xref: /linux/rust/kernel/sync/aref.rs (revision 182d95571ffa278f7c68a80d76de88a5333fb69f)
1 // SPDX-License-Identifier: GPL-2.0
2 
3 //! Internal reference counting support.
4 //!
5 //! Many C types already have their own reference counting mechanism (e.g. by storing a
6 //! `refcount_t`). This module provides support for directly using their internal reference count
7 //! from Rust; instead of making users have to use an additional Rust-reference count in the form of
8 //! [`Arc`].
9 //!
10 //! The smart pointer [`ARef<T>`] acts similarly to [`Arc<T>`] in that it holds a refcount on the
11 //! underlying object, but this refcount is internal to the object. It essentially is a Rust
12 //! implementation of the `get_` and `put_` pattern used in C for reference counting.
13 //!
14 //! To make use of [`ARef<MyType>`], `MyType` needs to implement [`AlwaysRefCounted`]. It is a trait
15 //! for accessing the internal reference count of an object of the `MyType` type.
16 //!
17 //! [`Arc`]: crate::sync::Arc
18 //! [`Arc<T>`]: crate::sync::Arc
19 
20 use core::{marker::PhantomData, mem::ManuallyDrop, ops::Deref, ptr::NonNull};
21 
22 /// Types that are _always_ reference counted.
23 ///
24 /// It allows such types to define their own custom ref increment and decrement functions.
25 /// Additionally, it allows users to convert from a shared reference `&T` to an owned reference
26 /// [`ARef<T>`].
27 ///
28 /// This is usually implemented by wrappers to existing structures on the C side of the code. For
29 /// Rust code, the recommendation is to use [`Arc`](crate::sync::Arc) to create reference-counted
30 /// instances of a type.
31 ///
32 /// # Safety
33 ///
34 /// Implementers must ensure that increments to the reference count keep the object alive in memory
35 /// at least until matching decrements are performed.
36 ///
37 /// Implementers must also ensure that all instances are reference-counted. (Otherwise they
38 /// won't be able to honour the requirement that [`AlwaysRefCounted::inc_ref`] keep the object
39 /// alive.)
40 pub unsafe trait AlwaysRefCounted {
41     /// Increments the reference count on the object.
42     fn inc_ref(&self);
43 
44     /// Decrements the reference count on the object.
45     ///
46     /// Frees the object when the count reaches zero.
47     ///
48     /// # Safety
49     ///
50     /// Callers must ensure that there was a previous matching increment to the reference count,
51     /// and that the object is no longer used after its reference count is decremented (as it may
52     /// result in the object being freed), unless the caller owns another increment on the refcount
53     /// (e.g., it calls [`AlwaysRefCounted::inc_ref`] twice, then calls
54     /// [`AlwaysRefCounted::dec_ref`] once).
55     unsafe fn dec_ref(obj: NonNull<Self>);
56 }
57 
58 /// An owned reference to an always-reference-counted object.
59 ///
60 /// The object's reference count is automatically decremented when an instance of [`ARef`] is
61 /// dropped. It is also automatically incremented when a new instance is created via
62 /// [`ARef::clone`].
63 ///
64 /// # Invariants
65 ///
66 /// The pointer stored in `ptr` is non-null and valid for the lifetime of the [`ARef`] instance. In
67 /// particular, the [`ARef`] instance owns an increment on the underlying object's reference count.
68 pub struct ARef<T: AlwaysRefCounted> {
69     ptr: NonNull<T>,
70     _p: PhantomData<T>,
71 }
72 
73 // SAFETY: It is safe to send `ARef<T>` to another thread when the underlying `T` is `Sync` because
74 // it effectively means sharing `&T` (which is safe because `T` is `Sync`); additionally, it needs
75 // `T` to be `Send` because any thread that has an `ARef<T>` may ultimately access `T` using a
76 // mutable reference, for example, when the reference count reaches zero and `T` is dropped.
77 unsafe impl<T: AlwaysRefCounted + Sync + Send> Send for ARef<T> {}
78 
79 // SAFETY: It is safe to send `&ARef<T>` to another thread when the underlying `T` is `Sync`
80 // because it effectively means sharing `&T` (which is safe because `T` is `Sync`); additionally,
81 // it needs `T` to be `Send` because any thread that has a `&ARef<T>` may clone it and get an
82 // `ARef<T>` on that thread, so the thread may ultimately access `T` using a mutable reference, for
83 // example, when the reference count reaches zero and `T` is dropped.
84 unsafe impl<T: AlwaysRefCounted + Sync + Send> Sync for ARef<T> {}
85 
86 impl<T: AlwaysRefCounted> ARef<T> {
87     /// Creates a new instance of [`ARef`].
88     ///
89     /// It takes over an increment of the reference count on the underlying object.
90     ///
91     /// # Safety
92     ///
93     /// Callers must ensure that the reference count was incremented at least once, and that they
94     /// are properly relinquishing one increment. That is, if there is only one increment, callers
95     /// must not use the underlying object anymore -- it is only safe to do so via the newly
96     /// created [`ARef`].
97     pub unsafe fn from_raw(ptr: NonNull<T>) -> Self {
98         // INVARIANT: The safety requirements guarantee that the new instance now owns the
99         // increment on the refcount.
100         Self {
101             ptr,
102             _p: PhantomData,
103         }
104     }
105 
106     /// Consumes the `ARef`, returning a raw pointer.
107     ///
108     /// This function does not change the refcount. After calling this function, the caller is
109     /// responsible for the refcount previously managed by the `ARef`.
110     ///
111     /// # Examples
112     ///
113     /// ```
114     /// use core::ptr::NonNull;
115     /// use kernel::sync::aref::{ARef, AlwaysRefCounted};
116     ///
117     /// struct Empty {}
118     ///
119     /// # // SAFETY: TODO.
120     /// unsafe impl AlwaysRefCounted for Empty {
121     ///     fn inc_ref(&self) {}
122     ///     unsafe fn dec_ref(_obj: NonNull<Self>) {}
123     /// }
124     ///
125     /// let mut data = Empty {};
126     /// let ptr = NonNull::<Empty>::new(&mut data).unwrap();
127     /// # // SAFETY: TODO.
128     /// let data_ref: ARef<Empty> = unsafe { ARef::from_raw(ptr) };
129     /// let raw_ptr: NonNull<Empty> = ARef::into_raw(data_ref);
130     ///
131     /// assert_eq!(ptr, raw_ptr);
132     /// ```
133     pub fn into_raw(me: Self) -> NonNull<T> {
134         ManuallyDrop::new(me).ptr
135     }
136 }
137 
138 impl<T: AlwaysRefCounted> Clone for ARef<T> {
139     fn clone(&self) -> Self {
140         self.inc_ref();
141         // SAFETY: We just incremented the refcount above.
142         unsafe { Self::from_raw(self.ptr) }
143     }
144 }
145 
146 impl<T: AlwaysRefCounted> Deref for ARef<T> {
147     type Target = T;
148 
149     fn deref(&self) -> &Self::Target {
150         // SAFETY: The type invariants guarantee that the object is valid.
151         unsafe { self.ptr.as_ref() }
152     }
153 }
154 
155 impl<T: AlwaysRefCounted> From<&T> for ARef<T> {
156     fn from(b: &T) -> Self {
157         b.inc_ref();
158         // SAFETY: We just incremented the refcount above.
159         unsafe { Self::from_raw(NonNull::from(b)) }
160     }
161 }
162 
163 impl<T: AlwaysRefCounted> Drop for ARef<T> {
164     fn drop(&mut self) {
165         // SAFETY: The type invariants guarantee that the `ARef` owns the reference we're about to
166         // decrement.
167         unsafe { T::dec_ref(self.ptr) };
168     }
169 }
170