Merge tag 'v3.10.55' into update
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / include / linux / rculist.h
CommitLineData
82524746
FBH
1#ifndef _LINUX_RCULIST_H
2#define _LINUX_RCULIST_H
3
4#ifdef __KERNEL__
5
6/*
7 * RCU-protected list version
8 */
9#include <linux/list.h>
10aa9d2c 10#include <linux/rcupdate.h>
82524746 11
65e6bf48
PM
12/*
13 * Why is there no list_empty_rcu()? Because list_empty() serves this
14 * purpose. The list_empty() function fetches the RCU-protected pointer
15 * and compares it to the address of the list head, but neither dereferences
16 * this pointer itself nor provides this pointer to the caller. Therefore,
17 * it is not necessary to use rcu_dereference(), so that list_empty() can
18 * be used anywhere you would want to use a list_empty_rcu().
19 */
20
67bdbffd
AB
21/*
22 * return the ->next pointer of a list_head in an rcu safe
23 * way, we must not access it directly
24 */
25#define list_next_rcu(list) (*((struct list_head __rcu **)(&(list)->next)))
26
82524746
FBH
27/*
28 * Insert a new entry between two known consecutive entries.
29 *
30 * This is only for internal list manipulation where we know
31 * the prev/next entries already!
32 */
559f9bad 33#ifndef CONFIG_DEBUG_LIST
82524746
FBH
34static inline void __list_add_rcu(struct list_head *new,
35 struct list_head *prev, struct list_head *next)
36{
37 new->next = next;
38 new->prev = prev;
67bdbffd 39 rcu_assign_pointer(list_next_rcu(prev), new);
82524746 40 next->prev = new;
82524746 41}
559f9bad
DJ
42#else
43extern void __list_add_rcu(struct list_head *new,
44 struct list_head *prev, struct list_head *next);
45#endif
82524746
FBH
46
47/**
48 * list_add_rcu - add a new entry to rcu-protected list
49 * @new: new entry to be added
50 * @head: list head to add it after
51 *
52 * Insert a new entry after the specified head.
53 * This is good for implementing stacks.
54 *
55 * The caller must take whatever precautions are necessary
56 * (such as holding appropriate locks) to avoid racing
57 * with another list-mutation primitive, such as list_add_rcu()
58 * or list_del_rcu(), running on this same list.
59 * However, it is perfectly legal to run concurrently with
60 * the _rcu list-traversal primitives, such as
61 * list_for_each_entry_rcu().
62 */
63static inline void list_add_rcu(struct list_head *new, struct list_head *head)
64{
65 __list_add_rcu(new, head, head->next);
66}
67
68/**
69 * list_add_tail_rcu - add a new entry to rcu-protected list
70 * @new: new entry to be added
71 * @head: list head to add it before
72 *
73 * Insert a new entry before the specified head.
74 * This is useful for implementing queues.
75 *
76 * The caller must take whatever precautions are necessary
77 * (such as holding appropriate locks) to avoid racing
78 * with another list-mutation primitive, such as list_add_tail_rcu()
79 * or list_del_rcu(), running on this same list.
80 * However, it is perfectly legal to run concurrently with
81 * the _rcu list-traversal primitives, such as
82 * list_for_each_entry_rcu().
83 */
84static inline void list_add_tail_rcu(struct list_head *new,
85 struct list_head *head)
86{
87 __list_add_rcu(new, head->prev, head);
88}
89
90/**
91 * list_del_rcu - deletes entry from list without re-initialization
92 * @entry: the element to delete from the list.
93 *
94 * Note: list_empty() on entry does not return true after this,
95 * the entry is in an undefined state. It is useful for RCU based
96 * lockfree traversal.
97 *
98 * In particular, it means that we can not poison the forward
99 * pointers that may still be used for walking the list.
100 *
101 * The caller must take whatever precautions are necessary
102 * (such as holding appropriate locks) to avoid racing
103 * with another list-mutation primitive, such as list_del_rcu()
104 * or list_add_rcu(), running on this same list.
105 * However, it is perfectly legal to run concurrently with
106 * the _rcu list-traversal primitives, such as
107 * list_for_each_entry_rcu().
108 *
109 * Note that the caller is not permitted to immediately free
110 * the newly deleted entry. Instead, either synchronize_rcu()
111 * or call_rcu() must be used to defer freeing until an RCU
112 * grace period has elapsed.
113 */
114static inline void list_del_rcu(struct list_head *entry)
115{
559f9bad 116 __list_del_entry(entry);
82524746
FBH
117 entry->prev = LIST_POISON2;
118}
119
6beeac76
AA
120/**
121 * hlist_del_init_rcu - deletes entry from hash list with re-initialization
122 * @n: the element to delete from the hash list.
123 *
124 * Note: list_unhashed() on the node return true after this. It is
125 * useful for RCU based read lockfree traversal if the writer side
126 * must know if the list entry is still hashed or already unhashed.
127 *
128 * In particular, it means that we can not poison the forward pointers
129 * that may still be used for walking the hash list and we can only
130 * zero the pprev pointer so list_unhashed() will return true after
131 * this.
132 *
133 * The caller must take whatever precautions are necessary (such as
134 * holding appropriate locks) to avoid racing with another
135 * list-mutation primitive, such as hlist_add_head_rcu() or
136 * hlist_del_rcu(), running on this same list. However, it is
137 * perfectly legal to run concurrently with the _rcu list-traversal
138 * primitives, such as hlist_for_each_entry_rcu().
139 */
140static inline void hlist_del_init_rcu(struct hlist_node *n)
141{
142 if (!hlist_unhashed(n)) {
143 __hlist_del(n);
144 n->pprev = NULL;
145 }
146}
147
82524746
FBH
148/**
149 * list_replace_rcu - replace old entry by new one
150 * @old : the element to be replaced
151 * @new : the new element to insert
152 *
153 * The @old entry will be replaced with the @new entry atomically.
154 * Note: @old should not be empty.
155 */
156static inline void list_replace_rcu(struct list_head *old,
157 struct list_head *new)
158{
159 new->next = old->next;
160 new->prev = old->prev;
67bdbffd 161 rcu_assign_pointer(list_next_rcu(new->prev), new);
82524746 162 new->next->prev = new;
82524746
FBH
163 old->prev = LIST_POISON2;
164}
165
166/**
167 * list_splice_init_rcu - splice an RCU-protected list into an existing list.
168 * @list: the RCU-protected list to splice
169 * @head: the place in the list to splice the first list into
170 * @sync: function to sync: synchronize_rcu(), synchronize_sched(), ...
171 *
172 * @head can be RCU-read traversed concurrently with this function.
173 *
174 * Note that this function blocks.
175 *
176 * Important note: the caller must take whatever action is necessary to
177 * prevent any other updates to @head. In principle, it is possible
178 * to modify the list as soon as sync() begins execution.
179 * If this sort of thing becomes necessary, an alternative version
180 * based on call_rcu() could be created. But only if -really-
181 * needed -- there is no shortage of RCU API members.
182 */
183static inline void list_splice_init_rcu(struct list_head *list,
184 struct list_head *head,
185 void (*sync)(void))
186{
187 struct list_head *first = list->next;
188 struct list_head *last = list->prev;
189 struct list_head *at = head->next;
190
7f708931 191 if (list_empty(list))
82524746
FBH
192 return;
193
194 /* "first" and "last" tracking list, so initialize it. */
195
196 INIT_LIST_HEAD(list);
197
198 /*
199 * At this point, the list body still points to the source list.
200 * Wait for any readers to finish using the list before splicing
201 * the list body into the new list. Any new readers will see
202 * an empty list.
203 */
204
205 sync();
206
207 /*
208 * Readers are finished with the source list, so perform splice.
209 * The order is important if the new list is global and accessible
210 * to concurrent RCU readers. Note that RCU readers are not
211 * permitted to traverse the prev pointers without excluding
212 * this function.
213 */
214
215 last->next = at;
67bdbffd 216 rcu_assign_pointer(list_next_rcu(head), first);
82524746
FBH
217 first->prev = head;
218 at->prev = last;
219}
220
72c6a987
JP
221/**
222 * list_entry_rcu - get the struct for this entry
223 * @ptr: the &struct list_head pointer.
224 * @type: the type of the struct this is embedded in.
225 * @member: the name of the list_struct within the struct.
226 *
227 * This primitive may safely run concurrently with the _rcu list-mutation
228 * primitives such as list_add_rcu() as long as it's guarded by rcu_read_lock().
229 */
230#define list_entry_rcu(ptr, type, member) \
67bdbffd
AB
231 ({typeof (*ptr) __rcu *__ptr = (typeof (*ptr) __rcu __force *)ptr; \
232 container_of((typeof(ptr))rcu_dereference_raw(__ptr), type, member); \
233 })
72c6a987
JP
234
235/**
f88022a4
MM
236 * Where are list_empty_rcu() and list_first_entry_rcu()?
237 *
238 * Implementing those functions following their counterparts list_empty() and
239 * list_first_entry() is not advisable because they lead to subtle race
240 * conditions as the following snippet shows:
241 *
242 * if (!list_empty_rcu(mylist)) {
243 * struct foo *bar = list_first_entry_rcu(mylist, struct foo, list_member);
244 * do_something(bar);
245 * }
246 *
247 * The list may not be empty when list_empty_rcu checks it, but it may be when
248 * list_first_entry_rcu rereads the ->next pointer.
249 *
250 * Rereading the ->next pointer is not a problem for list_empty() and
251 * list_first_entry() because they would be protected by a lock that blocks
252 * writers.
253 *
254 * See list_first_or_null_rcu for an alternative.
255 */
256
257/**
258 * list_first_or_null_rcu - get the first element from a list
72c6a987
JP
259 * @ptr: the list head to take the element from.
260 * @type: the type of the struct this is embedded in.
261 * @member: the name of the list_struct within the struct.
262 *
f88022a4 263 * Note that if the list is empty, it returns NULL.
72c6a987
JP
264 *
265 * This primitive may safely run concurrently with the _rcu list-mutation
266 * primitives such as list_add_rcu() as long as it's guarded by rcu_read_lock().
267 */
f88022a4
MM
268#define list_first_or_null_rcu(ptr, type, member) \
269 ({struct list_head *__ptr = (ptr); \
215840ab
TH
270 struct list_head *__next = ACCESS_ONCE(__ptr->next); \
271 likely(__ptr != __next) ? \
272 list_entry_rcu(__next, type, member) : NULL; \
f88022a4 273 })
72c6a987 274
82524746
FBH
275/**
276 * list_for_each_entry_rcu - iterate over rcu list of given type
277 * @pos: the type * to use as a loop cursor.
278 * @head: the head for your list.
279 * @member: the name of the list_struct within the struct.
280 *
281 * This list-traversal primitive may safely run concurrently with
282 * the _rcu list-mutation primitives such as list_add_rcu()
283 * as long as the traversal is guarded by rcu_read_lock().
284 */
285#define list_for_each_entry_rcu(pos, head, member) \
72c6a987 286 for (pos = list_entry_rcu((head)->next, typeof(*pos), member); \
e66eed65 287 &pos->member != (head); \
72c6a987 288 pos = list_entry_rcu(pos->member.next, typeof(*pos), member))
82524746 289
254245d2 290/**
291 * list_for_each_entry_continue_rcu - continue iteration over list of given type
292 * @pos: the type * to use as a loop cursor.
293 * @head: the head for your list.
294 * @member: the name of the list_struct within the struct.
295 *
296 * Continue to iterate over list of given type, continuing after
297 * the current position.
298 */
299#define list_for_each_entry_continue_rcu(pos, head, member) \
300 for (pos = list_entry_rcu(pos->member.next, typeof(*pos), member); \
e66eed65 301 &pos->member != (head); \
254245d2 302 pos = list_entry_rcu(pos->member.next, typeof(*pos), member))
303
82524746
FBH
304/**
305 * hlist_del_rcu - deletes entry from hash list without re-initialization
306 * @n: the element to delete from the hash list.
307 *
308 * Note: list_unhashed() on entry does not return true after this,
309 * the entry is in an undefined state. It is useful for RCU based
310 * lockfree traversal.
311 *
312 * In particular, it means that we can not poison the forward
313 * pointers that may still be used for walking the hash list.
314 *
315 * The caller must take whatever precautions are necessary
316 * (such as holding appropriate locks) to avoid racing
317 * with another list-mutation primitive, such as hlist_add_head_rcu()
318 * or hlist_del_rcu(), running on this same list.
319 * However, it is perfectly legal to run concurrently with
320 * the _rcu list-traversal primitives, such as
321 * hlist_for_each_entry().
322 */
323static inline void hlist_del_rcu(struct hlist_node *n)
324{
325 __hlist_del(n);
326 n->pprev = LIST_POISON2;
327}
328
329/**
330 * hlist_replace_rcu - replace old entry by new one
331 * @old : the element to be replaced
332 * @new : the new element to insert
333 *
334 * The @old entry will be replaced with the @new entry atomically.
335 */
336static inline void hlist_replace_rcu(struct hlist_node *old,
337 struct hlist_node *new)
338{
339 struct hlist_node *next = old->next;
340
341 new->next = next;
342 new->pprev = old->pprev;
67bdbffd 343 rcu_assign_pointer(*(struct hlist_node __rcu **)new->pprev, new);
82524746
FBH
344 if (next)
345 new->next->pprev = &new->next;
82524746
FBH
346 old->pprev = LIST_POISON2;
347}
348
67bdbffd
AB
349/*
350 * return the first or the next element in an RCU protected hlist
351 */
352#define hlist_first_rcu(head) (*((struct hlist_node __rcu **)(&(head)->first)))
353#define hlist_next_rcu(node) (*((struct hlist_node __rcu **)(&(node)->next)))
354#define hlist_pprev_rcu(node) (*((struct hlist_node __rcu **)((node)->pprev)))
355
82524746
FBH
356/**
357 * hlist_add_head_rcu
358 * @n: the element to add to the hash list.
359 * @h: the list to add to.
360 *
361 * Description:
362 * Adds the specified element to the specified hlist,
363 * while permitting racing traversals.
364 *
365 * The caller must take whatever precautions are necessary
366 * (such as holding appropriate locks) to avoid racing
367 * with another list-mutation primitive, such as hlist_add_head_rcu()
368 * or hlist_del_rcu(), running on this same list.
369 * However, it is perfectly legal to run concurrently with
370 * the _rcu list-traversal primitives, such as
371 * hlist_for_each_entry_rcu(), used to prevent memory-consistency
372 * problems on Alpha CPUs. Regardless of the type of CPU, the
373 * list-traversal primitive must be guarded by rcu_read_lock().
374 */
375static inline void hlist_add_head_rcu(struct hlist_node *n,
376 struct hlist_head *h)
377{
378 struct hlist_node *first = h->first;
10aa9d2c 379
82524746
FBH
380 n->next = first;
381 n->pprev = &h->first;
67bdbffd 382 rcu_assign_pointer(hlist_first_rcu(h), n);
82524746
FBH
383 if (first)
384 first->pprev = &n->next;
82524746
FBH
385}
386
387/**
388 * hlist_add_before_rcu
389 * @n: the new element to add to the hash list.
390 * @next: the existing element to add the new element before.
391 *
392 * Description:
393 * Adds the specified element to the specified hlist
394 * before the specified node while permitting racing traversals.
395 *
396 * The caller must take whatever precautions are necessary
397 * (such as holding appropriate locks) to avoid racing
398 * with another list-mutation primitive, such as hlist_add_head_rcu()
399 * or hlist_del_rcu(), running on this same list.
400 * However, it is perfectly legal to run concurrently with
401 * the _rcu list-traversal primitives, such as
402 * hlist_for_each_entry_rcu(), used to prevent memory-consistency
403 * problems on Alpha CPUs.
404 */
405static inline void hlist_add_before_rcu(struct hlist_node *n,
406 struct hlist_node *next)
407{
408 n->pprev = next->pprev;
409 n->next = next;
67bdbffd 410 rcu_assign_pointer(hlist_pprev_rcu(n), n);
82524746 411 next->pprev = &n->next;
82524746
FBH
412}
413
414/**
415 * hlist_add_after_rcu
416 * @prev: the existing element to add the new element after.
417 * @n: the new element to add to the hash list.
418 *
419 * Description:
420 * Adds the specified element to the specified hlist
421 * after the specified node while permitting racing traversals.
422 *
423 * The caller must take whatever precautions are necessary
424 * (such as holding appropriate locks) to avoid racing
425 * with another list-mutation primitive, such as hlist_add_head_rcu()
426 * or hlist_del_rcu(), running on this same list.
427 * However, it is perfectly legal to run concurrently with
428 * the _rcu list-traversal primitives, such as
429 * hlist_for_each_entry_rcu(), used to prevent memory-consistency
430 * problems on Alpha CPUs.
431 */
432static inline void hlist_add_after_rcu(struct hlist_node *prev,
433 struct hlist_node *n)
434{
435 n->next = prev->next;
436 n->pprev = &prev->next;
67bdbffd 437 rcu_assign_pointer(hlist_next_rcu(prev), n);
82524746
FBH
438 if (n->next)
439 n->next->pprev = &n->next;
440}
441
67bdbffd
AB
442#define __hlist_for_each_rcu(pos, head) \
443 for (pos = rcu_dereference(hlist_first_rcu(head)); \
75d65a42 444 pos; \
67bdbffd 445 pos = rcu_dereference(hlist_next_rcu(pos)))
1cc52327 446
82524746
FBH
447/**
448 * hlist_for_each_entry_rcu - iterate over rcu list of given type
b67bfe0d 449 * @pos: the type * to use as a loop cursor.
82524746
FBH
450 * @head: the head for your list.
451 * @member: the name of the hlist_node within the struct.
452 *
453 * This list-traversal primitive may safely run concurrently with
454 * the _rcu list-mutation primitives such as hlist_add_head_rcu()
455 * as long as the traversal is guarded by rcu_read_lock().
456 */
b67bfe0d
SL
457#define hlist_for_each_entry_rcu(pos, head, member) \
458 for (pos = hlist_entry_safe (rcu_dereference_raw(hlist_first_rcu(head)),\
459 typeof(*(pos)), member); \
460 pos; \
461 pos = hlist_entry_safe(rcu_dereference_raw(hlist_next_rcu(\
462 &(pos)->member)), typeof(*(pos)), member))
82524746 463
12bcbe66
SR
464/**
465 * hlist_for_each_entry_rcu_notrace - iterate over rcu list of given type (for tracing)
466 * @pos: the type * to use as a loop cursor.
467 * @head: the head for your list.
468 * @member: the name of the hlist_node within the struct.
469 *
470 * This list-traversal primitive may safely run concurrently with
471 * the _rcu list-mutation primitives such as hlist_add_head_rcu()
472 * as long as the traversal is guarded by rcu_read_lock().
473 *
474 * This is the same as hlist_for_each_entry_rcu() except that it does
475 * not do any RCU debugging or tracing.
476 */
477#define hlist_for_each_entry_rcu_notrace(pos, head, member) \
478 for (pos = hlist_entry_safe (rcu_dereference_raw_notrace(hlist_first_rcu(head)),\
479 typeof(*(pos)), member); \
480 pos; \
481 pos = hlist_entry_safe(rcu_dereference_raw_notrace(hlist_next_rcu(\
482 &(pos)->member)), typeof(*(pos)), member))
483
4f70ecca
ED
484/**
485 * hlist_for_each_entry_rcu_bh - iterate over rcu list of given type
b67bfe0d 486 * @pos: the type * to use as a loop cursor.
4f70ecca
ED
487 * @head: the head for your list.
488 * @member: the name of the hlist_node within the struct.
489 *
490 * This list-traversal primitive may safely run concurrently with
491 * the _rcu list-mutation primitives such as hlist_add_head_rcu()
492 * as long as the traversal is guarded by rcu_read_lock().
493 */
b67bfe0d
SL
494#define hlist_for_each_entry_rcu_bh(pos, head, member) \
495 for (pos = hlist_entry_safe(rcu_dereference_bh(hlist_first_rcu(head)),\
496 typeof(*(pos)), member); \
497 pos; \
498 pos = hlist_entry_safe(rcu_dereference_bh(hlist_next_rcu(\
499 &(pos)->member)), typeof(*(pos)), member))
4f70ecca 500
5c578aed 501/**
502 * hlist_for_each_entry_continue_rcu - iterate over a hlist continuing after current point
b67bfe0d 503 * @pos: the type * to use as a loop cursor.
5c578aed 504 * @member: the name of the hlist_node within the struct.
505 */
b67bfe0d
SL
506#define hlist_for_each_entry_continue_rcu(pos, member) \
507 for (pos = hlist_entry_safe(rcu_dereference((pos)->member.next),\
508 typeof(*(pos)), member); \
509 pos; \
510 pos = hlist_entry_safe(rcu_dereference((pos)->member.next),\
511 typeof(*(pos)), member))
5c578aed 512
4f70ecca
ED
513/**
514 * hlist_for_each_entry_continue_rcu_bh - iterate over a hlist continuing after current point
b67bfe0d 515 * @pos: the type * to use as a loop cursor.
4f70ecca
ED
516 * @member: the name of the hlist_node within the struct.
517 */
b67bfe0d
SL
518#define hlist_for_each_entry_continue_rcu_bh(pos, member) \
519 for (pos = hlist_entry_safe(rcu_dereference_bh((pos)->member.next),\
520 typeof(*(pos)), member); \
521 pos; \
522 pos = hlist_entry_safe(rcu_dereference_bh((pos)->member.next),\
523 typeof(*(pos)), member))
4f70ecca 524
5c578aed 525
82524746
FBH
526#endif /* __KERNEL__ */
527#endif