[PATCHv2] nvme: authentication error are always non-retryable
Daniel Wagner
dwagner at suse.de
Mon Feb 26 02:36:19 PST 2024
On Mon, Feb 26, 2024 at 11:24:35AM +0100, Daniel Wagner wrote:
> On Mon, Feb 26, 2024 at 09:06:28AM +0100, Hannes Reinecke wrote:
> > Any authentication errors which are generated internally are always
> > non-retryable, so set the DNR bit to ensure they are not retried.
> >
> > Signed-off-by: Hannes Reinecke <hare at suse.de>
>
> Tested-by: Daniel Wagner <dwagner at suse.de>
Well, I called it success too early.
Now other tests are starting to fail, e.g. nvme/044 for loop and fc is
looping now:
loop:
[ 67.481520] nvmet: ctrl 1 fatal error occurred!
[ 67.484296] nvme nvme0: qid 0: authentication failed, error -111
[ 67.531033] [1538] nvmet: ctrl 1 stop keep-alive
[ 67.532903] ==================================================================
[ 67.534283] BUG: KASAN: double-free in nvme_loop_create_ctrl+0x87c/0xbe0 [nvme_loop]
[ 67.535591] Free of addr ffff888101b1c000 by task nvme/1538
[ 67.536454] CPU: 0 PID: 1538 Comm: nvme Tainted: G W 6.8.0-rc3+ #39 3d0b6128d1ea3c6026a2c1de70ba6c7dc10623c3
[ 67.538326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022
[ 67.538326] Call Trace:
[ 67.538326] <TASK>
[ 67.538326] dump_stack_lvl+0x5b/0x80
[ 67.538326] print_report+0x163/0x800
[ 67.538326] ? __virt_addr_valid+0x2f3/0x340
[ 67.538326] ? nvme_loop_create_ctrl+0x87c/0xbe0 [nvme_loop e19ff72683e84a1bbd49637ed7792592f1a14d32]
[ 67.538326] kasan_report_invalid_free+0xa7/0xe0
[ 67.538326] ? nvme_loop_create_ctrl+0x87c/0xbe0 [nvme_loop e19ff72683e84a1bbd49637ed7792592f1a14d32]
[ 67.538326] ? nvme_loop_create_ctrl+0x87c/0xbe0 [nvme_loop e19ff72683e84a1bbd49637ed7792592f1a14d32]
[ 67.538326] poison_slab_object+0x11c/0x180
[ 67.538326] __kasan_slab_free+0x33/0x80
[ 67.538326] ? nvme_loop_create_ctrl+0x87c/0xbe0 [nvme_loop e19ff72683e84a1bbd49637ed7792592f1a14d32]
[ 67.538326] kfree+0x119/0x310
[ 67.538326] nvme_loop_create_ctrl+0x87c/0xbe0 [nvme_loop e19ff72683e84a1bbd49637ed7792592f1a14d32]
[ 67.554302] nvmf_dev_write+0x22ff/0x2ae0 [nvme_fabrics cd628fee4abd75b95095eaf559203a0a73425269]
[ 67.554302] ? common_file_perm+0x14e/0x210
[ 67.554302] vfs_write+0x1cd/0xb60
[ 67.554302] ? kasan_quarantine_put+0xb4/0x1c0
[ 67.554302] ? kmem_cache_free+0x11e/0x2e0
[ 67.554302] ksys_write+0xd7/0x1a0
[ 67.554302] do_syscall_64+0xb1/0x180
[ 67.554302] ? syscall_exit_to_user_mode+0x24d/0x350
[ 67.554302] ? do_syscall_64+0xc0/0x180
[ 67.554302] ? kmem_cache_free+0x11e/0x2e0
[ 67.554302] ? syscall_exit_to_user_mode+0x24d/0x350
[ 67.554302] ? do_syscall_64+0xc0/0x180
[ 67.554302] entry_SYSCALL_64_after_hwframe+0x6e/0x76
[ 67.554302] RIP: 0033:0x7fc80410afd4
[ 67.554302] Code: 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 90 90 80 3d 55 ea 0e 00 00 74 13 b8 01 00 00
00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 48 89 54 24 18 48
[ 67.554302] RSP: 002b:00007ffd31d002c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
[ 67.554302] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc80410afd4
[ 67.574292] RDX: 0000000000000149 RSI: 0000000001bee310 RDI: 0000000000000003
[ 67.574292] RBP: 0000000000000000 R08: 0000000000000149 R09: 0000000001bee310
[ 67.574292] R10: 00007fc80400b2a8 R11: 0000000000000202 R12: 0000000000000000
[ 67.574292] R13: 0000000000000000 R14: 00007fc8047cd000 R15: 00000000005659f8
[ 67.579476] </TASK>
fc:
[ 1215.072441] nvme nvme6: qid 0: authentication failed, error -111
[ 1215.074837] nvme nvme6: NVME-FC{0}: create_assoc failed, assoc_id 157f1b1ef3270000 ret -111
[ 1215.077495] nvme_fc: __nvme_fc_send_ls_req:1123 get 3 rport 0000000063a0d5d0
[ 1215.079555] nvme nvme6: NVME-FC{0}: reset: Reconnect attempt failed (-111)
[ 1215.081383] nvme_fc: nvme_fc_reconnect_or_delete:3356 ctrl 000000005d843865 status -111
More information about the Linux-nvme
mailing list