]>
Commit | Line | Data |
---|---|---|
215e262f KO |
1 | /* |
2 | * Percpu refcounts: | |
3 | * (C) 2012 Google, Inc. | |
4 | * Author: Kent Overstreet <koverstreet@google.com> | |
5 | * | |
6 | * This implements a refcount with similar semantics to atomic_t - atomic_inc(), | |
7 | * atomic_dec_and_test() - but percpu. | |
8 | * | |
9 | * There's one important difference between percpu refs and normal atomic_t | |
10 | * refcounts; you have to keep track of your initial refcount, and then when you | |
11 | * start shutting down you call percpu_ref_kill() _before_ dropping the initial | |
12 | * refcount. | |
13 | * | |
14 | * The refcount will have a range of 0 to ((1U << 31) - 1), i.e. one bit less | |
15 | * than an atomic_t - this is because of the way shutdown works, see | |
16 | * percpu_ref_kill()/PCPU_COUNT_BIAS. | |
17 | * | |
18 | * Before you call percpu_ref_kill(), percpu_ref_put() does not check for the | |
19 | * refcount hitting 0 - it can't, if it was in percpu mode. percpu_ref_kill() | |
20 | * puts the ref back in single atomic_t mode, collecting the per cpu refs and | |
21 | * issuing the appropriate barriers, and then marks the ref as shutting down so | |
22 | * that percpu_ref_put() will check for the ref hitting 0. After it returns, | |
23 | * it's safe to drop the initial ref. | |
24 | * | |
25 | * USAGE: | |
26 | * | |
27 | * See fs/aio.c for some example usage; it's used there for struct kioctx, which | |
28 | * is created when userspaces calls io_setup(), and destroyed when userspace | |
29 | * calls io_destroy() or the process exits. | |
30 | * | |
31 | * In the aio code, kill_ioctx() is called when we wish to destroy a kioctx; it | |
32 | * calls percpu_ref_kill(), then hlist_del_rcu() and sychronize_rcu() to remove | |
33 | * the kioctx from the proccess's list of kioctxs - after that, there can't be | |
34 | * any new users of the kioctx (from lookup_ioctx()) and it's then safe to drop | |
35 | * the initial ref with percpu_ref_put(). | |
36 | * | |
37 | * Code that does a two stage shutdown like this often needs some kind of | |
38 | * explicit synchronization to ensure the initial refcount can only be dropped | |
39 | * once - percpu_ref_kill() does this for you, it returns true once and false if | |
40 | * someone else already called it. The aio code uses it this way, but it's not | |
41 | * necessary if the code has some other mechanism to synchronize teardown. | |
42 | * around. | |
43 | */ | |
44 | ||
45 | #ifndef _LINUX_PERCPU_REFCOUNT_H | |
46 | #define _LINUX_PERCPU_REFCOUNT_H | |
47 | ||
48 | #include <linux/atomic.h> | |
49 | #include <linux/kernel.h> | |
50 | #include <linux/percpu.h> | |
51 | #include <linux/rcupdate.h> | |
52 | ||
53 | struct percpu_ref; | |
ac899061 | 54 | typedef void (percpu_ref_func_t)(struct percpu_ref *); |
215e262f KO |
55 | |
56 | struct percpu_ref { | |
57 | atomic_t count; | |
58 | /* | |
59 | * The low bit of the pointer indicates whether the ref is in percpu | |
60 | * mode; if set, then get/put will manipulate the atomic_t (this is a | |
61 | * hack because we need to keep the pointer around for | |
62 | * percpu_ref_kill_rcu()) | |
63 | */ | |
64 | unsigned __percpu *pcpu_count; | |
ac899061 | 65 | percpu_ref_func_t *release; |
dbece3a0 | 66 | percpu_ref_func_t *confirm_kill; |
215e262f KO |
67 | struct rcu_head rcu; |
68 | }; | |
69 | ||
acac7883 TH |
70 | int __must_check percpu_ref_init(struct percpu_ref *ref, |
71 | percpu_ref_func_t *release); | |
bc497bd3 | 72 | void percpu_ref_cancel_init(struct percpu_ref *ref); |
dbece3a0 TH |
73 | void percpu_ref_kill_and_confirm(struct percpu_ref *ref, |
74 | percpu_ref_func_t *confirm_kill); | |
75 | ||
76 | /** | |
77 | * percpu_ref_kill - drop the initial ref | |
78 | * @ref: percpu_ref to kill | |
79 | * | |
80 | * Must be used to drop the initial ref on a percpu refcount; must be called | |
81 | * precisely once before shutdown. | |
82 | * | |
83 | * Puts @ref in non percpu mode, then does a call_rcu() before gathering up the | |
84 | * percpu counters and dropping the initial ref. | |
85 | */ | |
86 | static inline void percpu_ref_kill(struct percpu_ref *ref) | |
87 | { | |
88 | return percpu_ref_kill_and_confirm(ref, NULL); | |
89 | } | |
215e262f | 90 | |
215e262f KO |
91 | #define PCPU_REF_PTR 0 |
92 | #define PCPU_REF_DEAD 1 | |
93 | ||
d630dc4c | 94 | #define REF_STATUS(count) (((unsigned long) count) & PCPU_REF_DEAD) |
215e262f KO |
95 | |
96 | /** | |
97 | * percpu_ref_get - increment a percpu refcount | |
ac899061 | 98 | * @ref: percpu_ref to get |
215e262f KO |
99 | * |
100 | * Analagous to atomic_inc(). | |
101 | */ | |
102 | static inline void percpu_ref_get(struct percpu_ref *ref) | |
103 | { | |
104 | unsigned __percpu *pcpu_count; | |
105 | ||
a4244454 | 106 | rcu_read_lock_sched(); |
215e262f KO |
107 | |
108 | pcpu_count = ACCESS_ONCE(ref->pcpu_count); | |
109 | ||
110 | if (likely(REF_STATUS(pcpu_count) == PCPU_REF_PTR)) | |
0c36b390 | 111 | this_cpu_inc(*pcpu_count); |
215e262f KO |
112 | else |
113 | atomic_inc(&ref->count); | |
114 | ||
a4244454 | 115 | rcu_read_unlock_sched(); |
215e262f KO |
116 | } |
117 | ||
4fb6e250 TH |
118 | /** |
119 | * percpu_ref_tryget - try to increment a percpu refcount | |
120 | * @ref: percpu_ref to try-get | |
121 | * | |
122 | * Increment a percpu refcount unless its count already reached zero. | |
123 | * Returns %true on success; %false on failure. | |
124 | * | |
125 | * The caller is responsible for ensuring that @ref stays accessible. | |
126 | */ | |
127 | static inline bool percpu_ref_tryget(struct percpu_ref *ref) | |
128 | { | |
129 | unsigned __percpu *pcpu_count; | |
130 | int ret = false; | |
131 | ||
132 | rcu_read_lock_sched(); | |
133 | ||
134 | pcpu_count = ACCESS_ONCE(ref->pcpu_count); | |
135 | ||
136 | if (likely(REF_STATUS(pcpu_count) == PCPU_REF_PTR)) { | |
315c5554 | 137 | this_cpu_inc(*pcpu_count); |
4fb6e250 TH |
138 | ret = true; |
139 | } else { | |
140 | ret = atomic_inc_not_zero(&ref->count); | |
141 | } | |
142 | ||
143 | rcu_read_unlock_sched(); | |
144 | ||
145 | return ret; | |
146 | } | |
147 | ||
dbece3a0 | 148 | /** |
2070d50e | 149 | * percpu_ref_tryget_live - try to increment a live percpu refcount |
dbece3a0 TH |
150 | * @ref: percpu_ref to try-get |
151 | * | |
152 | * Increment a percpu refcount unless it has already been killed. Returns | |
153 | * %true on success; %false on failure. | |
154 | * | |
155 | * Completion of percpu_ref_kill() in itself doesn't guarantee that tryget | |
156 | * will fail. For such guarantee, percpu_ref_kill_and_confirm() should be | |
157 | * used. After the confirm_kill callback is invoked, it's guaranteed that | |
158 | * no new reference will be given out by percpu_ref_tryget(). | |
4fb6e250 TH |
159 | * |
160 | * The caller is responsible for ensuring that @ref stays accessible. | |
dbece3a0 | 161 | */ |
2070d50e | 162 | static inline bool percpu_ref_tryget_live(struct percpu_ref *ref) |
dbece3a0 TH |
163 | { |
164 | unsigned __percpu *pcpu_count; | |
165 | int ret = false; | |
166 | ||
a4244454 | 167 | rcu_read_lock_sched(); |
dbece3a0 TH |
168 | |
169 | pcpu_count = ACCESS_ONCE(ref->pcpu_count); | |
170 | ||
171 | if (likely(REF_STATUS(pcpu_count) == PCPU_REF_PTR)) { | |
0c36b390 | 172 | this_cpu_inc(*pcpu_count); |
dbece3a0 TH |
173 | ret = true; |
174 | } | |
175 | ||
a4244454 | 176 | rcu_read_unlock_sched(); |
dbece3a0 TH |
177 | |
178 | return ret; | |
179 | } | |
180 | ||
215e262f KO |
181 | /** |
182 | * percpu_ref_put - decrement a percpu refcount | |
ac899061 | 183 | * @ref: percpu_ref to put |
215e262f KO |
184 | * |
185 | * Decrement the refcount, and if 0, call the release function (which was passed | |
186 | * to percpu_ref_init()) | |
187 | */ | |
188 | static inline void percpu_ref_put(struct percpu_ref *ref) | |
189 | { | |
190 | unsigned __percpu *pcpu_count; | |
191 | ||
a4244454 | 192 | rcu_read_lock_sched(); |
215e262f KO |
193 | |
194 | pcpu_count = ACCESS_ONCE(ref->pcpu_count); | |
195 | ||
196 | if (likely(REF_STATUS(pcpu_count) == PCPU_REF_PTR)) | |
0c36b390 | 197 | this_cpu_dec(*pcpu_count); |
215e262f KO |
198 | else if (unlikely(atomic_dec_and_test(&ref->count))) |
199 | ref->release(ref); | |
200 | ||
a4244454 | 201 | rcu_read_unlock_sched(); |
215e262f KO |
202 | } |
203 | ||
204 | #endif |