blob: 9af255ad1e2fcceb12feb2c9bd57c5f268205068 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
Robert P. J. Day932fb062010-03-13 07:58:13 -05002 * kref.h - library routines for handling generic reference counted objects
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 *
4 * Copyright (C) 2004 Greg Kroah-Hartman <greg@kroah.com>
5 * Copyright (C) 2004 IBM Corp.
6 *
7 * based on kobject.h which was:
8 * Copyright (C) 2002-2003 Patrick Mochel <mochel@osdl.org>
9 * Copyright (C) 2002-2003 Open Source Development Labs
10 *
11 * This file is released under the GPLv2.
12 *
13 */
14
15#ifndef _KREF_H_
16#define _KREF_H_
17
Greg Kroah-Hartman6261dde2011-12-14 11:19:07 -080018#include <linux/bug.h>
19#include <linux/atomic.h>
James Bottomley67175b82012-01-17 21:14:05 +000020#include <linux/kernel.h>
Al Viro8ad5db82012-08-17 20:10:46 -040021#include <linux/mutex.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070022
23struct kref {
24 atomic_t refcount;
25};
26
Peter Zijlstra1e24edc2016-11-14 17:12:23 +010027#define KREF_INIT(n) { .refcount = ATOMIC_INIT(n), }
28
Peter Zijlstra4af679c2011-12-13 10:36:20 +010029/**
30 * kref_init - initialize object.
31 * @kref: object in question.
32 */
33static inline void kref_init(struct kref *kref)
34{
35 atomic_set(&kref->refcount, 1);
Peter Zijlstra4af679c2011-12-13 10:36:20 +010036}
Linus Torvalds1da177e2005-04-16 15:20:36 -070037
Peter Zijlstra4af679c2011-12-13 10:36:20 +010038/**
39 * kref_get - increment refcount for object.
40 * @kref: object.
41 */
42static inline void kref_get(struct kref *kref)
43{
Anatol Pomozov2d864e42013-05-07 15:37:48 -070044 /* If refcount was 0 before incrementing then we have a race
45 * condition when this kref is freeing by some other thread right now.
46 * In this case one should use kref_get_unless_zero()
47 */
48 WARN_ON_ONCE(atomic_inc_return(&kref->refcount) < 2);
Peter Zijlstra4af679c2011-12-13 10:36:20 +010049}
50
51/**
Peter Zijlstra4af679c2011-12-13 10:36:20 +010052 * kref_sub - subtract a number of refcounts for object.
53 * @kref: object.
54 * @count: Number of recounts to subtract.
55 * @release: pointer to the function that will clean up the object when the
56 * last reference to the object is released.
57 * This pointer is required, and it is not acceptable to pass kfree
Greg Kroah-Hartman6261dde2011-12-14 11:19:07 -080058 * in as this function. If the caller does pass kfree to this
59 * function, you will be publicly mocked mercilessly by the kref
60 * maintainer, and anyone else who happens to notice it. You have
61 * been warned.
Peter Zijlstra4af679c2011-12-13 10:36:20 +010062 *
63 * Subtract @count from the refcount, and if 0, call release().
64 * Return 1 if the object was removed, otherwise return 0. Beware, if this
65 * function returns 0, you still can not count on the kref from remaining in
66 * memory. Only use the return value if you want to see if the kref is now
67 * gone, not present.
68 */
69static inline int kref_sub(struct kref *kref, unsigned int count,
70 void (*release)(struct kref *kref))
71{
72 WARN_ON(release == NULL);
Peter Zijlstra4af679c2011-12-13 10:36:20 +010073
74 if (atomic_sub_and_test((int) count, &kref->refcount)) {
75 release(kref);
76 return 1;
77 }
78 return 0;
79}
Peter Zijlstra47dbd7d2011-12-10 11:43:43 +010080
81/**
82 * kref_put - decrement refcount for object.
83 * @kref: object.
84 * @release: pointer to the function that will clean up the object when the
85 * last reference to the object is released.
86 * This pointer is required, and it is not acceptable to pass kfree
Greg Kroah-Hartman6261dde2011-12-14 11:19:07 -080087 * in as this function. If the caller does pass kfree to this
88 * function, you will be publicly mocked mercilessly by the kref
89 * maintainer, and anyone else who happens to notice it. You have
90 * been warned.
Peter Zijlstra47dbd7d2011-12-10 11:43:43 +010091 *
92 * Decrement the refcount, and if 0, call release().
93 * Return 1 if the object was removed, otherwise return 0. Beware, if this
94 * function returns 0, you still can not count on the kref from remaining in
95 * memory. Only use the return value if you want to see if the kref is now
96 * gone, not present.
97 */
98static inline int kref_put(struct kref *kref, void (*release)(struct kref *kref))
99{
100 return kref_sub(kref, 1, release);
101}
Al Viro8ad5db82012-08-17 20:10:46 -0400102
103static inline int kref_put_mutex(struct kref *kref,
104 void (*release)(struct kref *kref),
105 struct mutex *lock)
106{
107 WARN_ON(release == NULL);
Anatol Pomozov2d864e42013-05-07 15:37:48 -0700108 if (unlikely(!atomic_add_unless(&kref->refcount, -1, 1))) {
Al Viro8ad5db82012-08-17 20:10:46 -0400109 mutex_lock(lock);
110 if (unlikely(!atomic_dec_and_test(&kref->refcount))) {
111 mutex_unlock(lock);
112 return 0;
113 }
114 release(kref);
115 return 1;
116 }
117 return 0;
118}
Thomas Hellstrom4b20db32012-11-06 11:31:49 +0000119
120/**
121 * kref_get_unless_zero - Increment refcount for object unless it is zero.
122 * @kref: object.
123 *
124 * Return non-zero if the increment succeeded. Otherwise return 0.
125 *
126 * This function is intended to simplify locking around refcounting for
127 * objects that can be looked up from a lookup structure, and which are
128 * removed from that lookup structure in the object destructor.
129 * Operations on such objects require at least a read lock around
130 * lookup + kref_get, and a write lock around kref_put + remove from lookup
131 * structure. Furthermore, RCU implementations become extremely tricky.
132 * With a lookup followed by a kref_get_unless_zero *with return value check*
133 * locking in the kref_put path can be deferred to the actual removal from
134 * the lookup structure and RCU lookups become trivial.
135 */
136static inline int __must_check kref_get_unless_zero(struct kref *kref)
137{
138 return atomic_add_unless(&kref->refcount, 1, 0);
139}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700140#endif /* _KREF_H_ */