Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1731949imm; Tue, 10 Jul 2018 07:03:33 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdb4OXPcxAbrNjjyCFTiBn1kQ6sURWweZwW9B2fROG1xxeBBx0agQvLYyuz6WXTGUOe+VhL X-Received: by 2002:a63:b349:: with SMTP id x9-v6mr22856261pgt.337.1531231413601; Tue, 10 Jul 2018 07:03:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531231413; cv=none; d=google.com; s=arc-20160816; b=J7PMyUxurAi9M9nLkQjC4Rh8BcziA7zd+ZWz0Ll/zqfh8N3/lMfK4CMSL5FHENirTD sLXWqr3SUJIuAlhA8KvsVwmKJzN8JbfZN37UUEd9iVhWQsUeILNH/e5yA+RwFLbgTDaB FmQvCiaGJ2VG5OoZ1QSAEhQQ7ekgqlOT8egk9z6r9B0bpkOmG5NYJ++hE2ssdPOoihs0 lFPv/CaTT9x+ZPgX7iUZX2n4GbUwGh1uVOSUYfPzoatTjTT9OYKxeJVmkGNiiMiHCYdh lMHUmd9/wf7x8xyrsqoU/JA4vPPpk/8LQD0gQC0z96ryAT2P9bkyUHpJYvqyV+HsyeoC o76A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=a3DDYlYfuTo35IaUpudQVJhFhziDBB5tePmLJF2swIA=; b=tpjda8Id9o4Zu6AY+yF0KrgP/9lAqdqf0cOAsqIjXtvk2u0jlDBuz2HeNKRQYqO+aL ulstvqsRLUF7FStKHJhEXAazaNgDNJR9t7LQpkNm6irHi1WwnL+ANnDFoFI8zxWbpAGM ffzdZ/bm6p/V4qbFk3FtDEfe7HaugwUL+MJ7YYOsjEN6bmsqiuMC83vRtazjfHBEQl+x WFGGmwUtrYKLaruniaUHryc14gGpftIj4nK2PlV7X/TUotQC/dqjxn+Cz3VAM2Srp8wd PRNFCL/BKIyP0OMgqHFxmBCO1KPgAmDDd48S/9U0CdDaP7A43NWmodqdGyF1933huqCa ebpw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kArPiVey; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m2-v6si18400643pfi.351.2018.07.10.07.03.17; Tue, 10 Jul 2018 07:03:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kArPiVey; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933589AbeGJOBe (ORCPT + 99 others); Tue, 10 Jul 2018 10:01:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:34096 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933248AbeGJOBc (ORCPT ); Tue, 10 Jul 2018 10:01:32 -0400 Received: from tleilax.poochiereds.net (cpe-71-70-156-158.nc.res.rr.com [71.70.156.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6CA8D208E5; Tue, 10 Jul 2018 14:01:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1531231292; bh=rTBPS2lTBV4tvGy1bAXhJwa9kjE2MD8nXDGQjALKBFQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kArPiVeyLFR9Ai1JHx8cjeNeFfo+Lc0B5XJBttsPV2D37k3niaPTFCnz/IRUGouhj OVvKZ3GNwCOL1Y2AchFNMniIk5RGGd/MvpKyTi5F3APjPC672fasneo4dOappGyvg6 ENIhWxZepsNHe33aaqtZHDoAhEEe3ONMpZvcs9FE= From: Jeff Layton To: viro@ZenIV.linux.org.uk, dhowells@redhat.com Cc: willy@infradead.org, andres@anarazel.de, cmaiolino@redhat.com, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: [PATCH v2 2/4] errseq: add a new errseq_scrape function Date: Tue, 10 Jul 2018 10:01:25 -0400 Message-Id: <20180710140127.20739-3-jlayton@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180710140127.20739-1-jlayton@kernel.org> References: <20180710140127.20739-1-jlayton@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jeff Layton To grab the current value of an errseq_t, mark it as seen and then return the value with the seen bit masked off. Signed-off-by: Jeff Layton --- include/linux/errseq.h | 1 + lib/errseq.c | 33 +++++++++++++++++++++++++++++++-- 2 files changed, 32 insertions(+), 2 deletions(-) diff --git a/include/linux/errseq.h b/include/linux/errseq.h index fc2777770768..de165623fa86 100644 --- a/include/linux/errseq.h +++ b/include/linux/errseq.h @@ -9,6 +9,7 @@ typedef u32 errseq_t; errseq_t errseq_set(errseq_t *eseq, int err); errseq_t errseq_sample(errseq_t *eseq); +errseq_t errseq_scrape(errseq_t *eseq); int errseq_check(errseq_t *eseq, errseq_t since); int errseq_check_and_advance(errseq_t *eseq, errseq_t *since); #endif diff --git a/lib/errseq.c b/lib/errseq.c index 81f9e33aa7e7..8ded0920eed3 100644 --- a/lib/errseq.c +++ b/lib/errseq.c @@ -108,7 +108,7 @@ errseq_t errseq_set(errseq_t *eseq, int err) EXPORT_SYMBOL(errseq_set); /** - * errseq_sample() - Grab current errseq_t value. + * errseq_sample() - Grab current errseq_t value (or 0 if it hasn't been seen) * @eseq: Pointer to errseq_t to be sampled. * * This function allows callers to initialise their errseq_t variable. @@ -117,7 +117,7 @@ EXPORT_SYMBOL(errseq_set); * see it the next time it checks for an error. * * Context: Any context. - * Return: The current errseq value. + * Return: The current errseq value or 0 if it wasn't previously seen */ errseq_t errseq_sample(errseq_t *eseq) { @@ -130,6 +130,35 @@ errseq_t errseq_sample(errseq_t *eseq) } EXPORT_SYMBOL(errseq_sample); +/** + * errseq_scrape() - Grab current errseq_t value + * @eseq: Pointer to errseq_t to be sampled. + * + * This function allows callers to scrape the current value of an errseq_t. + * Unlike errseq_sample, this will always return the current value with + * the SEEN flag unset, even when the value has not yet been seen. + * + * Context: Any context. + * Return: The current errseq value with ERRSEQ_SEEN masked off + */ +errseq_t errseq_scrape(errseq_t *eseq) +{ + errseq_t old = READ_ONCE(*eseq); + + /* + * For the common case of no errors ever having been set, we can skip + * marking the SEEN bit. Once an error has been set, the value will + * never go back to zero. + */ + if (old != 0) { + errseq_t new = old | ERRSEQ_SEEN; + if (old != new) + cmpxchg(eseq, old, new); + } + return old & ~ERRSEQ_SEEN; +} +EXPORT_SYMBOL(errseq_scrape); + /** * errseq_check() - Has an error occurred since a particular sample point? * @eseq: Pointer to errseq_t value to be checked. -- 2.17.1