Applied, thanks.
On Wed, Feb 19, 2014 at 02:39:06PM -0800, Joe Stringer wrote: > Acked-by: Joe Stringer <joestrin...@nicira.com> > > > On 16 January 2014 10:07, Ben Pfaff <b...@nicira.com> wrote: > > > With glibc, rwlocks by default allow recursive read-locking even if a > > thread is blocked waiting for the write-lock. POSIX allows such attempts > > to deadlock, and it appears that the libc used in NetBSD, at least, does > > deadlock. The netdev_class_rwlock is in fact acquired recursively in this > > way, which is a bug. This commit fixes the problem by switching to a > > recursive mutex. This allows for less parallelism, but according to an > > existing comment that doesn't matter here anyway. > > > > Signed-off-by: Ben Pfaff <b...@nicira.com> > > --- > > lib/netdev.c | 63 > > +++++++++++++++++++++++++++++----------------------------- > > 1 file changed, 32 insertions(+), 31 deletions(-) > > > > diff --git a/lib/netdev.c b/lib/netdev.c > > index 575227c..8fd63de 100644 > > --- a/lib/netdev.c > > +++ b/lib/netdev.c > > @@ -1,5 +1,5 @@ > > /* > > - * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013 Nicira, Inc. > > + * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014 Nicira, Inc. > > * > > * Licensed under the Apache License, Version 2.0 (the "License"); > > * you may not use this file except in compliance with the License. > > @@ -67,15 +67,14 @@ static struct shash netdev_shash > > OVS_GUARDED_BY(netdev_mutex) > > > > /* Protects 'netdev_classes' against insertions or deletions. > > * > > - * This is not an rwlock for performance reasons but to allow recursive > > - * acquisition when calling into providers. For example, netdev_run() > > calls > > - * into provider 'run' functions, which might reasonably want to call one > > of > > - * the netdev functions that takes netdev_class_rwlock read-only. */ > > -static struct ovs_rwlock netdev_class_rwlock OVS_ACQ_BEFORE(netdev_mutex) > > - = OVS_RWLOCK_INITIALIZER; > > + * This is a recursive mutex to allow recursive acquisition when calling > > into > > + * providers. For example, netdev_run() calls into provider 'run' > > functions, > > + * which might reasonably want to call one of the netdev functions that > > takes > > + * netdev_class_mutex. */ > > +static struct ovs_mutex netdev_class_mutex OVS_ACQ_BEFORE(netdev_mutex); > > > > /* Contains 'struct netdev_registered_class'es. */ > > -static struct hmap netdev_classes OVS_GUARDED_BY(netdev_class_rwlock) > > +static struct hmap netdev_classes OVS_GUARDED_BY(netdev_class_mutex) > > = HMAP_INITIALIZER(&netdev_classes); > > > > struct netdev_registered_class { > > @@ -93,11 +92,13 @@ void update_device_args(struct netdev *, const struct > > shash *args); > > > > static void > > netdev_initialize(void) > > - OVS_EXCLUDED(netdev_class_rwlock, netdev_mutex) > > + OVS_EXCLUDED(netdev_class_mutex, netdev_mutex) > > { > > static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER; > > > > if (ovsthread_once_start(&once)) { > > + ovs_mutex_init_recursive(&netdev_class_mutex); > > + > > fatal_signal_add_hook(restore_all_flags, NULL, NULL, true); > > netdev_vport_patch_register(); > > > > @@ -122,17 +123,17 @@ netdev_initialize(void) > > * main poll loop. */ > > void > > netdev_run(void) > > - OVS_EXCLUDED(netdev_class_rwlock, netdev_mutex) > > + OVS_EXCLUDED(netdev_class_mutex, netdev_mutex) > > { > > struct netdev_registered_class *rc; > > > > - ovs_rwlock_rdlock(&netdev_class_rwlock); > > + ovs_mutex_lock(&netdev_class_mutex); > > HMAP_FOR_EACH (rc, hmap_node, &netdev_classes) { > > if (rc->class->run) { > > rc->class->run(); > > } > > } > > - ovs_rwlock_unlock(&netdev_class_rwlock); > > + ovs_mutex_unlock(&netdev_class_mutex); > > } > > > > /* Arranges for poll_block() to wake up when netdev_run() needs to be > > called. > > @@ -141,22 +142,22 @@ netdev_run(void) > > * main poll loop. */ > > void > > netdev_wait(void) > > - OVS_EXCLUDED(netdev_class_rwlock, netdev_mutex) > > + OVS_EXCLUDED(netdev_class_mutex, netdev_mutex) > > { > > struct netdev_registered_class *rc; > > > > - ovs_rwlock_rdlock(&netdev_class_rwlock); > > + ovs_mutex_lock(&netdev_class_mutex); > > HMAP_FOR_EACH (rc, hmap_node, &netdev_classes) { > > if (rc->class->wait) { > > rc->class->wait(); > > } > > } > > - ovs_rwlock_unlock(&netdev_class_rwlock); > > + ovs_mutex_unlock(&netdev_class_mutex); > > } > > > > static struct netdev_registered_class * > > netdev_lookup_class(const char *type) > > - OVS_REQ_RDLOCK(netdev_class_rwlock) > > + OVS_REQ_RDLOCK(netdev_class_mutex) > > { > > struct netdev_registered_class *rc; > > > > @@ -173,11 +174,11 @@ netdev_lookup_class(const char *type) > > * registration, new netdevs of that type can be opened using > > netdev_open(). */ > > int > > netdev_register_provider(const struct netdev_class *new_class) > > - OVS_EXCLUDED(netdev_class_rwlock, netdev_mutex) > > + OVS_EXCLUDED(netdev_class_mutex, netdev_mutex) > > { > > int error; > > > > - ovs_rwlock_wrlock(&netdev_class_rwlock); > > + ovs_mutex_lock(&netdev_class_mutex); > > if (netdev_lookup_class(new_class->type)) { > > VLOG_WARN("attempted to register duplicate netdev provider: %s", > > new_class->type); > > @@ -197,7 +198,7 @@ netdev_register_provider(const struct netdev_class > > *new_class) > > new_class->type, ovs_strerror(error)); > > } > > } > > - ovs_rwlock_unlock(&netdev_class_rwlock); > > + ovs_mutex_unlock(&netdev_class_mutex); > > > > return error; > > } > > @@ -207,12 +208,12 @@ netdev_register_provider(const struct netdev_class > > *new_class) > > * new netdevs of that type cannot be opened using netdev_open(). */ > > int > > netdev_unregister_provider(const char *type) > > - OVS_EXCLUDED(netdev_class_rwlock, netdev_mutex) > > + OVS_EXCLUDED(netdev_class_mutex, netdev_mutex) > > { > > struct netdev_registered_class *rc; > > int error; > > > > - ovs_rwlock_wrlock(&netdev_class_rwlock); > > + ovs_mutex_lock(&netdev_class_mutex); > > rc = netdev_lookup_class(type); > > if (!rc) { > > VLOG_WARN("attempted to unregister a netdev provider that is not " > > @@ -233,7 +234,7 @@ netdev_unregister_provider(const char *type) > > error = EBUSY; > > } > > } > > - ovs_rwlock_unlock(&netdev_class_rwlock); > > + ovs_mutex_unlock(&netdev_class_mutex); > > > > return error; > > } > > @@ -249,11 +250,11 @@ netdev_enumerate_types(struct sset *types) > > netdev_initialize(); > > sset_clear(types); > > > > - ovs_rwlock_rdlock(&netdev_class_rwlock); > > + ovs_mutex_lock(&netdev_class_mutex); > > HMAP_FOR_EACH (rc, hmap_node, &netdev_classes) { > > sset_add(types, rc->class->type); > > } > > - ovs_rwlock_unlock(&netdev_class_rwlock); > > + ovs_mutex_unlock(&netdev_class_mutex); > > } > > > > /* Check that the network device name is not the same as any of the > > registered > > @@ -269,15 +270,15 @@ netdev_is_reserved_name(const char *name) > > > > netdev_initialize(); > > > > - ovs_rwlock_rdlock(&netdev_class_rwlock); > > + ovs_mutex_lock(&netdev_class_mutex); > > HMAP_FOR_EACH (rc, hmap_node, &netdev_classes) { > > const char *dpif_port = > > netdev_vport_class_get_dpif_port(rc->class); > > if (dpif_port && !strcmp(dpif_port, name)) { > > - ovs_rwlock_unlock(&netdev_class_rwlock); > > + ovs_mutex_unlock(&netdev_class_mutex); > > return true; > > } > > } > > - ovs_rwlock_unlock(&netdev_class_rwlock); > > + ovs_mutex_unlock(&netdev_class_mutex); > > > > if (!strncmp(name, "ovs-", 4)) { > > struct sset types; > > @@ -313,7 +314,7 @@ netdev_open(const char *name, const char *type, struct > > netdev **netdevp) > > > > netdev_initialize(); > > > > - ovs_rwlock_rdlock(&netdev_class_rwlock); > > + ovs_mutex_lock(&netdev_class_mutex); > > ovs_mutex_lock(&netdev_mutex); > > netdev = shash_find_data(&netdev_shash, name); > > if (!netdev) { > > @@ -354,7 +355,7 @@ netdev_open(const char *name, const char *type, struct > > netdev **netdevp) > > } > > > > ovs_mutex_unlock(&netdev_mutex); > > - ovs_rwlock_unlock(&netdev_class_rwlock); > > + ovs_mutex_unlock(&netdev_class_mutex); > > > > if (!error) { > > netdev->ref_cnt++; > > @@ -460,11 +461,11 @@ netdev_unref(struct netdev *dev) > > dev->netdev_class->dealloc(dev); > > ovs_mutex_unlock(&netdev_mutex); > > > > - ovs_rwlock_rdlock(&netdev_class_rwlock); > > + ovs_mutex_lock(&netdev_class_mutex); > > rc = netdev_lookup_class(class->type); > > atomic_sub(&rc->ref_cnt, 1, &old_ref_cnt); > > ovs_assert(old_ref_cnt > 0); > > - ovs_rwlock_unlock(&netdev_class_rwlock); > > + ovs_mutex_unlock(&netdev_class_mutex); > > } else { > > ovs_mutex_unlock(&netdev_mutex); > > } > > -- > > 1.7.10.4 > > > > _______________________________________________ > > dev mailing list > > dev@openvswitch.org > > http://openvswitch.org/mailman/listinfo/dev > > _______________________________________________ dev mailing list dev@openvswitch.org http://openvswitch.org/mailman/listinfo/dev