diff options
author | Mauro Carvalho Chehab <mchehab+samsung@kernel.org> | 2019-06-27 18:59:40 +0300 |
---|---|---|
committer | Mauro Carvalho Chehab <mchehab+samsung@kernel.org> | 2019-07-15 17:03:02 +0300 |
commit | 83bbf6e103544d65f17f4b2ccea1c6a51c0b0769 (patch) | |
tree | 9f37eb8ea225fc60312ba26b43522c420634da53 /Documentation/admin-guide/aoe/todo.rst | |
parent | df1b7ce784c220373d202ea9f8bc0c424f2c9f7c (diff) | |
download | linux-83bbf6e103544d65f17f4b2ccea1c6a51c0b0769.tar.xz |
docs: aoe: add it to the driver-api book
Those files belong to the admin guide, so add them.
Signed-off-by: Mauro Carvalho Chehab <mchehab+samsung@kernel.org>
Acked-by: Justin Sanders <justin@coraid.com>
Diffstat (limited to 'Documentation/admin-guide/aoe/todo.rst')
-rw-r--r-- | Documentation/admin-guide/aoe/todo.rst | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/Documentation/admin-guide/aoe/todo.rst b/Documentation/admin-guide/aoe/todo.rst new file mode 100644 index 000000000000..dea8db5a33e1 --- /dev/null +++ b/Documentation/admin-guide/aoe/todo.rst @@ -0,0 +1,17 @@ +TODO +==== + +There is a potential for deadlock when allocating a struct sk_buff for +data that needs to be written out to aoe storage. If the data is +being written from a dirty page in order to free that page, and if +there are no other pages available, then deadlock may occur when a +free page is needed for the sk_buff allocation. This situation has +not been observed, but it would be nice to eliminate any potential for +deadlock under memory pressure. + +Because ATA over Ethernet is not fragmented by the kernel's IP code, +the destructor member of the struct sk_buff is available to the aoe +driver. By using a mempool for allocating all but the first few +sk_buffs, and by registering a destructor, we should be able to +efficiently allocate sk_buffs without introducing any potential for +deadlock. |