From: James Bottomley <James.Bottomley@HansenPartnership.com>
To: Robert Love <robert.w.love@intel.com>
Cc: linux-scsi@vger.kernel.org
Subject: Re: [PATCH 04/14] fcoe: create/destroy fcoe Rx threads on CPU hotplug events
Date: Mon, 23 Mar 2009 00:59:16 +0000 [thread overview]
Message-ID: <1237769956.4712.14.camel@localhost.localdomain> (raw)
In-Reply-To: <20090317184145.22987.97528.stgit@fritz>
On Tue, 2009-03-17 at 11:41 -0700, Robert Love wrote:
> This patch adds support for dynamically created Rx threads
> upon CPU hotplug events.
>
> There were existing synchronization problems that this patch
> attempts to resolve. The main problem had to do with fcoe_rcv()
> running in a different context than the hotplug notifications.
> This opened the possiblity that fcoe_rcv() would target a Rx
> thread for a skb. However, that thread could become NULL if
> the CPU was made offline.
>
> This patch uses the Rx queue's (a skb_queue) lock to protect
> the thread it's associated with and we use the 'thread' member
> of the fcoe_percpu_s to determine if the thread is ready to
> accept new skbs.
>
> The patch also attempts to do a better job of cleaning up, both
> if hotplug registration fails as well as when the module is
> removed.
>
> Contribution provided by Joe Eykholt <jeykholt@cisco.com> to
> fix incorrect use of __cpuinitdata.
>
> Signed-off-by: Yi Zou <yi.zou@intel.com>
> Signed-off-by: Robert Love <robert.w.love@intel.com>
> ---
>
> drivers/scsi/fcoe/libfcoe.c | 246 +++++++++++++++++++++++++++++++++++--------
> 1 files changed, 199 insertions(+), 47 deletions(-)
>
> diff --git a/drivers/scsi/fcoe/libfcoe.c b/drivers/scsi/fcoe/libfcoe.c
> index 648a2fc..951d244 100644
> --- a/drivers/scsi/fcoe/libfcoe.c
> +++ b/drivers/scsi/fcoe/libfcoe.c
> @@ -81,6 +81,156 @@ static struct notifier_block fcoe_notifier = {
> };
>
> /**
> + * fcoe_percpu_thread_create() - Create a receive thread for an online cpu
> + * @cpu: cpu index for the online cpu
> + */
> +static void fcoe_percpu_thread_create(unsigned int cpu)
> +{
> + struct fcoe_percpu_s *p;
> + struct task_struct *thread;
> +
> + p = &per_cpu(fcoe_percpu, cpu);
> +
> + thread = kthread_create(fcoe_percpu_receive_thread,
> + (void *)p, "fcoethread/%d", cpu);
> +
> + if (likely(!IS_ERR(p->thread))) {
> + kthread_bind(thread, cpu);
> + wake_up_process(thread);
> +
> + spin_lock_bh(&p->fcoe_rx_list.lock);
> + p->thread = thread;
> + spin_unlock_bh(&p->fcoe_rx_list.lock);
> + }
> +}
> +
> +/**
> + * fcoe_percpu_thread_destroy() - removes the rx thread for the given cpu
> + * @cpu: cpu index the rx thread is to be removed
> + *
> + * Destroys a per-CPU Rx thread. Any pending skbs are moved to the
> + * current CPU's Rx thread. If the thread being destroyed is bound to
> + * the CPU processing this context the skbs will be freed.
> + */
> +static void fcoe_percpu_thread_destroy(unsigned int cpu)
> +{
> + struct fcoe_percpu_s *p;
> + struct task_struct *thread;
> + struct page *crc_eof;
> + struct sk_buff *skb;
> +#ifdef CONFIG_SMP
> + struct fcoe_percpu_s *p0;
> + unsigned targ_cpu = smp_processor_id();
> +#endif /* CONFIG_SMP */
> +
> + printk(KERN_DEBUG "fcoe: Destroying receive thread for CPU %d\n", cpu);
> +
> + /* Prevent any new skbs from being queued for this CPU. */
> + p = &per_cpu(fcoe_percpu, cpu);
> + spin_lock_bh(&p->fcoe_rx_list.lock);
> + thread = p->thread;
> + p->thread = NULL;
> + crc_eof = p->crc_eof_page;
> + p->crc_eof_page = NULL;
> + p->crc_eof_offset = 0;
> + spin_unlock_bh(&p->fcoe_rx_list.lock);
> +
> +#ifdef CONFIG_SMP
> + /*
> + * Don't bother moving the skb's if this context is running
> + * on the same CPU that is having its thread destroyed. This
> + * can easily happen when the module is removed.
> + */
> + if (cpu != targ_cpu) {
> + p0 = &per_cpu(fcoe_percpu, targ_cpu);
> + spin_lock_bh(&p0->fcoe_rx_list.lock);
> + if (p0->thread) {
> + FC_DBG("Moving frames from CPU %d to CPU %d\n",
> + cpu, targ_cpu);
> +
> + while ((skb = __skb_dequeue(&p->fcoe_rx_list)) != NULL)
> + __skb_queue_tail(&p0->fcoe_rx_list, skb);
> + spin_unlock_bh(&p0->fcoe_rx_list.lock);
> + } else {
> + /*
> + * The targeted CPU is not initialized and cannot accept
> + * new skbs. Unlock the targeted CPU and drop the skbs
> + * on the CPU that is going offline.
> + */
> + while ((skb = __skb_dequeue(&p->fcoe_rx_list)) != NULL)
> + kfree_skb(skb);
> + spin_unlock_bh(&p0->fcoe_rx_list.lock);
> + }
> + } else {
> + /*
> + * This scenario occurs when the module is being removed
> + * and all threads are being destroyed. skbs will continue
> + * to be shifted from the CPU thread that is being removed
> + * to the CPU thread associated with the CPU that is processing
> + * the module removal. Once there is only one CPU Rx thread it
> + * will reach this case and we will drop all skbs and later
> + * stop the thread.
> + */
> + spin_lock_bh(&p->fcoe_rx_list.lock);
> + while ((skb = __skb_dequeue(&p->fcoe_rx_list)) != NULL)
> + kfree_skb(skb);
> + spin_unlock_bh(&p->fcoe_rx_list.lock);
> + }
> +#else
> + /*
> + * This a non-SMP scenario where the singluar Rx thread is
> + * being removed. Free all skbs and stop the thread.
> + */
> + spin_lock_bh(&p->fcoe_rx_list.lock);
> + while ((skb = __skb_dequeue(&p->fcoe_rx_list)) != NULL)
> + kfree_skb(skb);
> + spin_unlock_bh(&p->fcoe_rx_list.lock);
> +#endif
> +
> + if (thread)
> + kthread_stop(thread);
Don't you need a kthread_unbind() somewhere in here? Under most of your
calling conditions (CPU_DEAD events) the bound CPU is toast, so the
thread isn't going to be able to wake up on it.
James
next prev parent reply other threads:[~2009-03-23 0:59 UTC|newest]
Thread overview: 30+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-03-17 18:41 [PATCH 00/14] Open-FCoE fixes and features for 2.6.30 merge window Robert Love
2009-03-17 18:41 ` [PATCH 01/14] fcoe: Initialize all possilbe skb_queue(s) when module is loaded Robert Love
2009-03-17 18:41 ` [PATCH 02/14] fcoe: Use percpu kernel funcs for struct fcoe_percpu_s Robert Love
2009-03-17 18:41 ` [PATCH 03/14] fcoe: Use per-CPU kernel function for dev_stats instead of an array Robert Love
2009-03-31 22:51 ` [PATCH 3/14 v2] " Robert Love
2009-03-17 18:41 ` [PATCH 04/14] fcoe: create/destroy fcoe Rx threads on CPU hotplug events Robert Love
2009-03-23 0:59 ` James Bottomley [this message]
2009-03-23 19:42 ` Robert Love
2009-03-24 3:50 ` James Bottomley
2009-03-17 18:41 ` [PATCH 05/14] fcoe: prep work to completely remove fc_transport_fcoe code Robert Love
2009-03-24 23:19 ` [PATCH] " Robert Love
2009-03-26 3:03 ` [PATCH] PM port setting and attached SATA port selector in discover Andy Yan
2009-03-27 16:52 ` James Bottomley
2009-03-27 16:03 ` [PATCH] fcoe: prep work to completely remove fc_transport_fcoe code Robert Love
2009-03-27 16:12 ` Love, Robert W
2009-03-17 18:41 ` [PATCH 06/14] fcoe: removes fc_transport_fcoe.[ch] code files Robert Love
2009-03-24 23:24 ` [PATCH] " Robert Love
2009-03-27 16:05 ` Robert Love
2009-03-17 18:42 ` [PATCH 07/14] fcoe: removes default sw transport code file fcoe_sw.c Robert Love
2009-03-24 23:27 ` [PATCH] " Robert Love
2009-03-27 16:06 ` Robert Love
2009-03-17 18:42 ` [PATCH 08/14] fcoe: renames libfcoe.c to fcoe.c as the only fcoe module file Robert Love
2009-03-24 23:27 ` [PATCH] " Robert Love
2009-03-27 16:07 ` Robert Love
2009-03-17 18:42 ` [PATCH 09/14] fcoe, libfc, scsi: adds libfcoe module Robert Love
2009-03-17 18:42 ` [PATCH 10/14] fcoe: moves common FCoE library API functions to " Robert Love
2009-03-17 18:42 ` [PATCH 11/14] fcoe: cleans up libfcoe.h and adds fcoe.h for fcoe module Robert Love
2009-03-17 18:42 ` [PATCH 12/14] fcoe, libfc: fix double fcoe_softc memory alloc Robert Love
2009-03-17 18:42 ` [PATCH 13/14] fcoe: Add a header file defining the FIP protocol for FCoE Robert Love
2009-03-17 18:42 ` [PATCH 14/14] fcoe, libfcoe: Add support for FIP. FCoE discovery and keep-alive Robert Love
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1237769956.4712.14.camel@localhost.localdomain \
--to=james.bottomley@hansenpartnership.com \
--cc=linux-scsi@vger.kernel.org \
--cc=robert.w.love@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox