memcg: fix GPF when cgroup removal races with last exit
[linux-2.6-block.git] / include / linux / seqlock.h
CommitLineData
1da177e4
LT
1#ifndef __LINUX_SEQLOCK_H
2#define __LINUX_SEQLOCK_H
3/*
4 * Reader/writer consistent mechanism without starving writers. This type of
d08df601 5 * lock for data where the reader wants a consistent set of information
1da177e4
LT
6 * and is willing to retry if the information changes. Readers never
7 * block but they may have to retry if a writer is in
8 * progress. Writers do not wait for readers.
9 *
10 * This is not as cache friendly as brlock. Also, this will not work
11 * for data that contains pointers, because any writer could
12 * invalidate a pointer that a reader was following.
13 *
14 * Expected reader usage:
15 * do {
16 * seq = read_seqbegin(&foo);
17 * ...
18 * } while (read_seqretry(&foo, seq));
19 *
20 *
21 * On non-SMP the spin locks disappear but the writer still needs
22 * to increment the sequence variables because an interrupt routine could
23 * change the state of the data.
24 *
25 * Based on x86_64 vsyscall gettimeofday
26 * by Keith Owens and Andrea Arcangeli
27 */
28
1da177e4
LT
29#include <linux/spinlock.h>
30#include <linux/preempt.h>
56a21052 31#include <asm/processor.h>
1da177e4
LT
32
33typedef struct {
34 unsigned sequence;
35 spinlock_t lock;
36} seqlock_t;
37
38/*
39 * These macros triggered gcc-3.x compile-time problems. We think these are
40 * OK now. Be cautious.
41 */
e4d91918
IM
42#define __SEQLOCK_UNLOCKED(lockname) \
43 { 0, __SPIN_LOCK_UNLOCKED(lockname) }
1da177e4 44
99a3eb38
IM
45#define seqlock_init(x) \
46 do { \
47 (x)->sequence = 0; \
48 spin_lock_init(&(x)->lock); \
49 } while (0)
e4d91918
IM
50
51#define DEFINE_SEQLOCK(x) \
52 seqlock_t x = __SEQLOCK_UNLOCKED(x)
1da177e4
LT
53
54/* Lock out other writers and update the count.
55 * Acts like a normal spin_lock/unlock.
56 * Don't need preempt_disable() because that is in the spin_lock already.
57 */
58static inline void write_seqlock(seqlock_t *sl)
59{
60 spin_lock(&sl->lock);
61 ++sl->sequence;
20f09390
DW
62 smp_wmb();
63}
1da177e4 64
20f09390 65static inline void write_sequnlock(seqlock_t *sl)
1da177e4
LT
66{
67 smp_wmb();
68 sl->sequence++;
69 spin_unlock(&sl->lock);
70}
71
72static inline int write_tryseqlock(seqlock_t *sl)
73{
74 int ret = spin_trylock(&sl->lock);
75
76 if (ret) {
77 ++sl->sequence;
20f09390 78 smp_wmb();
1da177e4
LT
79 }
80 return ret;
81}
82
83/* Start of read calculation -- fetch last complete writer token */
cde227af 84static __always_inline unsigned read_seqbegin(const seqlock_t *sl)
1da177e4 85{
88a411c0
IM
86 unsigned ret;
87
88repeat:
5db1256a 89 ret = ACCESS_ONCE(sl->sequence);
88a411c0
IM
90 if (unlikely(ret & 1)) {
91 cpu_relax();
92 goto repeat;
93 }
5db1256a 94 smp_rmb();
88a411c0 95
1da177e4
LT
96 return ret;
97}
98
88a411c0
IM
99/*
100 * Test if reader processed invalid data.
101 *
102 * If sequence value changed then writer changed data while in section.
1da177e4 103 */
88a411c0 104static __always_inline int read_seqretry(const seqlock_t *sl, unsigned start)
1da177e4
LT
105{
106 smp_rmb();
88a411c0 107
3c22cd57 108 return unlikely(sl->sequence != start);
1da177e4
LT
109}
110
111
112/*
113 * Version using sequence counter only.
114 * This can be used when code has its own mutex protecting the
115 * updating starting before the write_seqcountbeqin() and ending
116 * after the write_seqcount_end().
117 */
118
119typedef struct seqcount {
120 unsigned sequence;
121} seqcount_t;
122
123#define SEQCNT_ZERO { 0 }
124#define seqcount_init(x) do { *(x) = (seqcount_t) SEQCNT_ZERO; } while (0)
125
3c22cd57
NP
126/**
127 * __read_seqcount_begin - begin a seq-read critical section (without barrier)
128 * @s: pointer to seqcount_t
129 * Returns: count to be passed to read_seqcount_retry
130 *
131 * __read_seqcount_begin is like read_seqcount_begin, but has no smp_rmb()
132 * barrier. Callers should ensure that smp_rmb() or equivalent ordering is
133 * provided before actually loading any of the variables that are to be
134 * protected in this critical section.
135 *
136 * Use carefully, only in critical code, and comment how the barrier is
137 * provided.
138 */
139static inline unsigned __read_seqcount_begin(const seqcount_t *s)
1da177e4 140{
88a411c0
IM
141 unsigned ret;
142
143repeat:
144 ret = s->sequence;
88a411c0
IM
145 if (unlikely(ret & 1)) {
146 cpu_relax();
147 goto repeat;
148 }
1da177e4
LT
149 return ret;
150}
151
3c22cd57
NP
152/**
153 * read_seqcount_begin - begin a seq-read critical section
154 * @s: pointer to seqcount_t
155 * Returns: count to be passed to read_seqcount_retry
156 *
157 * read_seqcount_begin opens a read critical section of the given seqcount.
158 * Validity of the critical section is tested by checking read_seqcount_retry
159 * function.
160 */
161static inline unsigned read_seqcount_begin(const seqcount_t *s)
162{
163 unsigned ret = __read_seqcount_begin(s);
164 smp_rmb();
165 return ret;
166}
167
168/**
169 * __read_seqcount_retry - end a seq-read critical section (without barrier)
170 * @s: pointer to seqcount_t
171 * @start: count, from read_seqcount_begin
172 * Returns: 1 if retry is required, else 0
173 *
174 * __read_seqcount_retry is like read_seqcount_retry, but has no smp_rmb()
175 * barrier. Callers should ensure that smp_rmb() or equivalent ordering is
176 * provided before actually loading any of the variables that are to be
177 * protected in this critical section.
178 *
179 * Use carefully, only in critical code, and comment how the barrier is
180 * provided.
181 */
182static inline int __read_seqcount_retry(const seqcount_t *s, unsigned start)
183{
184 return unlikely(s->sequence != start);
185}
186
187/**
188 * read_seqcount_retry - end a seq-read critical section
189 * @s: pointer to seqcount_t
190 * @start: count, from read_seqcount_begin
191 * Returns: 1 if retry is required, else 0
192 *
193 * read_seqcount_retry closes a read critical section of the given seqcount.
194 * If the critical section was invalid, it must be ignored (and typically
195 * retried).
1da177e4 196 */
88a411c0 197static inline int read_seqcount_retry(const seqcount_t *s, unsigned start)
1da177e4
LT
198{
199 smp_rmb();
88a411c0 200
3c22cd57 201 return __read_seqcount_retry(s, start);
1da177e4
LT
202}
203
204
205/*
206 * Sequence counter only version assumes that callers are using their
207 * own mutexing.
208 */
209static inline void write_seqcount_begin(seqcount_t *s)
210{
211 s->sequence++;
212 smp_wmb();
213}
214
215static inline void write_seqcount_end(seqcount_t *s)
216{
217 smp_wmb();
218 s->sequence++;
219}
220
3c22cd57
NP
221/**
222 * write_seqcount_barrier - invalidate in-progress read-side seq operations
223 * @s: pointer to seqcount_t
224 *
225 * After write_seqcount_barrier, no read-side seq operations will complete
226 * successfully and see data older than this.
227 */
228static inline void write_seqcount_barrier(seqcount_t *s)
229{
230 smp_wmb();
231 s->sequence+=2;
232}
233
1da177e4
LT
234/*
235 * Possible sw/hw IRQ protected versions of the interfaces.
236 */
237#define write_seqlock_irqsave(lock, flags) \
238 do { local_irq_save(flags); write_seqlock(lock); } while (0)
239#define write_seqlock_irq(lock) \
240 do { local_irq_disable(); write_seqlock(lock); } while (0)
241#define write_seqlock_bh(lock) \
242 do { local_bh_disable(); write_seqlock(lock); } while (0)
243
244#define write_sequnlock_irqrestore(lock, flags) \
245 do { write_sequnlock(lock); local_irq_restore(flags); } while(0)
246#define write_sequnlock_irq(lock) \
247 do { write_sequnlock(lock); local_irq_enable(); } while(0)
248#define write_sequnlock_bh(lock) \
249 do { write_sequnlock(lock); local_bh_enable(); } while(0)
250
251#define read_seqbegin_irqsave(lock, flags) \
252 ({ local_irq_save(flags); read_seqbegin(lock); })
253
254#define read_seqretry_irqrestore(lock, iv, flags) \
255 ({ \
256 int ret = read_seqretry(lock, iv); \
257 local_irq_restore(flags); \
258 ret; \
259 })
260
261#endif /* __LINUX_SEQLOCK_H */