Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp4253994imm; Mon, 11 Jun 2018 09:17:49 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKzk2RFpXZ4d7K688uC8qOz+kEKCozIkX+LoNZTOi7nIP+3v5OEnTl9eypOEiS6I2UFpZpx X-Received: by 2002:a17:902:8306:: with SMTP id bd6-v6mr19512772plb.120.1528733869383; Mon, 11 Jun 2018 09:17:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528733869; cv=none; d=google.com; s=arc-20160816; b=eAHFbbqNvRlRIWdm9mVfoetcr+Y1MCl3yg6Gr0lbv9njPjyj2nuhUTXdKOJKJ0f6fM bFIWapNf6mA8w+y3pjN9KqPiVv3GRtrqAjwWyaAxs0jqg4VJe8+tQ1l6EC6cew8u3cR8 ogXO50Jo9jCF01WEsRbjTkacpXOwazFSq1mRKquq3mJcz2U82ts3tnPAWVh/n+A8V2+4 UiBkb5EUV5lRSPXUCsRJlZNzaksyzn/+zTTzXlqyEhoPbGp1dEfAk0V0nljdXCFitTsi O0ML0F0Vs3GGrNHzPWkebhGRmU1gCfsl6gUdrUehOJTB4zUvagUHX/GMKqU1BvVM8NdE WYEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=/OXuoNN01nhzSTU6HgfbvZIzFPLZd+W81a8DkuntQPA=; b=CIM1uI+kO8dXVM+YATKrqgGcFybwEJSRp8CHVLn7BQQr7Y5scB/vqodsFXC7wB5uTL f6o19PdyzrUeVBzJVPGj1r/PkJZzxQqjZQtqRa3K8NYLbC+7uYCarnZNRC1/1SUvpR45 zuzwH9QAS6LVGXs9TKfbMZoahmzOkGZ/fpysoHH4DVPrPHDNG9uCYBkShk2qGJFtSDk5 S7pO8EVprLHCNIozdL/GXp0HfItkFpmq5K89Jk7+wRxmGz2+F/W+8UtRGJxQegRlUMs5 dfVrhDVFj5aiyTgSBFlACOSdtWuhcEtMcK+DeXm/d0MWtMzEkJpQvlkeBJI7SRjEXSGH HKaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=fhCmjc0s; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b26-v6si34912492pgw.394.2018.06.11.09.17.35; Mon, 11 Jun 2018 09:17:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=fhCmjc0s; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934309AbeFKOUg (ORCPT + 99 others); Mon, 11 Jun 2018 10:20:36 -0400 Received: from bombadil.infradead.org ([198.137.202.133]:45006 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933475AbeFKOGq (ORCPT ); Mon, 11 Jun 2018 10:06:46 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=References:In-Reply-To:Message-Id: Date:Subject:Cc:To:From:Sender:Reply-To:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=/OXuoNN01nhzSTU6HgfbvZIzFPLZd+W81a8DkuntQPA=; b=fhCmjc0sb8KAhLmuFlr1+POvw Jq1LGFUkBThFZymX5NjKJX/mXAMHpuFoYgS8xF5DFQ4OrZmlNn0jqUtO9Ods9r30jjCEac+mG4t1z yUBrTHIwOAgx/INY0KSV2hbKREWkgC6d/7yqu96pH9w6g5Jt49qc14XS36+XIhgyGu2xIIchow4Qz BW+5ahtfcg5tlK9MAQGV/if7x7G36MRXucUdzi4Pm433ZfNWXB4GQKDK6tpaRa9b9WLE/4eNwotsQ WYJU0V3ymjWi/vygICy/VM7sHmuyl6AEEOhdn+hgIPLQrknYf6RUcBi7t2+U9uZR7FAYMk0lGCpt0 sOmyZdAcQ==; Received: from willy by bombadil.infradead.org with local (Exim 4.90_1 #2 (Red Hat Linux)) id 1fSNT3-0004bh-Vi; Mon, 11 Jun 2018 14:06:45 +0000 From: Matthew Wilcox To: linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Matthew Wilcox , Jan Kara , Jeff Layton , Lukas Czerner , Ross Zwisler , Christoph Hellwig , Goldwyn Rodrigues , Nicholas Piggin , Ryusuke Konishi , linux-nilfs@vger.kernel.org, Jaegeuk Kim , Chao Yu , linux-f2fs-devel@lists.sourceforge.net Subject: [PATCH v13 16/72] xarray: Add xas_for_each_conflict Date: Mon, 11 Jun 2018 07:05:43 -0700 Message-Id: <20180611140639.17215-17-willy@infradead.org> X-Mailer: git-send-email 2.14.3 In-Reply-To: <20180611140639.17215-1-willy@infradead.org> References: <20180611140639.17215-1-willy@infradead.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Matthew Wilcox This iterator iterates over each entry that is stored in the index or indices specified by the xa_state. This is intended for use for a conditional store of a multiindex entry, or to allow entries which are about to be removed from the xarray to be disposed of properly. Signed-off-by: Matthew Wilcox --- include/linux/xarray.h | 17 +++++++ lib/xarray.c | 61 +++++++++++++++++++++++++ tools/testing/radix-tree/xarray-test.c | 63 ++++++++++++++++++++++++++ 3 files changed, 141 insertions(+) diff --git a/include/linux/xarray.h b/include/linux/xarray.h index dd941454bb5b..6a61aab11038 100644 --- a/include/linux/xarray.h +++ b/include/linux/xarray.h @@ -750,6 +750,7 @@ static inline bool xas_retry(struct xa_state *xas, const void *entry) void *xas_load(struct xa_state *); void *xas_store(struct xa_state *, void *entry); void *xas_find(struct xa_state *, unsigned long max); +void *xas_next_conflict(struct xa_state *); bool xas_get_tag(const struct xa_state *, xa_tag_t); void xas_set_tag(const struct xa_state *, xa_tag_t); @@ -964,6 +965,22 @@ enum { for (entry = xas_find_tagged(xas, max, tag); entry; \ entry = xas_next_tagged(xas, max, tag)) +/** + * xas_for_each_conflict() - Iterate over a range of an XArray. + * @xas: XArray operation state. + * @entry: Entry retrieved from the array. + * + * The loop body will be executed for each entry in the XArray that lies + * within the range specified by @xas. If the loop completes successfully, + * any entries that lie in this range will be replaced by @entry. The caller + * may break out of the loop; if they do so, the contents of the XArray will + * be unchanged. The operation may fail due to an out of memory condition. + * The caller may also call xa_set_err() to exit the loop while setting an + * error to record the reason. + */ +#define xas_for_each_conflict(xas, entry) \ + while ((entry = xas_next_conflict(xas))) + void *__xas_next(struct xa_state *); void *__xas_prev(struct xa_state *); diff --git a/lib/xarray.c b/lib/xarray.c index 3b2c2f2240bf..d76db0ff17cf 100644 --- a/lib/xarray.c +++ b/lib/xarray.c @@ -1100,6 +1100,67 @@ void *xas_find_tagged(struct xa_state *xas, unsigned long max, xa_tag_t tag) } EXPORT_SYMBOL_GPL(xas_find_tagged); +/** + * xas_next_conflict() - Step for xas_for_each_conflict(). + * @xas: XArray operation state. + * + * This function does the work for xas_for_each_conflict(). + * + * Context: Any context. Expects xa_lock to be held. + * Return: The next entry in the range covered by @xas or %NULL. + */ +void *xas_next_conflict(struct xa_state *xas) +{ + void *curr; + + if (xas_error(xas)) + return NULL; + + if (!xas->xa_node) + return NULL; + + if (xas_top(xas->xa_node)) { + curr = xas_start(xas); + if (!curr) + return NULL; + while (xa_is_node(curr)) { + struct xa_node *node = xa_to_node(curr); + curr = xas_descend(xas, node); + } + if (curr) + return curr; + } + + if (xas->xa_node->shift > xas->xa_shift) + return NULL; + + for (;;) { + if (xas->xa_node->shift == xas->xa_shift) { + if ((xas->xa_offset & xas->xa_sibs) == xas->xa_sibs) + break; + } else if (xas->xa_offset == XA_CHUNK_MASK) { + xas->xa_offset = xas->xa_node->offset; + xas->xa_node = xas->xa_node->parent; + if (!xas->xa_node) + break; + continue; + } + curr = xa_entry_locked(xas->xa, xas->xa_node, ++xas->xa_offset); + if (xa_is_sibling(curr)) + continue; + while (xa_is_node(curr)) { + xas->xa_node = xa_to_node(curr); + xas->xa_offset = 0; + curr = xa_entry_locked(xas->xa, xas->xa_node, 0); + } + if (curr) + return curr; + } + xas->xa_offset -= xas->xa_sibs; + return NULL; +} +EXPORT_SYMBOL_GPL(xas_next_conflict); + /** * xa_init_flags() - Initialise an empty XArray with flags. * @xa: XArray. diff --git a/tools/testing/radix-tree/xarray-test.c b/tools/testing/radix-tree/xarray-test.c index eeafbf8c948c..296ace77c4f4 100644 --- a/tools/testing/radix-tree/xarray-test.c +++ b/tools/testing/radix-tree/xarray-test.c @@ -315,6 +315,68 @@ void check_multi_store(struct xarray *xa) BUG_ON(!xa_empty(xa)); } +void __check_store_iter(struct xarray *xa, unsigned long start, + unsigned int order, unsigned int present) +{ + XA_STATE_ORDER(xas, xa, start, order); + void *entry; + unsigned int count = 0; + +retry: + xas_for_each_conflict(&xas, entry) { + BUG_ON(!xa_is_value(entry)); + BUG_ON(entry < xa_mk_value(start)); + BUG_ON(entry > xa_mk_value(start + (1UL << order) - 1)); + count++; + } + xas_store(&xas, xa_mk_value(start)); + if (xas_nomem(&xas, GFP_KERNEL)) { + count = 0; + goto retry; + } + BUG_ON(xas_error(&xas)); + BUG_ON(count != present); + BUG_ON(xa_load(xa, start) != xa_mk_value(start)); + BUG_ON(xa_load(xa, start + (1UL << order) - 1) != xa_mk_value(start)); + xa_store(xa, start, NULL, 0); +} + +void check_store_iter(struct xarray *xa) +{ + unsigned int i, j; + + for (i = 0; i < 20; i++) { + unsigned int min = 1 << i; + unsigned int max = (2 << i) - 1; + __check_store_iter(xa, 0, i, 0); + BUG_ON(!xa_empty(xa)); + __check_store_iter(xa, min, i, 0); + BUG_ON(!xa_empty(xa)); + + xa_store(xa, min, xa_mk_value(min), GFP_KERNEL); + __check_store_iter(xa, min, i, 1); + BUG_ON(!xa_empty(xa)); + xa_store(xa, max, xa_mk_value(max), GFP_KERNEL); + __check_store_iter(xa, min, i, 1); + BUG_ON(!xa_empty(xa)); + + for (j = 0; j < min; j++) + xa_store(xa, j, xa_mk_value(j), GFP_KERNEL); + __check_store_iter(xa, 0, i, min); + BUG_ON(!xa_empty(xa)); + for (j = 0; j < min; j++) + xa_store(xa, min + j, xa_mk_value(min + j), GFP_KERNEL); + __check_store_iter(xa, min, i, min); + BUG_ON(!xa_empty(xa)); + } + xa_store(xa, 63, xa_mk_value(63), GFP_KERNEL); + xa_store(xa, 65, xa_mk_value(65), GFP_KERNEL); + __check_store_iter(xa, 64, 2, 1); + BUG_ON(xa_load(xa, 63) != xa_mk_value(63)); + xa_store(xa, 63, NULL, 0); + BUG_ON(!xa_empty(xa)); +} + void check_multi_find(struct xarray *xa) { unsigned long index; @@ -537,6 +599,7 @@ void xarray_checks(void) check_cmpxchg(&array); check_multi_store(&array); item_kill_tree(&array); + check_store_iter(&array); check_find(&array); check_xas_delete(&array); -- 2.17.1