Prev: [git pull] Please pull powerpc.git merge branch
Next: msi-wmi: make needlessly global symbols static
From: Tejun Heo on 8 Jul 2010 04:30 Hello, We've been seeing oops in tcp_xmit_retransmit_queue() w/ 2.6.32.15. Please see the attached photoshoot. This is happening on a HPC cluster and very interestingly caused by one particular job. How long it takes isn't clear yet (at least more than a day) but when it happens it happens on a lot of machines in relatively short time. With a bit of disassemblying, I've found that the oops is happening during tcp_for_write_queue_from() because the skb->next points to NULL. void tcp_xmit_retransmit_queue(struct sock *sk) { ... if (tp->retransmit_skb_hint) { skb = tp->retransmit_skb_hint; last_lost = TCP_SKB_CB(skb)->end_seq; if (after(last_lost, tp->retransmit_high)) last_lost = tp->retransmit_high; } else { skb = tcp_write_queue_head(sk); last_lost = tp->snd_una; } => tcp_for_write_queue_from(skb, sk) { __u8 sacked = TCP_SKB_CB(skb)->sacked; if (skb == tcp_send_head(sk)) break; /* we could do better than to assign each time */ if (hole == NULL) This can happen for one of the following reasons, 1. tp->retransmit_skb_hint is NULL and tcp_write_queue_head() is NULL too. ie. tcp_xmit_retransmit_queue() is called on an empty write queue for some reason. 2. tp->retransmit_skb_hint is pointing to a skb which is not on the write_queue. ie. somebody forgot to update hint while removing the skb from the write queue. 3. The hint is pointing to a skb on the list but the list itself is corrupt. I added some debug code and the crash is happening when tp->retransmit_skb_hint is not NULL but tp->retransmit_skb_hint->next is NULL. So, #1 is out; unfortunately, I didn't have debug code in place to discern between #2 and #3. Does anything ring a bell? This is a production system and debugging affects quite a number of people. I can put debug code in to discern between #2 and #3 but I'm basically shooting in the dark and it would be great if someone has a better idea. Thanks. -- tejun
From: David Miller on 10 Jul 2010 22:40 From: Tejun Heo <tj(a)kernel.org> Date: Thu, 08 Jul 2010 10:22:02 +0200 > We've been seeing oops in tcp_xmit_retransmit_queue() w/ 2.6.32.15. ... > Does anything ring a bell? A long time ago we had a packet scheduler bug that could corrupt the TCP socket queues, but that was fixed in 2.6.27 so would definitely be fixed in your kernel. -------------------- commit 69747650c814a8a79fef412c7416adf823293a3e Author: David S. Miller <davem(a)davemloft.net> Date: Sun Aug 17 23:55:36 2008 -0700 pkt_sched: Fix return value corruption in HTB and TBF. Based upon a bug report by Josip Rodin. Packet schedulers should only return NET_XMIT_DROP iff the packet really was dropped. If the packet does reach the device after we return NET_XMIT_DROP then TCP can crash because it depends upon the enqueue path return values being accurate. Signed-off-by: David S. Miller <davem(a)davemloft.net> -------------------- Nothing else jumps to mind, sorry. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo(a)vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
From: Eric Dumazet on 11 Jul 2010 13:10 Le dimanche 11 juillet 2010 à 19:09 +0300, Ilpo Järvinen a écrit : > On Thu, 8 Jul 2010, Tejun Heo wrote: > > > We've been seeing oops in tcp_xmit_retransmit_queue() w/ 2.6.32.15. > > Please see the attached photoshoot. This is happening on a HPC > > cluster and very interestingly caused by one particular job. How long > > it takes isn't clear yet (at least more than a day) but when it > > happens it happens on a lot of machines in relatively short time. > > > > With a bit of disassemblying, I've found that the oops is happening > > during tcp_for_write_queue_from() because the skb->next points to > > NULL. > > > > void tcp_xmit_retransmit_queue(struct sock *sk) > > { > > ... > > if (tp->retransmit_skb_hint) { > > skb = tp->retransmit_skb_hint; > > last_lost = TCP_SKB_CB(skb)->end_seq; > > if (after(last_lost, tp->retransmit_high)) > > last_lost = tp->retransmit_high; > > } else { > > skb = tcp_write_queue_head(sk); > > last_lost = tp->snd_una; > > } > > > > => tcp_for_write_queue_from(skb, sk) { > > __u8 sacked = TCP_SKB_CB(skb)->sacked; > > > > if (skb == tcp_send_head(sk)) > > break; > > /* we could do better than to assign each time */ > > if (hole == NULL) > > > > This can happen for one of the following reasons, > > > > 1. tp->retransmit_skb_hint is NULL and tcp_write_queue_head() is NULL > > too. ie. tcp_xmit_retransmit_queue() is called on an empty write > > queue for some reason. > > > > 2. tp->retransmit_skb_hint is pointing to a skb which is not on the > > write_queue. ie. somebody forgot to update hint while removing the > > skb from the write queue. > > Once again I've read the unlinkers through, and only thing that could > cause this is tcp_send_synack (others do deal with the hints) but I think > Eric already proposed a patch to that but we never got anywhere due to > some counterargument why it wouldn't take place (too far away for me to > remember, see archives about the discussions). ...But if you want be dead > sure some WARN_ON there might not hurt. Also the purging of the whole > queue was a similar suspect I then came across (but that would only > materialize with sk reuse happening e.g., with nfs which the other guys > weren't using). > Hmm. This sounds familiar to me, but I cannot remember the discussion you mention or the patch. Or maybe it was the TCP transaction thing ? (including data in SYN or SYN-ACK packet) > > 3. The hint is pointing to a skb on the list but the list itself is > > corrupt. > > > > I added some debug code and the crash is happening when > > tp->retransmit_skb_hint is not NULL but tp->retransmit_skb_hint->next > > is NULL. So, #1 is out; unfortunately, I didn't have debug code in > > place to discern between #2 and #3. > > > > Does anything ring a bell? This is a production system and debugging > > affects quite a number of people. I can put debug code in to discern > > between #2 and #3 but I'm basically shooting in the dark and it would > > be great if someone has a better idea. > > Thanks for taking this up. I've been kind of waiting somebody to show up > who actually has some way of reproducing it. Once I had one guy in the > hook but his ability to reproduce was for some reason lost when he tried > with a debug patch [1]. > > I now realize that the debug patch should probably also print the write > queue too when the problem is caught in order to discern the cases you > mention. > > Something along these lines: > > tcp_for_write_queue(skb, sk) { > printk("skb %p (%u-%u) next %p prev %p sacked %u\n", ...); > } > > Anyway, my debugging patch should be such that in a lucky case it avoids > crashing the system too, though price to pay might then be a stuck > connection. In case #3 I'd expect the box to die elsewhere in TCP code > pretty soon anyway so it depends whether avoiding oops is really so > useful, but if you're lucky other mechanism in TCP will recover > the lost one for you (basically RTO driven retransmission). > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo(a)vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
From: Eric Dumazet on 11 Jul 2010 13:50 Le dimanche 11 juillet 2010 à 19:06 +0200, Eric Dumazet a écrit : > Le dimanche 11 juillet 2010 à 19:09 +0300, Ilpo Järvinen a écrit : > > On Thu, 8 Jul 2010, Tejun Heo wrote: > > > > > We've been seeing oops in tcp_xmit_retransmit_queue() w/ 2.6.32.15. > > > Please see the attached photoshoot. This is happening on a HPC > > > cluster and very interestingly caused by one particular job. How long > > > it takes isn't clear yet (at least more than a day) but when it > > > happens it happens on a lot of machines in relatively short time. > > > > > > With a bit of disassemblying, I've found that the oops is happening > > > during tcp_for_write_queue_from() because the skb->next points to > > > NULL. > > > > > > void tcp_xmit_retransmit_queue(struct sock *sk) > > > { > > > ... > > > if (tp->retransmit_skb_hint) { > > > skb = tp->retransmit_skb_hint; > > > last_lost = TCP_SKB_CB(skb)->end_seq; > > > if (after(last_lost, tp->retransmit_high)) > > > last_lost = tp->retransmit_high; > > > } else { > > > skb = tcp_write_queue_head(sk); > > > last_lost = tp->snd_una; > > > } > > > > > > => tcp_for_write_queue_from(skb, sk) { > > > __u8 sacked = TCP_SKB_CB(skb)->sacked; > > > > > > if (skb == tcp_send_head(sk)) > > > break; > > > /* we could do better than to assign each time */ > > > if (hole == NULL) > > > > > > This can happen for one of the following reasons, > > > > > > 1. tp->retransmit_skb_hint is NULL and tcp_write_queue_head() is NULL > > > too. ie. tcp_xmit_retransmit_queue() is called on an empty write > > > queue for some reason. > > > > > > 2. tp->retransmit_skb_hint is pointing to a skb which is not on the > > > write_queue. ie. somebody forgot to update hint while removing the > > > skb from the write queue. > > > > Once again I've read the unlinkers through, and only thing that could > > cause this is tcp_send_synack (others do deal with the hints) but I think > > Eric already proposed a patch to that but we never got anywhere due to > > some counterargument why it wouldn't take place (too far away for me to > > remember, see archives about the discussions). ...But if you want be dead > > sure some WARN_ON there might not hurt. Also the purging of the whole > > queue was a similar suspect I then came across (but that would only > > materialize with sk reuse happening e.g., with nfs which the other guys > > weren't using). > > > > Hmm. > > This sounds familiar to me, but I cannot remember the discussion you > mention or the patch. > > Or maybe it was the TCP transaction thing ? (including data in SYN or > SYN-ACK packet) Hmm, I cannot find where we reset restransmit_skb_hint in tcp_mtu_probe(), if we call tcp_unlink_write_queue(). if (skb->len <= copy) { /* We've eaten all the data from this skb. * Throw it away. */ TCP_SKB_CB(nskb)->flags |= TCP_SKB_CB(skb)->flags; <<>> tcp_unlink_write_queue(skb, sk); sk_wmem_free_skb(sk, skb); } else { Sorry if this was already discussed. We might add a comment here in anycase ;) -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo(a)vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
From: Eric Dumazet on 11 Jul 2010 14:40 Le dimanche 11 juillet 2010 à 19:46 +0200, Eric Dumazet a écrit : > Le dimanche 11 juillet 2010 à 19:06 +0200, Eric Dumazet a écrit : > > Le dimanche 11 juillet 2010 à 19:09 +0300, Ilpo Järvinen a écrit : > > > On Thu, 8 Jul 2010, Tejun Heo wrote: > > > > > > > We've been seeing oops in tcp_xmit_retransmit_queue() w/ 2.6.32.15. > > > > Please see the attached photoshoot. This is happening on a HPC > > > > cluster and very interestingly caused by one particular job. How long > > > > it takes isn't clear yet (at least more than a day) but when it > > > > happens it happens on a lot of machines in relatively short time. > > > > > > > > With a bit of disassemblying, I've found that the oops is happening > > > > during tcp_for_write_queue_from() because the skb->next points to > > > > NULL. > > > > > > > > void tcp_xmit_retransmit_queue(struct sock *sk) > > > > { > > > > ... > > > > if (tp->retransmit_skb_hint) { > > > > skb = tp->retransmit_skb_hint; > > > > last_lost = TCP_SKB_CB(skb)->end_seq; > > > > if (after(last_lost, tp->retransmit_high)) > > > > last_lost = tp->retransmit_high; > > > > } else { > > > > skb = tcp_write_queue_head(sk); > > > > last_lost = tp->snd_una; > > > > } > > > > > > > > => tcp_for_write_queue_from(skb, sk) { > > > > __u8 sacked = TCP_SKB_CB(skb)->sacked; > > > > > > > > if (skb == tcp_send_head(sk)) > > > > break; > > > > /* we could do better than to assign each time */ > > > > if (hole == NULL) > > > > > > > > This can happen for one of the following reasons, > > > > > > > > 1. tp->retransmit_skb_hint is NULL and tcp_write_queue_head() is NULL > > > > too. ie. tcp_xmit_retransmit_queue() is called on an empty write > > > > queue for some reason. > > > > > > > > 2. tp->retransmit_skb_hint is pointing to a skb which is not on the > > > > write_queue. ie. somebody forgot to update hint while removing the > > > > skb from the write queue. > > > > > > Once again I've read the unlinkers through, and only thing that could > > > cause this is tcp_send_synack (others do deal with the hints) but I think > > > Eric already proposed a patch to that but we never got anywhere due to > > > some counterargument why it wouldn't take place (too far away for me to > > > remember, see archives about the discussions). ...But if you want be dead > > > sure some WARN_ON there might not hurt. Also the purging of the whole > > > queue was a similar suspect I then came across (but that would only > > > materialize with sk reuse happening e.g., with nfs which the other guys > > > weren't using). > > > > > > > Hmm. > > > > This sounds familiar to me, but I cannot remember the discussion you > > mention or the patch. > > > > Or maybe it was the TCP transaction thing ? (including data in SYN or > > SYN-ACK packet) > > Hmm, I cannot find where we reset restransmit_skb_hint in > tcp_mtu_probe(), if we call tcp_unlink_write_queue(). > > if (skb->len <= copy) { > /* We've eaten all the data from this skb. > * Throw it away. */ > TCP_SKB_CB(nskb)->flags |= TCP_SKB_CB(skb)->flags; > <<>> tcp_unlink_write_queue(skb, sk); > sk_wmem_free_skb(sk, skb); > } else { > > > Sorry if this was already discussed. We might add a comment here in anycase ;) > Just in case, here is a patch for this issue, if Tejun wants to try it. Thanks [PATCH] tcp: tcp_mtu_probe() and retransmit hints When removing an skb from tcp write queue, we must take care of various hints that could be kept on this skb. tcp_mtu_probe() misses this cleanup. lkml reference : http://lkml.org/lkml/2010/7/8/63 Reported-by: Tejun Heo <tj(a)kernel.org> Signed-off-by: Eric Dumazet <eric.dumazet(a)gmail.com> --- diff --git a/net/ipv4/tcp_output.c b/net/ipv4/tcp_output.c index b4ed957..187453f 100644 --- a/net/ipv4/tcp_output.c +++ b/net/ipv4/tcp_output.c @@ -1666,6 +1666,9 @@ static int tcp_mtu_probe(struct sock *sk) * Throw it away. */ TCP_SKB_CB(nskb)->flags |= TCP_SKB_CB(skb)->flags; tcp_unlink_write_queue(skb, sk); + tcp_clear_retrans_hints_partial(tp); + if (skb == tp->retransmit_skb_hint) + tp->retransmit_skb_hint = nskb; sk_wmem_free_skb(sk, skb); } else { TCP_SKB_CB(nskb)->flags |= TCP_SKB_CB(skb)->flags & -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo(a)vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
|
Next
|
Last
Pages: 1 2 3 Prev: [git pull] Please pull powerpc.git merge branch Next: msi-wmi: make needlessly global symbols static |