blob: 89eae7f6b3601612e858688282be6a55770e7b3f [file] [log] [blame]
Peter Zijlstra706eeb32017-06-12 14:50:27 +02001
2On atomic types (atomic_t atomic64_t and atomic_long_t).
3
4The atomic type provides an interface to the architecture's means of atomic
5RMW operations between CPUs (atomic operations on MMIO are not supported and
6can lead to fatal traps on some platforms).
7
8API
9---
10
11The 'full' API consists of (atomic64_ and atomic_long_ prefixes omitted for
12brevity):
13
14Non-RMW ops:
15
16 atomic_read(), atomic_set()
17 atomic_read_acquire(), atomic_set_release()
18
19
20RMW atomic operations:
21
22Arithmetic:
23
24 atomic_{add,sub,inc,dec}()
25 atomic_{add,sub,inc,dec}_return{,_relaxed,_acquire,_release}()
26 atomic_fetch_{add,sub,inc,dec}{,_relaxed,_acquire,_release}()
27
28
29Bitwise:
30
31 atomic_{and,or,xor,andnot}()
32 atomic_fetch_{and,or,xor,andnot}{,_relaxed,_acquire,_release}()
33
34
35Swap:
36
37 atomic_xchg{,_relaxed,_acquire,_release}()
38 atomic_cmpxchg{,_relaxed,_acquire,_release}()
39 atomic_try_cmpxchg{,_relaxed,_acquire,_release}()
40
41
42Reference count (but please see refcount_t):
43
44 atomic_add_unless(), atomic_inc_not_zero()
45 atomic_sub_and_test(), atomic_dec_and_test()
46
47
48Misc:
49
50 atomic_inc_and_test(), atomic_add_negative()
51 atomic_dec_unless_positive(), atomic_inc_unless_negative()
52
53
54Barriers:
55
56 smp_mb__{before,after}_atomic()
57
58
Peter Zijlstraf1887142019-02-11 18:09:43 +010059TYPES (signed vs unsigned)
60-----
61
62While atomic_t, atomic_long_t and atomic64_t use int, long and s64
63respectively (for hysterical raisins), the kernel uses -fno-strict-overflow
64(which implies -fwrapv) and defines signed overflow to behave like
652s-complement.
66
67Therefore, an explicitly unsigned variant of the atomic ops is strictly
68unnecessary and we can simply cast, there is no UB.
69
70There was a bug in UBSAN prior to GCC-8 that would generate UB warnings for
71signed types.
72
73With this we also conform to the C/C++ _Atomic behaviour and things like
74P1236R1.
75
Peter Zijlstra706eeb32017-06-12 14:50:27 +020076
77SEMANTICS
78---------
79
80Non-RMW ops:
81
82The non-RMW ops are (typically) regular LOADs and STOREs and are canonically
83implemented using READ_ONCE(), WRITE_ONCE(), smp_load_acquire() and
Peter Zijlstrafff9b6c2019-05-24 13:52:31 +020084smp_store_release() respectively. Therefore, if you find yourself only using
85the Non-RMW operations of atomic_t, you do not in fact need atomic_t at all
86and are doing it wrong.
Peter Zijlstra706eeb32017-06-12 14:50:27 +020087
Peter Zijlstrafff9b6c2019-05-24 13:52:31 +020088A subtle detail of atomic_set{}() is that it should be observable to the RMW
Peter Zijlstra706eeb32017-06-12 14:50:27 +020089ops. That is:
90
91 C atomic-set
92
93 {
94 atomic_set(v, 1);
95 }
96
97 P1(atomic_t *v)
98 {
99 atomic_add_unless(v, 1, 0);
100 }
101
102 P2(atomic_t *v)
103 {
104 atomic_set(v, 0);
105 }
106
107 exists
108 (v=2)
109
110In this case we would expect the atomic_set() from CPU1 to either happen
111before the atomic_add_unless(), in which case that latter one would no-op, or
112_after_ in which case we'd overwrite its result. In no case is "2" a valid
113outcome.
114
115This is typically true on 'normal' platforms, where a regular competing STORE
116will invalidate a LL/SC or fail a CMPXCHG.
117
118The obvious case where this is not so is when we need to implement atomic ops
119with a lock:
120
121 CPU0 CPU1
122
123 atomic_add_unless(v, 1, 0);
124 lock();
125 ret = READ_ONCE(v->counter); // == 1
126 atomic_set(v, 0);
127 if (ret != u) WRITE_ONCE(v->counter, 0);
128 WRITE_ONCE(v->counter, ret + 1);
129 unlock();
130
131the typical solution is to then implement atomic_set{}() with atomic_xchg().
132
133
134RMW ops:
135
136These come in various forms:
137
138 - plain operations without return value: atomic_{}()
139
140 - operations which return the modified value: atomic_{}_return()
141
142 these are limited to the arithmetic operations because those are
143 reversible. Bitops are irreversible and therefore the modified value
144 is of dubious utility.
145
146 - operations which return the original value: atomic_fetch_{}()
147
148 - swap operations: xchg(), cmpxchg() and try_cmpxchg()
149
150 - misc; the special purpose operations that are commonly used and would,
151 given the interface, normally be implemented using (try_)cmpxchg loops but
152 are time critical and can, (typically) on LL/SC architectures, be more
153 efficiently implemented.
154
155All these operations are SMP atomic; that is, the operations (for a single
156atomic variable) can be fully ordered and no intermediate state is lost or
157visible.
158
159
160ORDERING (go read memory-barriers.txt first)
161--------
162
163The rule of thumb:
164
165 - non-RMW operations are unordered;
166
167 - RMW operations that have no return value are unordered;
168
169 - RMW operations that have a return value are fully ordered;
170
171 - RMW operations that are conditional are unordered on FAILURE,
172 otherwise the above rules apply.
173
174Except of course when an operation has an explicit ordering like:
175
176 {}_relaxed: unordered
177 {}_acquire: the R of the RMW (or atomic_read) is an ACQUIRE
178 {}_release: the W of the RMW (or atomic_set) is a RELEASE
179
180Where 'unordered' is against other memory locations. Address dependencies are
181not defeated.
182
183Fully ordered primitives are ordered against everything prior and everything
184subsequent. Therefore a fully ordered primitive is like having an smp_mb()
185before and an smp_mb() after the primitive.
186
187
188The barriers:
189
190 smp_mb__{before,after}_atomic()
191
192only apply to the RMW ops and can be used to augment/upgrade the ordering
193inherent to the used atomic op. These barriers provide a full smp_mb().
194
195These helper barriers exist because architectures have varying implicit
196ordering on their SMP atomic primitives. For example our TSO architectures
197provide full ordered atomics and these barriers are no-ops.
198
199Thus:
200
201 atomic_fetch_add();
202
203is equivalent to:
204
205 smp_mb__before_atomic();
206 atomic_fetch_add_relaxed();
207 smp_mb__after_atomic();
208
209However the atomic_fetch_add() might be implemented more efficiently.
210
211Further, while something like:
212
213 smp_mb__before_atomic();
214 atomic_dec(&X);
215
216is a 'typical' RELEASE pattern, the barrier is strictly stronger than
217a RELEASE. Similarly for something like:
218
Peter Zijlstraca110692017-08-23 18:15:20 +0200219 atomic_inc(&X);
220 smp_mb__after_atomic();
Peter Zijlstra706eeb32017-06-12 14:50:27 +0200221
Peter Zijlstraca110692017-08-23 18:15:20 +0200222is an ACQUIRE pattern (though very much not typical), but again the barrier is
223strictly stronger than ACQUIRE. As illustrated:
224
225 C strong-acquire
226
227 {
228 }
229
230 P1(int *x, atomic_t *y)
231 {
232 r0 = READ_ONCE(*x);
233 smp_rmb();
234 r1 = atomic_read(y);
235 }
236
237 P2(int *x, atomic_t *y)
238 {
239 atomic_inc(y);
240 smp_mb__after_atomic();
241 WRITE_ONCE(*x, 1);
242 }
243
244 exists
245 (r0=1 /\ r1=0)
246
247This should not happen; but a hypothetical atomic_inc_acquire() --
248(void)atomic_fetch_inc_acquire() for instance -- would allow the outcome,
249since then:
250
251 P1 P2
252
253 t = LL.acq *y (0)
254 t++;
255 *x = 1;
256 r0 = *x (1)
257 RMB
258 r1 = *y (0)
259 SC *y, t;
260
261is allowed.