Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp182551imm; Thu, 31 May 2018 21:51:49 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKcRdf7ly7QbXxE/zbqruJxfM3tHRACwzsUcEIi6IrZS+9KATthWIN51sf6khwbl8hYNQ6U X-Received: by 2002:a63:9611:: with SMTP id c17-v6mr4397206pge.361.1527828709369; Thu, 31 May 2018 21:51:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527828709; cv=none; d=google.com; s=arc-20160816; b=vRskiutfwo/XD4GT5MqYoiZsmh+8QZzTIsaXWPAUf9mySi+fbYK8MI9vBk586YxuHL /1dK4/NxTO1LX3zv6DzB+KfjLddb2wr9cbxf4+ZM6twD2ScqaulHNVH9bBe4Ybcphsga xOmuXr+uZ/Kvaqm9n0DJ2MdrpaISrsz2DsFSgvx6HmO418RT46b4zQoQmVlURyay0Mp7 dIm6z2sIOzeW180nKbKRdn7vYXRvM9VD2nx8Ttlp7mbD/m5aaPDg/slI7vQbHZTyBepP 9rRVEly+lJ80sodBumjo4aRcns79dvh3mvgQVZBKL9oqpKvKjogP4QwdcpU0SdCPwCqx fbIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:cc:subject:date:to :from:arc-authentication-results; bh=FrMSSHal/eV4XO0d72/LMaqmievhrKgg7VNLQfoKDj0=; b=XGHxDaM5QxRjVcUwqqIE4t3fEch4j9IA8KfLyXl5pQRCZljxv3pDC269RASZLIf2pc ANSjT0DGzp243QShdg9jnJUW7BZHw6xPgnnSUHfyNFyM8VnAutnqrZN69mgBIg0eSVCE V1KyqjsdmKnS8+By+tBZLyliU5vwZzDW3Y+n6rP4ADEC8ApOxVrsWOx9jYACht2A2OTT wCF1Hj6L5886blOu9jbhMmhaRe23PPadx4MBwtMHuRt7t7cI+eMoYD07C9lKuTMqpmYV DDqXtkJGEPMSh6mvaYAmCOedQWTenPuMxM6ukXzLRLq7Lws9df2FGx17Zo0KIhlj7Ulh pZUg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x63-v6si38828845pfi.162.2018.05.31.21.51.05; Thu, 31 May 2018 21:51:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751525AbeFAEp7 (ORCPT + 99 others); Fri, 1 Jun 2018 00:45:59 -0400 Received: from mx2.suse.de ([195.135.220.15]:34073 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751441AbeFAEpz (ORCPT ); Fri, 1 Jun 2018 00:45:55 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext-too.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 08DB5AD02; Fri, 1 Jun 2018 04:45:54 +0000 (UTC) From: NeilBrown To: Thomas Graf , Herbert Xu Date: Fri, 01 Jun 2018 14:44:09 +1000 Subject: [PATCH 08/18] rhashtable: clean up dereference of ->future_tbl. Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org Message-ID: <152782824957.30340.14092720576731091742.stgit@noble> In-Reply-To: <152782754287.30340.4395718227884933670.stgit@noble> References: <152782754287.30340.4395718227884933670.stgit@noble> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Using rht_dereference_bucket() to dereference ->future_tbl looks like a type error, and could be confusing. Using rht_dereference_rcu() to test a pointer for NULL adds an unnecessary barrier - rcu_access_pointer() is preferred for NULL tests when no lock is held. This uses 3 different ways to access ->future_tbl. - if we know the mutex is held, use rht_dereference() - if we don't hold the mutex, and are only testing for NULL, use rcu_access_pointer() - otherwise (using RCU protection for true dereference), use rht_dereference_rcu(). Note that this includes a simplification of the call to rhashtable_last_table() - we don't do an extra dereference before the call any more. Signed-off-by: NeilBrown --- include/linux/rhashtable.h | 2 +- lib/rhashtable.c | 9 ++++----- 2 files changed, 5 insertions(+), 6 deletions(-) diff --git a/include/linux/rhashtable.h b/include/linux/rhashtable.h index 49f80506d02e..10435a77b156 100644 --- a/include/linux/rhashtable.h +++ b/include/linux/rhashtable.h @@ -605,7 +605,7 @@ static inline void *__rhashtable_insert_fast( lock = rht_bucket_lock(tbl, hash); spin_lock_bh(lock); - if (unlikely(rht_dereference_bucket(tbl->future_tbl, tbl, hash))) { + if (unlikely(rcu_access_pointer(tbl->future_tbl))) { slow_path: spin_unlock_bh(lock); rcu_read_unlock(); diff --git a/lib/rhashtable.c b/lib/rhashtable.c index b5d17bce19ff..1737fbd049da 100644 --- a/lib/rhashtable.c +++ b/lib/rhashtable.c @@ -226,8 +226,7 @@ static struct bucket_table *rhashtable_last_table(struct rhashtable *ht, static int rhashtable_rehash_one(struct rhashtable *ht, unsigned int old_hash) { struct bucket_table *old_tbl = rht_dereference(ht->tbl, ht); - struct bucket_table *new_tbl = rhashtable_last_table(ht, - rht_dereference_rcu(old_tbl->future_tbl, ht)); + struct bucket_table *new_tbl = rhashtable_last_table(ht, old_tbl); struct rhash_head __rcu **pprev = rht_bucket_var(old_tbl, old_hash); int err = -EAGAIN; struct rhash_head *head, *next, *entry; @@ -467,7 +466,7 @@ static int rhashtable_insert_rehash(struct rhashtable *ht, fail: /* Do not fail the insert if someone else did a rehash. */ - if (likely(rcu_dereference_raw(tbl->future_tbl))) + if (likely(rcu_access_pointer(tbl->future_tbl))) return 0; /* Schedule async rehash to retry allocation in process context. */ @@ -540,7 +539,7 @@ static struct bucket_table *rhashtable_insert_one(struct rhashtable *ht, if (PTR_ERR(data) != -EAGAIN && PTR_ERR(data) != -ENOENT) return ERR_CAST(data); - new_tbl = rcu_dereference(tbl->future_tbl); + new_tbl = rht_dereference_rcu(tbl->future_tbl, ht); if (new_tbl) return new_tbl; @@ -599,7 +598,7 @@ static void *rhashtable_try_insert(struct rhashtable *ht, const void *key, break; spin_unlock_bh(lock); - tbl = rcu_dereference(tbl->future_tbl); + tbl = rht_dereference_rcu(tbl->future_tbl, ht); } data = rhashtable_lookup_one(ht, tbl, hash, key, obj);