Applied, thanks.

On Wed, Feb 19, 2014 at 02:39:06PM -0800, Joe Stringer wrote:
> Acked-by: Joe Stringer <joestrin...@nicira.com>
> 
> 
> On 16 January 2014 10:07, Ben Pfaff <b...@nicira.com> wrote:
> 
> > With glibc, rwlocks by default allow recursive read-locking even if a
> > thread is blocked waiting for the write-lock.  POSIX allows such attempts
> > to deadlock, and it appears that the libc used in NetBSD, at least, does
> > deadlock.  The netdev_class_rwlock is in fact acquired recursively in this
> > way, which is a bug.  This commit fixes the problem by switching to a
> > recursive mutex.  This allows for less parallelism, but according to an
> > existing comment that doesn't matter here anyway.
> >
> > Signed-off-by: Ben Pfaff <b...@nicira.com>
> > ---
> >  lib/netdev.c |   63
> > +++++++++++++++++++++++++++++-----------------------------
> >  1 file changed, 32 insertions(+), 31 deletions(-)
> >
> > diff --git a/lib/netdev.c b/lib/netdev.c
> > index 575227c..8fd63de 100644
> > --- a/lib/netdev.c
> > +++ b/lib/netdev.c
> > @@ -1,5 +1,5 @@
> >  /*
> > - * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013 Nicira, Inc.
> > + * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014 Nicira, Inc.
> >   *
> >   * Licensed under the Apache License, Version 2.0 (the "License");
> >   * you may not use this file except in compliance with the License.
> > @@ -67,15 +67,14 @@ static struct shash netdev_shash
> > OVS_GUARDED_BY(netdev_mutex)
> >
> >  /* Protects 'netdev_classes' against insertions or deletions.
> >   *
> > - * This is not an rwlock for performance reasons but to allow recursive
> > - * acquisition when calling into providers.  For example, netdev_run()
> > calls
> > - * into provider 'run' functions, which might reasonably want to call one
> > of
> > - * the netdev functions that takes netdev_class_rwlock read-only. */
> > -static struct ovs_rwlock netdev_class_rwlock OVS_ACQ_BEFORE(netdev_mutex)
> > -    = OVS_RWLOCK_INITIALIZER;
> > + * This is a recursive mutex to allow recursive acquisition when calling
> > into
> > + * providers.  For example, netdev_run() calls into provider 'run'
> > functions,
> > + * which might reasonably want to call one of the netdev functions that
> > takes
> > + * netdev_class_mutex. */
> > +static struct ovs_mutex netdev_class_mutex OVS_ACQ_BEFORE(netdev_mutex);
> >
> >  /* Contains 'struct netdev_registered_class'es. */
> > -static struct hmap netdev_classes OVS_GUARDED_BY(netdev_class_rwlock)
> > +static struct hmap netdev_classes OVS_GUARDED_BY(netdev_class_mutex)
> >      = HMAP_INITIALIZER(&netdev_classes);
> >
> >  struct netdev_registered_class {
> > @@ -93,11 +92,13 @@ void update_device_args(struct netdev *, const struct
> > shash *args);
> >
> >  static void
> >  netdev_initialize(void)
> > -    OVS_EXCLUDED(netdev_class_rwlock, netdev_mutex)
> > +    OVS_EXCLUDED(netdev_class_mutex, netdev_mutex)
> >  {
> >      static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
> >
> >      if (ovsthread_once_start(&once)) {
> > +        ovs_mutex_init_recursive(&netdev_class_mutex);
> > +
> >          fatal_signal_add_hook(restore_all_flags, NULL, NULL, true);
> >          netdev_vport_patch_register();
> >
> > @@ -122,17 +123,17 @@ netdev_initialize(void)
> >   * main poll loop. */
> >  void
> >  netdev_run(void)
> > -    OVS_EXCLUDED(netdev_class_rwlock, netdev_mutex)
> > +    OVS_EXCLUDED(netdev_class_mutex, netdev_mutex)
> >  {
> >      struct netdev_registered_class *rc;
> >
> > -    ovs_rwlock_rdlock(&netdev_class_rwlock);
> > +    ovs_mutex_lock(&netdev_class_mutex);
> >      HMAP_FOR_EACH (rc, hmap_node, &netdev_classes) {
> >          if (rc->class->run) {
> >              rc->class->run();
> >          }
> >      }
> > -    ovs_rwlock_unlock(&netdev_class_rwlock);
> > +    ovs_mutex_unlock(&netdev_class_mutex);
> >  }
> >
> >  /* Arranges for poll_block() to wake up when netdev_run() needs to be
> > called.
> > @@ -141,22 +142,22 @@ netdev_run(void)
> >   * main poll loop. */
> >  void
> >  netdev_wait(void)
> > -    OVS_EXCLUDED(netdev_class_rwlock, netdev_mutex)
> > +    OVS_EXCLUDED(netdev_class_mutex, netdev_mutex)
> >  {
> >      struct netdev_registered_class *rc;
> >
> > -    ovs_rwlock_rdlock(&netdev_class_rwlock);
> > +    ovs_mutex_lock(&netdev_class_mutex);
> >      HMAP_FOR_EACH (rc, hmap_node, &netdev_classes) {
> >          if (rc->class->wait) {
> >              rc->class->wait();
> >          }
> >      }
> > -    ovs_rwlock_unlock(&netdev_class_rwlock);
> > +    ovs_mutex_unlock(&netdev_class_mutex);
> >  }
> >
> >  static struct netdev_registered_class *
> >  netdev_lookup_class(const char *type)
> > -    OVS_REQ_RDLOCK(netdev_class_rwlock)
> > +    OVS_REQ_RDLOCK(netdev_class_mutex)
> >  {
> >      struct netdev_registered_class *rc;
> >
> > @@ -173,11 +174,11 @@ netdev_lookup_class(const char *type)
> >   * registration, new netdevs of that type can be opened using
> > netdev_open(). */
> >  int
> >  netdev_register_provider(const struct netdev_class *new_class)
> > -    OVS_EXCLUDED(netdev_class_rwlock, netdev_mutex)
> > +    OVS_EXCLUDED(netdev_class_mutex, netdev_mutex)
> >  {
> >      int error;
> >
> > -    ovs_rwlock_wrlock(&netdev_class_rwlock);
> > +    ovs_mutex_lock(&netdev_class_mutex);
> >      if (netdev_lookup_class(new_class->type)) {
> >          VLOG_WARN("attempted to register duplicate netdev provider: %s",
> >                     new_class->type);
> > @@ -197,7 +198,7 @@ netdev_register_provider(const struct netdev_class
> > *new_class)
> >                       new_class->type, ovs_strerror(error));
> >          }
> >      }
> > -    ovs_rwlock_unlock(&netdev_class_rwlock);
> > +    ovs_mutex_unlock(&netdev_class_mutex);
> >
> >      return error;
> >  }
> > @@ -207,12 +208,12 @@ netdev_register_provider(const struct netdev_class
> > *new_class)
> >   * new netdevs of that type cannot be opened using netdev_open(). */
> >  int
> >  netdev_unregister_provider(const char *type)
> > -    OVS_EXCLUDED(netdev_class_rwlock, netdev_mutex)
> > +    OVS_EXCLUDED(netdev_class_mutex, netdev_mutex)
> >  {
> >      struct netdev_registered_class *rc;
> >      int error;
> >
> > -    ovs_rwlock_wrlock(&netdev_class_rwlock);
> > +    ovs_mutex_lock(&netdev_class_mutex);
> >      rc = netdev_lookup_class(type);
> >      if (!rc) {
> >          VLOG_WARN("attempted to unregister a netdev provider that is not "
> > @@ -233,7 +234,7 @@ netdev_unregister_provider(const char *type)
> >              error = EBUSY;
> >          }
> >      }
> > -    ovs_rwlock_unlock(&netdev_class_rwlock);
> > +    ovs_mutex_unlock(&netdev_class_mutex);
> >
> >      return error;
> >  }
> > @@ -249,11 +250,11 @@ netdev_enumerate_types(struct sset *types)
> >      netdev_initialize();
> >      sset_clear(types);
> >
> > -    ovs_rwlock_rdlock(&netdev_class_rwlock);
> > +    ovs_mutex_lock(&netdev_class_mutex);
> >      HMAP_FOR_EACH (rc, hmap_node, &netdev_classes) {
> >          sset_add(types, rc->class->type);
> >      }
> > -    ovs_rwlock_unlock(&netdev_class_rwlock);
> > +    ovs_mutex_unlock(&netdev_class_mutex);
> >  }
> >
> >  /* Check that the network device name is not the same as any of the
> > registered
> > @@ -269,15 +270,15 @@ netdev_is_reserved_name(const char *name)
> >
> >      netdev_initialize();
> >
> > -    ovs_rwlock_rdlock(&netdev_class_rwlock);
> > +    ovs_mutex_lock(&netdev_class_mutex);
> >      HMAP_FOR_EACH (rc, hmap_node, &netdev_classes) {
> >          const char *dpif_port =
> > netdev_vport_class_get_dpif_port(rc->class);
> >          if (dpif_port && !strcmp(dpif_port, name)) {
> > -            ovs_rwlock_unlock(&netdev_class_rwlock);
> > +            ovs_mutex_unlock(&netdev_class_mutex);
> >              return true;
> >          }
> >      }
> > -    ovs_rwlock_unlock(&netdev_class_rwlock);
> > +    ovs_mutex_unlock(&netdev_class_mutex);
> >
> >      if (!strncmp(name, "ovs-", 4)) {
> >          struct sset types;
> > @@ -313,7 +314,7 @@ netdev_open(const char *name, const char *type, struct
> > netdev **netdevp)
> >
> >      netdev_initialize();
> >
> > -    ovs_rwlock_rdlock(&netdev_class_rwlock);
> > +    ovs_mutex_lock(&netdev_class_mutex);
> >      ovs_mutex_lock(&netdev_mutex);
> >      netdev = shash_find_data(&netdev_shash, name);
> >      if (!netdev) {
> > @@ -354,7 +355,7 @@ netdev_open(const char *name, const char *type, struct
> > netdev **netdevp)
> >      }
> >
> >      ovs_mutex_unlock(&netdev_mutex);
> > -    ovs_rwlock_unlock(&netdev_class_rwlock);
> > +    ovs_mutex_unlock(&netdev_class_mutex);
> >
> >      if (!error) {
> >          netdev->ref_cnt++;
> > @@ -460,11 +461,11 @@ netdev_unref(struct netdev *dev)
> >          dev->netdev_class->dealloc(dev);
> >          ovs_mutex_unlock(&netdev_mutex);
> >
> > -        ovs_rwlock_rdlock(&netdev_class_rwlock);
> > +        ovs_mutex_lock(&netdev_class_mutex);
> >          rc = netdev_lookup_class(class->type);
> >          atomic_sub(&rc->ref_cnt, 1, &old_ref_cnt);
> >          ovs_assert(old_ref_cnt > 0);
> > -        ovs_rwlock_unlock(&netdev_class_rwlock);
> > +        ovs_mutex_unlock(&netdev_class_mutex);
> >      } else {
> >          ovs_mutex_unlock(&netdev_mutex);
> >      }
> > --
> > 1.7.10.4
> >
> > _______________________________________________
> > dev mailing list
> > dev@openvswitch.org
> > http://openvswitch.org/mailman/listinfo/dev
> >
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to