NPIV mapping problems (was Re: [PATCH 1/19] add data buffer accessors)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 12 May 2007, James Bottomley wrote:

> On Sat, 2007-05-12 at 19:05 +0900, FUJITA Tomonori wrote:
> > Add a set of accessors for the scsi data buffer. This is in
> > preparation for chaining sg lists and bidirectional requests (and
> > possibly, the mid-layer dma mapping).
> > 
> > Signed-off-by: FUJITA Tomonori <fujita.tomonori@xxxxxxxxxxxxx>
> > ---
> >  drivers/scsi/scsi_lib.c  |   26 ++++++++++++++++++++++++++
> >  include/scsi/scsi_cmnd.h |   11 +++++++++++
> >  2 files changed, 37 insertions(+), 0 deletions(-)
> > 
> > diff --git a/drivers/scsi/scsi_lib.c b/drivers/scsi/scsi_lib.c
> > index 1f5a07b..a2ebe61 100644
> > --- a/drivers/scsi/scsi_lib.c
> > +++ b/drivers/scsi/scsi_lib.c
> > @@ -2290,3 +2290,29 @@ void scsi_kunmap_atomic_sg(void *virt)
> >  	kunmap_atomic(virt, KM_BIO_SRC_IRQ);
> >  }
> >  EXPORT_SYMBOL(scsi_kunmap_atomic_sg);
> > +
> > +int scsi_dma_map(struct device *dev, struct scsi_cmnd *cmd)
> 
> Actually, this is redundant.  We make sure the
> shost->shost_gendev.parent is the device which should have been passed
> in to scsi_add_host().

Well, there's perhaps an unintended side-effect with this assumption,
NPIV-based 'vports' (and their subsequent 'struct device' members) are
not fully initialized objects.

This is what we've run into while working on our NPIV (based) driver
with the 'data buffer' accessors works, while queueing the first
command to an sdev of a freshly created vport:

	[  366.860758] Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP: 
	[  366.860762]  [<ffffffff8020fdf6>] check_addr+0x10/0x4a
	[  366.860778] PGD 0 
	[  366.860782] Oops: 0000 [1] SMP 
	[  366.860787] CPU 0 
	[  366.860790] Modules linked in: qla2xxx scsi_transport_fc
	[  366.860798] Pid: 5757, comm: scsi_wq_2 Not tainted 2.6.22-rc6 #4
	[  366.860802] RIP: 0010:[<ffffffff8020fdf6>]  [<ffffffff8020fdf6>] check_addr+0x10/0x4a
	[  366.860812] RSP: 0018:ffff810073979960  EFLAGS: 00010082
	[  366.860816] RAX: 0000000000000000 RBX: ffff810037cda070 RCX: 0000000000000024
	[  366.860821] RDX: 000000007cd86188 RSI: ffff81007d800ef8 RDI: ffffffff804c30e1
	[  366.860824] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
	[  366.860828] R10: 00000000ffffffff R11: 0000000000000006 R12: 0000000000000001
	[  366.860834] R13: ffff81007d800ef8 R14: ffff810075f9fda0 R15: ffff810076d66af8
	[  366.860839] FS:  0000000000000000(0000) GS:ffffffff80570000(0000) knlGS:0000000000000000
	[  366.860844] CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
	[  366.860847] CR2: 0000000000000000 CR3: 000000007ec6b000 CR4: 00000000000006e0
	[  366.860853] Process scsi_wq_2 (pid: 5757, threadinfo ffff810073978000, task ffff810037c6ce00)
	[  366.860856] Stack:  0000000000011220 ffffffff8020fea6 0000000000000246 00000000000000e1
	[  366.860866]  00000000000000e1 ffff810076908608 ffff810076d66af8 ffffffff803a440c
	[  366.860876]  ffff810076908608 ffffffff8801cdd2 ffff810076908688 ffff810073979a18
	[  366.860885] Call Trace:
	[  366.860891]  [<ffffffff8020fea6>] nommu_map_sg+0x76/0x8f
	[  366.860900]  [<ffffffff803a440c>] scsi_dma_map+0x45/0x5c
	[  366.860922]  [<ffffffff8801cdd2>] :qla2xxx:qla24xx_start_scsi+0x118/0x4fb
	[  366.860928]  [<ffffffff8039fa74>] scsi_done+0x0/0x18
	[  366.860942]  [<ffffffff880116f0>] :qla2xxx:qla24xx_queuecommand+0x148/0x17a
	[  366.860948]  [<ffffffff803a01f7>] scsi_dispatch_cmd+0x1f6/0x313
	[  366.860953]  [<ffffffff803a622b>] scsi_request_fn+0x1d7/0x3b8

the failure point is this check (line 16) in check_addr():

	(gdb) l* check_addr+0x10
	0xffffffff8020fdf6 is in check_addr (arch/x86_64/kernel/pci-nommu.c:16).
	11      #include <asm/dma.h>
	12
	13      static int
	14      check_addr(char *name, struct device *hwdev, dma_addr_t bus, size_t size)
	15      {
	16              if (hwdev && bus + size > *hwdev->dma_mask) {
	17                      if (*hwdev->dma_mask >= DMA_32BIT_MASK)
	18                              printk(KERN_ERR
	19                                  "nommu_%s: overflow %Lx+%zu of device mask %Lx\n",
	20                                      name, (long long)bus, size,

hwdev->dma_mask (an 'u64 *') is NULL, as a corresponding 'set'
function is never getting called via pci_set_dma_mask() and
pci_set_consistent_dma_mask() on a vport.

I don't believe we'd want to:

1) have each LLD cache the physical-port's previously determined
   dma-mask, and call pci_set_[consistent_]dma_mask() for each
   instantiated vport.

   the problem with this approach is 'knowing' how much data needs to
   be propagated to a vport's underlying 'struct device'.

2) pass the physical-port's 'scsi_host' structure during a vport's
   scsi_add_host() call:

	if (scsi_add_host(vha->host, &fc_vport->dev)) {

   as that would lead to some device-model ugliness...


Abstractions such as these 'data-accessor functions' which don't allow
a LLD the opprotunity to be more selective on the
'physical-characteristics' of a 'virtual' device are going to lead to
more subtle bugs going forward.

One possiblity (the least intrusive) would be to add a
scsi_dma_map_with_device() function which takes the proper (LLD
defined) 'struct device' as a parameter, as was originally proposed,
and have NPIV-aware drivers call that function during the mappings of
physical *and* virtual dma-mappings.
-
To unsubscribe from this list: send the line "unsubscribe linux-scsi" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [SCSI Target Devel]     [Linux SCSI Target Infrastructure]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Linux IIO]     [Samba]     [Device Mapper]
  Powered by Linux