mirror of
				git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
				synced 2025-10-31 16:54:21 +00:00 
			
		
		
		
	 9dbbc3b9d0
			
		
	
	
		9dbbc3b9d0
		
	
	
	
	
		
			
			Fix some spelling mistakes in comments: permanentely ==> permanently wont ==> won't remaning ==> remaining succed ==> succeed shouldnt ==> shouldn't alpha-numeric ==> alphanumeric storeing ==> storing funtion ==> function documenation ==> documentation Determin ==> Determine intepreted ==> interpreted ammount ==> amount obious ==> obvious interupts ==> interrupts occured ==> occurred asssociated ==> associated taking into acount ==> taking into account squence ==> sequence stil ==> still contiguos ==> contiguous matchs ==> matches Link: https://lkml.kernel.org/r/20210607072555.12416-1-thunder.leizhen@huawei.com Signed-off-by: Zhen Lei <thunder.leizhen@huawei.com> Reviewed-by: Jacob Keller <jacob.e.keller@intel.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
		
			
				
	
	
		
			186 lines
		
	
	
	
		
			4.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			186 lines
		
	
	
	
		
			4.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| // SPDX-License-Identifier: GPL-2.0
 | |
| /*
 | |
|  * Out-of-line refcount functions.
 | |
|  */
 | |
| 
 | |
| #include <linux/mutex.h>
 | |
| #include <linux/refcount.h>
 | |
| #include <linux/spinlock.h>
 | |
| #include <linux/bug.h>
 | |
| 
 | |
| #define REFCOUNT_WARN(str)	WARN_ONCE(1, "refcount_t: " str ".\n")
 | |
| 
 | |
| void refcount_warn_saturate(refcount_t *r, enum refcount_saturation_type t)
 | |
| {
 | |
| 	refcount_set(r, REFCOUNT_SATURATED);
 | |
| 
 | |
| 	switch (t) {
 | |
| 	case REFCOUNT_ADD_NOT_ZERO_OVF:
 | |
| 		REFCOUNT_WARN("saturated; leaking memory");
 | |
| 		break;
 | |
| 	case REFCOUNT_ADD_OVF:
 | |
| 		REFCOUNT_WARN("saturated; leaking memory");
 | |
| 		break;
 | |
| 	case REFCOUNT_ADD_UAF:
 | |
| 		REFCOUNT_WARN("addition on 0; use-after-free");
 | |
| 		break;
 | |
| 	case REFCOUNT_SUB_UAF:
 | |
| 		REFCOUNT_WARN("underflow; use-after-free");
 | |
| 		break;
 | |
| 	case REFCOUNT_DEC_LEAK:
 | |
| 		REFCOUNT_WARN("decrement hit 0; leaking memory");
 | |
| 		break;
 | |
| 	default:
 | |
| 		REFCOUNT_WARN("unknown saturation event!?");
 | |
| 	}
 | |
| }
 | |
| EXPORT_SYMBOL(refcount_warn_saturate);
 | |
| 
 | |
| /**
 | |
|  * refcount_dec_if_one - decrement a refcount if it is 1
 | |
|  * @r: the refcount
 | |
|  *
 | |
|  * No atomic_t counterpart, it attempts a 1 -> 0 transition and returns the
 | |
|  * success thereof.
 | |
|  *
 | |
|  * Like all decrement operations, it provides release memory order and provides
 | |
|  * a control dependency.
 | |
|  *
 | |
|  * It can be used like a try-delete operator; this explicit case is provided
 | |
|  * and not cmpxchg in generic, because that would allow implementing unsafe
 | |
|  * operations.
 | |
|  *
 | |
|  * Return: true if the resulting refcount is 0, false otherwise
 | |
|  */
 | |
| bool refcount_dec_if_one(refcount_t *r)
 | |
| {
 | |
| 	int val = 1;
 | |
| 
 | |
| 	return atomic_try_cmpxchg_release(&r->refs, &val, 0);
 | |
| }
 | |
| EXPORT_SYMBOL(refcount_dec_if_one);
 | |
| 
 | |
| /**
 | |
|  * refcount_dec_not_one - decrement a refcount if it is not 1
 | |
|  * @r: the refcount
 | |
|  *
 | |
|  * No atomic_t counterpart, it decrements unless the value is 1, in which case
 | |
|  * it will return false.
 | |
|  *
 | |
|  * Was often done like: atomic_add_unless(&var, -1, 1)
 | |
|  *
 | |
|  * Return: true if the decrement operation was successful, false otherwise
 | |
|  */
 | |
| bool refcount_dec_not_one(refcount_t *r)
 | |
| {
 | |
| 	unsigned int new, val = atomic_read(&r->refs);
 | |
| 
 | |
| 	do {
 | |
| 		if (unlikely(val == REFCOUNT_SATURATED))
 | |
| 			return true;
 | |
| 
 | |
| 		if (val == 1)
 | |
| 			return false;
 | |
| 
 | |
| 		new = val - 1;
 | |
| 		if (new > val) {
 | |
| 			WARN_ONCE(new > val, "refcount_t: underflow; use-after-free.\n");
 | |
| 			return true;
 | |
| 		}
 | |
| 
 | |
| 	} while (!atomic_try_cmpxchg_release(&r->refs, &val, new));
 | |
| 
 | |
| 	return true;
 | |
| }
 | |
| EXPORT_SYMBOL(refcount_dec_not_one);
 | |
| 
 | |
| /**
 | |
|  * refcount_dec_and_mutex_lock - return holding mutex if able to decrement
 | |
|  *                               refcount to 0
 | |
|  * @r: the refcount
 | |
|  * @lock: the mutex to be locked
 | |
|  *
 | |
|  * Similar to atomic_dec_and_mutex_lock(), it will WARN on underflow and fail
 | |
|  * to decrement when saturated at REFCOUNT_SATURATED.
 | |
|  *
 | |
|  * Provides release memory ordering, such that prior loads and stores are done
 | |
|  * before, and provides a control dependency such that free() must come after.
 | |
|  * See the comment on top.
 | |
|  *
 | |
|  * Return: true and hold mutex if able to decrement refcount to 0, false
 | |
|  *         otherwise
 | |
|  */
 | |
| bool refcount_dec_and_mutex_lock(refcount_t *r, struct mutex *lock)
 | |
| {
 | |
| 	if (refcount_dec_not_one(r))
 | |
| 		return false;
 | |
| 
 | |
| 	mutex_lock(lock);
 | |
| 	if (!refcount_dec_and_test(r)) {
 | |
| 		mutex_unlock(lock);
 | |
| 		return false;
 | |
| 	}
 | |
| 
 | |
| 	return true;
 | |
| }
 | |
| EXPORT_SYMBOL(refcount_dec_and_mutex_lock);
 | |
| 
 | |
| /**
 | |
|  * refcount_dec_and_lock - return holding spinlock if able to decrement
 | |
|  *                         refcount to 0
 | |
|  * @r: the refcount
 | |
|  * @lock: the spinlock to be locked
 | |
|  *
 | |
|  * Similar to atomic_dec_and_lock(), it will WARN on underflow and fail to
 | |
|  * decrement when saturated at REFCOUNT_SATURATED.
 | |
|  *
 | |
|  * Provides release memory ordering, such that prior loads and stores are done
 | |
|  * before, and provides a control dependency such that free() must come after.
 | |
|  * See the comment on top.
 | |
|  *
 | |
|  * Return: true and hold spinlock if able to decrement refcount to 0, false
 | |
|  *         otherwise
 | |
|  */
 | |
| bool refcount_dec_and_lock(refcount_t *r, spinlock_t *lock)
 | |
| {
 | |
| 	if (refcount_dec_not_one(r))
 | |
| 		return false;
 | |
| 
 | |
| 	spin_lock(lock);
 | |
| 	if (!refcount_dec_and_test(r)) {
 | |
| 		spin_unlock(lock);
 | |
| 		return false;
 | |
| 	}
 | |
| 
 | |
| 	return true;
 | |
| }
 | |
| EXPORT_SYMBOL(refcount_dec_and_lock);
 | |
| 
 | |
| /**
 | |
|  * refcount_dec_and_lock_irqsave - return holding spinlock with disabled
 | |
|  *                                 interrupts if able to decrement refcount to 0
 | |
|  * @r: the refcount
 | |
|  * @lock: the spinlock to be locked
 | |
|  * @flags: saved IRQ-flags if the is acquired
 | |
|  *
 | |
|  * Same as refcount_dec_and_lock() above except that the spinlock is acquired
 | |
|  * with disabled interrupts.
 | |
|  *
 | |
|  * Return: true and hold spinlock if able to decrement refcount to 0, false
 | |
|  *         otherwise
 | |
|  */
 | |
| bool refcount_dec_and_lock_irqsave(refcount_t *r, spinlock_t *lock,
 | |
| 				   unsigned long *flags)
 | |
| {
 | |
| 	if (refcount_dec_not_one(r))
 | |
| 		return false;
 | |
| 
 | |
| 	spin_lock_irqsave(lock, *flags);
 | |
| 	if (!refcount_dec_and_test(r)) {
 | |
| 		spin_unlock_irqrestore(lock, *flags);
 | |
| 		return false;
 | |
| 	}
 | |
| 
 | |
| 	return true;
 | |
| }
 | |
| EXPORT_SYMBOL(refcount_dec_and_lock_irqsave);
 |