Re: NPIV mapping problems (was Re: [PATCH 1/19] add data buffer accessors)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Sorry for the delay...

From: Andrew Vasquez <andrew.vasquez@xxxxxxxxxx>
Subject: NPIV mapping problems (was Re: [PATCH 1/19] add data buffer accessors)
Date: Fri, 29 Jun 2007 06:23:32 -0700

> On Sat, 12 May 2007, James Bottomley wrote:
> 
> > On Sat, 2007-05-12 at 19:05 +0900, FUJITA Tomonori wrote:
> > > Add a set of accessors for the scsi data buffer. This is in
> > > preparation for chaining sg lists and bidirectional requests (and
> > > possibly, the mid-layer dma mapping).
> > > 
> > > Signed-off-by: FUJITA Tomonori <fujita.tomonori@xxxxxxxxxxxxx>
> > > ---
> > >  drivers/scsi/scsi_lib.c  |   26 ++++++++++++++++++++++++++
> > >  include/scsi/scsi_cmnd.h |   11 +++++++++++
> > >  2 files changed, 37 insertions(+), 0 deletions(-)
> > > 
> > > diff --git a/drivers/scsi/scsi_lib.c b/drivers/scsi/scsi_lib.c
> > > index 1f5a07b..a2ebe61 100644
> > > --- a/drivers/scsi/scsi_lib.c
> > > +++ b/drivers/scsi/scsi_lib.c
> > > @@ -2290,3 +2290,29 @@ void scsi_kunmap_atomic_sg(void *virt)
> > >  	kunmap_atomic(virt, KM_BIO_SRC_IRQ);
> > >  }
> > >  EXPORT_SYMBOL(scsi_kunmap_atomic_sg);
> > > +
> > > +int scsi_dma_map(struct device *dev, struct scsi_cmnd *cmd)
> > 
> > Actually, this is redundant.  We make sure the
> > shost->shost_gendev.parent is the device which should have been passed
> > in to scsi_add_host().
> 
> Well, there's perhaps an unintended side-effect with this assumption,
> NPIV-based 'vports' (and their subsequent 'struct device' members) are
> not fully initialized objects.
> 
> This is what we've run into while working on our NPIV (based) driver
> with the 'data buffer' accessors works, while queueing the first
> command to an sdev of a freshly created vport:
> 
> 	[  366.860758] Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP: 
> 	[  366.860762]  [<ffffffff8020fdf6>] check_addr+0x10/0x4a
> 	[  366.860778] PGD 0 
> 	[  366.860782] Oops: 0000 [1] SMP 
> 	[  366.860787] CPU 0 
> 	[  366.860790] Modules linked in: qla2xxx scsi_transport_fc
> 	[  366.860798] Pid: 5757, comm: scsi_wq_2 Not tainted 2.6.22-rc6 #4
> 	[  366.860802] RIP: 0010:[<ffffffff8020fdf6>]  [<ffffffff8020fdf6>] check_addr+0x10/0x4a
> 	[  366.860812] RSP: 0018:ffff810073979960  EFLAGS: 00010082
> 	[  366.860816] RAX: 0000000000000000 RBX: ffff810037cda070 RCX: 0000000000000024
> 	[  366.860821] RDX: 000000007cd86188 RSI: ffff81007d800ef8 RDI: ffffffff804c30e1
> 	[  366.860824] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
> 	[  366.860828] R10: 00000000ffffffff R11: 0000000000000006 R12: 0000000000000001
> 	[  366.860834] R13: ffff81007d800ef8 R14: ffff810075f9fda0 R15: ffff810076d66af8
> 	[  366.860839] FS:  0000000000000000(0000) GS:ffffffff80570000(0000) knlGS:0000000000000000
> 	[  366.860844] CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
> 	[  366.860847] CR2: 0000000000000000 CR3: 000000007ec6b000 CR4: 00000000000006e0
> 	[  366.860853] Process scsi_wq_2 (pid: 5757, threadinfo ffff810073978000, task ffff810037c6ce00)
> 	[  366.860856] Stack:  0000000000011220 ffffffff8020fea6 0000000000000246 00000000000000e1
> 	[  366.860866]  00000000000000e1 ffff810076908608 ffff810076d66af8 ffffffff803a440c
> 	[  366.860876]  ffff810076908608 ffffffff8801cdd2 ffff810076908688 ffff810073979a18
> 	[  366.860885] Call Trace:
> 	[  366.860891]  [<ffffffff8020fea6>] nommu_map_sg+0x76/0x8f
> 	[  366.860900]  [<ffffffff803a440c>] scsi_dma_map+0x45/0x5c
> 	[  366.860922]  [<ffffffff8801cdd2>] :qla2xxx:qla24xx_start_scsi+0x118/0x4fb
> 	[  366.860928]  [<ffffffff8039fa74>] scsi_done+0x0/0x18
> 	[  366.860942]  [<ffffffff880116f0>] :qla2xxx:qla24xx_queuecommand+0x148/0x17a
> 	[  366.860948]  [<ffffffff803a01f7>] scsi_dispatch_cmd+0x1f6/0x313
> 	[  366.860953]  [<ffffffff803a622b>] scsi_request_fn+0x1d7/0x3b8
> 
> the failure point is this check (line 16) in check_addr():
> 
> 	(gdb) l* check_addr+0x10
> 	0xffffffff8020fdf6 is in check_addr (arch/x86_64/kernel/pci-nommu.c:16).
> 	11      #include <asm/dma.h>
> 	12
> 	13      static int
> 	14      check_addr(char *name, struct device *hwdev, dma_addr_t bus, size_t size)
> 	15      {
> 	16              if (hwdev && bus + size > *hwdev->dma_mask) {
> 	17                      if (*hwdev->dma_mask >= DMA_32BIT_MASK)
> 	18                              printk(KERN_ERR
> 	19                                  "nommu_%s: overflow %Lx+%zu of device mask %Lx\n",
> 	20                                      name, (long long)bus, size,
> 
> hwdev->dma_mask (an 'u64 *') is NULL, as a corresponding 'set'
> function is never getting called via pci_set_dma_mask() and
> pci_set_consistent_dma_mask() on a vport.

Yeah, I use lpfc's NPIV but haven't hit this because I use swiotlb...


> I don't believe we'd want to:
> 
> 1) have each LLD cache the physical-port's previously determined
>    dma-mask, and call pci_set_[consistent_]dma_mask() for each
>    instantiated vport.
> 
>    the problem with this approach is 'knowing' how much data needs to
>    be propagated to a vport's underlying 'struct device'.
>
> 2) pass the physical-port's 'scsi_host' structure during a vport's
>    scsi_add_host() call:
> 
> 	if (scsi_add_host(vha->host, &fc_vport->dev)) {
> 
>    as that would lead to some device-model ugliness...

Yeah, we shouldn't do this...


> Abstractions such as these 'data-accessor functions' which don't allow
> a LLD the opprotunity to be more selective on the
> 'physical-characteristics' of a 'virtual' device are going to lead to
> more subtle bugs going forward.
> 
> One possiblity (the least intrusive) would be to add a
> scsi_dma_map_with_device() function which takes the proper (LLD
> defined) 'struct device' as a parameter, as was originally proposed,
> and have NPIV-aware drivers call that function during the mappings of
> physical *and* virtual dma-mappings.

It's ok. But if only NPIV-aware drivers need to handle this, would it
be better to just use dma_map_sg instead of scsi_dma_map?
-
To unsubscribe from this list: send the line "unsubscribe linux-scsi" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [SCSI Target Devel]     [Linux SCSI Target Infrastructure]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Linux IIO]     [Samba]     [Device Mapper]
  Powered by Linux