Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753528AbbGQPx7 (ORCPT ); Fri, 17 Jul 2015 11:53:59 -0400 Received: from mail-bn1bon0132.outbound.protection.outlook.com ([157.56.111.132]:14592 "EHLO na01-bn1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752248AbbGQPx6 convert rfc822-to-8bit (ORCPT ); Fri, 17 Jul 2015 11:53:58 -0400 From: KY Srinivasan To: Vitaly Kuznetsov CC: "davem@davemloft.net" , "netdev@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "devel@linuxdriverproject.org" , "olaf@aepfle.de" , "apw@canonical.com" , "jasowang@redhat.com" , Dexuan Cui Subject: RE: [PATCH net-next 1/1] hv_netvsc: Wait for sub-channels to be processed during probe Thread-Topic: [PATCH net-next 1/1] hv_netvsc: Wait for sub-channels to be processed during probe Thread-Index: AQHQv/BE7CKV1hTvu0eTIWyibDz4rJ3ftXw/gAAW8zA= Date: Fri, 17 Jul 2015 15:53:54 +0000 Message-ID: References: <1437074222-13020-1-git-send-email-kys@microsoft.com> <87a8uuoot9.fsf@vitty.brq.redhat.com> In-Reply-To: <87a8uuoot9.fsf@vitty.brq.redhat.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: redhat.com; dkim=none (message not signed) header.d=none; x-originating-ip: [2601:600:8c01:121d:d100:50d7:b414:86e8] x-microsoft-exchange-diagnostics: 1;BY2PR0301MB1655;5:6DVcs9jL8X4kU8Dxuuov/7/GvbMx1VXDbym2ZLTPJK3A36mHVPIoiSmFPFm5ZFdSFNtNRp8YTFvXzINSahis2cf4GSr+OZi8OSL5S6hm359GS99mJYJG+BhZlvBCR1J7UlMH1U0pjVmumPUS5VnBOA==;24:a8iLWsOXWcFhXegsLMFD8HbH/UkWMwRALYNXNf1s6CNkVhyz3AVFjhCnUXrowXHIXIsGnUpklDPjHX8bXTa1pE+ZoWPlGhxyBLry9B9b/sI=;20:Ot/NQE1r4Oi0D/Fo7StT6builyl5ey0kg8F8s4Q5iGvS6Kez1UnoIQdQTWCyr0MuFD3LVvPrxwWqyQ5qvdh9Fg== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BY2PR0301MB1655; by2pr0301mb1655: X-MS-Exchange-Organization-RulesExecuted x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(108003899814671); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(601004)(2401001)(5005006)(3002001);SRVR:BY2PR0301MB1655;BCL:0;PCL:0;RULEID:;SRVR:BY2PR0301MB1655; x-forefront-prvs: 06400060E1 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(6009001)(13464003)(164054003)(377454003)(77156002)(33656002)(2656002)(106116001)(5003600100002)(74316001)(76576001)(92566002)(19580405001)(76176999)(50986999)(5002640100001)(99286002)(5001960100002)(86612001)(19580395003)(2900100001)(107886002)(62966003)(86362001)(77096005)(110136002)(87936001)(54356999)(46102003)(2950100001)(189998001)(122556002)(102836002)(3826002)(4001430100001);DIR:OUT;SFP:1102;SCL:1;SRVR:BY2PR0301MB1655;H:BY2PR0301MB1654.namprd03.prod.outlook.com;FPR:;SPF:None;MLV:sfv;LANG:en; Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Jul 2015 15:53:54.5770 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR0301MB1655 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 5899 Lines: 165 > -----Original Message----- > From: Vitaly Kuznetsov [mailto:vkuznets@redhat.com] > Sent: Friday, July 17, 2015 7:13 AM > To: KY Srinivasan > Cc: davem@davemloft.net; netdev@vger.kernel.org; linux- > kernel@vger.kernel.org; devel@linuxdriverproject.org; olaf@aepfle.de; > apw@canonical.com; jasowang@redhat.com; Dexuan Cui > Subject: Re: [PATCH net-next 1/1] hv_netvsc: Wait for sub-channels to be > processed during probe > > "K. Y. Srinivasan" writes: > > > The current code returns from probe without waiting for the proper > handling > > of subchannels that may be requested. If the netvsc driver were to be > rapidly > > loaded/unloaded, we can trigger a panic as the unload will be tearing > > down state that may not have been fully setup yet. We fix this issue by > making > > sure that we return from the probe call only after ensuring that the > > sub-channel offers in flight are properly handled. > > > > Signed-off-by: K. Y. Srinivasan > > Reviewed-and-tested-by: Haiyang Zhang > --- > > drivers/net/hyperv/hyperv_net.h | 2 ++ > > drivers/net/hyperv/rndis_filter.c | 25 +++++++++++++++++++++++++ > > 2 files changed, 27 insertions(+), 0 deletions(-) > > > > diff --git a/drivers/net/hyperv/hyperv_net.h > b/drivers/net/hyperv/hyperv_net.h > > index 26cd14c..925b75d 100644 > > --- a/drivers/net/hyperv/hyperv_net.h > > +++ b/drivers/net/hyperv/hyperv_net.h > > @@ -671,6 +671,8 @@ struct netvsc_device { > > u32 send_table[VRSS_SEND_TAB_SIZE]; > > u32 max_chn; > > u32 num_chn; > > + spinlock_t sc_lock; /* Protects num_sc_offered variable */ > > + u32 num_sc_offered; > > atomic_t queue_sends[NR_CPUS]; > > > > /* Holds rndis device info */ > > diff --git a/drivers/net/hyperv/rndis_filter.c > b/drivers/net/hyperv/rndis_filter.c > > index 2e40417..2e09f3f 100644 > > --- a/drivers/net/hyperv/rndis_filter.c > > +++ b/drivers/net/hyperv/rndis_filter.c > > @@ -984,9 +984,16 @@ static void netvsc_sc_open(struct vmbus_channel > *new_sc) > > struct netvsc_device *nvscdev; > > u16 chn_index = new_sc->offermsg.offer.sub_channel_index; > > int ret; > > + unsigned long flags; > > > > nvscdev = hv_get_drvdata(new_sc->primary_channel->device_obj); > > > > + spin_lock_irqsave(&nvscdev->sc_lock, flags); > > + nvscdev->num_sc_offered--; > > + spin_unlock_irqrestore(&nvscdev->sc_lock, flags); > > + if (nvscdev->num_sc_offered == 0) > > + complete(&nvscdev->channel_init_wait); > > + > > if (chn_index >= nvscdev->num_chn) > > return; > > > > @@ -1015,8 +1022,10 @@ int rndis_filter_device_add(struct hv_device > *dev, > > u32 rsscap_size = sizeof(struct ndis_recv_scale_cap); > > u32 mtu, size; > > u32 num_rss_qs; > > + u32 sc_delta; > > const struct cpumask *node_cpu_mask; > > u32 num_possible_rss_qs; > > + unsigned long flags; > > > > rndis_device = get_rndis_device(); > > if (!rndis_device) > > @@ -1039,6 +1048,8 @@ int rndis_filter_device_add(struct hv_device > *dev, > > net_device->max_chn = 1; > > net_device->num_chn = 1; > > > > + spin_lock_init(&net_device->sc_lock); > > + > > net_device->extension = rndis_device; > > rndis_device->net_dev = net_device; > > > > @@ -1116,6 +1127,9 @@ int rndis_filter_device_add(struct hv_device > *dev, > > num_possible_rss_qs = cpumask_weight(node_cpu_mask); > > net_device->num_chn = min(num_possible_rss_qs, num_rss_qs); > > > > + num_rss_qs = net_device->num_chn - 1; > > + net_device->num_sc_offered = num_rss_qs; > > + > > if (net_device->num_chn == 1) > > goto out; > > > > @@ -1157,11 +1171,22 @@ int rndis_filter_device_add(struct hv_device > *dev, > > > > ret = rndis_filter_set_rss_param(rndis_device, net_device- > >num_chn); > > > > + /* > > + * Wait for the host to send us the sub-channel offers. > > + */ > > + spin_lock_irqsave(&net_device->sc_lock, flags); > > + sc_delta = net_device->num_chn - 1 - num_rss_qs; > > + net_device->num_sc_offered -= sc_delta; > > + spin_unlock_irqrestore(&net_device->sc_lock, flags); > > + > > + if (net_device->num_sc_offered != 0) > > + wait_for_completion(&net_device->channel_init_wait); > > I'd suggest we add an essentian timeout (big, let's say 30 sec.) > here. In case something goes wrong we don't really want to hang the > whole kernel for forever. Such bugs are hard to debug as if a 'kernel > hangs' is reported we can't be sure which wait caused it. We can even > have something like: > > t = wait_for_completion_timeout(&net_device->channel_init_wait, 30*HZ); > BUG_ON(t == 0); > > This is much better as we'll be sure what went wrong. (I know other > pieces of hyper-v code use wait_for_completion() without a timeout, this > is rather a general suggestion for all of them). There is some history here. Initially, I had timeout for calls where we could reasonably rollback state if we timed out. Some calls were subsequently changed to unconditional wait because under some load conditions, these timeouts would trigger (granted I did not have 30 second timeout; it was a 5 second timeout). Greg was opposed to calls to BUG_ON() in general for drivers. Consequently, I have chosen to wait unconditionally in cases where there is no sensible rollback if we were to timeout (rather thank bug checking). In this specific case though, we can have a timeout and we don't need to bug check if we timeout. I will make this change and resubmit. Thanks, K. Y > > > out: > > if (ret) { > > net_device->max_chn = 1; > > net_device->num_chn = 1; > > } > > + > > return 0; /* return 0 because primary channel can be used alone */ > > > > err_dev_remv: > > -- > Vitaly -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/