2016-08-27 22:01:08 +08:00
|
|
|
/*
|
2021-02-18 22:57:13 +08:00
|
|
|
* Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved.
|
2016-08-27 22:01:08 +08:00
|
|
|
*
|
2018-12-06 20:12:35 +08:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-08-27 22:01:08 +08:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
2019-09-28 06:45:57 +08:00
|
|
|
#ifndef OSSL_INTERNAL_REFCOUNT_H
|
|
|
|
# define OSSL_INTERNAL_REFCOUNT_H
|
2021-02-07 05:14:03 +08:00
|
|
|
# pragma once
|
2016-08-27 22:01:08 +08:00
|
|
|
|
2020-12-01 09:30:10 +08:00
|
|
|
# include <openssl/e_os2.h>
|
|
|
|
|
2017-08-22 05:17:35 +08:00
|
|
|
/* Used to checking reference counts, most while doing perl5 stuff :-) */
|
|
|
|
# if defined(OPENSSL_NO_STDIO)
|
|
|
|
# if defined(REF_PRINT)
|
|
|
|
# error "REF_PRINT requires stdio"
|
|
|
|
# endif
|
|
|
|
# endif
|
|
|
|
|
2019-03-14 16:59:00 +08:00
|
|
|
# ifndef OPENSSL_DEV_NO_ATOMICS
|
|
|
|
# if defined(__STDC_VERSION__) && __STDC_VERSION__ >= 201112L \
|
|
|
|
&& !defined(__STDC_NO_ATOMICS__)
|
|
|
|
# include <stdatomic.h>
|
|
|
|
# define HAVE_C11_ATOMICS
|
|
|
|
# endif
|
2016-08-27 22:01:08 +08:00
|
|
|
|
2019-03-14 16:59:00 +08:00
|
|
|
# if defined(HAVE_C11_ATOMICS) && defined(ATOMIC_INT_LOCK_FREE) \
|
|
|
|
&& ATOMIC_INT_LOCK_FREE > 0
|
2016-08-27 22:01:08 +08:00
|
|
|
|
2019-03-14 16:59:00 +08:00
|
|
|
# define HAVE_ATOMICS 1
|
2016-08-27 22:01:08 +08:00
|
|
|
|
|
|
|
typedef _Atomic int CRYPTO_REF_COUNT;
|
|
|
|
|
2020-12-01 09:30:10 +08:00
|
|
|
static inline int CRYPTO_UP_REF(_Atomic int *val, int *ret,
|
|
|
|
ossl_unused void *lock)
|
2016-08-27 22:01:08 +08:00
|
|
|
{
|
|
|
|
*ret = atomic_fetch_add_explicit(val, 1, memory_order_relaxed) + 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2018-08-08 17:10:11 +08:00
|
|
|
/*
|
|
|
|
* Changes to shared structure other than reference counter have to be
|
|
|
|
* serialized. And any kind of serialization implies a release fence. This
|
|
|
|
* means that by the time reference counter is decremented all other
|
|
|
|
* changes are visible on all processors. Hence decrement itself can be
|
|
|
|
* relaxed. In case it hits zero, object will be destructed. Since it's
|
|
|
|
* last use of the object, destructor programmer might reason that access
|
|
|
|
* to mutable members doesn't have to be serialized anymore, which would
|
|
|
|
* otherwise imply an acquire fence. Hence conditional acquire fence...
|
|
|
|
*/
|
2020-12-01 09:30:10 +08:00
|
|
|
static inline int CRYPTO_DOWN_REF(_Atomic int *val, int *ret,
|
|
|
|
ossl_unused void *lock)
|
2016-08-27 22:01:08 +08:00
|
|
|
{
|
2018-08-08 17:10:11 +08:00
|
|
|
*ret = atomic_fetch_sub_explicit(val, 1, memory_order_relaxed) - 1;
|
2016-08-27 22:01:08 +08:00
|
|
|
if (*ret == 0)
|
|
|
|
atomic_thread_fence(memory_order_acquire);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2019-03-14 16:59:00 +08:00
|
|
|
# elif defined(__GNUC__) && defined(__ATOMIC_RELAXED) && __GCC_ATOMIC_INT_LOCK_FREE > 0
|
2016-08-27 22:01:08 +08:00
|
|
|
|
2019-03-14 16:59:00 +08:00
|
|
|
# define HAVE_ATOMICS 1
|
2016-08-27 22:01:08 +08:00
|
|
|
|
|
|
|
typedef int CRYPTO_REF_COUNT;
|
|
|
|
|
2020-12-01 09:30:10 +08:00
|
|
|
static __inline__ int CRYPTO_UP_REF(int *val, int *ret, ossl_unused void *lock)
|
2016-08-27 22:01:08 +08:00
|
|
|
{
|
|
|
|
*ret = __atomic_fetch_add(val, 1, __ATOMIC_RELAXED) + 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-12-01 09:30:10 +08:00
|
|
|
static __inline__ int CRYPTO_DOWN_REF(int *val, int *ret,
|
|
|
|
ossl_unused void *lock)
|
2016-08-27 22:01:08 +08:00
|
|
|
{
|
2018-08-08 17:10:11 +08:00
|
|
|
*ret = __atomic_fetch_sub(val, 1, __ATOMIC_RELAXED) - 1;
|
2016-08-27 22:01:08 +08:00
|
|
|
if (*ret == 0)
|
|
|
|
__atomic_thread_fence(__ATOMIC_ACQUIRE);
|
|
|
|
return 1;
|
|
|
|
}
|
2019-09-18 13:26:19 +08:00
|
|
|
# elif defined(__ICL) && defined(_WIN32)
|
|
|
|
# define HAVE_ATOMICS 1
|
|
|
|
typedef volatile int CRYPTO_REF_COUNT;
|
|
|
|
|
2020-12-01 09:30:10 +08:00
|
|
|
static __inline int CRYPTO_UP_REF(volatile int *val, int *ret,
|
|
|
|
ossl_unused void *lock)
|
2019-09-18 13:26:19 +08:00
|
|
|
{
|
|
|
|
*ret = _InterlockedExchangeAdd((void *)val, 1) + 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-12-01 09:30:10 +08:00
|
|
|
static __inline int CRYPTO_DOWN_REF(volatile int *val, int *ret,
|
|
|
|
ossl_unused void *lock)
|
2019-09-18 13:26:19 +08:00
|
|
|
{
|
|
|
|
*ret = _InterlockedExchangeAdd((void *)val, -1) - 1;
|
|
|
|
return 1;
|
|
|
|
}
|
2016-08-27 22:01:08 +08:00
|
|
|
|
2019-03-14 16:59:00 +08:00
|
|
|
# elif defined(_MSC_VER) && _MSC_VER>=1200
|
2018-08-08 17:10:11 +08:00
|
|
|
|
2019-03-14 16:59:00 +08:00
|
|
|
# define HAVE_ATOMICS 1
|
2018-08-08 17:10:11 +08:00
|
|
|
|
|
|
|
typedef volatile int CRYPTO_REF_COUNT;
|
|
|
|
|
2019-03-27 14:55:32 +08:00
|
|
|
# if (defined(_M_ARM) && _M_ARM>=7 && !defined(_WIN32_WCE)) || defined(_M_ARM64)
|
2019-03-14 16:59:00 +08:00
|
|
|
# include <intrin.h>
|
|
|
|
# if defined(_M_ARM64) && !defined(_ARM_BARRIER_ISH)
|
|
|
|
# define _ARM_BARRIER_ISH _ARM64_BARRIER_ISH
|
|
|
|
# endif
|
2018-08-08 17:10:11 +08:00
|
|
|
|
2020-12-01 09:30:10 +08:00
|
|
|
static __inline int CRYPTO_UP_REF(volatile int *val, int *ret,
|
|
|
|
ossl_unused void *lock)
|
2018-08-08 17:10:11 +08:00
|
|
|
{
|
|
|
|
*ret = _InterlockedExchangeAdd_nf(val, 1) + 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-12-01 09:30:10 +08:00
|
|
|
static __inline int CRYPTO_DOWN_REF(volatile int *val, int *ret,
|
|
|
|
ossl_unused void *lock)
|
2018-08-08 17:10:11 +08:00
|
|
|
{
|
|
|
|
*ret = _InterlockedExchangeAdd_nf(val, -1) - 1;
|
|
|
|
if (*ret == 0)
|
|
|
|
__dmb(_ARM_BARRIER_ISH);
|
|
|
|
return 1;
|
|
|
|
}
|
2019-03-14 16:59:00 +08:00
|
|
|
# else
|
2019-03-27 14:55:32 +08:00
|
|
|
# if !defined(_WIN32_WCE)
|
|
|
|
# pragma intrinsic(_InterlockedExchangeAdd)
|
|
|
|
# else
|
|
|
|
# if _WIN32_WCE >= 0x600
|
|
|
|
extern long __cdecl _InterlockedExchangeAdd(long volatile*, long);
|
|
|
|
# else
|
2019-04-07 19:30:26 +08:00
|
|
|
/* under Windows CE we still have old-style Interlocked* functions */
|
2019-03-27 14:55:32 +08:00
|
|
|
extern long __cdecl InterlockedExchangeAdd(long volatile*, long);
|
|
|
|
# define _InterlockedExchangeAdd InterlockedExchangeAdd
|
|
|
|
# endif
|
|
|
|
# endif
|
2018-08-08 17:10:11 +08:00
|
|
|
|
2020-12-01 09:30:10 +08:00
|
|
|
static __inline int CRYPTO_UP_REF(volatile int *val, int *ret,
|
|
|
|
ossl_unused void *lock)
|
2018-08-08 17:10:11 +08:00
|
|
|
{
|
|
|
|
*ret = _InterlockedExchangeAdd(val, 1) + 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-12-01 09:30:10 +08:00
|
|
|
static __inline int CRYPTO_DOWN_REF(volatile int *val, int *ret,
|
|
|
|
ossl_unused void *lock)
|
2018-08-08 17:10:11 +08:00
|
|
|
{
|
|
|
|
*ret = _InterlockedExchangeAdd(val, -1) - 1;
|
|
|
|
return 1;
|
|
|
|
}
|
2019-03-14 16:59:00 +08:00
|
|
|
# endif
|
|
|
|
|
2018-08-08 17:10:11 +08:00
|
|
|
# endif
|
2019-03-14 16:59:00 +08:00
|
|
|
# endif /* !OPENSSL_DEV_NO_ATOMICS */
|
2018-08-08 17:10:11 +08:00
|
|
|
|
2019-03-14 16:59:00 +08:00
|
|
|
/*
|
|
|
|
* All the refcounting implementations above define HAVE_ATOMICS, so if it's
|
2020-06-20 05:33:24 +08:00
|
|
|
* still undefined here (such as when OPENSSL_DEV_NO_ATOMICS is defined), it
|
2019-03-14 16:59:00 +08:00
|
|
|
* means we need to implement a fallback. This fallback uses locks.
|
|
|
|
*/
|
|
|
|
# ifndef HAVE_ATOMICS
|
2016-08-27 22:01:08 +08:00
|
|
|
|
|
|
|
typedef int CRYPTO_REF_COUNT;
|
|
|
|
|
|
|
|
# define CRYPTO_UP_REF(val, ret, lock) CRYPTO_atomic_add(val, 1, ret, lock)
|
|
|
|
# define CRYPTO_DOWN_REF(val, ret, lock) CRYPTO_atomic_add(val, -1, ret, lock)
|
|
|
|
|
|
|
|
# endif
|
2017-08-22 05:17:35 +08:00
|
|
|
|
|
|
|
# if !defined(NDEBUG) && !defined(OPENSSL_NO_STDIO)
|
|
|
|
# define REF_ASSERT_ISNT(test) \
|
|
|
|
(void)((test) ? (OPENSSL_die("refcount error", __FILE__, __LINE__), 1) : 0)
|
|
|
|
# else
|
|
|
|
# define REF_ASSERT_ISNT(i)
|
|
|
|
# endif
|
|
|
|
|
|
|
|
# ifdef REF_PRINT
|
|
|
|
# define REF_PRINT_COUNT(a, b) \
|
REF_PRINT: cast pointer to void to avoid warnings
Currently, when configuring OpenSSL and specifying the --strict-warnings
option there are failures like the following one:
crypto/bio/bio_lib.c: In function 'BIO_up_ref':
include/internal/refcount.h:169:25: error: format '%p' expects argument
of type 'void *', but argument 3 has type 'BIO *'
{aka 'struct bio_st *'} [-Werror=format=]
169 | fprintf(stderr, "%p:%4d:%s\n", b, b->references, a)
| ^~~~~~~~~~~~~
crypto/bio/bio_lib.c:185:5:
note: in expansion of macro'REF_PRINT_COUNT'
185 | REF_PRINT_COUNT("BIO", a);
| ^~~~~~~~~~~~~~~
include/internal/refcount.h:169:27: note: format string is defined here
169 | fprintf(stderr, "%p:%4d:%s\n", b, b->references, a)
| ~^
| |
| void *
cc1: all warnings being treated as errors
This commit adds casts to avoid the warnings.
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/13389)
2020-11-12 16:51:14 +08:00
|
|
|
fprintf(stderr, "%p:%4d:%s\n", (void*)b, b->references, a)
|
2017-08-22 05:17:35 +08:00
|
|
|
# else
|
|
|
|
# define REF_PRINT_COUNT(a, b)
|
|
|
|
# endif
|
|
|
|
|
2016-08-27 22:01:08 +08:00
|
|
|
#endif
|