Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp3429735rwb; Mon, 19 Sep 2022 22:23:14 -0700 (PDT) X-Google-Smtp-Source: AMsMyM60hjtP1AxPuav0On+fTNtkFTiXl8Neij6KiQCX1AqT02VHImKwBPhFnRgbhvvW5Ja2Fo0G X-Received: by 2002:a05:6402:298b:b0:44f:20a:2db2 with SMTP id eq11-20020a056402298b00b0044f020a2db2mr18693277edb.138.1663651394020; Mon, 19 Sep 2022 22:23:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663651394; cv=none; d=google.com; s=arc-20160816; b=zH3Suvtdib2mj92LbtAI+RG2S+Av4guUS+3I743cMhGKJzbTWZP/Mai+mepsJ/D+q9 D1JAqnlfKI4ing359rfDXcrCWt2rKO2N5+5LMTqa79wqBLGScgayAeo+K/lR8EMubj3f cXbaRuwTJEGmRhrjWL0dXK1yypUAcIb+pxUlMvQMdbulY+SirZKcCnbeiwWIDFN7WnRI rl6ybpENlExeOCepAMcY1w/+tA+Ou3sxLjv0hY/zEW53CfRpyat0Ykw2JM/SYVhwXjjD TrDZbS85AqcFqd/4A/0WaBLJsVfmI/Xg0OG1TC+P9HzvdAMlWHQtwBZG63fZ2ic/6tM7 QFnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=NGl/WsIKHK6qXqwVjw/8kGSC4H9HcR5hemgEycnEl0A=; b=oLITnSXVZl7x4d36M4sB3D7f3GjVWuRTLWq3Wc0yS6yDVqEniMQ7Rh4MncoGsgnLMz 5tINFAA98098olHnaWMf/hIKEbUikGwqJQQUeBaEdU891i0+bWk3GvG3A+vmS3gBT30i S44s47TRrz66UZ9hZ4lEeQPkMbV48RusdUKGjTKoY7VsnmurfJe7DjBuB4DyF4l3TfdD E94PBKiUETvma/hH1r7+i5pQcslQVCE1wT0/FVzWkgvAGmeMI4O1aTSwrnB6Tqvjc/Np oMyojh0VtK++YePrW0zG6eyCtEETc17MdFNqnZ636GiC3AbvusSxqOFm86KnyIXhF7DO ZIBg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=fMm8bt82; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id xg14-20020a170907320e00b00780a6ba90a8si423720ejb.282.2022.09.19.22.22.46; Mon, 19 Sep 2022 22:23:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=fMm8bt82; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229917AbiITEmM (ORCPT + 99 others); Tue, 20 Sep 2022 00:42:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53416 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229731AbiITEmK (ORCPT ); Tue, 20 Sep 2022 00:42:10 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 585F852E65 for ; Mon, 19 Sep 2022 21:42:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1663648928; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=NGl/WsIKHK6qXqwVjw/8kGSC4H9HcR5hemgEycnEl0A=; b=fMm8bt822B2k1KyBDFcIHUtl1AtXh3K6Z2FkVmLMM12+nXqYpGFN6TvkSWuYCSowby2ORF HSp8+JHFhqPjkQFnLH5Iedekd5fWZ9dHWR5kbsaqocF6VXQ88ukciZXHK/zB49Qg+aDQbF 0Cd3YigC07tmmRjMDPx08ljTrAvRz2o= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-373-nlk-64QDPba9eA-ngPBEHw-1; Tue, 20 Sep 2022 00:41:59 -0400 X-MC-Unique: nlk-64QDPba9eA-ngPBEHw-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com [10.11.54.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id DFBD68039A0; Tue, 20 Sep 2022 04:41:58 +0000 (UTC) Received: from T590 (ovpn-8-20.pek2.redhat.com [10.72.8.20]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 72F0A140EBF5; Tue, 20 Sep 2022 04:41:54 +0000 (UTC) Date: Tue, 20 Sep 2022 12:41:48 +0800 From: Ming Lei To: Ziyang Zhang Cc: axboe@kernel.dk, xiaoguang.wang@linux.alibaba.com, linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, joseph.qi@linux.alibaba.com Subject: Re: [PATCH V3 4/7] ublk_drv: requeue rqs with recovery feature enabled Message-ID: References: <20220913041707.197334-1-ZiyangZhang@linux.alibaba.com> <20220913041707.197334-5-ZiyangZhang@linux.alibaba.com> <84b99294-6859-f49f-d529-c6e3899f2aa2@linux.alibaba.com> <5383bd34-4f61-f3b0-0a75-a8a2eb75d7ef@linux.alibaba.com> <0642eab9-6124-ba42-1585-82eab1ff9e87@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <0642eab9-6124-ba42-1585-82eab1ff9e87@linux.alibaba.com> X-Scanned-By: MIMEDefang 3.1 on 10.11.54.7 X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 20, 2022 at 11:34:32AM +0800, Ziyang Zhang wrote: > On 2022/9/20 11:18, Ming Lei wrote: > > On Tue, Sep 20, 2022 at 11:04:30AM +0800, Ziyang Zhang wrote: > >> On 2022/9/20 10:39, Ming Lei wrote: > >>> On Tue, Sep 20, 2022 at 09:31:54AM +0800, Ziyang Zhang wrote: > >>>> On 2022/9/19 20:39, Ming Lei wrote: > >>>>> On Mon, Sep 19, 2022 at 05:12:21PM +0800, Ziyang Zhang wrote: > >>>>>> On 2022/9/19 11:55, Ming Lei wrote: > >>>>>>> On Tue, Sep 13, 2022 at 12:17:04PM +0800, ZiyangZhang wrote: > >>>>>>>> With recovery feature enabled, in ublk_queue_rq or task work > >>>>>>>> (in exit_task_work or fallback wq), we requeue rqs instead of > >>>>>>>> ending(aborting) them. Besides, No matter recovery feature is enabled > >>>>>>>> or disabled, we schedule monitor_work immediately. > >>>>>>>> > >>>>>>>> Signed-off-by: ZiyangZhang > >>>>>>>> --- > >>>>>>>> drivers/block/ublk_drv.c | 34 ++++++++++++++++++++++++++++++++-- > >>>>>>>> 1 file changed, 32 insertions(+), 2 deletions(-) > >>>>>>>> > >>>>>>>> diff --git a/drivers/block/ublk_drv.c b/drivers/block/ublk_drv.c > >>>>>>>> index 23337bd7c105..b067f33a1913 100644 > >>>>>>>> --- a/drivers/block/ublk_drv.c > >>>>>>>> +++ b/drivers/block/ublk_drv.c > >>>>>>>> @@ -682,6 +682,21 @@ static void ubq_complete_io_cmd(struct ublk_io *io, int res) > >>>>>>>> > >>>>>>>> #define UBLK_REQUEUE_DELAY_MS 3 > >>>>>>>> > >>>>>>>> +static inline void __ublk_abort_rq_in_task_work(struct ublk_queue *ubq, > >>>>>>>> + struct request *rq) > >>>>>>>> +{ > >>>>>>>> + pr_devel("%s: %s q_id %d tag %d io_flags %x.\n", __func__, > >>>>>>>> + (ublk_queue_can_use_recovery(ubq)) ? "requeue" : "abort", > >>>>>>>> + ubq->q_id, rq->tag, ubq->ios[rq->tag].flags); > >>>>>>>> + /* We cannot process this rq so just requeue it. */ > >>>>>>>> + if (ublk_queue_can_use_recovery(ubq)) { > >>>>>>>> + blk_mq_requeue_request(rq, false); > >>>>>>>> + blk_mq_delay_kick_requeue_list(rq->q, UBLK_REQUEUE_DELAY_MS); > >>>>>>> > >>>>>>> Here you needn't to kick requeue list since we know it can't make > >>>>>>> progress. And you can do that once before deleting gendisk > >>>>>>> or the queue is recovered. > >>>>>> > >>>>>> No, kicking rq here is necessary. > >>>>>> > >>>>>> Consider USER_RECOVERY is enabled and everything goes well. > >>>>>> User sends STOP_DEV, and we have kicked requeue list in > >>>>>> ublk_stop_dev() and are going to call del_gendisk(). > >>>>>> However, a crash happens now. Then rqs may be still requeued > >>>>>> by ublk_queue_rq() because ublk_queue_rq() sees a dying > >>>>>> ubq_daemon. So del_gendisk() will hang because there are > >>>>>> rqs leaving in requeue list and no one kicks them. > >>>>> > >>>>> Why can't you kick requeue list before calling del_gendisk(). > >>>> > >>>> Yes, we can kick requeue list once before calling del_gendisk(). > >>>> But a crash may happen just after kicking but before del_gendisk(). > >>>> So some rqs may be requeued at this moment. But we have already > >>>> kicked the requeue list! Then del_gendisk() will hang, right? > >>> > >>> ->force_abort is set before kicking in ublk_unquiesce_dev(), so > >>> all new requests are failed immediately instead of being requeued, > >>> right? > >>> > >> > >> ->force_abort is not heplful here because there may be fallback wq running > >> which can requeue rqs after kicking requeue list. > > > > After ublk_wait_tagset_rqs_idle() returns, there can't be any > > pending requests in fallback wq or task work, can there > Please consider this case: a crash happens while ublk_stop_dev() is > calling. In such case I cannot schedule quiesce_work or call > ublk_wait_tagset_rqs_idle(). This is because quiesce_work has to > accquire ub_mutex to quiesce request queue. The issue can be addressed in the following way more reliably & cleanly & consistently, then you needn't to switch between the two modes. ublk_stop_dev() if (ublk_can_use_recovery(ub)) { if (ub->dev_info.state == UBLK_S_DEV_LIVE) __ublk_quiesce_dev(ub); //lockless version ublk_unquiesce_dev(); } Meantime not necessary to disable recovery feature in ublk_unquiesce_dev any more. thanks, Ming