Received: by 10.192.165.156 with SMTP id m28csp47031imm; Tue, 10 Apr 2018 16:06:13 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/PGS30vLNWrDLUdxdo1HNFZcyKPH/6qZBqvT2Bx5ybf3g2t/0FDZmF0VQ2sE2rH31DUTmG X-Received: by 2002:a17:902:7702:: with SMTP id n2-v6mr2452469pll.216.1523401573633; Tue, 10 Apr 2018 16:06:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523401573; cv=none; d=google.com; s=arc-20160816; b=D4DpM2QT+46NaLs1Ht1GKYW347frB/kAlZagffe4NR1imffZHM48I2LKuV7ydRa4qJ a4mO6q1bsc5L1JFiT/6n3k3pTSKlv0nqnqUQ6sP81FRxqSlR7tpI9eOfBf+IvsdsBtWv 7xwSifCFzIKBHDMpvOPDSFtmsfYMaFwOLItqC5f9TOVEJ86qe902DeSs7upuCT2HRrAJ LrI9H9wW8tzvU8hHSXkfZ4TUceIObiv0dQkucwxgBiDCkl4cW+jJlfZBBij0ZOvDYoi5 iWub2UzobVxqS6sfHd0awf7mmbrCmcwvgqROEOCxYWEQOBKuvZD2jYKxhnjs4x9hqmg2 JW1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=qX/r3oL0Xs8Yo7aUrunCsgERAg2h92JdUDX0+h0ocms=; b=wJLOj+J94LrZCmw+x+iVWNZsY1/r7gPrulHz/Jje8vix+F1ffXapw+slDGwYT/thP1 nmI+3MC6KZuZMP85ffZ2Idu2ryXjgz2YfPdgwAHNSMx75sUTtvE+rJolfnuicPNHaDYK yXvggbNgfCBaKi+0+NWgoS7+pIS8IaeRR/mqo7OvolIHPwZIhmu1z4gCwHT6/6EM+RaG L0XQ32fvxP1iNPKLFElk/zLF3HxNZI7zy4quwDickj2ur6SPoJx8wFxeKTH2y77QJhLL RzASHRu1xl5V+nQttOvVNlHmlpaM82LtbgTllrWxWNRWMy97PCIaQwPm1tVebfWw+BkV 6Zgg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h15-v6si3889031plk.535.2018.04.10.16.05.37; Tue, 10 Apr 2018 16:06:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932310AbeDJWfp (ORCPT + 99 others); Tue, 10 Apr 2018 18:35:45 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:42242 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932294AbeDJWfn (ORCPT ); Tue, 10 Apr 2018 18:35:43 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 583BBD66; Tue, 10 Apr 2018 22:35:42 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Rafael David Tinoco , Lee Duncan , "Martin K. Petersen" , Sasha Levin Subject: [PATCH 4.14 030/138] scsi: libiscsi: Allow sd_shutdown on bad transport Date: Wed, 11 Apr 2018 00:23:40 +0200 Message-Id: <20180410212905.633331449@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180410212902.121524696@linuxfoundation.org> References: <20180410212902.121524696@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Rafael David Tinoco [ Upstream commit d754941225a7dbc61f6dd2173fa9498049f9a7ee ] If, for any reason, userland shuts down iscsi transport interfaces before proper logouts - like when logging in to LUNs manually, without logging out on server shutdown, or when automated scripts can't umount/logout from logged LUNs - kernel will hang forever on its sd_sync_cache() logic, after issuing the SYNCHRONIZE_CACHE cmd to all still existent paths. PID: 1 TASK: ffff8801a69b8000 CPU: 1 COMMAND: "systemd-shutdow" #0 [ffff8801a69c3a30] __schedule at ffffffff8183e9ee #1 [ffff8801a69c3a80] schedule at ffffffff8183f0d5 #2 [ffff8801a69c3a98] schedule_timeout at ffffffff81842199 #3 [ffff8801a69c3b40] io_schedule_timeout at ffffffff8183e604 #4 [ffff8801a69c3b70] wait_for_completion_io_timeout at ffffffff8183fc6c #5 [ffff8801a69c3bd0] blk_execute_rq at ffffffff813cfe10 #6 [ffff8801a69c3c88] scsi_execute at ffffffff815c3fc7 #7 [ffff8801a69c3cc8] scsi_execute_req_flags at ffffffff815c60fe #8 [ffff8801a69c3d30] sd_sync_cache at ffffffff815d37d7 #9 [ffff8801a69c3da8] sd_shutdown at ffffffff815d3c3c This happens because iscsi_eh_cmd_timed_out(), the transport layer timeout helper, would tell the queue timeout function (scsi_times_out) to reset the request timer over and over, until the session state is back to logged in state. Unfortunately, during server shutdown, this might never happen again. Other option would be "not to handle" the issue in the transport layer. That would trigger the error handler logic, which would also need the session state to be logged in again. Best option, for such case, is to tell upper layers that the command was handled during the transport layer error handler helper, marking it as DID_NO_CONNECT, which will allow completion and inform about the problem. After the session was marked as ISCSI_STATE_FAILED, due to the first timeout during the server shutdown phase, all subsequent cmds will fail to be queued, allowing upper logic to fail faster. Signed-off-by: Rafael David Tinoco Reviewed-by: Lee Duncan Signed-off-by: Martin K. Petersen Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/scsi/libiscsi.c | 24 +++++++++++++++++++++++- 1 file changed, 23 insertions(+), 1 deletion(-) --- a/drivers/scsi/libiscsi.c +++ b/drivers/scsi/libiscsi.c @@ -1696,6 +1696,15 @@ int iscsi_queuecommand(struct Scsi_Host */ switch (session->state) { case ISCSI_STATE_FAILED: + /* + * cmds should fail during shutdown, if the session + * state is bad, allowing completion to happen + */ + if (unlikely(system_state != SYSTEM_RUNNING)) { + reason = FAILURE_SESSION_FAILED; + sc->result = DID_NO_CONNECT << 16; + break; + } case ISCSI_STATE_IN_RECOVERY: reason = FAILURE_SESSION_IN_RECOVERY; sc->result = DID_IMM_RETRY << 16; @@ -1981,6 +1990,19 @@ enum blk_eh_timer_return iscsi_eh_cmd_ti if (session->state != ISCSI_STATE_LOGGED_IN) { /* + * During shutdown, if session is prematurely disconnected, + * recovery won't happen and there will be hung cmds. Not + * handling cmds would trigger EH, also bad in this case. + * Instead, handle cmd, allow completion to happen and let + * upper layer to deal with the result. + */ + if (unlikely(system_state != SYSTEM_RUNNING)) { + sc->result = DID_NO_CONNECT << 16; + ISCSI_DBG_EH(session, "sc on shutdown, handled\n"); + rc = BLK_EH_HANDLED; + goto done; + } + /* * We are probably in the middle of iscsi recovery so let * that complete and handle the error. */ @@ -2084,7 +2106,7 @@ done: task->last_timeout = jiffies; spin_unlock(&session->frwd_lock); ISCSI_DBG_EH(session, "return %s\n", rc == BLK_EH_RESET_TIMER ? - "timer reset" : "nh"); + "timer reset" : "shutdown or nh"); return rc; } EXPORT_SYMBOL_GPL(iscsi_eh_cmd_timed_out);