On Thu, 2018-02-08 at 07:39 -0800, tj@xxxxxxxxxx wrote: > On Thu, Feb 08, 2018 at 01:09:57AM +0000, Bart Van Assche wrote: > > On Wed, 2018-02-07 at 23:48 +0000, Bart Van Assche wrote: > > > With this patch applied I see requests for which it seems like the timeout handler > > > did not get invoked: [ ... ] > > > > I just noticed the following in the system log, which is probably the reason why some > > requests got stuck: > > > > Feb 7 15:16:26 ubuntu-vm kernel: BUG: unable to handle kernel NULL pointer dereference at (null) > > Feb 7 15:16:26 ubuntu-vm kernel: IP: scsi_times_out+0x17/0x2c0 [scsi_mod] > > Feb 7 15:16:26 ubuntu-vm kernel: PGD 0 P4D 0 > > Feb 7 15:16:26 ubuntu-vm kernel: Oops: 0000 [#1] PREEMPT SMP > > Feb 7 15:16:26 ubuntu-vm kernel: Modules linked in: dm_service_time ib_srp libcrc32c crc32c_generic scsi_transport_srp target_core_pscsi target_core_file ib_srpt target_core_iblock > > target_core_mod > > rdma_rxe ip6_udp_tunnel udp_tunnel ib_umad ib_uverbs scsi_debug brd mq_deadline kyber_iosched deadline_iosched cfq_iosched bfq crct10dif_pclmul crc32_pclmul af_packet ghash_clmulni_intel pcbc > > aesni_intel aes_x86_64 crypto_simd cryptd glue_helper serio_raw virtio_console virtio_balloon sg button i2c_piix4 dm_multipath dm_mod dax scsi_dh_rdac scsi_dh_emc scsi_dh_alua ib_iser rdma_cm > > iw_cm > > ib_cm ib_core configfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables ipv6 autofs4 ext4 crc16 mbcache jbd2 sd_mod virtio_net virtio_blk virtio_scsi sr_mod cdrom > > ata_generic > > pata_acpi psmouse crc32c_intel i2c_core atkbd > > Feb 7 15:16:26 ubuntu-vm kernel: uhci_hcd ehci_hcd intel_agp ata_piix intel_gtt agpgart libata virtio_pci usbcore virtio_ring virtio scsi_mod usb_common unix > > Feb 7 15:16:26 ubuntu-vm kernel: CPU: 0 PID: 146 Comm: kworker/0:1H Not tainted 4.15.0-dbg+ #1 > > Feb 7 15:16:26 ubuntu-vm kernel: Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.0.0-prebuilt.qemu-project.org 04/01/2014 > > Feb 7 15:16:26 ubuntu-vm kernel: Workqueue: kblockd blk_mq_timeout_work > > Feb 7 15:16:26 ubuntu-vm kernel: RIP: 0010:scsi_times_out+0x17/0x2c0 [scsi_mod] > > Feb 7 15:16:26 ubuntu-vm kernel: RSP: 0018:ffff98f0c02abd58 EFLAGS: 00010246 > > Feb 7 15:16:26 ubuntu-vm kernel: RAX: 0000000000000000 RBX: ffff965de2b3a2c0 RCX: 0000000000000000 > > Feb 7 15:16:26 ubuntu-vm kernel: RDX: ffffffffc0094740 RSI: 0000000000000000 RDI: ffff965de2b3a2c0 > > Feb 7 15:16:26 ubuntu-vm kernel: RBP: ffff965de2b3a438 R08: fffffffffffffffc R09: 0000000000000007 > > Feb 7 15:16:26 ubuntu-vm kernel: R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002 > > Feb 7 15:16:26 ubuntu-vm kernel: R13: 0000000000000000 R14: ffff965de2a44218 R15: ffff965de2a48728 > > Feb 7 15:16:26 ubuntu-vm kernel: FS: 0000000000000000(0000) GS:ffff965dffc00000(0000) knlGS:0000000000000000 > > Feb 7 15:16:26 ubuntu-vm kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > Feb 7 15:16:26 ubuntu-vm kernel: CR2: 0000000000000000 CR3: 000000003ce0f003 CR4: 00000000003606f0 > > Feb 7 15:16:26 ubuntu-vm kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > > Feb 7 15:16:26 ubuntu-vm kernel: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > > Feb 7 15:16:26 ubuntu-vm kernel: Call Trace: > > Feb 7 15:16:26 ubuntu-vm kernel: blk_mq_terminate_expired+0x42/0x80 > > Feb 7 15:16:26 ubuntu-vm kernel: bt_iter+0x3d/0x50 > > Feb 7 15:16:26 ubuntu-vm kernel: blk_mq_queue_tag_busy_iter+0xe9/0x200 > > Feb 7 15:16:26 ubuntu-vm kernel: blk_mq_timeout_work+0x181/0x2e0 > > Feb 7 15:16:26 ubuntu-vm kernel: process_one_work+0x21c/0x6d0 > > Feb 7 15:16:26 ubuntu-vm kernel: worker_thread+0x35/0x380 > > Feb 7 15:16:26 ubuntu-vm kernel: kthread+0x117/0x130 > > Feb 7 15:16:26 ubuntu-vm kernel: ret_from_fork+0x24/0x30 > > Feb 7 15:16:26 ubuntu-vm kernel: Code: ff ff 0f ff e9 fd fe ff ff 90 66 2e 0f 1f 84 00 00 00 00 00 41 55 41 54 55 48 8d af 78 01 00 00 53 48 8b 87 b0 01 00 00 48 89 fb <4c> 8b 28 0f 1f 44 00 00 > > 65 > > 8b 05 6a b5 f8 3f 83 f8 0f 0f 87 ed > > Feb 7 15:16:26 ubuntu-vm kernel: RIP: scsi_times_out+0x17/0x2c0 [scsi_mod] RSP: ffff98f0c02abd58 > > Feb 7 15:16:26 ubuntu-vm kernel: CR2: 0000000000000000 > > Feb 7 15:16:26 ubuntu-vm kernel: ---[ end trace ce6c20d95bab450e ]--- > > So, that's dereferencing %rax which is NULL. That gotta be the ->host > deref in the following. > > enum blk_eh_timer_return scsi_times_out(struct request *req) > { > struct scsi_cmnd *scmd = blk_mq_rq_to_pdu(req); > enum blk_eh_timer_return rtn = BLK_EH_NOT_HANDLED; > struct Scsi_Host *host = scmd->device->host; > ... > > That sounds more like a scsi hotplug bug than an issue in the timeout > code unless we messed up @req pointer to begin with. I don't think that this is related to SCSI hotplugging: this crash does not occur with the v4.15 block layer core and it does not occur with my timeout handler rework patch applied either. I think that means that we cannot exclude the block layer core timeout handler rework as a possible cause. The disassembler output is as follows: (gdb) disas /s scsi_times_out Dump of assembler code for function scsi_times_out: drivers/scsi/scsi_error.c: 282 { 0x0000000000005bd0 <+0>: push %r13 0x0000000000005bd2 <+2>: push %r12 0x0000000000005bd4 <+4>: push %rbp ./include/linux/blk-mq.h: 300 return rq + 1; 0x0000000000005bd5 <+5>: lea 0x178(%rdi),%rbp drivers/scsi/scsi_error.c: 282 { 0x0000000000005bdc <+12>: push %rbx 283 struct scsi_cmnd *scmd = blk_mq_rq_to_pdu(req); 284 enum blk_eh_timer_return rtn = BLK_EH_NOT_HANDLED; 285 struct Scsi_Host *host = scmd->device->host; 0x0000000000005bdd <+13>: mov 0x1b0(%rdi),%rax 282 { 0x0000000000005be4 <+20>: mov %rdi,%rbx 283 struct scsi_cmnd *scmd = blk_mq_rq_to_pdu(req); 284 enum blk_eh_timer_return rtn = BLK_EH_NOT_HANDLED; 285 struct Scsi_Host *host = scmd->device->host; 0x0000000000005be7 <+23>: mov (%rax),%r13 0x0000000000005bea <+26>: nopl 0x0(%rax,%rax,1) [ ... ] (gdb) print /x sizeof(struct request) $2 = 0x178 (gdb) print &(((struct scsi_cmnd*)0)->device) $4 = (struct scsi_device **) 0x38 <scsi_cmd_get_serial+8> (gdb) print &(((struct scsi_device*)0)->host) $5 = (struct Scsi_Host **) 0x0 The crash is reported at address scsi_times_out+0x17 == scsi_times_out+23. The instruction at that address tries to dereference scsi_cmnd.device (%rax). The register dump shows that that pointer has the value NULL. The only function I know of that clears the scsi_cmnd.device pointer is scsi_req_init(). The only caller of that function in the SCSI core is scsi_initialize_rq(). That function has two callers, namely scsi_init_command() and blk_get_request(). However, the scsi_cmnd.device pointer is not cleared when a request finishes. This is why I think that the above crash report indicates that scsi_times_out() was called for a request that was being reinitialized and not by device hotplugging. Thanks, Bart.