summaryrefslogtreecommitdiffstats
path: root/Documentation/RCU
diff options
context:
space:
mode:
authorJoel Fernandes (Google) <joel@joelfernandes.org>2019-03-29 10:05:55 -0400
committerPaul E. McKenney <paulmck@linux.ibm.com>2019-05-28 12:02:16 -0400
commitde1dbcee433ccff3e0a37698c65b40542c9d4cf1 (patch)
tree6465fbfa57570c5cd5e850f6c13d831c5cb7a8b0 /Documentation/RCU
parenta188339ca5a396acc588e5851ed7e19f66b0ebd9 (diff)
doc/rcuref: Document real world examples in kernel
Document similar real world examples in the kernel corresponding to the second and third code snippets. Also correct an issue in release_referenced() in the code snippet example. Cc: oleg@redhat.com Cc: jannh@google.com Signed-off-by: Joel Fernandes (Google) <joel@joelfernandes.org> [ paulmck: Do a bit of wordsmithing. ] Signed-off-by: Paul E. McKenney <paulmck@linux.ibm.com>
Diffstat (limited to 'Documentation/RCU')
-rw-r--r--Documentation/RCU/rcuref.txt21
1 files changed, 20 insertions, 1 deletions
diff --git a/Documentation/RCU/rcuref.txt b/Documentation/RCU/rcuref.txt
index 613033ff2b9b..5e6429d66c24 100644
--- a/Documentation/RCU/rcuref.txt
+++ b/Documentation/RCU/rcuref.txt
@@ -12,6 +12,7 @@ please read on.
12Reference counting on elements of lists which are protected by traditional 12Reference counting on elements of lists which are protected by traditional
13reader/writer spinlocks or semaphores are straightforward: 13reader/writer spinlocks or semaphores are straightforward:
14 14
15CODE LISTING A:
151. 2. 161. 2.
16add() search_and_reference() 17add() search_and_reference()
17{ { 18{ {
@@ -28,7 +29,8 @@ add() search_and_reference()
28release_referenced() delete() 29release_referenced() delete()
29{ { 30{ {
30 ... write_lock(&list_lock); 31 ... write_lock(&list_lock);
31 atomic_dec(&el->rc, relfunc) ... 32 if(atomic_dec_and_test(&el->rc)) ...
33 kfree(el);
32 ... remove_element 34 ... remove_element
33} write_unlock(&list_lock); 35} write_unlock(&list_lock);
34 ... 36 ...
@@ -44,6 +46,7 @@ search_and_reference() could potentially hold reference to an element which
44has already been deleted from the list/array. Use atomic_inc_not_zero() 46has already been deleted from the list/array. Use atomic_inc_not_zero()
45in this scenario as follows: 47in this scenario as follows:
46 48
49CODE LISTING B:
471. 2. 501. 2.
48add() search_and_reference() 51add() search_and_reference()
49{ { 52{ {
@@ -79,6 +82,7 @@ search_and_reference() code path. In such cases, the
79atomic_dec_and_test() may be moved from delete() to el_free() 82atomic_dec_and_test() may be moved from delete() to el_free()
80as follows: 83as follows:
81 84
85CODE LISTING C:
821. 2. 861. 2.
83add() search_and_reference() 87add() search_and_reference()
84{ { 88{ {
@@ -114,6 +118,17 @@ element can therefore safely be freed. This in turn guarantees that if
114any reader finds the element, that reader may safely acquire a reference 118any reader finds the element, that reader may safely acquire a reference
115without checking the value of the reference counter. 119without checking the value of the reference counter.
116 120
121A clear advantage of the RCU-based pattern in listing C over the one
122in listing B is that any call to search_and_reference() that locates
123a given object will succeed in obtaining a reference to that object,
124even given a concurrent invocation of delete() for that same object.
125Similarly, a clear advantage of both listings B and C over listing A is
126that a call to delete() is not delayed even if there are an arbitrarily
127large number of calls to search_and_reference() searching for the same
128object that delete() was invoked on. Instead, all that is delayed is
129the eventual invocation of kfree(), which is usually not a problem on
130modern computer systems, even the small ones.
131
117In cases where delete() can sleep, synchronize_rcu() can be called from 132In cases where delete() can sleep, synchronize_rcu() can be called from
118delete(), so that el_free() can be subsumed into delete as follows: 133delete(), so that el_free() can be subsumed into delete as follows:
119 134
@@ -130,3 +145,7 @@ delete()
130 kfree(el); 145 kfree(el);
131 ... 146 ...
132} 147}
148
149As additional examples in the kernel, the pattern in listing C is used by
150reference counting of struct pid, while the pattern in listing B is used by
151struct posix_acl.