Received: by 10.192.165.156 with SMTP id m28csp72558imm; Tue, 10 Apr 2018 16:41:42 -0700 (PDT) X-Google-Smtp-Source: AIpwx48gZcKIULRhznbo1WVUHgz9d2LqUizxaAXXKSH3G1Q+/9hCbA0hHwqlrypwZF94CrmAuzp9 X-Received: by 10.99.182.73 with SMTP id v9mr1692262pgt.158.1523403702665; Tue, 10 Apr 2018 16:41:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523403702; cv=none; d=google.com; s=arc-20160816; b=xe7Whzix/gEXSc8TauHso8x7ikhFF5wWR91XdVW0XPP3iK3tXeNgTcut60vKBmZEUg lIkZL4rLwFptWvcRG41lk1B2adECWAFOaBwJndCXzTQ0rYotAJkBNSPX8lid3fFWVw4d z0oX6bFndHnKqm45LPhBh/N4ljuZbN5WJYjnFue6Si0j/qLS5Bl1IHwJ2xvHl1Xnu+i5 wsN6acm8Xl/MLCT7HqS3csEmLKHyjvYgaCs3kFEEeCTU116JaRuTzNYvubtB2hXjQGCD qJd3/d8Xhd/MBoJ8bj0kjvrJ5ng+3ZRX3CCfUAUvCCpu9PtxrX4l68xkneQ95IkCoRdQ owiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=O+zNQZLdICet/NlHgIYvoONOwEnck+R15Pf3hgkZ2Y0=; b=kOBzGYpCYrqKCZQBWWKicc8CxqRHyXyAo5PAXe8W4JatrKL2oJwn1/tBoLbv8oVnT1 /QdBP10Mr6WDD+WN1GLRq2FGTHaSAZwDAVweiAE/PtTSX0NCNg1826WAvM1y0Hb4ZVe+ Mas2BAsvA9BaRNIp6AUcl5vBOPBx3Nvi4ZiIoALWwoQVH/84iuRpofdwkFSZYEIvgWPL I4nqt/PchnTQcPCVJpieuv0h0Ep6YmMYGOAgwxP4TLWvKQSHoaoRcUqDagNHneyYl95h ge5t9dv8SDRr5stV8IGECsD3LsPekfbnFly3rZI8Pvyg0OjlvEdmOrA6oAwa85vb3fd5 QCFg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g12-v6si3515743plt.294.2018.04.10.16.41.06; Tue, 10 Apr 2018 16:41:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754372AbeDJXg3 (ORCPT + 99 others); Tue, 10 Apr 2018 19:36:29 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:37874 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753692AbeDJW12 (ORCPT ); Tue, 10 Apr 2018 18:27:28 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id B3BB3CC4; Tue, 10 Apr 2018 22:27:27 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Rafael David Tinoco , Lee Duncan , "Martin K. Petersen" , Sasha Levin Subject: [PATCH 4.15 040/168] scsi: libiscsi: Allow sd_shutdown on bad transport Date: Wed, 11 Apr 2018 00:23:02 +0200 Message-Id: <20180410212801.896558612@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180410212800.144079021@linuxfoundation.org> References: <20180410212800.144079021@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Rafael David Tinoco [ Upstream commit d754941225a7dbc61f6dd2173fa9498049f9a7ee ] If, for any reason, userland shuts down iscsi transport interfaces before proper logouts - like when logging in to LUNs manually, without logging out on server shutdown, or when automated scripts can't umount/logout from logged LUNs - kernel will hang forever on its sd_sync_cache() logic, after issuing the SYNCHRONIZE_CACHE cmd to all still existent paths. PID: 1 TASK: ffff8801a69b8000 CPU: 1 COMMAND: "systemd-shutdow" #0 [ffff8801a69c3a30] __schedule at ffffffff8183e9ee #1 [ffff8801a69c3a80] schedule at ffffffff8183f0d5 #2 [ffff8801a69c3a98] schedule_timeout at ffffffff81842199 #3 [ffff8801a69c3b40] io_schedule_timeout at ffffffff8183e604 #4 [ffff8801a69c3b70] wait_for_completion_io_timeout at ffffffff8183fc6c #5 [ffff8801a69c3bd0] blk_execute_rq at ffffffff813cfe10 #6 [ffff8801a69c3c88] scsi_execute at ffffffff815c3fc7 #7 [ffff8801a69c3cc8] scsi_execute_req_flags at ffffffff815c60fe #8 [ffff8801a69c3d30] sd_sync_cache at ffffffff815d37d7 #9 [ffff8801a69c3da8] sd_shutdown at ffffffff815d3c3c This happens because iscsi_eh_cmd_timed_out(), the transport layer timeout helper, would tell the queue timeout function (scsi_times_out) to reset the request timer over and over, until the session state is back to logged in state. Unfortunately, during server shutdown, this might never happen again. Other option would be "not to handle" the issue in the transport layer. That would trigger the error handler logic, which would also need the session state to be logged in again. Best option, for such case, is to tell upper layers that the command was handled during the transport layer error handler helper, marking it as DID_NO_CONNECT, which will allow completion and inform about the problem. After the session was marked as ISCSI_STATE_FAILED, due to the first timeout during the server shutdown phase, all subsequent cmds will fail to be queued, allowing upper logic to fail faster. Signed-off-by: Rafael David Tinoco Reviewed-by: Lee Duncan Signed-off-by: Martin K. Petersen Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/scsi/libiscsi.c | 24 +++++++++++++++++++++++- 1 file changed, 23 insertions(+), 1 deletion(-) --- a/drivers/scsi/libiscsi.c +++ b/drivers/scsi/libiscsi.c @@ -1696,6 +1696,15 @@ int iscsi_queuecommand(struct Scsi_Host */ switch (session->state) { case ISCSI_STATE_FAILED: + /* + * cmds should fail during shutdown, if the session + * state is bad, allowing completion to happen + */ + if (unlikely(system_state != SYSTEM_RUNNING)) { + reason = FAILURE_SESSION_FAILED; + sc->result = DID_NO_CONNECT << 16; + break; + } case ISCSI_STATE_IN_RECOVERY: reason = FAILURE_SESSION_IN_RECOVERY; sc->result = DID_IMM_RETRY << 16; @@ -1979,6 +1988,19 @@ enum blk_eh_timer_return iscsi_eh_cmd_ti if (session->state != ISCSI_STATE_LOGGED_IN) { /* + * During shutdown, if session is prematurely disconnected, + * recovery won't happen and there will be hung cmds. Not + * handling cmds would trigger EH, also bad in this case. + * Instead, handle cmd, allow completion to happen and let + * upper layer to deal with the result. + */ + if (unlikely(system_state != SYSTEM_RUNNING)) { + sc->result = DID_NO_CONNECT << 16; + ISCSI_DBG_EH(session, "sc on shutdown, handled\n"); + rc = BLK_EH_HANDLED; + goto done; + } + /* * We are probably in the middle of iscsi recovery so let * that complete and handle the error. */ @@ -2082,7 +2104,7 @@ done: task->last_timeout = jiffies; spin_unlock(&session->frwd_lock); ISCSI_DBG_EH(session, "return %s\n", rc == BLK_EH_RESET_TIMER ? - "timer reset" : "nh"); + "timer reset" : "shutdown or nh"); return rc; } EXPORT_SYMBOL_GPL(iscsi_eh_cmd_timed_out);