From: James Bottomley <James.Bottomley@HansenPartnership.com>
To: Robert Love <robert.w.love@intel.com>
Cc: "linux-scsi@vger.kernel.org" <linux-scsi@vger.kernel.org>
Subject: Re: [PATCH 04/14] fcoe: create/destroy fcoe Rx threads on CPU hotplug events
Date: Tue, 24 Mar 2009 03:50:13 +0000 [thread overview]
Message-ID: <1237866614.4127.41.camel@localhost.localdomain> (raw)
In-Reply-To: <1237837339.9083.20.camel@fritz>
On Mon, 2009-03-23 at 12:42 -0700, Robert Love wrote:
> On Sun, 2009-03-22 at 17:59 -0700, James Bottomley wrote:
> > On Tue, 2009-03-17 at 11:41 -0700, Robert Love wrote:
> > > This patch adds support for dynamically created Rx threads
> > > upon CPU hotplug events.
> > >
> > > There were existing synchronization problems that this patch
> > > attempts to resolve. The main problem had to do with fcoe_rcv()
> > > running in a different context than the hotplug notifications.
> > > This opened the possiblity that fcoe_rcv() would target a Rx
> > > thread for a skb. However, that thread could become NULL if
> > > the CPU was made offline.
> > >
> > > This patch uses the Rx queue's (a skb_queue) lock to protect
> > > the thread it's associated with and we use the 'thread' member
> > > of the fcoe_percpu_s to determine if the thread is ready to
> > > accept new skbs.
> > >
> > > The patch also attempts to do a better job of cleaning up, both
> > > if hotplug registration fails as well as when the module is
> > > removed.
> > >
> > > Contribution provided by Joe Eykholt <jeykholt@cisco.com> to
> > > fix incorrect use of __cpuinitdata.
> > >
> > > Signed-off-by: Yi Zou <yi.zou@intel.com>
> > > Signed-off-by: Robert Love <robert.w.love@intel.com>
> > > ---
> > >
> > > drivers/scsi/fcoe/libfcoe.c | 246 +++++++++++++++++++++++++++++++++++--------
> > > 1 files changed, 199 insertions(+), 47 deletions(-)
> > >
> > > diff --git a/drivers/scsi/fcoe/libfcoe.c b/drivers/scsi/fcoe/libfcoe.c
> > > index 648a2fc..951d244 100644
> > > --- a/drivers/scsi/fcoe/libfcoe.c
> > > +++ b/drivers/scsi/fcoe/libfcoe.c
> > > @@ -81,6 +81,156 @@ static struct notifier_block fcoe_notifier = {
> > > };
> > >
> > > /**
> > > + * fcoe_percpu_thread_create() - Create a receive thread for an online cpu
> > > + * @cpu: cpu index for the online cpu
> > > + */
> > > +static void fcoe_percpu_thread_create(unsigned int cpu)
> > > +{
> > > + struct fcoe_percpu_s *p;
> > > + struct task_struct *thread;
> > > +
> > > + p = &per_cpu(fcoe_percpu, cpu);
> > > +
> > > + thread = kthread_create(fcoe_percpu_receive_thread,
> > > + (void *)p, "fcoethread/%d", cpu);
> > > +
> > > + if (likely(!IS_ERR(p->thread))) {
> > > + kthread_bind(thread, cpu);
> > > + wake_up_process(thread);
> > > +
> > > + spin_lock_bh(&p->fcoe_rx_list.lock);
> > > + p->thread = thread;
> > > + spin_unlock_bh(&p->fcoe_rx_list.lock);
> > > + }
> > > +}
> > > +
> > > +/**
> > > + * fcoe_percpu_thread_destroy() - removes the rx thread for the given cpu
> > > + * @cpu: cpu index the rx thread is to be removed
> > > + *
> > > + * Destroys a per-CPU Rx thread. Any pending skbs are moved to the
> > > + * current CPU's Rx thread. If the thread being destroyed is bound to
> > > + * the CPU processing this context the skbs will be freed.
> > > + */
> > > +static void fcoe_percpu_thread_destroy(unsigned int cpu)
> > > +{
> > > + struct fcoe_percpu_s *p;
> > > + struct task_struct *thread;
> > > + struct page *crc_eof;
> > > + struct sk_buff *skb;
> > > +#ifdef CONFIG_SMP
> > > + struct fcoe_percpu_s *p0;
> > > + unsigned targ_cpu = smp_processor_id();
> > > +#endif /* CONFIG_SMP */
> > > +
> > > + printk(KERN_DEBUG "fcoe: Destroying receive thread for CPU %d\n", cpu);
> > > +
> > > + /* Prevent any new skbs from being queued for this CPU. */
> > > + p = &per_cpu(fcoe_percpu, cpu);
> > > + spin_lock_bh(&p->fcoe_rx_list.lock);
> > > + thread = p->thread;
> > > + p->thread = NULL;
> > > + crc_eof = p->crc_eof_page;
> > > + p->crc_eof_page = NULL;
> > > + p->crc_eof_offset = 0;
> > > + spin_unlock_bh(&p->fcoe_rx_list.lock);
> > > +
> > > +#ifdef CONFIG_SMP
> > > + /*
> > > + * Don't bother moving the skb's if this context is running
> > > + * on the same CPU that is having its thread destroyed. This
> > > + * can easily happen when the module is removed.
> > > + */
> > > + if (cpu != targ_cpu) {
> > > + p0 = &per_cpu(fcoe_percpu, targ_cpu);
> > > + spin_lock_bh(&p0->fcoe_rx_list.lock);
> > > + if (p0->thread) {
> > > + FC_DBG("Moving frames from CPU %d to CPU %d\n",
> > > + cpu, targ_cpu);
> > > +
> > > + while ((skb = __skb_dequeue(&p->fcoe_rx_list)) != NULL)
> > > + __skb_queue_tail(&p0->fcoe_rx_list, skb);
> > > + spin_unlock_bh(&p0->fcoe_rx_list.lock);
> > > + } else {
> > > + /*
> > > + * The targeted CPU is not initialized and cannot accept
> > > + * new skbs. Unlock the targeted CPU and drop the skbs
> > > + * on the CPU that is going offline.
> > > + */
> > > + while ((skb = __skb_dequeue(&p->fcoe_rx_list)) != NULL)
> > > + kfree_skb(skb);
> > > + spin_unlock_bh(&p0->fcoe_rx_list.lock);
> > > + }
> > > + } else {
> > > + /*
> > > + * This scenario occurs when the module is being removed
> > > + * and all threads are being destroyed. skbs will continue
> > > + * to be shifted from the CPU thread that is being removed
> > > + * to the CPU thread associated with the CPU that is processing
> > > + * the module removal. Once there is only one CPU Rx thread it
> > > + * will reach this case and we will drop all skbs and later
> > > + * stop the thread.
> > > + */
> > > + spin_lock_bh(&p->fcoe_rx_list.lock);
> > > + while ((skb = __skb_dequeue(&p->fcoe_rx_list)) != NULL)
> > > + kfree_skb(skb);
> > > + spin_unlock_bh(&p->fcoe_rx_list.lock);
> > > + }
> > > +#else
> > > + /*
> > > + * This a non-SMP scenario where the singluar Rx thread is
> > > + * being removed. Free all skbs and stop the thread.
> > > + */
> > > + spin_lock_bh(&p->fcoe_rx_list.lock);
> > > + while ((skb = __skb_dequeue(&p->fcoe_rx_list)) != NULL)
> > > + kfree_skb(skb);
> > > + spin_unlock_bh(&p->fcoe_rx_list.lock);
> > > +#endif
> > > +
> > > + if (thread)
> > > + kthread_stop(thread);
> >
> > Don't you need a kthread_unbind() somewhere in here? Under most of your
> > calling conditions (CPU_DEAD events) the bound CPU is toast, so the
> > thread isn't going to be able to wake up on it.
> >
> Is there a kthread_unbind()? I can't find it, maybe it was removed
> recently.
>
> This function should be moving all work off of the CPU that's going away
> and should also prevent any new work from being scheduled to it (by
> setting p->thread = NULL), so I'm not expecting this thread to wake up
> and do something.
Yes, sorry, it looks like the API is kthread_bind(task,
cpumask_any(cpu_online_mask) ... although some in kernel users do this
and some don't ... I suspect it's not something that's often tested.
James
next prev parent reply other threads:[~2009-03-24 3:50 UTC|newest]
Thread overview: 30+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-03-17 18:41 [PATCH 00/14] Open-FCoE fixes and features for 2.6.30 merge window Robert Love
2009-03-17 18:41 ` [PATCH 01/14] fcoe: Initialize all possilbe skb_queue(s) when module is loaded Robert Love
2009-03-17 18:41 ` [PATCH 02/14] fcoe: Use percpu kernel funcs for struct fcoe_percpu_s Robert Love
2009-03-17 18:41 ` [PATCH 03/14] fcoe: Use per-CPU kernel function for dev_stats instead of an array Robert Love
2009-03-31 22:51 ` [PATCH 3/14 v2] " Robert Love
2009-03-17 18:41 ` [PATCH 04/14] fcoe: create/destroy fcoe Rx threads on CPU hotplug events Robert Love
2009-03-23 0:59 ` James Bottomley
2009-03-23 19:42 ` Robert Love
2009-03-24 3:50 ` James Bottomley [this message]
2009-03-17 18:41 ` [PATCH 05/14] fcoe: prep work to completely remove fc_transport_fcoe code Robert Love
2009-03-24 23:19 ` [PATCH] " Robert Love
2009-03-26 3:03 ` [PATCH] PM port setting and attached SATA port selector in discover Andy Yan
2009-03-27 16:52 ` James Bottomley
2009-03-27 16:03 ` [PATCH] fcoe: prep work to completely remove fc_transport_fcoe code Robert Love
2009-03-27 16:12 ` Love, Robert W
2009-03-17 18:41 ` [PATCH 06/14] fcoe: removes fc_transport_fcoe.[ch] code files Robert Love
2009-03-24 23:24 ` [PATCH] " Robert Love
2009-03-27 16:05 ` Robert Love
2009-03-17 18:42 ` [PATCH 07/14] fcoe: removes default sw transport code file fcoe_sw.c Robert Love
2009-03-24 23:27 ` [PATCH] " Robert Love
2009-03-27 16:06 ` Robert Love
2009-03-17 18:42 ` [PATCH 08/14] fcoe: renames libfcoe.c to fcoe.c as the only fcoe module file Robert Love
2009-03-24 23:27 ` [PATCH] " Robert Love
2009-03-27 16:07 ` Robert Love
2009-03-17 18:42 ` [PATCH 09/14] fcoe, libfc, scsi: adds libfcoe module Robert Love
2009-03-17 18:42 ` [PATCH 10/14] fcoe: moves common FCoE library API functions to " Robert Love
2009-03-17 18:42 ` [PATCH 11/14] fcoe: cleans up libfcoe.h and adds fcoe.h for fcoe module Robert Love
2009-03-17 18:42 ` [PATCH 12/14] fcoe, libfc: fix double fcoe_softc memory alloc Robert Love
2009-03-17 18:42 ` [PATCH 13/14] fcoe: Add a header file defining the FIP protocol for FCoE Robert Love
2009-03-17 18:42 ` [PATCH 14/14] fcoe, libfcoe: Add support for FIP. FCoE discovery and keep-alive Robert Love
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1237866614.4127.41.camel@localhost.localdomain \
--to=james.bottomley@hansenpartnership.com \
--cc=linux-scsi@vger.kernel.org \
--cc=robert.w.love@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox