43980 ffff88087b36b230 ffff88087b35b658
Call Trace:
 <IRQ> <0> [<ffffffff80d43793>] scsi_next_command+0x2e/0x46
 [<ffffffff80d43980>] scsi_end_request+0x92/0xa4
 [<ffffffff80d43fe3>] scsi_io_completion+0x1a7/0x3ad
 [<ffffffff80d3d926>] scsi_finish_command+0xe9/0xf2
 [<ffffffff80d444d5>] scsi_softirq_done+0x10c/0x115
 [<ffffffff8062afeb>] blk_done_softirq+0x77/0x87
 [<ffffffff802628a0>] ? ktime_get_ts+0x49/0x4e
 [<ffffffff802514b8>] __do_softirq+0x8a/0x151
 [<ffffffff8256b140>] ? early_idt_handler+0x0/0x72
 [<ffffffff8020dbec>] call_softirq+0x1c/0x28
 [<ffffffff8020f32c>] do_softirq+0x44/0x8b
 [<ffffffff802511bf>] irq_exit+0x3f/0x82
 [<ffffffff8020f5f0>] do_IRQ+0xc3/0xe3
 [<ffffffff8020c983>] ret_from_intr+0x0/0x29
 <EOI> <0> [<ffffffff80228446>] ? native_safe_halt+0x6/0x8
 [<ffffffff8021406e>] ? default_idle+0x3c/0x59
 [<ffffffff802141b0>] ? c1e_idle+0x117/0x11e
 [<ffffffff8026332d>] ? atomic_notifier_call_chain+0x13/0x15
 [<ffffffff8020b4ea>] ? cpu_idle+0x51/0x92
 [<ffffffff815be32d>] ? rest_init+0x61/0x63
 [<ffffffff8256bd6b>] ? start_kernel+0x39c/0x3a7
 [<ffffffff8256b29f>] ? x86_64_start_reservations+0xa5/0xa9
 [<ffffffff8256b3f0>] ? x86_64_start_kernel+0x12a/0x139
Code: 41 5e c9 c3 55 48 89 e5 41 54 53 4c 8b 27 48 89 fb 49 8d 7c 24 34
e8 69 56 98 00 48 8b 53 08 48 8d 4b 08 48 89 c6 48 39 ca 75 04 <0f> 0b
eb fe 48 8b 43 10 48 89 42 08 48 89 10 48 8b 3b 48 89 4b
RIP  [<ffffffff80d3df3e>] scsi_put_command+0x27/0x65
 RSP <ffffffff827b3d80>



I'll post my .config & full dump a little later.

Alan
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ