154da6a09SPeter Zijlstra /* SPDX-License-Identifier: GPL-2.0 */
2c80c4490SIngo Molnar #ifndef _LINUX_CLEANUP_H
3c80c4490SIngo Molnar #define _LINUX_CLEANUP_H
454da6a09SPeter Zijlstra
554da6a09SPeter Zijlstra #include <linux/compiler.h>
654da6a09SPeter Zijlstra
7d5934e76SDan Williams /**
8d5934e76SDan Williams * DOC: scope-based cleanup helpers
9d5934e76SDan Williams *
10d5934e76SDan Williams * The "goto error" pattern is notorious for introducing subtle resource
11d5934e76SDan Williams * leaks. It is tedious and error prone to add new resource acquisition
12d5934e76SDan Williams * constraints into code paths that already have several unwind
13d5934e76SDan Williams * conditions. The "cleanup" helpers enable the compiler to help with
14d5934e76SDan Williams * this tedium and can aid in maintaining LIFO (last in first out)
15d5934e76SDan Williams * unwind ordering to avoid unintentional leaks.
16d5934e76SDan Williams *
17d5934e76SDan Williams * As drivers make up the majority of the kernel code base, here is an
18d5934e76SDan Williams * example of using these helpers to clean up PCI drivers. The target of
19d5934e76SDan Williams * the cleanups are occasions where a goto is used to unwind a device
20d5934e76SDan Williams * reference (pci_dev_put()), or unlock the device (pci_dev_unlock())
21d5934e76SDan Williams * before returning.
22d5934e76SDan Williams *
23d5934e76SDan Williams * The DEFINE_FREE() macro can arrange for PCI device references to be
24d5934e76SDan Williams * dropped when the associated variable goes out of scope::
25d5934e76SDan Williams *
26d5934e76SDan Williams * DEFINE_FREE(pci_dev_put, struct pci_dev *, if (_T) pci_dev_put(_T))
27d5934e76SDan Williams * ...
28d5934e76SDan Williams * struct pci_dev *dev __free(pci_dev_put) =
29d5934e76SDan Williams * pci_get_slot(parent, PCI_DEVFN(0, 0));
30d5934e76SDan Williams *
31d5934e76SDan Williams * The above will automatically call pci_dev_put() if @dev is non-NULL
32d5934e76SDan Williams * when @dev goes out of scope (automatic variable scope). If a function
33d5934e76SDan Williams * wants to invoke pci_dev_put() on error, but return @dev (i.e. without
34d5934e76SDan Williams * freeing it) on success, it can do::
35d5934e76SDan Williams *
36d5934e76SDan Williams * return no_free_ptr(dev);
37d5934e76SDan Williams *
38d5934e76SDan Williams * ...or::
39d5934e76SDan Williams *
40d5934e76SDan Williams * return_ptr(dev);
41d5934e76SDan Williams *
42d5934e76SDan Williams * The DEFINE_GUARD() macro can arrange for the PCI device lock to be
43d5934e76SDan Williams * dropped when the scope where guard() is invoked ends::
44d5934e76SDan Williams *
45d5934e76SDan Williams * DEFINE_GUARD(pci_dev, struct pci_dev *, pci_dev_lock(_T), pci_dev_unlock(_T))
46d5934e76SDan Williams * ...
47d5934e76SDan Williams * guard(pci_dev)(dev);
48d5934e76SDan Williams *
49d5934e76SDan Williams * The lifetime of the lock obtained by the guard() helper follows the
50d5934e76SDan Williams * scope of automatic variable declaration. Take the following example::
51d5934e76SDan Williams *
52d5934e76SDan Williams * func(...)
53d5934e76SDan Williams * {
54d5934e76SDan Williams * if (...) {
55d5934e76SDan Williams * ...
56d5934e76SDan Williams * guard(pci_dev)(dev); // pci_dev_lock() invoked here
57d5934e76SDan Williams * ...
58d5934e76SDan Williams * } // <- implied pci_dev_unlock() triggered here
59d5934e76SDan Williams * }
60d5934e76SDan Williams *
61d5934e76SDan Williams * Observe the lock is held for the remainder of the "if ()" block not
62d5934e76SDan Williams * the remainder of "func()".
63d5934e76SDan Williams *
64d5934e76SDan Williams * Now, when a function uses both __free() and guard(), or multiple
65d5934e76SDan Williams * instances of __free(), the LIFO order of variable definition order
66d5934e76SDan Williams * matters. GCC documentation says:
67d5934e76SDan Williams *
68d5934e76SDan Williams * "When multiple variables in the same scope have cleanup attributes,
69d5934e76SDan Williams * at exit from the scope their associated cleanup functions are run in
70d5934e76SDan Williams * reverse order of definition (last defined, first cleanup)."
71d5934e76SDan Williams *
72d5934e76SDan Williams * When the unwind order matters it requires that variables be defined
73d5934e76SDan Williams * mid-function scope rather than at the top of the file. Take the
74d5934e76SDan Williams * following example and notice the bug highlighted by "!!"::
75d5934e76SDan Williams *
76d5934e76SDan Williams * LIST_HEAD(list);
77d5934e76SDan Williams * DEFINE_MUTEX(lock);
78d5934e76SDan Williams *
79d5934e76SDan Williams * struct object {
80d5934e76SDan Williams * struct list_head node;
81d5934e76SDan Williams * };
82d5934e76SDan Williams *
83d5934e76SDan Williams * static struct object *alloc_add(void)
84d5934e76SDan Williams * {
85d5934e76SDan Williams * struct object *obj;
86d5934e76SDan Williams *
87d5934e76SDan Williams * lockdep_assert_held(&lock);
88d5934e76SDan Williams * obj = kzalloc(sizeof(*obj), GFP_KERNEL);
89d5934e76SDan Williams * if (obj) {
90d5934e76SDan Williams * LIST_HEAD_INIT(&obj->node);
91d5934e76SDan Williams * list_add(obj->node, &list):
92d5934e76SDan Williams * }
93d5934e76SDan Williams * return obj;
94d5934e76SDan Williams * }
95d5934e76SDan Williams *
96d5934e76SDan Williams * static void remove_free(struct object *obj)
97d5934e76SDan Williams * {
98d5934e76SDan Williams * lockdep_assert_held(&lock);
99d5934e76SDan Williams * list_del(&obj->node);
100d5934e76SDan Williams * kfree(obj);
101d5934e76SDan Williams * }
102d5934e76SDan Williams *
103d5934e76SDan Williams * DEFINE_FREE(remove_free, struct object *, if (_T) remove_free(_T))
104d5934e76SDan Williams * static int init(void)
105d5934e76SDan Williams * {
106d5934e76SDan Williams * struct object *obj __free(remove_free) = NULL;
107d5934e76SDan Williams * int err;
108d5934e76SDan Williams *
109d5934e76SDan Williams * guard(mutex)(&lock);
110d5934e76SDan Williams * obj = alloc_add();
111d5934e76SDan Williams *
112d5934e76SDan Williams * if (!obj)
113d5934e76SDan Williams * return -ENOMEM;
114d5934e76SDan Williams *
115d5934e76SDan Williams * err = other_init(obj);
116d5934e76SDan Williams * if (err)
117d5934e76SDan Williams * return err; // remove_free() called without the lock!!
118d5934e76SDan Williams *
119d5934e76SDan Williams * no_free_ptr(obj);
120d5934e76SDan Williams * return 0;
121d5934e76SDan Williams * }
122d5934e76SDan Williams *
123d5934e76SDan Williams * That bug is fixed by changing init() to call guard() and define +
124d5934e76SDan Williams * initialize @obj in this order::
125d5934e76SDan Williams *
126d5934e76SDan Williams * guard(mutex)(&lock);
127d5934e76SDan Williams * struct object *obj __free(remove_free) = alloc_add();
128d5934e76SDan Williams *
129d5934e76SDan Williams * Given that the "__free(...) = NULL" pattern for variables defined at
130d5934e76SDan Williams * the top of the function poses this potential interdependency problem
131d5934e76SDan Williams * the recommendation is to always define and assign variables in one
132d5934e76SDan Williams * statement and not group variable definitions at the top of the
133d5934e76SDan Williams * function when __free() is used.
134d5934e76SDan Williams *
135d5934e76SDan Williams * Lastly, given that the benefit of cleanup helpers is removal of
136d5934e76SDan Williams * "goto", and that the "goto" statement can jump between scopes, the
137d5934e76SDan Williams * expectation is that usage of "goto" and cleanup helpers is never
138d5934e76SDan Williams * mixed in the same function. I.e. for a given routine, convert all
139d5934e76SDan Williams * resources that need a "goto" cleanup to scope-based cleanup, or
140d5934e76SDan Williams * convert none of them.
141d5934e76SDan Williams */
142d5934e76SDan Williams
14354da6a09SPeter Zijlstra /*
14454da6a09SPeter Zijlstra * DEFINE_FREE(name, type, free):
14554da6a09SPeter Zijlstra * simple helper macro that defines the required wrapper for a __free()
14685be6d84SPeter Zijlstra * based cleanup function. @free is an expression using '_T' to access the
14785be6d84SPeter Zijlstra * variable. @free should typically include a NULL test before calling a
14885be6d84SPeter Zijlstra * function, see the example below.
14954da6a09SPeter Zijlstra *
15054da6a09SPeter Zijlstra * __free(name):
15154da6a09SPeter Zijlstra * variable attribute to add a scoped based cleanup to the variable.
15254da6a09SPeter Zijlstra *
15354da6a09SPeter Zijlstra * no_free_ptr(var):
15454da6a09SPeter Zijlstra * like a non-atomic xchg(var, NULL), such that the cleanup function will
15554da6a09SPeter Zijlstra * be inhibited -- provided it sanely deals with a NULL value.
15654da6a09SPeter Zijlstra *
15785be6d84SPeter Zijlstra * NOTE: this has __must_check semantics so that it is harder to accidentally
15885be6d84SPeter Zijlstra * leak the resource.
15985be6d84SPeter Zijlstra *
16054da6a09SPeter Zijlstra * return_ptr(p):
16154da6a09SPeter Zijlstra * returns p while inhibiting the __free().
16254da6a09SPeter Zijlstra *
16354da6a09SPeter Zijlstra * Ex.
16454da6a09SPeter Zijlstra *
16554da6a09SPeter Zijlstra * DEFINE_FREE(kfree, void *, if (_T) kfree(_T))
16654da6a09SPeter Zijlstra *
16785be6d84SPeter Zijlstra * void *alloc_obj(...)
16885be6d84SPeter Zijlstra * {
16954da6a09SPeter Zijlstra * struct obj *p __free(kfree) = kmalloc(...);
17054da6a09SPeter Zijlstra * if (!p)
17154da6a09SPeter Zijlstra * return NULL;
17254da6a09SPeter Zijlstra *
17354da6a09SPeter Zijlstra * if (!init_obj(p))
17454da6a09SPeter Zijlstra * return NULL;
17554da6a09SPeter Zijlstra *
17654da6a09SPeter Zijlstra * return_ptr(p);
17785be6d84SPeter Zijlstra * }
17885be6d84SPeter Zijlstra *
17985be6d84SPeter Zijlstra * NOTE: the DEFINE_FREE()'s @free expression includes a NULL test even though
18085be6d84SPeter Zijlstra * kfree() is fine to be called with a NULL value. This is on purpose. This way
18185be6d84SPeter Zijlstra * the compiler sees the end of our alloc_obj() function as:
18285be6d84SPeter Zijlstra *
18385be6d84SPeter Zijlstra * tmp = p;
18485be6d84SPeter Zijlstra * p = NULL;
18585be6d84SPeter Zijlstra * if (p)
18685be6d84SPeter Zijlstra * kfree(p);
18785be6d84SPeter Zijlstra * return tmp;
18885be6d84SPeter Zijlstra *
18985be6d84SPeter Zijlstra * And through the magic of value-propagation and dead-code-elimination, it
19085be6d84SPeter Zijlstra * eliminates the actual cleanup call and compiles into:
19185be6d84SPeter Zijlstra *
19285be6d84SPeter Zijlstra * return p;
19385be6d84SPeter Zijlstra *
19485be6d84SPeter Zijlstra * Without the NULL test it turns into a mess and the compiler can't help us.
19554da6a09SPeter Zijlstra */
19654da6a09SPeter Zijlstra
19754da6a09SPeter Zijlstra #define DEFINE_FREE(_name, _type, _free) \
19854da6a09SPeter Zijlstra static inline void __free_##_name(void *p) { _type _T = *(_type *)p; _free; }
19954da6a09SPeter Zijlstra
20054da6a09SPeter Zijlstra #define __free(_name) __cleanup(__free_##_name)
20154da6a09SPeter Zijlstra
202c6269149SChristian Brauner #define __get_and_null(p, nullvalue) \
203c6269149SChristian Brauner ({ \
204c6269149SChristian Brauner __auto_type __ptr = &(p); \
20585be6d84SPeter Zijlstra __auto_type __val = *__ptr; \
206c6269149SChristian Brauner *__ptr = nullvalue; \
207c6269149SChristian Brauner __val; \
208c6269149SChristian Brauner })
20985be6d84SPeter Zijlstra
21085be6d84SPeter Zijlstra static inline __must_check
__must_check_fn(const volatile void * val)21185be6d84SPeter Zijlstra const volatile void * __must_check_fn(const volatile void *val)
21285be6d84SPeter Zijlstra { return val; }
21385be6d84SPeter Zijlstra
21454da6a09SPeter Zijlstra #define no_free_ptr(p) \
215366fef79SIlpo Järvinen ((typeof(p)) __must_check_fn((__force const volatile void *)__get_and_null(p, NULL)))
21654da6a09SPeter Zijlstra
21754da6a09SPeter Zijlstra #define return_ptr(p) return no_free_ptr(p)
21854da6a09SPeter Zijlstra
21954da6a09SPeter Zijlstra
22054da6a09SPeter Zijlstra /*
22154da6a09SPeter Zijlstra * DEFINE_CLASS(name, type, exit, init, init_args...):
22254da6a09SPeter Zijlstra * helper to define the destructor and constructor for a type.
22354da6a09SPeter Zijlstra * @exit is an expression using '_T' -- similar to FREE above.
22454da6a09SPeter Zijlstra * @init is an expression in @init_args resulting in @type
22554da6a09SPeter Zijlstra *
22654da6a09SPeter Zijlstra * EXTEND_CLASS(name, ext, init, init_args...):
22754da6a09SPeter Zijlstra * extends class @name to @name@ext with the new constructor
22854da6a09SPeter Zijlstra *
22954da6a09SPeter Zijlstra * CLASS(name, var)(args...):
23054da6a09SPeter Zijlstra * declare the variable @var as an instance of the named class
23154da6a09SPeter Zijlstra *
23254da6a09SPeter Zijlstra * Ex.
23354da6a09SPeter Zijlstra *
23454da6a09SPeter Zijlstra * DEFINE_CLASS(fdget, struct fd, fdput(_T), fdget(fd), int fd)
23554da6a09SPeter Zijlstra *
23654da6a09SPeter Zijlstra * CLASS(fdget, f)(fd);
23738052c2dSAl Viro * if (fd_empty(f))
23854da6a09SPeter Zijlstra * return -EBADF;
23954da6a09SPeter Zijlstra *
24054da6a09SPeter Zijlstra * // use 'f' without concern
24154da6a09SPeter Zijlstra */
24254da6a09SPeter Zijlstra
24354da6a09SPeter Zijlstra #define DEFINE_CLASS(_name, _type, _exit, _init, _init_args...) \
24454da6a09SPeter Zijlstra typedef _type class_##_name##_t; \
24554da6a09SPeter Zijlstra static inline void class_##_name##_destructor(_type *p) \
24654da6a09SPeter Zijlstra { _type _T = *p; _exit; } \
24754da6a09SPeter Zijlstra static inline _type class_##_name##_constructor(_init_args) \
24854da6a09SPeter Zijlstra { _type t = _init; return t; }
24954da6a09SPeter Zijlstra
25054da6a09SPeter Zijlstra #define EXTEND_CLASS(_name, ext, _init, _init_args...) \
25154da6a09SPeter Zijlstra typedef class_##_name##_t class_##_name##ext##_t; \
25254da6a09SPeter Zijlstra static inline void class_##_name##ext##_destructor(class_##_name##_t *p)\
25354da6a09SPeter Zijlstra { class_##_name##_destructor(p); } \
25454da6a09SPeter Zijlstra static inline class_##_name##_t class_##_name##ext##_constructor(_init_args) \
25554da6a09SPeter Zijlstra { class_##_name##_t t = _init; return t; }
25654da6a09SPeter Zijlstra
25754da6a09SPeter Zijlstra #define CLASS(_name, var) \
25854da6a09SPeter Zijlstra class_##_name##_t var __cleanup(class_##_name##_destructor) = \
25954da6a09SPeter Zijlstra class_##_name##_constructor
26054da6a09SPeter Zijlstra
26154da6a09SPeter Zijlstra
26254da6a09SPeter Zijlstra /*
26354da6a09SPeter Zijlstra * DEFINE_GUARD(name, type, lock, unlock):
26454da6a09SPeter Zijlstra * trivial wrapper around DEFINE_CLASS() above specifically
26554da6a09SPeter Zijlstra * for locks.
26654da6a09SPeter Zijlstra *
267e4ab322fSPeter Zijlstra * DEFINE_GUARD_COND(name, ext, condlock)
268e4ab322fSPeter Zijlstra * wrapper around EXTEND_CLASS above to add conditional lock
269e4ab322fSPeter Zijlstra * variants to a base class, eg. mutex_trylock() or
270e4ab322fSPeter Zijlstra * mutex_lock_interruptible().
271e4ab322fSPeter Zijlstra *
27254da6a09SPeter Zijlstra * guard(name):
273e4ab322fSPeter Zijlstra * an anonymous instance of the (guard) class, not recommended for
274e4ab322fSPeter Zijlstra * conditional locks.
27554da6a09SPeter Zijlstra *
27654da6a09SPeter Zijlstra * scoped_guard (name, args...) { }:
27754da6a09SPeter Zijlstra * similar to CLASS(name, scope)(args), except the variable (with the
27854da6a09SPeter Zijlstra * explicit name 'scope') is declard in a for-loop such that its scope is
27954da6a09SPeter Zijlstra * bound to the next (compound) statement.
28054da6a09SPeter Zijlstra *
281e4ab322fSPeter Zijlstra * for conditional locks the loop body is skipped when the lock is not
282e4ab322fSPeter Zijlstra * acquired.
283e4ab322fSPeter Zijlstra *
284e4ab322fSPeter Zijlstra * scoped_cond_guard (name, fail, args...) { }:
285e4ab322fSPeter Zijlstra * similar to scoped_guard(), except it does fail when the lock
286e4ab322fSPeter Zijlstra * acquire fails.
287e4ab322fSPeter Zijlstra *
288fcc22ac5SPrzemek Kitszel * Only for conditional locks.
28954da6a09SPeter Zijlstra */
29054da6a09SPeter Zijlstra
291fcc22ac5SPrzemek Kitszel #define __DEFINE_CLASS_IS_CONDITIONAL(_name, _is_cond) \
292fcc22ac5SPrzemek Kitszel static __maybe_unused const bool class_##_name##_is_conditional = _is_cond
293fcc22ac5SPrzemek Kitszel
294*538d710eSPeter Zijlstra #define __DEFINE_GUARD_LOCK_PTR(_name, _exp) \
295e4ab322fSPeter Zijlstra static inline void * class_##_name##_lock_ptr(class_##_name##_t *_T) \
296*538d710eSPeter Zijlstra { return (void *)(__force unsigned long)*(_exp); }
297*538d710eSPeter Zijlstra
298*538d710eSPeter Zijlstra #define DEFINE_CLASS_IS_GUARD(_name) \
299*538d710eSPeter Zijlstra __DEFINE_CLASS_IS_CONDITIONAL(_name, false); \
300*538d710eSPeter Zijlstra __DEFINE_GUARD_LOCK_PTR(_name, _T)
301*538d710eSPeter Zijlstra
302*538d710eSPeter Zijlstra #define DEFINE_CLASS_IS_COND_GUARD(_name) \
303*538d710eSPeter Zijlstra __DEFINE_CLASS_IS_CONDITIONAL(_name, true); \
304*538d710eSPeter Zijlstra __DEFINE_GUARD_LOCK_PTR(_name, _T)
305*538d710eSPeter Zijlstra
306*538d710eSPeter Zijlstra #define DEFINE_GUARD(_name, _type, _lock, _unlock) \
307*538d710eSPeter Zijlstra DEFINE_CLASS(_name, _type, if (_T) { _unlock; }, ({ _lock; _T; }), _type _T); \
308*538d710eSPeter Zijlstra DEFINE_CLASS_IS_GUARD(_name)
309e4ab322fSPeter Zijlstra
310e4ab322fSPeter Zijlstra #define DEFINE_GUARD_COND(_name, _ext, _condlock) \
311fcc22ac5SPrzemek Kitszel __DEFINE_CLASS_IS_CONDITIONAL(_name##_ext, true); \
312e4ab322fSPeter Zijlstra EXTEND_CLASS(_name, _ext, \
313e4ab322fSPeter Zijlstra ({ void *_t = _T; if (_T && !(_condlock)) _t = NULL; _t; }), \
314e4ab322fSPeter Zijlstra class_##_name##_t _T) \
315e4ab322fSPeter Zijlstra static inline void * class_##_name##_ext##_lock_ptr(class_##_name##_t *_T) \
316e4ab322fSPeter Zijlstra { return class_##_name##_lock_ptr(_T); }
31754da6a09SPeter Zijlstra
31854da6a09SPeter Zijlstra #define guard(_name) \
31954da6a09SPeter Zijlstra CLASS(_name, __UNIQUE_ID(guard))
32054da6a09SPeter Zijlstra
321e4ab322fSPeter Zijlstra #define __guard_ptr(_name) class_##_name##_lock_ptr
322fcc22ac5SPrzemek Kitszel #define __is_cond_ptr(_name) class_##_name##_is_conditional
323fcc22ac5SPrzemek Kitszel
324fcc22ac5SPrzemek Kitszel /*
325fcc22ac5SPrzemek Kitszel * Helper macro for scoped_guard().
326fcc22ac5SPrzemek Kitszel *
327fcc22ac5SPrzemek Kitszel * Note that the "!__is_cond_ptr(_name)" part of the condition ensures that
328fcc22ac5SPrzemek Kitszel * compiler would be sure that for the unconditional locks the body of the
329fcc22ac5SPrzemek Kitszel * loop (caller-provided code glued to the else clause) could not be skipped.
330fcc22ac5SPrzemek Kitszel * It is needed because the other part - "__guard_ptr(_name)(&scope)" - is too
331fcc22ac5SPrzemek Kitszel * hard to deduce (even if could be proven true for unconditional locks).
332fcc22ac5SPrzemek Kitszel */
333fcc22ac5SPrzemek Kitszel #define __scoped_guard(_name, _label, args...) \
334fcc22ac5SPrzemek Kitszel for (CLASS(_name, scope)(args); \
335fcc22ac5SPrzemek Kitszel __guard_ptr(_name)(&scope) || !__is_cond_ptr(_name); \
336fcc22ac5SPrzemek Kitszel ({ goto _label; })) \
337fcc22ac5SPrzemek Kitszel if (0) { \
338fcc22ac5SPrzemek Kitszel _label: \
339fcc22ac5SPrzemek Kitszel break; \
340fcc22ac5SPrzemek Kitszel } else
341e4ab322fSPeter Zijlstra
34254da6a09SPeter Zijlstra #define scoped_guard(_name, args...) \
343fcc22ac5SPrzemek Kitszel __scoped_guard(_name, __UNIQUE_ID(label), args)
344fcc22ac5SPrzemek Kitszel
345fcc22ac5SPrzemek Kitszel #define __scoped_cond_guard(_name, _fail, _label, args...) \
346fcc22ac5SPrzemek Kitszel for (CLASS(_name, scope)(args); true; ({ goto _label; })) \
347fcc22ac5SPrzemek Kitszel if (!__guard_ptr(_name)(&scope)) { \
348fcc22ac5SPrzemek Kitszel BUILD_BUG_ON(!__is_cond_ptr(_name)); \
349fcc22ac5SPrzemek Kitszel _fail; \
350fcc22ac5SPrzemek Kitszel _label: \
351fcc22ac5SPrzemek Kitszel break; \
352fcc22ac5SPrzemek Kitszel } else
353e4ab322fSPeter Zijlstra
354e4ab322fSPeter Zijlstra #define scoped_cond_guard(_name, _fail, args...) \
355fcc22ac5SPrzemek Kitszel __scoped_cond_guard(_name, _fail, __UNIQUE_ID(label), args)
35636c2cf88SDavid Lechner
35754da6a09SPeter Zijlstra /*
35854da6a09SPeter Zijlstra * Additional helper macros for generating lock guards with types, either for
35954da6a09SPeter Zijlstra * locks that don't have a native type (eg. RCU, preempt) or those that need a
36054da6a09SPeter Zijlstra * 'fat' pointer (eg. spin_lock_irqsave).
36154da6a09SPeter Zijlstra *
36254da6a09SPeter Zijlstra * DEFINE_LOCK_GUARD_0(name, lock, unlock, ...)
36354da6a09SPeter Zijlstra * DEFINE_LOCK_GUARD_1(name, type, lock, unlock, ...)
364e4ab322fSPeter Zijlstra * DEFINE_LOCK_GUARD_1_COND(name, ext, condlock)
36554da6a09SPeter Zijlstra *
36654da6a09SPeter Zijlstra * will result in the following type:
36754da6a09SPeter Zijlstra *
36854da6a09SPeter Zijlstra * typedef struct {
36954da6a09SPeter Zijlstra * type *lock; // 'type := void' for the _0 variant
37054da6a09SPeter Zijlstra * __VA_ARGS__;
37154da6a09SPeter Zijlstra * } class_##name##_t;
37254da6a09SPeter Zijlstra *
37354da6a09SPeter Zijlstra * As above, both _lock and _unlock are statements, except this time '_T' will
37454da6a09SPeter Zijlstra * be a pointer to the above struct.
37554da6a09SPeter Zijlstra */
37654da6a09SPeter Zijlstra
37754da6a09SPeter Zijlstra #define __DEFINE_UNLOCK_GUARD(_name, _type, _unlock, ...) \
37854da6a09SPeter Zijlstra typedef struct { \
37954da6a09SPeter Zijlstra _type *lock; \
38054da6a09SPeter Zijlstra __VA_ARGS__; \
38154da6a09SPeter Zijlstra } class_##_name##_t; \
38254da6a09SPeter Zijlstra \
38354da6a09SPeter Zijlstra static inline void class_##_name##_destructor(class_##_name##_t *_T) \
38454da6a09SPeter Zijlstra { \
38554da6a09SPeter Zijlstra if (_T->lock) { _unlock; } \
386e4ab322fSPeter Zijlstra } \
387e4ab322fSPeter Zijlstra \
388*538d710eSPeter Zijlstra __DEFINE_GUARD_LOCK_PTR(_name, &_T->lock)
38954da6a09SPeter Zijlstra
39054da6a09SPeter Zijlstra #define __DEFINE_LOCK_GUARD_1(_name, _type, _lock) \
39154da6a09SPeter Zijlstra static inline class_##_name##_t class_##_name##_constructor(_type *l) \
39254da6a09SPeter Zijlstra { \
39354da6a09SPeter Zijlstra class_##_name##_t _t = { .lock = l }, *_T = &_t; \
39454da6a09SPeter Zijlstra _lock; \
39554da6a09SPeter Zijlstra return _t; \
39654da6a09SPeter Zijlstra }
39754da6a09SPeter Zijlstra
39854da6a09SPeter Zijlstra #define __DEFINE_LOCK_GUARD_0(_name, _lock) \
39954da6a09SPeter Zijlstra static inline class_##_name##_t class_##_name##_constructor(void) \
40054da6a09SPeter Zijlstra { \
40154da6a09SPeter Zijlstra class_##_name##_t _t = { .lock = (void*)1 }, \
40254da6a09SPeter Zijlstra *_T __maybe_unused = &_t; \
40354da6a09SPeter Zijlstra _lock; \
40454da6a09SPeter Zijlstra return _t; \
40554da6a09SPeter Zijlstra }
40654da6a09SPeter Zijlstra
40754da6a09SPeter Zijlstra #define DEFINE_LOCK_GUARD_1(_name, _type, _lock, _unlock, ...) \
408fcc22ac5SPrzemek Kitszel __DEFINE_CLASS_IS_CONDITIONAL(_name, false); \
40954da6a09SPeter Zijlstra __DEFINE_UNLOCK_GUARD(_name, _type, _unlock, __VA_ARGS__) \
41054da6a09SPeter Zijlstra __DEFINE_LOCK_GUARD_1(_name, _type, _lock)
41154da6a09SPeter Zijlstra
41254da6a09SPeter Zijlstra #define DEFINE_LOCK_GUARD_0(_name, _lock, _unlock, ...) \
413fcc22ac5SPrzemek Kitszel __DEFINE_CLASS_IS_CONDITIONAL(_name, false); \
41454da6a09SPeter Zijlstra __DEFINE_UNLOCK_GUARD(_name, void, _unlock, __VA_ARGS__) \
41554da6a09SPeter Zijlstra __DEFINE_LOCK_GUARD_0(_name, _lock)
41654da6a09SPeter Zijlstra
417e4ab322fSPeter Zijlstra #define DEFINE_LOCK_GUARD_1_COND(_name, _ext, _condlock) \
418fcc22ac5SPrzemek Kitszel __DEFINE_CLASS_IS_CONDITIONAL(_name##_ext, true); \
419e4ab322fSPeter Zijlstra EXTEND_CLASS(_name, _ext, \
420e4ab322fSPeter Zijlstra ({ class_##_name##_t _t = { .lock = l }, *_T = &_t;\
421e4ab322fSPeter Zijlstra if (_T->lock && !(_condlock)) _T->lock = NULL; \
422e4ab322fSPeter Zijlstra _t; }), \
423e4ab322fSPeter Zijlstra typeof_member(class_##_name##_t, lock) l) \
424e4ab322fSPeter Zijlstra static inline void * class_##_name##_ext##_lock_ptr(class_##_name##_t *_T) \
425e4ab322fSPeter Zijlstra { return class_##_name##_lock_ptr(_T); }
426e4ab322fSPeter Zijlstra
427e4ab322fSPeter Zijlstra
428c80c4490SIngo Molnar #endif /* _LINUX_CLEANUP_H */
429