2013-06-24 11:05:10 -07:00
|
|
|
|
/*
|
2016-03-10 08:37:43 -08:00
|
|
|
|
* Copyright (c) 2013, 2014, 2015, 2016 Nicira, Inc.
|
2013-06-24 11:05:10 -07:00
|
|
|
|
*
|
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at:
|
|
|
|
|
*
|
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
#include "ovs-thread.h"
|
|
|
|
|
#include <errno.h>
|
2013-06-19 13:07:35 -07:00
|
|
|
|
#include <poll.h>
|
2014-05-23 14:15:28 -07:00
|
|
|
|
#ifndef _WIN32
|
|
|
|
|
#include <signal.h>
|
|
|
|
|
#endif
|
2013-06-19 13:07:35 -07:00
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <unistd.h>
|
2013-06-24 11:05:10 -07:00
|
|
|
|
#include "compiler.h"
|
2015-04-07 17:34:27 -07:00
|
|
|
|
#include "fatal-signal.h"
|
2013-12-23 14:04:13 -08:00
|
|
|
|
#include "hash.h"
|
2016-03-25 14:10:21 -07:00
|
|
|
|
#include "openvswitch/list.h"
|
2014-03-18 16:34:28 -07:00
|
|
|
|
#include "ovs-rcu.h"
|
2017-11-03 13:53:53 +08:00
|
|
|
|
#include "openvswitch/poll-loop.h"
|
2014-05-29 15:37:37 -07:00
|
|
|
|
#include "seq.h"
|
2013-06-19 13:07:35 -07:00
|
|
|
|
#include "socket-util.h"
|
2022-12-19 19:29:06 +01:00
|
|
|
|
#include "timeval.h"
|
2013-06-24 11:05:10 -07:00
|
|
|
|
#include "util.h"
|
|
|
|
|
|
|
|
|
|
#ifdef __CHECKER__
|
|
|
|
|
/* Omit the definitions in this file because they are somewhat difficult to
|
|
|
|
|
* write without prompting "sparse" complaints, without ugliness or
|
|
|
|
|
* cut-and-paste. Since "sparse" is just a checker, not a compiler, it
|
|
|
|
|
* doesn't matter that we don't define them. */
|
|
|
|
|
#else
|
2014-12-15 14:10:38 +01:00
|
|
|
|
#include "openvswitch/vlog.h"
|
2013-06-19 13:07:35 -07:00
|
|
|
|
|
|
|
|
|
VLOG_DEFINE_THIS_MODULE(ovs_thread);
|
|
|
|
|
|
|
|
|
|
/* If there is a reason that we cannot fork anymore (unless the fork will be
|
|
|
|
|
* immediately followed by an exec), then this points to a string that
|
|
|
|
|
* explains why. */
|
|
|
|
|
static const char *must_not_fork;
|
|
|
|
|
|
|
|
|
|
/* True if we created any threads beyond the main initial thread. */
|
|
|
|
|
static bool multithreaded;
|
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
#define LOCK_FUNCTION(TYPE, FUN) \
|
|
|
|
|
void \
|
|
|
|
|
ovs_##TYPE##_##FUN##_at(const struct ovs_##TYPE *l_, \
|
|
|
|
|
const char *where) \
|
2013-08-21 11:24:49 -07:00
|
|
|
|
OVS_NO_THREAD_SAFETY_ANALYSIS \
|
2013-07-30 15:31:48 -07:00
|
|
|
|
{ \
|
|
|
|
|
struct ovs_##TYPE *l = CONST_CAST(struct ovs_##TYPE *, l_); \
|
2014-04-24 16:49:05 -07:00
|
|
|
|
int error; \
|
|
|
|
|
\
|
|
|
|
|
/* Verify that 'l' was initialized. */ \
|
2014-05-08 09:20:09 -07:00
|
|
|
|
if (OVS_UNLIKELY(!l->where)) { \
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("%s: %s() passed uninitialized ovs_"#TYPE, \
|
|
|
|
|
where, __func__); \
|
2014-05-08 09:20:09 -07:00
|
|
|
|
} \
|
2014-04-24 16:49:05 -07:00
|
|
|
|
\
|
|
|
|
|
error = pthread_##TYPE##_##FUN(&l->lock); \
|
2013-07-30 15:31:48 -07:00
|
|
|
|
if (OVS_UNLIKELY(error)) { \
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("%s: pthread_%s_%s failed: %s", where, #TYPE, #FUN, \
|
|
|
|
|
ovs_strerror(error)); \
|
2013-07-30 15:31:48 -07:00
|
|
|
|
} \
|
|
|
|
|
l->where = where; \
|
2014-04-24 16:49:05 -07:00
|
|
|
|
}
|
2013-07-30 15:31:48 -07:00
|
|
|
|
LOCK_FUNCTION(mutex, lock);
|
|
|
|
|
LOCK_FUNCTION(rwlock, rdlock);
|
|
|
|
|
LOCK_FUNCTION(rwlock, wrlock);
|
2019-07-17 13:23:33 -07:00
|
|
|
|
#ifdef HAVE_PTHREAD_SPIN_LOCK
|
|
|
|
|
LOCK_FUNCTION(spin, lock);
|
|
|
|
|
#endif
|
2013-07-30 15:31:48 -07:00
|
|
|
|
|
|
|
|
|
#define TRY_LOCK_FUNCTION(TYPE, FUN) \
|
|
|
|
|
int \
|
|
|
|
|
ovs_##TYPE##_##FUN##_at(const struct ovs_##TYPE *l_, \
|
|
|
|
|
const char *where) \
|
2013-08-21 11:24:49 -07:00
|
|
|
|
OVS_NO_THREAD_SAFETY_ANALYSIS \
|
2013-07-30 15:31:48 -07:00
|
|
|
|
{ \
|
|
|
|
|
struct ovs_##TYPE *l = CONST_CAST(struct ovs_##TYPE *, l_); \
|
2014-04-24 16:49:05 -07:00
|
|
|
|
int error; \
|
|
|
|
|
\
|
|
|
|
|
/* Verify that 'l' was initialized. */ \
|
2014-05-08 09:20:09 -07:00
|
|
|
|
if (OVS_UNLIKELY(!l->where)) { \
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("%s: %s() passed uninitialized ovs_"#TYPE, \
|
|
|
|
|
where, __func__); \
|
2014-05-08 09:20:09 -07:00
|
|
|
|
} \
|
2014-04-24 16:49:05 -07:00
|
|
|
|
\
|
|
|
|
|
error = pthread_##TYPE##_##FUN(&l->lock); \
|
2013-07-30 15:31:48 -07:00
|
|
|
|
if (OVS_UNLIKELY(error) && error != EBUSY) { \
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("%s: pthread_%s_%s failed: %s", where, #TYPE, #FUN, \
|
|
|
|
|
ovs_strerror(error)); \
|
2013-07-30 15:31:48 -07:00
|
|
|
|
} \
|
|
|
|
|
if (!error) { \
|
|
|
|
|
l->where = where; \
|
|
|
|
|
} \
|
|
|
|
|
return error; \
|
|
|
|
|
}
|
|
|
|
|
TRY_LOCK_FUNCTION(mutex, trylock);
|
|
|
|
|
TRY_LOCK_FUNCTION(rwlock, tryrdlock);
|
|
|
|
|
TRY_LOCK_FUNCTION(rwlock, trywrlock);
|
2019-07-17 13:23:33 -07:00
|
|
|
|
#ifdef HAVE_PTHREAD_SPIN_LOCK
|
|
|
|
|
TRY_LOCK_FUNCTION(spin, trylock);
|
|
|
|
|
#endif
|
2013-07-30 15:31:48 -07:00
|
|
|
|
|
2014-04-24 16:49:05 -07:00
|
|
|
|
#define UNLOCK_FUNCTION(TYPE, FUN, WHERE) \
|
2013-07-30 15:31:48 -07:00
|
|
|
|
void \
|
|
|
|
|
ovs_##TYPE##_##FUN(const struct ovs_##TYPE *l_) \
|
2013-08-21 11:24:49 -07:00
|
|
|
|
OVS_NO_THREAD_SAFETY_ANALYSIS \
|
2013-07-30 15:31:48 -07:00
|
|
|
|
{ \
|
|
|
|
|
struct ovs_##TYPE *l = CONST_CAST(struct ovs_##TYPE *, l_); \
|
|
|
|
|
int error; \
|
2014-04-24 16:49:05 -07:00
|
|
|
|
\
|
|
|
|
|
/* Verify that 'l' was initialized. */ \
|
|
|
|
|
ovs_assert(l->where); \
|
|
|
|
|
\
|
|
|
|
|
l->where = WHERE; \
|
2013-07-30 15:31:48 -07:00
|
|
|
|
error = pthread_##TYPE##_##FUN(&l->lock); \
|
|
|
|
|
if (OVS_UNLIKELY(error)) { \
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("%s: pthread_%s_%s failed: %s", l->where, #TYPE, #FUN, \
|
|
|
|
|
ovs_strerror(error)); \
|
2013-07-30 15:31:48 -07:00
|
|
|
|
} \
|
|
|
|
|
}
|
2014-04-24 16:49:05 -07:00
|
|
|
|
UNLOCK_FUNCTION(mutex, unlock, "<unlocked>");
|
|
|
|
|
UNLOCK_FUNCTION(mutex, destroy, NULL);
|
|
|
|
|
UNLOCK_FUNCTION(rwlock, unlock, "<unlocked>");
|
|
|
|
|
UNLOCK_FUNCTION(rwlock, destroy, NULL);
|
2019-07-17 13:23:33 -07:00
|
|
|
|
#ifdef HAVE_PTHREAD_SPIN_LOCK
|
|
|
|
|
UNLOCK_FUNCTION(spin, unlock, "<unlocked>");
|
|
|
|
|
UNLOCK_FUNCTION(spin, destroy, NULL);
|
|
|
|
|
#endif
|
2013-07-30 15:31:48 -07:00
|
|
|
|
|
2013-06-24 11:05:10 -07:00
|
|
|
|
#define XPTHREAD_FUNC1(FUNCTION, PARAM1) \
|
|
|
|
|
void \
|
|
|
|
|
x##FUNCTION(PARAM1 arg1) \
|
|
|
|
|
{ \
|
|
|
|
|
int error = FUNCTION(arg1); \
|
|
|
|
|
if (OVS_UNLIKELY(error)) { \
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("%s failed: %s", #FUNCTION, \
|
|
|
|
|
ovs_strerror(error)); \
|
2013-06-24 11:05:10 -07:00
|
|
|
|
} \
|
|
|
|
|
}
|
|
|
|
|
#define XPTHREAD_FUNC2(FUNCTION, PARAM1, PARAM2) \
|
|
|
|
|
void \
|
|
|
|
|
x##FUNCTION(PARAM1 arg1, PARAM2 arg2) \
|
|
|
|
|
{ \
|
|
|
|
|
int error = FUNCTION(arg1, arg2); \
|
|
|
|
|
if (OVS_UNLIKELY(error)) { \
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("%s failed: %s", #FUNCTION, \
|
|
|
|
|
ovs_strerror(error)); \
|
2013-06-24 11:05:10 -07:00
|
|
|
|
} \
|
|
|
|
|
}
|
2014-03-04 13:15:41 -08:00
|
|
|
|
#define XPTHREAD_FUNC3(FUNCTION, PARAM1, PARAM2, PARAM3)\
|
|
|
|
|
void \
|
|
|
|
|
x##FUNCTION(PARAM1 arg1, PARAM2 arg2, PARAM3 arg3) \
|
|
|
|
|
{ \
|
|
|
|
|
int error = FUNCTION(arg1, arg2, arg3); \
|
|
|
|
|
if (OVS_UNLIKELY(error)) { \
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("%s failed: %s", #FUNCTION, \
|
|
|
|
|
ovs_strerror(error)); \
|
2014-03-04 13:15:41 -08:00
|
|
|
|
} \
|
|
|
|
|
}
|
2013-06-24 11:05:10 -07:00
|
|
|
|
|
2013-05-09 10:54:04 -07:00
|
|
|
|
XPTHREAD_FUNC1(pthread_mutexattr_init, pthread_mutexattr_t *);
|
|
|
|
|
XPTHREAD_FUNC1(pthread_mutexattr_destroy, pthread_mutexattr_t *);
|
|
|
|
|
XPTHREAD_FUNC2(pthread_mutexattr_settype, pthread_mutexattr_t *, int);
|
|
|
|
|
XPTHREAD_FUNC2(pthread_mutexattr_gettype, pthread_mutexattr_t *, int *);
|
|
|
|
|
|
2014-02-21 10:53:49 -08:00
|
|
|
|
XPTHREAD_FUNC1(pthread_rwlockattr_init, pthread_rwlockattr_t *);
|
|
|
|
|
XPTHREAD_FUNC1(pthread_rwlockattr_destroy, pthread_rwlockattr_t *);
|
|
|
|
|
#ifdef PTHREAD_RWLOCK_WRITER_NONRECURSIVE_INITIALIZER_NP
|
|
|
|
|
XPTHREAD_FUNC2(pthread_rwlockattr_setkind_np, pthread_rwlockattr_t *, int);
|
|
|
|
|
#endif
|
|
|
|
|
|
2013-06-24 11:05:10 -07:00
|
|
|
|
XPTHREAD_FUNC2(pthread_cond_init, pthread_cond_t *, pthread_condattr_t *);
|
2013-07-22 15:24:36 -07:00
|
|
|
|
XPTHREAD_FUNC1(pthread_cond_destroy, pthread_cond_t *);
|
2013-06-24 11:05:10 -07:00
|
|
|
|
XPTHREAD_FUNC1(pthread_cond_signal, pthread_cond_t *);
|
|
|
|
|
XPTHREAD_FUNC1(pthread_cond_broadcast, pthread_cond_t *);
|
|
|
|
|
|
2013-08-06 16:47:43 -07:00
|
|
|
|
XPTHREAD_FUNC2(pthread_join, pthread_t, void **);
|
|
|
|
|
|
2013-06-24 11:05:10 -07:00
|
|
|
|
typedef void destructor_func(void *);
|
|
|
|
|
XPTHREAD_FUNC2(pthread_key_create, pthread_key_t *, destructor_func *);
|
2014-01-14 14:35:48 -08:00
|
|
|
|
XPTHREAD_FUNC1(pthread_key_delete, pthread_key_t);
|
2013-08-06 14:30:01 -07:00
|
|
|
|
XPTHREAD_FUNC2(pthread_setspecific, pthread_key_t, const void *);
|
2013-06-24 11:05:10 -07:00
|
|
|
|
|
2014-05-23 14:15:28 -07:00
|
|
|
|
#ifndef _WIN32
|
|
|
|
|
XPTHREAD_FUNC3(pthread_sigmask, int, const sigset_t *, sigset_t *);
|
|
|
|
|
#endif
|
|
|
|
|
|
Use "error-checking" mutexes in place of other kinds wherever possible.
We've seen a number of deadlocks in the tree since thread safety was
introduced. So far, all of these are self-deadlocks, that is, a single
thread acquiring a lock and then attempting to re-acquire the same lock
recursively. When this has happened, the process simply hung, and it was
somewhat difficult to find the cause.
POSIX "error-checking" mutexes check for this specific problem (and
others). This commit switches from other types of mutexes to
error-checking mutexes everywhere that we can, that is, everywhere that
we're not using recursive mutexes. This ought to help find problems more
quickly in the future.
There might be performance advantages to other kinds of mutexes in some
cases. However, the existing mutex type choices were just guesses, so I'd
rather go for easy detection of errors until we know that other mutex
types actually perform better in specific cases. Also, I did a quick
microbenchmark of glibc mutex types on my host and found that the
error checking mutexes weren't any slower than the other types, at least
when the mutex is uncontended.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Ethan Jackson <ethan@nicira.com>
2013-08-20 13:40:02 -07:00
|
|
|
|
static void
|
|
|
|
|
ovs_mutex_init__(const struct ovs_mutex *l_, int type)
|
2013-07-30 15:31:48 -07:00
|
|
|
|
{
|
|
|
|
|
struct ovs_mutex *l = CONST_CAST(struct ovs_mutex *, l_);
|
|
|
|
|
pthread_mutexattr_t attr;
|
|
|
|
|
int error;
|
|
|
|
|
|
2014-04-24 16:49:05 -07:00
|
|
|
|
l->where = "<unlocked>";
|
2013-07-30 15:31:48 -07:00
|
|
|
|
xpthread_mutexattr_init(&attr);
|
|
|
|
|
xpthread_mutexattr_settype(&attr, type);
|
|
|
|
|
error = pthread_mutex_init(&l->lock, &attr);
|
|
|
|
|
if (OVS_UNLIKELY(error)) {
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("pthread_mutex_init failed: %s", ovs_strerror(error));
|
2013-07-30 15:31:48 -07:00
|
|
|
|
}
|
|
|
|
|
xpthread_mutexattr_destroy(&attr);
|
|
|
|
|
}
|
|
|
|
|
|
Use "error-checking" mutexes in place of other kinds wherever possible.
We've seen a number of deadlocks in the tree since thread safety was
introduced. So far, all of these are self-deadlocks, that is, a single
thread acquiring a lock and then attempting to re-acquire the same lock
recursively. When this has happened, the process simply hung, and it was
somewhat difficult to find the cause.
POSIX "error-checking" mutexes check for this specific problem (and
others). This commit switches from other types of mutexes to
error-checking mutexes everywhere that we can, that is, everywhere that
we're not using recursive mutexes. This ought to help find problems more
quickly in the future.
There might be performance advantages to other kinds of mutexes in some
cases. However, the existing mutex type choices were just guesses, so I'd
rather go for easy detection of errors until we know that other mutex
types actually perform better in specific cases. Also, I did a quick
microbenchmark of glibc mutex types on my host and found that the
error checking mutexes weren't any slower than the other types, at least
when the mutex is uncontended.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Ethan Jackson <ethan@nicira.com>
2013-08-20 13:40:02 -07:00
|
|
|
|
/* Initializes 'mutex' as a normal (non-recursive) mutex. */
|
|
|
|
|
void
|
|
|
|
|
ovs_mutex_init(const struct ovs_mutex *mutex)
|
|
|
|
|
{
|
|
|
|
|
ovs_mutex_init__(mutex, PTHREAD_MUTEX_ERRORCHECK);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Initializes 'mutex' as a recursive mutex. */
|
|
|
|
|
void
|
|
|
|
|
ovs_mutex_init_recursive(const struct ovs_mutex *mutex)
|
|
|
|
|
{
|
|
|
|
|
ovs_mutex_init__(mutex, PTHREAD_MUTEX_RECURSIVE);
|
|
|
|
|
}
|
|
|
|
|
|
2014-02-04 15:47:39 -08:00
|
|
|
|
/* Initializes 'mutex' as a recursive mutex. */
|
|
|
|
|
void
|
|
|
|
|
ovs_mutex_init_adaptive(const struct ovs_mutex *mutex)
|
|
|
|
|
{
|
|
|
|
|
#ifdef PTHREAD_ADAPTIVE_MUTEX_INITIALIZER_NP
|
|
|
|
|
ovs_mutex_init__(mutex, PTHREAD_MUTEX_ADAPTIVE_NP);
|
|
|
|
|
#else
|
|
|
|
|
ovs_mutex_init(mutex);
|
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
void
|
|
|
|
|
ovs_rwlock_init(const struct ovs_rwlock *l_)
|
|
|
|
|
{
|
|
|
|
|
struct ovs_rwlock *l = CONST_CAST(struct ovs_rwlock *, l_);
|
|
|
|
|
int error;
|
|
|
|
|
|
2014-04-24 16:49:05 -07:00
|
|
|
|
l->where = "<unlocked>";
|
2014-02-21 10:53:49 -08:00
|
|
|
|
|
|
|
|
|
#ifdef PTHREAD_RWLOCK_WRITER_NONRECURSIVE_INITIALIZER_NP
|
2016-12-28 22:27:17 +00:00
|
|
|
|
pthread_rwlockattr_t attr;
|
|
|
|
|
xpthread_rwlockattr_init(&attr);
|
2014-02-21 10:53:49 -08:00
|
|
|
|
xpthread_rwlockattr_setkind_np(
|
|
|
|
|
&attr, PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP);
|
2016-12-16 10:28:11 +08:00
|
|
|
|
error = pthread_rwlock_init(&l->lock, &attr);
|
2016-12-28 22:27:17 +00:00
|
|
|
|
xpthread_rwlockattr_destroy(&attr);
|
|
|
|
|
#else
|
|
|
|
|
/* It is important to avoid passing a rwlockattr in this case because
|
|
|
|
|
* Windows pthreads 2.9.1 (and earlier) fail and abort if passed one, even
|
|
|
|
|
* one without any special attributes. */
|
|
|
|
|
error = pthread_rwlock_init(&l->lock, NULL);
|
|
|
|
|
#endif
|
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
if (OVS_UNLIKELY(error)) {
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("pthread_rwlock_init failed: %s", ovs_strerror(error));
|
2013-07-30 15:31:48 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2016-04-04 16:38:57 -07:00
|
|
|
|
/* Provides an error-checking wrapper around pthread_cond_wait().
|
|
|
|
|
*
|
|
|
|
|
* If the wait can take a significant amount of time, consider bracketing this
|
|
|
|
|
* call with calls to ovsrcu_quiesce_start() and ovsrcu_quiesce_end(). */
|
2013-07-30 15:31:48 -07:00
|
|
|
|
void
|
|
|
|
|
ovs_mutex_cond_wait(pthread_cond_t *cond, const struct ovs_mutex *mutex_)
|
2018-12-10 20:05:23 +03:00
|
|
|
|
OVS_NO_THREAD_SAFETY_ANALYSIS
|
2013-07-30 15:31:48 -07:00
|
|
|
|
{
|
|
|
|
|
struct ovs_mutex *mutex = CONST_CAST(struct ovs_mutex *, mutex_);
|
2014-03-18 16:34:28 -07:00
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
error = pthread_cond_wait(cond, &mutex->lock);
|
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
if (OVS_UNLIKELY(error)) {
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("pthread_cond_wait failed: %s", ovs_strerror(error));
|
2013-07-30 15:31:48 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
2014-03-04 13:15:41 -08:00
|
|
|
|
|
2019-07-17 13:23:33 -07:00
|
|
|
|
#ifdef HAVE_PTHREAD_SPIN_LOCK
|
|
|
|
|
static void
|
|
|
|
|
ovs_spin_init__(const struct ovs_spin *l_, int pshared)
|
|
|
|
|
{
|
|
|
|
|
struct ovs_spin *l = CONST_CAST(struct ovs_spin *, l_);
|
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
l->where = "<unlocked>";
|
|
|
|
|
error = pthread_spin_init(&l->lock, pshared);
|
|
|
|
|
if (OVS_UNLIKELY(error)) {
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("pthread_spin_init failed: %s", ovs_strerror(error));
|
2019-07-17 13:23:33 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
ovs_spin_init(const struct ovs_spin *spin)
|
|
|
|
|
{
|
|
|
|
|
ovs_spin_init__(spin, PTHREAD_PROCESS_PRIVATE);
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
2021-09-08 11:47:25 +02:00
|
|
|
|
struct ovs_barrier_impl {
|
|
|
|
|
uint32_t size; /* Number of threads to wait. */
|
|
|
|
|
atomic_count count; /* Number of threads already hit the barrier. */
|
|
|
|
|
struct seq *seq;
|
|
|
|
|
struct ovs_refcount refcnt;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ovs_barrier_impl_ref(struct ovs_barrier_impl *impl)
|
|
|
|
|
{
|
|
|
|
|
ovs_refcount_ref(&impl->refcnt);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ovs_barrier_impl_unref(struct ovs_barrier_impl *impl)
|
|
|
|
|
{
|
|
|
|
|
if (ovs_refcount_unref(&impl->refcnt) == 1) {
|
|
|
|
|
seq_destroy(impl->seq);
|
|
|
|
|
free(impl);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2014-05-29 15:37:37 -07:00
|
|
|
|
/* Initializes the 'barrier'. 'size' is the number of threads
|
|
|
|
|
* expected to hit the barrier. */
|
|
|
|
|
void
|
|
|
|
|
ovs_barrier_init(struct ovs_barrier *barrier, uint32_t size)
|
2014-03-04 13:15:41 -08:00
|
|
|
|
{
|
2021-09-08 11:47:25 +02:00
|
|
|
|
struct ovs_barrier_impl *impl;
|
|
|
|
|
|
|
|
|
|
impl = xmalloc(sizeof *impl);
|
|
|
|
|
impl->size = size;
|
|
|
|
|
atomic_count_init(&impl->count, 0);
|
|
|
|
|
impl->seq = seq_create();
|
|
|
|
|
ovs_refcount_init(&impl->refcnt);
|
|
|
|
|
|
|
|
|
|
ovsrcu_set(&barrier->impl, impl);
|
2014-05-29 15:37:37 -07:00
|
|
|
|
}
|
2014-03-04 13:15:41 -08:00
|
|
|
|
|
2014-05-29 15:37:37 -07:00
|
|
|
|
/* Destroys the 'barrier'. */
|
|
|
|
|
void
|
|
|
|
|
ovs_barrier_destroy(struct ovs_barrier *barrier)
|
|
|
|
|
{
|
2021-09-08 11:47:25 +02:00
|
|
|
|
struct ovs_barrier_impl *impl;
|
|
|
|
|
|
|
|
|
|
impl = ovsrcu_get(struct ovs_barrier_impl *, &barrier->impl);
|
|
|
|
|
ovsrcu_set(&barrier->impl, NULL);
|
|
|
|
|
ovs_barrier_impl_unref(impl);
|
2014-05-29 15:37:37 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Makes the calling thread block on the 'barrier' until all
|
2014-08-29 16:15:44 -07:00
|
|
|
|
* 'barrier->size' threads hit the barrier.
|
|
|
|
|
* ovs_barrier provides the necessary acquire-release semantics to make
|
|
|
|
|
* the effects of prior memory accesses of all the participating threads
|
|
|
|
|
* visible on return and to prevent the following memory accesses to be
|
|
|
|
|
* reordered before the ovs_barrier_block(). */
|
2014-05-29 15:37:37 -07:00
|
|
|
|
void
|
|
|
|
|
ovs_barrier_block(struct ovs_barrier *barrier)
|
|
|
|
|
{
|
2021-09-08 11:47:25 +02:00
|
|
|
|
struct ovs_barrier_impl *impl;
|
2014-05-29 15:37:37 -07:00
|
|
|
|
uint32_t orig;
|
2021-09-08 11:47:25 +02:00
|
|
|
|
uint64_t seq;
|
2014-04-25 13:50:48 -07:00
|
|
|
|
|
2021-09-08 11:47:25 +02:00
|
|
|
|
impl = ovsrcu_get(struct ovs_barrier_impl *, &barrier->impl);
|
|
|
|
|
ovs_barrier_impl_ref(impl);
|
|
|
|
|
|
|
|
|
|
seq = seq_read(impl->seq);
|
|
|
|
|
orig = atomic_count_inc(&impl->count);
|
|
|
|
|
if (orig + 1 == impl->size) {
|
|
|
|
|
atomic_count_set(&impl->count, 0);
|
2014-08-29 16:15:44 -07:00
|
|
|
|
/* seq_change() serves as a release barrier against the other threads,
|
|
|
|
|
* so the zeroed count is visible to them as they continue. */
|
2021-09-08 11:47:25 +02:00
|
|
|
|
seq_change(impl->seq);
|
2014-08-29 16:15:44 -07:00
|
|
|
|
} else {
|
|
|
|
|
/* To prevent thread from waking up by other event,
|
|
|
|
|
* keeps waiting for the change of 'barrier->seq'. */
|
2021-09-08 11:47:25 +02:00
|
|
|
|
while (seq == seq_read(impl->seq)) {
|
|
|
|
|
seq_wait(impl->seq, seq);
|
2014-08-29 16:15:44 -07:00
|
|
|
|
poll_block();
|
|
|
|
|
}
|
2014-05-29 15:37:37 -07:00
|
|
|
|
}
|
2021-09-08 11:47:25 +02:00
|
|
|
|
|
|
|
|
|
ovs_barrier_impl_unref(impl);
|
2014-03-04 13:15:41 -08:00
|
|
|
|
}
|
2013-08-06 14:57:19 -07:00
|
|
|
|
|
2018-06-04 10:07:36 +02:00
|
|
|
|
DEFINE_EXTERN_PER_THREAD_DATA(ovsthread_id, OVSTHREAD_ID_UNSET);
|
2013-08-06 14:57:19 -07:00
|
|
|
|
|
|
|
|
|
struct ovsthread_aux {
|
|
|
|
|
void *(*start)(void *);
|
|
|
|
|
void *arg;
|
ovs-thread: Make caller provide thread name when creating a thread.
Thread names are occasionally very useful for debugging, but from time to
time we've forgotten to set one. This commit adds the new thread's name
as a parameter to the function to start a thread, to make that mistake
impossible. This also simplifies code, since two function calls become
only one.
This makes a few other changes to the thread creation function:
* Since it is no longer a direct wrapper around a pthread function,
rename it to avoid giving that impression.
* Remove 'pthread_attr_t *' param that every caller supplied as NULL.
* Change 'pthread *' parameter into a return value, for convenience.
The system-stats code hadn't set a thread name, so this fixes that issue.
This patch is a prerequisite for making RCU report the name of a thread
that is blocking RCU synchronization, because the easiest way to do that is
for ovsrcu_quiesce_end() to record the current thread's name.
ovsrcu_quiesce_end() is called before the thread function is called, so it
won't get a name set within the thread function itself. Setting the thread
name earlier, as in this patch, avoids the problem.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Alex Wang <alexw@nicira.com>
2014-04-25 17:46:21 -07:00
|
|
|
|
char name[16];
|
2013-08-06 14:57:19 -07:00
|
|
|
|
};
|
|
|
|
|
|
2018-06-04 10:07:36 +02:00
|
|
|
|
unsigned int
|
|
|
|
|
ovsthread_id_init(void)
|
|
|
|
|
{
|
|
|
|
|
static atomic_count next_id = ATOMIC_COUNT_INIT(0);
|
|
|
|
|
|
|
|
|
|
ovs_assert(*ovsthread_id_get() == OVSTHREAD_ID_UNSET);
|
|
|
|
|
return *ovsthread_id_get() = atomic_count_inc(&next_id);
|
|
|
|
|
}
|
|
|
|
|
|
2013-08-06 14:57:19 -07:00
|
|
|
|
static void *
|
|
|
|
|
ovsthread_wrapper(void *aux_)
|
|
|
|
|
{
|
|
|
|
|
struct ovsthread_aux *auxp = aux_;
|
|
|
|
|
struct ovsthread_aux aux;
|
|
|
|
|
unsigned int id;
|
|
|
|
|
|
2018-06-04 10:07:36 +02:00
|
|
|
|
id = ovsthread_id_init();
|
2013-08-06 14:57:19 -07:00
|
|
|
|
|
|
|
|
|
aux = *auxp;
|
|
|
|
|
free(auxp);
|
|
|
|
|
|
2014-04-28 15:25:19 -07:00
|
|
|
|
/* The order of the following calls is important, because
|
|
|
|
|
* ovsrcu_quiesce_end() saves a copy of the thread name. */
|
2015-06-07 09:48:14 -07:00
|
|
|
|
char *subprogram_name = xasprintf("%s%u", aux.name, id);
|
|
|
|
|
set_subprogram_name(subprogram_name);
|
|
|
|
|
free(subprogram_name);
|
2014-03-18 16:34:28 -07:00
|
|
|
|
ovsrcu_quiesce_end();
|
2014-04-28 15:25:19 -07:00
|
|
|
|
|
2013-08-06 14:57:19 -07:00
|
|
|
|
return aux.start(aux.arg);
|
|
|
|
|
}
|
2013-07-30 15:31:48 -07:00
|
|
|
|
|
2016-02-04 09:20:34 +02:00
|
|
|
|
static void
|
|
|
|
|
set_min_stack_size(pthread_attr_t *attr, size_t min_stacksize)
|
|
|
|
|
{
|
|
|
|
|
size_t stacksize;
|
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
error = pthread_attr_getstacksize(attr, &stacksize);
|
|
|
|
|
if (error) {
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("pthread_attr_getstacksize failed: %s",
|
|
|
|
|
ovs_strerror(error));
|
2016-02-04 09:20:34 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (stacksize < min_stacksize) {
|
|
|
|
|
error = pthread_attr_setstacksize(attr, min_stacksize);
|
|
|
|
|
if (error) {
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("pthread_attr_setstacksize failed: %s",
|
|
|
|
|
ovs_strerror(error));
|
2016-02-04 09:20:34 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
ovs-thread: Make caller provide thread name when creating a thread.
Thread names are occasionally very useful for debugging, but from time to
time we've forgotten to set one. This commit adds the new thread's name
as a parameter to the function to start a thread, to make that mistake
impossible. This also simplifies code, since two function calls become
only one.
This makes a few other changes to the thread creation function:
* Since it is no longer a direct wrapper around a pthread function,
rename it to avoid giving that impression.
* Remove 'pthread_attr_t *' param that every caller supplied as NULL.
* Change 'pthread *' parameter into a return value, for convenience.
The system-stats code hadn't set a thread name, so this fixes that issue.
This patch is a prerequisite for making RCU report the name of a thread
that is blocking RCU synchronization, because the easiest way to do that is
for ovsrcu_quiesce_end() to record the current thread's name.
ovsrcu_quiesce_end() is called before the thread function is called, so it
won't get a name set within the thread function itself. Setting the thread
name earlier, as in this patch, avoids the problem.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Alex Wang <alexw@nicira.com>
2014-04-25 17:46:21 -07:00
|
|
|
|
/* Starts a thread that calls 'start(arg)'. Sets the thread's name to 'name'
|
|
|
|
|
* (suffixed by its ovsthread_id()). Returns the new thread's pthread_t. */
|
|
|
|
|
pthread_t
|
|
|
|
|
ovs_thread_create(const char *name, void *(*start)(void *), void *arg)
|
2013-06-24 11:05:10 -07:00
|
|
|
|
{
|
ovs-thread: Do not always end quiescent state in ovs_thread_create().
A new thread must be started in a non quiescent state. There is a call
to ovsrcu_quiesce_end() in ovsthread_wrapper(), to enforce this.
ovs_thread_create(), instead, is executed in the parent thread. It must
call ovsrcu_quiesce_end() on its first invocation, to put the main
thread in a non quiescent state. On every other invocation, it doesn't
make sense to alter the calling thread state, so this commits wraps the
call to ovsrcu_quiesce_end() in an ovsthread_once construct.
This fixes a bug in ovs-rcu where the first call in the process to
ovsrcu_quiesce_start() will not be honored, because the calling thread
will need to create the 'urcu' thread (and creating a thread will
wrongly end its quiescent state).
ovsrcu_quiesce_start()
ovs_rcu_quiesced()
if (ovsthread_once_start(&once)) {
ovs_thread_create("urcu") /*This will end the quiescent state*/
}
This bug affects in particular ovs-vswitchd with DPDK.
In the DPDK case the first threads created are "vhost_thread" and
"dpdk_watchdog". If dpdk_watchdog is the first to call
ovsrcu_quiesce_start() (via xsleep()), the call is not honored and
the RCU grace period lasts at least for DPDK_PORT_WATCHDOG_INTERVAL
(5s on current master). If vhost_thread, on the other hand, is the
first to call ovsrcu_quiesce_start(), the call is not honored and the
RCU grace period lasts undefinitely, because no more calls to
ovsrcu_quiesce_start() are issued from vhost_thread.
For some reason (it's a race condition after all), on current master,
dpdk_watchdog will always be the first to call ovsrcu_quiesce_start(),
but with the upcoming DPDK database configuration changes, sometimes
vhost_thread will issue the first call to ovsrcu_quiesce_start().
Sample ovs-vswitchd.log:
2016-03-23T22:34:28.532Z|00004|ovs_rcu(urcu3)|WARN|blocked 8000 ms
waiting for vhost_thread2 to quiesce
2016-03-23T22:34:30.501Z|00118|ovs_rcu|WARN|blocked 8000 ms waiting for
vhost_thread2 to quiesce
2016-03-23T22:34:36.532Z|00005|ovs_rcu(urcu3)|WARN|blocked 16000 ms
waiting for vhost_thread2 to quiesce
2016-03-23T22:34:38.501Z|00119|ovs_rcu|WARN|blocked 16000 ms waiting for
vhost_thread2 to quiesce
The commit also adds a test for the ovs-rcu module to make sure that:
* A new thread is started in a non quiescent state.
* The first call to ovsrcu_quiesce_start() is honored.
* When a process becomes multithreaded the main thread is put in an
active state
Signed-off-by: Daniele Di Proietto <diproiettod@vmware.com>
Acked-by: Ben Pfaff <blp@ovn.org>
2016-03-23 16:37:47 -07:00
|
|
|
|
static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
|
2013-08-06 14:57:19 -07:00
|
|
|
|
struct ovsthread_aux *aux;
|
2013-06-24 11:05:10 -07:00
|
|
|
|
pthread_t thread;
|
|
|
|
|
int error;
|
|
|
|
|
|
2013-06-19 13:07:35 -07:00
|
|
|
|
forbid_forking("multiple threads exist");
|
ovs-thread: Do not always end quiescent state in ovs_thread_create().
A new thread must be started in a non quiescent state. There is a call
to ovsrcu_quiesce_end() in ovsthread_wrapper(), to enforce this.
ovs_thread_create(), instead, is executed in the parent thread. It must
call ovsrcu_quiesce_end() on its first invocation, to put the main
thread in a non quiescent state. On every other invocation, it doesn't
make sense to alter the calling thread state, so this commits wraps the
call to ovsrcu_quiesce_end() in an ovsthread_once construct.
This fixes a bug in ovs-rcu where the first call in the process to
ovsrcu_quiesce_start() will not be honored, because the calling thread
will need to create the 'urcu' thread (and creating a thread will
wrongly end its quiescent state).
ovsrcu_quiesce_start()
ovs_rcu_quiesced()
if (ovsthread_once_start(&once)) {
ovs_thread_create("urcu") /*This will end the quiescent state*/
}
This bug affects in particular ovs-vswitchd with DPDK.
In the DPDK case the first threads created are "vhost_thread" and
"dpdk_watchdog". If dpdk_watchdog is the first to call
ovsrcu_quiesce_start() (via xsleep()), the call is not honored and
the RCU grace period lasts at least for DPDK_PORT_WATCHDOG_INTERVAL
(5s on current master). If vhost_thread, on the other hand, is the
first to call ovsrcu_quiesce_start(), the call is not honored and the
RCU grace period lasts undefinitely, because no more calls to
ovsrcu_quiesce_start() are issued from vhost_thread.
For some reason (it's a race condition after all), on current master,
dpdk_watchdog will always be the first to call ovsrcu_quiesce_start(),
but with the upcoming DPDK database configuration changes, sometimes
vhost_thread will issue the first call to ovsrcu_quiesce_start().
Sample ovs-vswitchd.log:
2016-03-23T22:34:28.532Z|00004|ovs_rcu(urcu3)|WARN|blocked 8000 ms
waiting for vhost_thread2 to quiesce
2016-03-23T22:34:30.501Z|00118|ovs_rcu|WARN|blocked 8000 ms waiting for
vhost_thread2 to quiesce
2016-03-23T22:34:36.532Z|00005|ovs_rcu(urcu3)|WARN|blocked 16000 ms
waiting for vhost_thread2 to quiesce
2016-03-23T22:34:38.501Z|00119|ovs_rcu|WARN|blocked 16000 ms waiting for
vhost_thread2 to quiesce
The commit also adds a test for the ovs-rcu module to make sure that:
* A new thread is started in a non quiescent state.
* The first call to ovsrcu_quiesce_start() is honored.
* When a process becomes multithreaded the main thread is put in an
active state
Signed-off-by: Daniele Di Proietto <diproiettod@vmware.com>
Acked-by: Ben Pfaff <blp@ovn.org>
2016-03-23 16:37:47 -07:00
|
|
|
|
|
|
|
|
|
if (ovsthread_once_start(&once)) {
|
|
|
|
|
/* The first call to this function has to happen in the main thread.
|
|
|
|
|
* Before the process becomes multithreaded we make sure that the
|
|
|
|
|
* main thread is considered non quiescent.
|
|
|
|
|
*
|
|
|
|
|
* For other threads this is done in ovs_thread_wrapper(), but the
|
|
|
|
|
* main thread has no such wrapper.
|
|
|
|
|
*
|
|
|
|
|
* There's no reason to call ovsrcu_quiesce_end() in subsequent
|
|
|
|
|
* invocations of this function and it might introduce problems
|
|
|
|
|
* for other threads. */
|
|
|
|
|
ovsrcu_quiesce_end();
|
|
|
|
|
ovsthread_once_done(&once);
|
|
|
|
|
}
|
2013-06-19 13:07:35 -07:00
|
|
|
|
|
2016-06-17 15:41:26 -07:00
|
|
|
|
multithreaded = true;
|
2013-08-06 14:57:19 -07:00
|
|
|
|
aux = xmalloc(sizeof *aux);
|
|
|
|
|
aux->start = start;
|
|
|
|
|
aux->arg = arg;
|
ovs-thread: Make caller provide thread name when creating a thread.
Thread names are occasionally very useful for debugging, but from time to
time we've forgotten to set one. This commit adds the new thread's name
as a parameter to the function to start a thread, to make that mistake
impossible. This also simplifies code, since two function calls become
only one.
This makes a few other changes to the thread creation function:
* Since it is no longer a direct wrapper around a pthread function,
rename it to avoid giving that impression.
* Remove 'pthread_attr_t *' param that every caller supplied as NULL.
* Change 'pthread *' parameter into a return value, for convenience.
The system-stats code hadn't set a thread name, so this fixes that issue.
This patch is a prerequisite for making RCU report the name of a thread
that is blocking RCU synchronization, because the easiest way to do that is
for ovsrcu_quiesce_end() to record the current thread's name.
ovsrcu_quiesce_end() is called before the thread function is called, so it
won't get a name set within the thread function itself. Setting the thread
name earlier, as in this patch, avoids the problem.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Alex Wang <alexw@nicira.com>
2014-04-25 17:46:21 -07:00
|
|
|
|
ovs_strlcpy(aux->name, name, sizeof aux->name);
|
2013-08-06 14:57:19 -07:00
|
|
|
|
|
2016-02-04 09:20:34 +02:00
|
|
|
|
/* Some small systems use a default stack size as small as 80 kB, but OVS
|
|
|
|
|
* requires approximately 384 kB according to the following analysis:
|
2017-11-27 14:19:30 -08:00
|
|
|
|
* https://mail.openvswitch.org/pipermail/ovs-dev/2016-January/308592.html
|
2016-02-04 09:20:34 +02:00
|
|
|
|
*
|
|
|
|
|
* We use 512 kB to give us some margin of error. */
|
|
|
|
|
pthread_attr_t attr;
|
|
|
|
|
pthread_attr_init(&attr);
|
|
|
|
|
set_min_stack_size(&attr, 512 * 1024);
|
|
|
|
|
|
2016-03-10 08:37:43 -08:00
|
|
|
|
error = pthread_create(&thread, &attr, ovsthread_wrapper, aux);
|
2013-06-24 11:05:10 -07:00
|
|
|
|
if (error) {
|
2024-02-15 13:00:05 +01:00
|
|
|
|
VLOG_ABORT("pthread_create failed: %s", ovs_strerror(error));
|
2013-06-24 11:05:10 -07:00
|
|
|
|
}
|
2016-02-04 09:20:34 +02:00
|
|
|
|
pthread_attr_destroy(&attr);
|
ovs-thread: Make caller provide thread name when creating a thread.
Thread names are occasionally very useful for debugging, but from time to
time we've forgotten to set one. This commit adds the new thread's name
as a parameter to the function to start a thread, to make that mistake
impossible. This also simplifies code, since two function calls become
only one.
This makes a few other changes to the thread creation function:
* Since it is no longer a direct wrapper around a pthread function,
rename it to avoid giving that impression.
* Remove 'pthread_attr_t *' param that every caller supplied as NULL.
* Change 'pthread *' parameter into a return value, for convenience.
The system-stats code hadn't set a thread name, so this fixes that issue.
This patch is a prerequisite for making RCU report the name of a thread
that is blocking RCU synchronization, because the easiest way to do that is
for ovsrcu_quiesce_end() to record the current thread's name.
ovsrcu_quiesce_end() is called before the thread function is called, so it
won't get a name set within the thread function itself. Setting the thread
name earlier, as in this patch, avoids the problem.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Alex Wang <alexw@nicira.com>
2014-04-25 17:46:21 -07:00
|
|
|
|
return thread;
|
2013-06-24 11:05:10 -07:00
|
|
|
|
}
|
2013-06-19 11:21:47 -07:00
|
|
|
|
|
|
|
|
|
bool
|
|
|
|
|
ovsthread_once_start__(struct ovsthread_once *once)
|
|
|
|
|
{
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_lock(&once->mutex);
|
2014-08-29 16:15:44 -07:00
|
|
|
|
/* Mutex synchronizes memory, so we get the current value of 'done'. */
|
|
|
|
|
if (!once->done) {
|
|
|
|
|
return true;
|
2013-06-19 11:21:47 -07:00
|
|
|
|
}
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_unlock(&once->mutex);
|
2014-08-29 16:15:44 -07:00
|
|
|
|
return false;
|
2013-06-19 11:21:47 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
void
|
2013-06-19 11:21:47 -07:00
|
|
|
|
ovsthread_once_done(struct ovsthread_once *once)
|
|
|
|
|
{
|
2014-08-29 16:15:44 -07:00
|
|
|
|
/* We need release semantics here, so that the following store may not
|
|
|
|
|
* be moved ahead of any of the preceding initialization operations.
|
|
|
|
|
* A release atomic_thread_fence provides that prior memory accesses
|
|
|
|
|
* will not be reordered to take place after the following store. */
|
|
|
|
|
atomic_thread_fence(memory_order_release);
|
|
|
|
|
once->done = true;
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_unlock(&once->mutex);
|
2013-06-19 11:21:47 -07:00
|
|
|
|
}
|
2013-06-19 13:07:35 -07:00
|
|
|
|
|
2014-03-18 16:34:28 -07:00
|
|
|
|
bool
|
|
|
|
|
single_threaded(void)
|
|
|
|
|
{
|
|
|
|
|
return !multithreaded;
|
|
|
|
|
}
|
|
|
|
|
|
2013-06-19 13:07:35 -07:00
|
|
|
|
/* Asserts that the process has not yet created any threads (beyond the initial
|
2013-07-29 15:24:45 -07:00
|
|
|
|
* thread).
|
|
|
|
|
*
|
|
|
|
|
* ('where' is used in logging. Commonly one would use
|
|
|
|
|
* assert_single_threaded() to automatically provide the caller's source file
|
|
|
|
|
* and line number for 'where'.) */
|
2013-06-19 13:07:35 -07:00
|
|
|
|
void
|
2013-07-29 15:24:45 -07:00
|
|
|
|
assert_single_threaded_at(const char *where)
|
2013-06-19 13:07:35 -07:00
|
|
|
|
{
|
|
|
|
|
if (multithreaded) {
|
|
|
|
|
VLOG_FATAL("%s: attempted operation not allowed when multithreaded",
|
|
|
|
|
where);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2014-03-12 10:32:59 -07:00
|
|
|
|
#ifndef _WIN32
|
2013-06-19 13:07:35 -07:00
|
|
|
|
/* Forks the current process (checking that this is allowed). Aborts with
|
|
|
|
|
* VLOG_FATAL if fork() returns an error, and otherwise returns the value
|
2013-07-29 15:24:45 -07:00
|
|
|
|
* returned by fork().
|
|
|
|
|
*
|
|
|
|
|
* ('where' is used in logging. Commonly one would use xfork() to
|
|
|
|
|
* automatically provide the caller's source file and line number for
|
|
|
|
|
* 'where'.) */
|
2013-06-19 13:07:35 -07:00
|
|
|
|
pid_t
|
2013-07-29 15:24:45 -07:00
|
|
|
|
xfork_at(const char *where)
|
2013-06-19 13:07:35 -07:00
|
|
|
|
{
|
|
|
|
|
pid_t pid;
|
|
|
|
|
|
|
|
|
|
if (must_not_fork) {
|
|
|
|
|
VLOG_FATAL("%s: attempted to fork but forking not allowed (%s)",
|
|
|
|
|
where, must_not_fork);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pid = fork();
|
|
|
|
|
if (pid < 0) {
|
2013-07-30 15:31:48 -07:00
|
|
|
|
VLOG_FATAL("%s: fork failed (%s)", where, ovs_strerror(errno));
|
2013-06-19 13:07:35 -07:00
|
|
|
|
}
|
|
|
|
|
return pid;
|
|
|
|
|
}
|
2014-03-12 10:32:59 -07:00
|
|
|
|
#endif
|
2013-06-19 13:07:35 -07:00
|
|
|
|
|
|
|
|
|
/* Notes that the process must not call fork() from now on, for the specified
|
|
|
|
|
* 'reason'. (The process may still fork() if it execs itself immediately
|
|
|
|
|
* afterward.) */
|
|
|
|
|
void
|
|
|
|
|
forbid_forking(const char *reason)
|
|
|
|
|
{
|
|
|
|
|
ovs_assert(reason != NULL);
|
|
|
|
|
must_not_fork = reason;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Returns true if the process is allowed to fork, false otherwise. */
|
|
|
|
|
bool
|
|
|
|
|
may_fork(void)
|
|
|
|
|
{
|
|
|
|
|
return !must_not_fork;
|
|
|
|
|
}
|
2013-12-06 07:42:20 +00:00
|
|
|
|
|
2014-03-19 07:47:12 -07:00
|
|
|
|
/* ovsthread_stats. */
|
2013-12-23 14:04:13 -08:00
|
|
|
|
|
2014-03-19 07:47:12 -07:00
|
|
|
|
void
|
|
|
|
|
ovsthread_stats_init(struct ovsthread_stats *stats)
|
2013-12-23 14:04:13 -08:00
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
2014-03-19 07:47:12 -07:00
|
|
|
|
ovs_mutex_init(&stats->mutex);
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(stats->buckets); i++) {
|
|
|
|
|
stats->buckets[i] = NULL;
|
2013-12-23 14:04:13 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
2014-03-19 07:47:12 -07:00
|
|
|
|
ovsthread_stats_destroy(struct ovsthread_stats *stats)
|
2013-12-23 14:04:13 -08:00
|
|
|
|
{
|
2014-03-19 07:47:12 -07:00
|
|
|
|
ovs_mutex_destroy(&stats->mutex);
|
2013-12-23 14:04:13 -08:00
|
|
|
|
}
|
|
|
|
|
|
2014-03-19 07:47:12 -07:00
|
|
|
|
void *
|
|
|
|
|
ovsthread_stats_bucket_get(struct ovsthread_stats *stats,
|
|
|
|
|
void *(*new_bucket)(void))
|
2013-12-23 14:04:13 -08:00
|
|
|
|
{
|
2014-03-19 07:47:12 -07:00
|
|
|
|
unsigned int idx = ovsthread_id_self() & (ARRAY_SIZE(stats->buckets) - 1);
|
|
|
|
|
void *bucket = stats->buckets[idx];
|
|
|
|
|
if (!bucket) {
|
|
|
|
|
ovs_mutex_lock(&stats->mutex);
|
|
|
|
|
bucket = stats->buckets[idx];
|
|
|
|
|
if (!bucket) {
|
|
|
|
|
bucket = stats->buckets[idx] = new_bucket();
|
|
|
|
|
}
|
|
|
|
|
ovs_mutex_unlock(&stats->mutex);
|
|
|
|
|
}
|
|
|
|
|
return bucket;
|
2013-12-23 14:04:13 -08:00
|
|
|
|
}
|
|
|
|
|
|
2014-03-19 07:47:12 -07:00
|
|
|
|
size_t
|
|
|
|
|
ovs_thread_stats_next_bucket(const struct ovsthread_stats *stats, size_t i)
|
2013-12-23 14:04:13 -08:00
|
|
|
|
{
|
2014-03-19 07:47:12 -07:00
|
|
|
|
for (; i < ARRAY_SIZE(stats->buckets); i++) {
|
|
|
|
|
if (stats->buckets[i]) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
2013-12-23 14:04:13 -08:00
|
|
|
|
}
|
2014-03-19 07:47:12 -07:00
|
|
|
|
return i;
|
2013-12-23 14:04:13 -08:00
|
|
|
|
}
|
2014-03-19 07:47:12 -07:00
|
|
|
|
|
2013-12-23 14:04:13 -08:00
|
|
|
|
|
2022-12-19 19:29:06 +01:00
|
|
|
|
static int
|
|
|
|
|
count_cpu_cores__(void)
|
2013-12-06 07:42:20 +00:00
|
|
|
|
{
|
2022-12-19 19:29:06 +01:00
|
|
|
|
long int n_cores;
|
2013-12-06 07:42:21 +00:00
|
|
|
|
|
2014-03-10 09:59:56 -07:00
|
|
|
|
#ifndef _WIN32
|
2022-12-19 19:29:06 +01:00
|
|
|
|
n_cores = sysconf(_SC_NPROCESSORS_ONLN);
|
|
|
|
|
#else
|
|
|
|
|
SYSTEM_INFO sysinfo;
|
|
|
|
|
GetSystemInfo(&sysinfo);
|
|
|
|
|
n_cores = sysinfo.dwNumberOfProcessors;
|
|
|
|
|
#endif
|
2016-06-09 11:52:49 +02:00
|
|
|
|
#ifdef __linux__
|
2022-12-19 19:29:06 +01:00
|
|
|
|
if (n_cores > 0) {
|
|
|
|
|
cpu_set_t *set = CPU_ALLOC(n_cores);
|
2016-06-09 11:52:49 +02:00
|
|
|
|
|
2022-12-19 19:29:06 +01:00
|
|
|
|
if (set) {
|
|
|
|
|
size_t size = CPU_ALLOC_SIZE(n_cores);
|
2016-06-09 11:52:49 +02:00
|
|
|
|
|
2022-12-19 19:29:06 +01:00
|
|
|
|
if (!sched_getaffinity(0, size, set)) {
|
|
|
|
|
n_cores = CPU_COUNT_S(size, set);
|
2016-06-09 11:52:49 +02:00
|
|
|
|
}
|
2022-12-19 19:29:06 +01:00
|
|
|
|
CPU_FREE(set);
|
2013-12-06 07:42:21 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
2022-12-19 19:29:06 +01:00
|
|
|
|
#endif
|
2013-12-06 07:42:20 +00:00
|
|
|
|
return n_cores > 0 ? n_cores : 0;
|
|
|
|
|
}
|
2015-12-22 17:26:47 +03:00
|
|
|
|
|
2022-12-19 19:29:06 +01:00
|
|
|
|
/* It's unlikely that the available cpus change several times per second and
|
|
|
|
|
* even if it does, it's not needed (or desired) to react to such changes so
|
|
|
|
|
* quickly. */
|
|
|
|
|
#define COUNT_CPU_UPDATE_TIME_MS 10000
|
|
|
|
|
|
|
|
|
|
static struct ovs_mutex cpu_cores_mutex = OVS_MUTEX_INITIALIZER;
|
|
|
|
|
|
|
|
|
|
/* Returns the current total number of cores available to this process, or 0
|
|
|
|
|
* if the number cannot be determined. */
|
|
|
|
|
int
|
|
|
|
|
count_cpu_cores(void)
|
|
|
|
|
{
|
|
|
|
|
static long long int last_updated = 0;
|
|
|
|
|
long long int now = time_msec();
|
|
|
|
|
static int cpu_cores;
|
|
|
|
|
|
|
|
|
|
ovs_mutex_lock(&cpu_cores_mutex);
|
2023-03-27 10:40:11 +02:00
|
|
|
|
if (!last_updated || now - last_updated >= COUNT_CPU_UPDATE_TIME_MS) {
|
2022-12-19 19:29:06 +01:00
|
|
|
|
last_updated = now;
|
|
|
|
|
cpu_cores = count_cpu_cores__();
|
|
|
|
|
}
|
|
|
|
|
ovs_mutex_unlock(&cpu_cores_mutex);
|
|
|
|
|
return cpu_cores;
|
|
|
|
|
}
|
|
|
|
|
|
2022-08-09 03:18:14 -04:00
|
|
|
|
/* Returns the total number of cores on the system, or 0 if the
|
|
|
|
|
* number cannot be determined. */
|
|
|
|
|
int
|
|
|
|
|
count_total_cores(void)
|
|
|
|
|
{
|
|
|
|
|
long int n_cores;
|
|
|
|
|
|
|
|
|
|
#ifndef _WIN32
|
|
|
|
|
n_cores = sysconf(_SC_NPROCESSORS_CONF);
|
|
|
|
|
#else
|
|
|
|
|
n_cores = 0;
|
|
|
|
|
errno = ENOTSUP;
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
return n_cores > 0 ? n_cores : 0;
|
|
|
|
|
}
|
|
|
|
|
|
2015-12-22 17:26:47 +03:00
|
|
|
|
/* Returns 'true' if current thread is PMD thread. */
|
|
|
|
|
bool
|
|
|
|
|
thread_is_pmd(void)
|
|
|
|
|
{
|
|
|
|
|
const char *name = get_subprogram_name();
|
|
|
|
|
return !strncmp(name, "pmd", 3);
|
|
|
|
|
}
|
|
|
|
|
|
2014-01-14 14:35:48 -08:00
|
|
|
|
|
|
|
|
|
/* ovsthread_key. */
|
|
|
|
|
|
|
|
|
|
#define L1_SIZE 1024
|
|
|
|
|
#define L2_SIZE 1024
|
|
|
|
|
#define MAX_KEYS (L1_SIZE * L2_SIZE)
|
|
|
|
|
|
|
|
|
|
/* A piece of thread-specific data. */
|
|
|
|
|
struct ovsthread_key {
|
2014-12-15 14:10:38 +01:00
|
|
|
|
struct ovs_list list_node; /* In 'inuse_keys' or 'free_keys'. */
|
2014-01-14 14:35:48 -08:00
|
|
|
|
void (*destructor)(void *); /* Called at thread exit. */
|
|
|
|
|
|
|
|
|
|
/* Indexes into the per-thread array in struct ovsthread_key_slots.
|
|
|
|
|
* This key's data is stored in p1[index / L2_SIZE][index % L2_SIZE]. */
|
|
|
|
|
unsigned int index;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
/* Per-thread data structure. */
|
|
|
|
|
struct ovsthread_key_slots {
|
2014-12-15 14:10:38 +01:00
|
|
|
|
struct ovs_list list_node; /* In 'slots_list'. */
|
2014-01-14 14:35:48 -08:00
|
|
|
|
void **p1[L1_SIZE];
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
/* Contains "struct ovsthread_key_slots *". */
|
|
|
|
|
static pthread_key_t tsd_key;
|
|
|
|
|
|
|
|
|
|
/* Guards data structures below. */
|
|
|
|
|
static struct ovs_mutex key_mutex = OVS_MUTEX_INITIALIZER;
|
|
|
|
|
|
|
|
|
|
/* 'inuse_keys' holds "struct ovsthread_key"s that have been created and not
|
|
|
|
|
* yet destroyed.
|
|
|
|
|
*
|
|
|
|
|
* 'free_keys' holds "struct ovsthread_key"s that have been deleted and are
|
|
|
|
|
* ready for reuse. (We keep them around only to be able to easily locate
|
|
|
|
|
* free indexes.)
|
|
|
|
|
*
|
|
|
|
|
* Together, 'inuse_keys' and 'free_keys' hold an ovsthread_key for every index
|
|
|
|
|
* from 0 to n_keys - 1, inclusive. */
|
2014-12-15 14:10:38 +01:00
|
|
|
|
static struct ovs_list inuse_keys OVS_GUARDED_BY(key_mutex)
|
2014-12-15 14:10:38 +01:00
|
|
|
|
= OVS_LIST_INITIALIZER(&inuse_keys);
|
2014-12-15 14:10:38 +01:00
|
|
|
|
static struct ovs_list free_keys OVS_GUARDED_BY(key_mutex)
|
2014-12-15 14:10:38 +01:00
|
|
|
|
= OVS_LIST_INITIALIZER(&free_keys);
|
2014-01-14 14:35:48 -08:00
|
|
|
|
static unsigned int n_keys OVS_GUARDED_BY(key_mutex);
|
|
|
|
|
|
|
|
|
|
/* All existing struct ovsthread_key_slots. */
|
2014-12-15 14:10:38 +01:00
|
|
|
|
static struct ovs_list slots_list OVS_GUARDED_BY(key_mutex)
|
2014-12-15 14:10:38 +01:00
|
|
|
|
= OVS_LIST_INITIALIZER(&slots_list);
|
2014-01-14 14:35:48 -08:00
|
|
|
|
|
|
|
|
|
static void *
|
|
|
|
|
clear_slot(struct ovsthread_key_slots *slots, unsigned int index)
|
|
|
|
|
{
|
|
|
|
|
void **p2 = slots->p1[index / L2_SIZE];
|
|
|
|
|
if (p2) {
|
|
|
|
|
void **valuep = &p2[index % L2_SIZE];
|
|
|
|
|
void *value = *valuep;
|
|
|
|
|
*valuep = NULL;
|
|
|
|
|
return value;
|
|
|
|
|
} else {
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ovsthread_key_destruct__(void *slots_)
|
|
|
|
|
{
|
|
|
|
|
struct ovsthread_key_slots *slots = slots_;
|
|
|
|
|
struct ovsthread_key *key;
|
|
|
|
|
unsigned int n;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
ovs_mutex_lock(&key_mutex);
|
2016-03-25 14:10:22 -07:00
|
|
|
|
ovs_list_remove(&slots->list_node);
|
2014-01-14 14:35:48 -08:00
|
|
|
|
LIST_FOR_EACH (key, list_node, &inuse_keys) {
|
|
|
|
|
void *value = clear_slot(slots, key->index);
|
|
|
|
|
if (value && key->destructor) {
|
|
|
|
|
key->destructor(value);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
n = n_keys;
|
|
|
|
|
ovs_mutex_unlock(&key_mutex);
|
|
|
|
|
|
2015-11-10 13:13:28 -08:00
|
|
|
|
for (i = 0; i < DIV_ROUND_UP(n, L2_SIZE); i++) {
|
2014-01-14 14:35:48 -08:00
|
|
|
|
free(slots->p1[i]);
|
|
|
|
|
}
|
|
|
|
|
free(slots);
|
|
|
|
|
}
|
|
|
|
|
|
2015-04-07 17:34:27 -07:00
|
|
|
|
/* Cancels the callback to ovsthread_key_destruct__().
|
|
|
|
|
*
|
|
|
|
|
* Cancelling the call to the destructor during the main thread exit
|
|
|
|
|
* is needed while using pthreads-win32 library in Windows. It has been
|
|
|
|
|
* observed that in pthreads-win32, a call to the destructor during
|
|
|
|
|
* main thread exit causes undefined behavior. */
|
|
|
|
|
static void
|
|
|
|
|
ovsthread_cancel_ovsthread_key_destruct__(void *aux OVS_UNUSED)
|
|
|
|
|
{
|
|
|
|
|
pthread_setspecific(tsd_key, NULL);
|
|
|
|
|
}
|
|
|
|
|
|
2014-01-14 14:35:48 -08:00
|
|
|
|
/* Initializes '*keyp' as a thread-specific data key. The data items are
|
|
|
|
|
* initially null in all threads.
|
|
|
|
|
*
|
|
|
|
|
* If a thread exits with non-null data, then 'destructor', if nonnull, will be
|
|
|
|
|
* called passing the final data value as its argument. 'destructor' must not
|
|
|
|
|
* call any thread-specific data functions in this API.
|
|
|
|
|
*
|
|
|
|
|
* This function is similar to xpthread_key_create(). */
|
|
|
|
|
void
|
|
|
|
|
ovsthread_key_create(ovsthread_key_t *keyp, void (*destructor)(void *))
|
|
|
|
|
{
|
|
|
|
|
static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
|
|
|
|
|
struct ovsthread_key *key;
|
|
|
|
|
|
|
|
|
|
if (ovsthread_once_start(&once)) {
|
|
|
|
|
xpthread_key_create(&tsd_key, ovsthread_key_destruct__);
|
2015-04-07 17:34:27 -07:00
|
|
|
|
fatal_signal_add_hook(ovsthread_cancel_ovsthread_key_destruct__,
|
|
|
|
|
NULL, NULL, true);
|
2014-01-14 14:35:48 -08:00
|
|
|
|
ovsthread_once_done(&once);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ovs_mutex_lock(&key_mutex);
|
2016-03-25 14:10:22 -07:00
|
|
|
|
if (ovs_list_is_empty(&free_keys)) {
|
2014-01-14 14:35:48 -08:00
|
|
|
|
key = xmalloc(sizeof *key);
|
|
|
|
|
key->index = n_keys++;
|
|
|
|
|
if (key->index >= MAX_KEYS) {
|
|
|
|
|
abort();
|
|
|
|
|
}
|
|
|
|
|
} else {
|
2016-03-25 14:10:22 -07:00
|
|
|
|
key = CONTAINER_OF(ovs_list_pop_back(&free_keys),
|
2014-01-14 14:35:48 -08:00
|
|
|
|
struct ovsthread_key, list_node);
|
|
|
|
|
}
|
2016-03-25 14:10:22 -07:00
|
|
|
|
ovs_list_push_back(&inuse_keys, &key->list_node);
|
2014-01-14 14:35:48 -08:00
|
|
|
|
key->destructor = destructor;
|
|
|
|
|
ovs_mutex_unlock(&key_mutex);
|
|
|
|
|
|
|
|
|
|
*keyp = key;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Frees 'key'. The destructor supplied to ovsthread_key_create(), if any, is
|
|
|
|
|
* not called.
|
|
|
|
|
*
|
|
|
|
|
* This function is similar to xpthread_key_delete(). */
|
|
|
|
|
void
|
|
|
|
|
ovsthread_key_delete(ovsthread_key_t key)
|
|
|
|
|
{
|
|
|
|
|
struct ovsthread_key_slots *slots;
|
|
|
|
|
|
|
|
|
|
ovs_mutex_lock(&key_mutex);
|
|
|
|
|
|
|
|
|
|
/* Move 'key' from 'inuse_keys' to 'free_keys'. */
|
2016-03-25 14:10:22 -07:00
|
|
|
|
ovs_list_remove(&key->list_node);
|
|
|
|
|
ovs_list_push_back(&free_keys, &key->list_node);
|
2014-01-14 14:35:48 -08:00
|
|
|
|
|
|
|
|
|
/* Clear this slot in all threads. */
|
|
|
|
|
LIST_FOR_EACH (slots, list_node, &slots_list) {
|
|
|
|
|
clear_slot(slots, key->index);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ovs_mutex_unlock(&key_mutex);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void **
|
|
|
|
|
ovsthread_key_lookup__(const struct ovsthread_key *key)
|
|
|
|
|
{
|
|
|
|
|
struct ovsthread_key_slots *slots;
|
|
|
|
|
void **p2;
|
|
|
|
|
|
|
|
|
|
slots = pthread_getspecific(tsd_key);
|
|
|
|
|
if (!slots) {
|
|
|
|
|
slots = xzalloc(sizeof *slots);
|
|
|
|
|
|
|
|
|
|
ovs_mutex_lock(&key_mutex);
|
|
|
|
|
pthread_setspecific(tsd_key, slots);
|
2016-03-25 14:10:22 -07:00
|
|
|
|
ovs_list_push_back(&slots_list, &slots->list_node);
|
2014-01-14 14:35:48 -08:00
|
|
|
|
ovs_mutex_unlock(&key_mutex);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
p2 = slots->p1[key->index / L2_SIZE];
|
|
|
|
|
if (!p2) {
|
|
|
|
|
p2 = xzalloc(L2_SIZE * sizeof *p2);
|
|
|
|
|
slots->p1[key->index / L2_SIZE] = p2;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return &p2[key->index % L2_SIZE];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Sets the value of thread-specific data item 'key', in the current thread, to
|
|
|
|
|
* 'value'.
|
|
|
|
|
*
|
|
|
|
|
* This function is similar to pthread_setspecific(). */
|
|
|
|
|
void
|
|
|
|
|
ovsthread_setspecific(ovsthread_key_t key, const void *value)
|
|
|
|
|
{
|
|
|
|
|
*ovsthread_key_lookup__(key) = CONST_CAST(void *, value);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Returns the value of thread-specific data item 'key' in the current thread.
|
|
|
|
|
*
|
|
|
|
|
* This function is similar to pthread_getspecific(). */
|
|
|
|
|
void *
|
|
|
|
|
ovsthread_getspecific(ovsthread_key_t key)
|
|
|
|
|
{
|
|
|
|
|
return *ovsthread_key_lookup__(key);
|
|
|
|
|
}
|
2013-06-24 11:05:10 -07:00
|
|
|
|
#endif
|