Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp3326778imj; Mon, 11 Feb 2019 18:52:27 -0800 (PST) X-Google-Smtp-Source: AHgI3IYDtkFPjmSk2wfUZ70Rd0aAcXcMld3Clh+dYED63EkhYIcsJi5G0RsVF1n2P1BtSeJZTj4s X-Received: by 2002:a17:902:f64:: with SMTP id 91mr1688347ply.132.1549939947474; Mon, 11 Feb 2019 18:52:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549939947; cv=none; d=google.com; s=arc-20160816; b=jGY1EPOuFwGTK4w/dRxgIPWJu7Agbh9jm4sksCFWOFtcn3ViLfapbHdvW8kQ2F+N03 aOhz42M0Fhd1Brlyu+8SacdMFYbfvgBl7JhXgMfSVxKJEdmn4Ik+QjPA8sXncisrgrCa k04fE6bWRviGgtnzEHoywpOy6LoXiwYnsHeoOiRZSGIS2jbYPzvvEC4AdO24D831rngB HnW+7fTSRzlyuHbN5bSINaBjuyTlFVoAHawX2zfqC2+rdBOETVk7nR5D/8ATWgz5SPee R1Q+vb6unaoNPfIEP34foV7iYCLjWpLKrOgIBdHzVuFdDIXdFcSOOS0V12NNFdW5rjXs 5ZIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=4hktLvRrYNBAIK5RvKt0ooP5Z2boEovdPPoa2tGx3BY=; b=vEaycT4yxzHH5uymVMAn3O5F0pfhlEpFu5KOYb5yamNMUIfiAT0Ebf41i0VpANRMCE V7g1eQ17skjmKL0wSQ92JP4Lc2uaAfBEedFEQdmDaa7sY/lYa3APIANjJ7L9qKsU1A5P rUKETLZEZ9YpKYn0lBuFTN3jnFdx4/s2KhKzmDvdDHoH/1xRUYv0IAYHT+WMZbp6UN/r ufAGvDTYg+Mg9uORD8lOj2yNC0RO0E9yMOLB9MK2gg0RIGFbBEKI1B7riHi3qEgiFol4 2kMZo3yT+vC+iqaFztH6P2CcMn/Wf4BnLjVZGN7hwYSBfR3CXM1cb16XlwcGZhG0ftP0 tQSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b=rbubk3Kd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e96si945264plb.123.2019.02.11.18.52.08; Mon, 11 Feb 2019 18:52:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b=rbubk3Kd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727054AbfBLCud (ORCPT + 99 others); Mon, 11 Feb 2019 21:50:33 -0500 Received: from mail-pf1-f177.google.com ([209.85.210.177]:45072 "EHLO mail-pf1-f177.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726655AbfBLCud (ORCPT ); Mon, 11 Feb 2019 21:50:33 -0500 Received: by mail-pf1-f177.google.com with SMTP id j3so524987pfi.12 for ; Mon, 11 Feb 2019 18:50:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel-dk.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=4hktLvRrYNBAIK5RvKt0ooP5Z2boEovdPPoa2tGx3BY=; b=rbubk3KdIMO91/3BKlq9NkDgoIMTno7c+Chy0O1pwH6lNKMhbw1YId7jl7YDYAUtXE eCdf+umqUFQsboiMY4S0CZY1rKvtYFPeL/NpfBuCyXr87/8rqTOZjFQTBsMFT7fDoeav lbBbSJrKG/vLeGHIdG+8LVPz4J9BESBo5CG7A3E9oirZGQ3ACD1ookWK0h+mvEHlMEs1 r+mGBkPxUP8xDY95Of5VO1KMRlHRYbQ+qSwEv28PtSqdSBy70WFwbJGE89DotS7REFkO muhsNKYZFUBO1G379KO5DAS4WgXHAGjob8y7lth4FF+yg4zg1QorawRiEgQZkfuPOnTf 0fhQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=4hktLvRrYNBAIK5RvKt0ooP5Z2boEovdPPoa2tGx3BY=; b=IeqBteMDkQnUsk/k7P0sHsXj6SUW8qe5frNADVI7WvlAKD+lPgDucR6B0P71yslI8M cBE3K75s+Z94CD1izecCxMMDj7iqaMx4jtSEL5Idl7Oo3NiulFN/3tc9FjshEK+g+Nah TfGSGMajQgiexdD8d2Zb5S4Q2dZNlY8z+auZmPXEzZF+kxJDJGkC1TAYDXC4ORunKfz0 LiLFnmCe9DiNMTZM8SYFpaCy/+MoKZp7zaIy8ptT4RQATcNzVxn8jUO9esdLS1ZGqFiu s7NdLtlGyHScJIy85ugz3uyJ1wSsQBIdYySH8lpJ+H8WkJAr0JLrTULr+D6OUHHK9Akt 44Vw== X-Gm-Message-State: AHQUAuaXtv6G4+3nUztPQJefcvs4nGNm884ig/+n/o3m8uJDXRxI4PY4 50gk0TD2eMYmWDKwZyitMl3+GQ== X-Received: by 2002:a63:535c:: with SMTP id t28mr1546084pgl.128.1549939832350; Mon, 11 Feb 2019 18:50:32 -0800 (PST) Received: from ?IPv6:2600:380:4a5b:8858:a8b3:edff:f3de:ccc1? ([2600:380:4a5b:8858:a8b3:edff:f3de:ccc1]) by smtp.gmail.com with ESMTPSA id r12sm12995051pgv.83.2019.02.11.18.50.30 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 11 Feb 2019 18:50:31 -0800 (PST) Subject: Re: [5.0-rc5 regression] "scsi: kill off the legacy IO path" causes 5 minute delay during boot on Sun Blade 2500 To: James Bottomley , Mikael Pettersson Cc: Linux SPARC Kernel Mailing List , linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, linux-scsi References: <1549736341.2971.7.camel@HansenPartnership.com> <1549813472.4142.3.camel@HansenPartnership.com> <3380ed8e-ae02-96f2-142b-7cce09459df8@kernel.dk> <1549815924.4142.8.camel@HansenPartnership.com> <0e6e5d67-d305-dd00-2e42-e2299166c8b2@kernel.dk> <1549898730.2831.6.camel@HansenPartnership.com> <44bb4374-0b7c-733b-a53e-92d2f03f2f49@kernel.dk> <1549899773.2831.12.camel@HansenPartnership.com> <1a00da0e-cb8e-30ea-8d17-120f97242b2f@kernel.dk> <1549902521.2831.23.camel@HansenPartnership.com> <1549937598.2857.8.camel@HansenPartnership.com> From: Jens Axboe Message-ID: Date: Mon, 11 Feb 2019 19:50:28 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 In-Reply-To: <1549937598.2857.8.camel@HansenPartnership.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/11/19 7:13 PM, James Bottomley wrote: > On Mon, 2019-02-11 at 09:31 -0700, Jens Axboe wrote: >> On 2/11/19 9:28 AM, James Bottomley wrote: >>> On Mon, 2019-02-11 at 08:46 -0700, Jens Axboe wrote: >>>> On 2/11/19 8:42 AM, James Bottomley wrote: >>>>> On Mon, 2019-02-11 at 08:28 -0700, Jens Axboe wrote: >>>>>> On 2/11/19 8:25 AM, James Bottomley wrote: >>>>>>> On Sun, 2019-02-10 at 09:35 -0700, Jens Axboe wrote: >>>>>>>> On 2/10/19 9:25 AM, James Bottomley wrote: >>> >>> [...] >>>>>>>>> That check wasn't changed by the code removal. >>>>>>>> >>>>>>>> As I said above, for sd. This isn't true for non-disks. >>>>>>> >>>>>>> Yes, but the behaviour above doesn't change across a switch >>>>>>> to MQ, so I don't quite understand how it bisects back to >>>>>>> that change. If we're not gathering entropy for the device >>>>>>> now, we wouldn't have been before the switch, so the >>>>>>> entropy characteristics shouldn't have changed. >>>>>> >>>>>> But it does, as I also wrote in that first email. The legacy >>>>>> queue flags had QUEUE_FLAG_ADD_RANDOM set by default, the MQ >>>>>> ones do not. Hence any non-sd device would previously ALWAYS >>>>>> have ADD_RANDOM set, now none of them do. Also see the patch >>>>>> I sent. >>>>> >>>>> So your theory is that the disk in question never gets to the >>>>> rotational check? because the check will clear the flag if >>>>> it's non-rotational and set it if it's not, so the default >>>>> state of the flag shouldn't matter. >>>> >>>> No, my point is about non-disks, devices that aren't driven by >>>> sd. The behavior for sd hasn't changed, as it sets/clears it >>>> unconditionally. >>> >>> I agree, but I don't think any of them were significant entropy >>> contributors before: things like nvme have always been outside of >>> this and sr and st don't really contribute much to the seek load >>> during boot because they're probed but not used by the boot >>> sequence, so I can't see how they would cause this behaviour. I >>> suppose it could be target probing, but even that seems unlikely >>> because it should be dwarfed by the number of root disk reads >>> during boot. >>> >>> For the rng to take an additional 5 minutes to initialize, we must >>> have lost a significant entropy source somewhere. >> >> I agree it's not a significant amount of entropy, but even just one >> bit could mean a long stall if that put us over the edge of just not >> having enough for whatever is blocking on /dev/random. Mikael's boot >> did have a CDROM, it's not impossible that the handful of commands we >> end up doing to that device would have contributed enough entropy to >> get the boot done without stalling for minutes. >> >> One way to know for sure, and that's if Mikael tests the patch. > > I think I've got the root cause. I have one system in my test bed > exhibiting this behaviour. It turns out the disk in it has no > characteristics VPD page. The 0xB1 VPD was a SBC-3 addition, so that's > not surprising. However, the characteristics check bails before > setting the flags, so it takes the default flag which has flipped. > > We can either fix this by setting the QUEUE_FLAG_ADD_RANDOM if there's > no 0xB1 page or by setting the default as Jens proposed. I'd recommend just doing my patch, since that'll be the same behavior that SCSI had before. -- Jens Axboe