Re: [bug report] block nbd0: Unexpected reply (15) 000000009c07859b

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Leon,

I saw only now that you replied to this old thread recently, which looks
a lot like what I reported independently yesterday:

https://lore.kernel.org/linux-block/Zw8i6-DVDsLk3sq9@fedora/T/#t

Am 14.10.2024 um 16:07 hat Leon Schuermann geschrieben:
> Vincent Chen <vincent.chen@xxxxxxxxxx> writes:
> > I occasionally encountered this NBD error on the Linux 6.9.0-rc7
> > (commit hash: dd5a440a31fae) arm64 kernel when I executed the
> > stress-ng HDD test on NBD.
> >
> > [...]
> >
> > [  196.497492] block nbd0: Unexpected reply (15) 000000009c07859b
> > [  196.539765] block nbd0: Dead connection, failed to find a fallback
> > [  196.540442] block nbd0: shutting down sockets
> 
> Unfortunately, I can confirm this and the other "Double reply on req"
> bugs and pretty reliably reproduce them among a variety of different
> configurations and devices, such as
> 
> - an AMD64 VM running a vanilla 6.12-rc3+1 6485cf5ea253 ("Merge tag
>   'hid-for-linus-2024101301'") with the Fedora 40 kernel config,
> 
> - and a Raspberry Pi running its vendor kernel (6.6.51+rpt-rpi-2712 #1
>   SMP PREEMPT Debian 1:6.6.51-1+rpt3 (2024-10-08) aarch64).
> 
> I'm testing these NBD clients against both the nbd-server package
> (3.26.1) and QEMU's qemu-nbd (v8.2.2).
> 
> Key to reproducing this issue seems to be high CPU load caused by the
> NBD / filesystem / networking stack (so, running on a high-bandwidth
> connection with a server that can keep up), as well as an SMP system (I
> am testing with 4 cores on both AMD64 and aarch64 platforms).

This sounds like you could reproduce the problem with an actual network
connection, going over TCP to another host? This is an interesting
addition for me, because I only saw it with local unix domain sockets.

> To pinpoint the issue, I enabled the `nbd_send_request`,
> `nbd_header_sent` and `nbd_header_received` tracepoints while triggering
> the following bug:
> 
>     [    0.000000] Linux version 6.12.0-rc3-nbddebug+ (root@treadmill-nbd-debug-4) (gcc (GCC) 14.2.1 20240912 (Red Hat 14.2.1-3), GNU ld version 2.41-37.fc40) #1 SMP PREEMPT_DYNAMIC Mon Oct 14 01:07:12 UTC 2024
>     [    0.000000] Command line: BOOT_IMAGE=(hd0,gpt1)/boot/vmlinuz-6.12.0-rc3-nbddebug+ root=UUID=944ab680-e1ab-49d7-a580-dfce30985180 ro consoleblank=0 systemd.show_status=true crashkernel=auto no_timer_check console=tty1 console=ttyS0,115200n8
> 
>     [  +0.011557] EXT4-fs (nbd0): mounted filesystem 8998d2ee-2045-4708-bb3a-0fff335c437f r/w with ordered data mode. Quota mode: none.
>     [Oct14 02:36] block nbd0: Double reply on req 0000000015334b0a, cmd_cookie 193, handle cookie 187
>     [  +0.004639] block nbd0: Dead connection, failed to find a fallback
> 
> Looking at the reversed trace file, we can see the offending header with
> cookie 187 == 0xbb:
> 
>     kworker/u17:0-121     [000] .....   103.672786: nbd_header_received: nbd transport event: request 0000000015334b0a, handle 0x000000bb00000042
> 
> However, some 11 events back, we can see that this request object was
> just sent with a different NBD handle/cookie:
> 
>     stress-ng-hdd-1119    [000] .....   103.668096: nbd_header_sent: nbd transport event: request 0000000015334b0a, handle 0x000000c100000059
>     stress-ng-hdd-1119    [000] .....   103.668084: nbd_send_request: nbd0: request 0000000015334b0a
> 
> This new NBD handle (0x000000c100000059) never appears in the trace
> file, perhaps because the socket was closed before it could be received.
> 
> However, the exact handle of the offending NBD request was sent 49
> events before it was received again:
> 
>     stress-ng-hdd-1120    [002] .....   103.647257: nbd_header_sent: nbd transport event: request 00000000ae03f314, handle 0x000000bb00000042
>     stress-ng-hdd-1120    [002] .....   103.647244: nbd_send_request: nbd0: request 00000000ae03f314
> 
> In fact, all other requests in the trace have almost exactly 50 trace
> events between them being sent and received again. From this I conclude
> that it is mostly likely that the handle of the _received_ offending
> reply (103.672786) is indeed correct (0x000000bb00000042) and
> corresponds to the request 103.647244 (latency works out), but it is
> mapped onto an entirely wrong request object (0000000015334b0a), or onto
> a non-existent request object in the case of a "Unexpected request"
> error. Could it be that sometimes a request is prematurely marked as
> completed such that the queue tag gets reused?

My conclusion was that we hit one of the code paths where a partially
completed request gets requeued (and then assigned a new tag when it
runs the next time).

Maybe you want to test the patch (v3) Ming suggested in the other thread
on your setup? The problem doesn't reproduce for me any more with it,
but I suppose more testing can't hurt.

Kevin





[Index of Archives]     [Linux RAID]     [Linux SCSI]     [Linux ATA RAID]     [IDE]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Device Mapper]

  Powered by Linux