Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3754923pxk; Tue, 8 Sep 2020 01:18:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw/BtMdyCRVzS8kWdElIZWNADNvdwbo49lsJ3OP6h/acUuRG1dhA+FU3kL485B/lNMc2r+T X-Received: by 2002:a17:906:1186:: with SMTP id n6mr23455639eja.331.1599553091044; Tue, 08 Sep 2020 01:18:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599553091; cv=none; d=google.com; s=arc-20160816; b=eL0wssmVWszoZ0LUP7VB4063trZ2rPmzSQgC+CtBTHpSojVru2NYas1gEsQg+JqHae UvMrdBhR/j240f81vqiOryb0eUd/xNvFSPA1lF0+PbCrj6KBUP97plz2GdXq/80rwHB5 6cH+CVRHybx68gsIjl7YTpMfl91EaC88n1ItrCCpQxbIimowBloo3GzEIfgpF723KO1x ij27r1w0whdLlG/akPD55ZPICC7aG1Nvq2XEjN8TNRdk53idy8/WiMYtOLZys/C6ZCBv S3kxG9LfjxxQ5rS+hAONMJ9mlw/cGJQXBKEqP/Gx11fXcFh4Sml6khGFQhB2pJi78tIo H4/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=AO1mceDkzyY+GXFzQZPUfUoX+3pREdstrNzPjkRtHeM=; b=0/Mdn5i8zSXOZFLPmJXM+xruz0iouUKLTUg3LaHhqywWT28BIv8t5XpK7UEQomBOq7 Zwwlp4RnR5yzK0cptylTHDnkkCgX0LZQXN/wRvQkAA1ltJAUtmIv4YLDEP37BPoSWzws 4Wqi2peIS8Bpq1Xg2zgHGX7zp9s5vdHRA+Ga+DFXq519dzIGMebPZWFCBjSuTkj/0qy2 H/nFV5Z9JLsnJaeqKLwX7K2PthPCpIYNyfjEaurRZt7ffZFPb+X67LBS+o6Bykm+zyId HmxfMVvyIWUQBpMekuW17bPIaPaKhANHgRTbBsOo8gOvGr4hL0YIrA6vuKK6xrn5dU2N 8s2Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i8si11636290edj.113.2020.09.08.01.17.48; Tue, 08 Sep 2020 01:18:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729991AbgIHIQF (ORCPT + 99 others); Tue, 8 Sep 2020 04:16:05 -0400 Received: from mx2.suse.de ([195.135.220.15]:37130 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729365AbgIHIPZ (ORCPT ); Tue, 8 Sep 2020 04:15:25 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 340BDACF2; Tue, 8 Sep 2020 08:15:24 +0000 (UTC) From: Daniel Wagner To: linux-scsi@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Nilesh Javali , Martin Wilck , Arun Easi , Daniel Wagner Subject: [PATCH v3 0/4] qla2xxx: A couple crash fixes Date: Tue, 8 Sep 2020 10:15:12 +0200 Message-Id: <20200908081516.8561-1-dwagner@suse.de> X-Mailer: git-send-email 2.16.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The first crash we observed is due memory corruption in the srb memory pool. Unforuntatly, I couldn't find the source of the problem but the workaround by resetting the cleanup callbacks 'fixes' this problem (patch #1). I think as intermeditate step this should be merged until the real cause can be identified. The second crash is due a race condition(?) in the firmware. The sts entries are not updated in time which leads to this crash pattern which several customers have reported: #0 [c00000ffffd1bb80] scsi_dma_unmap at d00000001e4904d4 [scsi_mod] #1 [c00000ffffd1bbe0] qla2x00_sp_compl at d0000000204803cc [qla2xxx] #2 [c00000ffffd1bc20] qla24xx_process_response_queue at d0000000204c5810 [qla2xxx] #3 [c00000ffffd1bd50] qla24xx_msix_rsp_q at d0000000204c8fd8 [qla2xxx] #4 [c00000ffffd1bde0] __handle_irq_event_percpu at c000000000189510 #5 [c00000ffffd1bea0] handle_irq_event_percpu at c00000000018978c #6 [c00000ffffd1bee0] handle_irq_event at c00000000018984c #7 [c00000ffffd1bf10] handle_fasteoi_irq at c00000000018efc0 #8 [c00000ffffd1bf40] generic_handle_irq at c000000000187f10 #9 [c00000ffffd1bf60] __do_irq at c000000000018784 #10 [c00000ffffd1bf90] call_do_irq at c00000000002caa4 #11 [c00000ecca417a00] do_IRQ at c000000000018970 #12 [c00000ecca417a50] restore_check_irq_replay at c00000000000de98 From analyzing the crash dump it was clear that qla24xx_mbx_iocb_entry() calls sp->done (qla2x00_sp_compl) which crashes because the response is not a mailbox entry, it is a status entry. Patch #4 changes the process logic for mailbox commands so that the sp is parsed before calling the correct proccess function. changes since v1: - addressed review comments by Martin - patch#1: added dummy warn function - patch#4: added log entry changes since v2: - added reviewed tags by Martin - addressed review comments by Arun - patch#1: add srb pointer to log message - patch#3: print calling func name in qla2x00_get_sp_from_handle() - patch#4: dropped comment, reset HBA Daniel Wagner (4): qla2xxx: Warn if done() or free() are called on an already freed srb qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() qla2xxx: Handle incorrect entry_type entries drivers/scsi/qla2xxx/qla_init.c | 10 +++++++++ drivers/scsi/qla2xxx/qla_inline.h | 5 +++++ drivers/scsi/qla2xxx/qla_isr.c | 47 ++++++++++++++++++++++++++++++--------- 3 files changed, 51 insertions(+), 11 deletions(-) -- 2.16.4