mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

Move the definitions of `ARef` and `AlwaysRefCounted` from `types.rs` to a new file `sync/aref.rs`. Define the corresponding `aref` module under `rust/kernel/sync.rs`. These types are better grouped in `sync`. To avoid breaking existing imports, they are re-exported from `types.rs`. Drop unused imports `mem::ManuallyDrop`, `ptr::NonNull` from `types.rs`, they are now only used in `sync/aref.rs`, where they are already imported. Suggested-by: Benno Lossin <lossin@kernel.org> Link: https://github.com/Rust-for-Linux/linux/issues/1173 Signed-off-by: Shankari Anand <shankari.ak0208@gmail.com> Reviewed-by: Benno Lossin <lossin@kernel.org> Link: https://lore.kernel.org/r/20250715110423.334744-1-shankari.ak0208@gmail.com [ Added missing `///`. Changed module title. Reworded slightly. - Miguel ] Signed-off-by: Miguel Ojeda <ojeda@kernel.org>
120 lines
4 KiB
Rust
120 lines
4 KiB
Rust
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
//! Synchronisation primitives.
|
|
//!
|
|
//! This module contains the kernel APIs related to synchronisation that have been ported or
|
|
//! wrapped for usage by Rust code in the kernel.
|
|
|
|
use crate::prelude::*;
|
|
use crate::types::Opaque;
|
|
use pin_init;
|
|
|
|
mod arc;
|
|
pub mod aref;
|
|
pub mod completion;
|
|
mod condvar;
|
|
pub mod lock;
|
|
mod locked_by;
|
|
pub mod poll;
|
|
pub mod rcu;
|
|
|
|
pub use arc::{Arc, ArcBorrow, UniqueArc};
|
|
pub use completion::Completion;
|
|
pub use condvar::{new_condvar, CondVar, CondVarTimeoutResult};
|
|
pub use lock::global::{global_lock, GlobalGuard, GlobalLock, GlobalLockBackend, GlobalLockedBy};
|
|
pub use lock::mutex::{new_mutex, Mutex, MutexGuard};
|
|
pub use lock::spinlock::{new_spinlock, SpinLock, SpinLockGuard};
|
|
pub use locked_by::LockedBy;
|
|
|
|
/// Represents a lockdep class. It's a wrapper around C's `lock_class_key`.
|
|
#[repr(transparent)]
|
|
#[pin_data(PinnedDrop)]
|
|
pub struct LockClassKey {
|
|
#[pin]
|
|
inner: Opaque<bindings::lock_class_key>,
|
|
}
|
|
|
|
// SAFETY: `bindings::lock_class_key` is designed to be used concurrently from multiple threads and
|
|
// provides its own synchronization.
|
|
unsafe impl Sync for LockClassKey {}
|
|
|
|
impl LockClassKey {
|
|
/// Initializes a dynamically allocated lock class key. In the common case of using a
|
|
/// statically allocated lock class key, the static_lock_class! macro should be used instead.
|
|
///
|
|
/// # Examples
|
|
/// ```
|
|
/// # use kernel::c_str;
|
|
/// # use kernel::alloc::KBox;
|
|
/// # use kernel::types::ForeignOwnable;
|
|
/// # use kernel::sync::{LockClassKey, SpinLock};
|
|
/// # use pin_init::stack_pin_init;
|
|
///
|
|
/// let key = KBox::pin_init(LockClassKey::new_dynamic(), GFP_KERNEL)?;
|
|
/// let key_ptr = key.into_foreign();
|
|
///
|
|
/// {
|
|
/// stack_pin_init!(let num: SpinLock<u32> = SpinLock::new(
|
|
/// 0,
|
|
/// c_str!("my_spinlock"),
|
|
/// // SAFETY: `key_ptr` is returned by the above `into_foreign()`, whose
|
|
/// // `from_foreign()` has not yet been called.
|
|
/// unsafe { <Pin<KBox<LockClassKey>> as ForeignOwnable>::borrow(key_ptr) }
|
|
/// ));
|
|
/// }
|
|
///
|
|
/// // SAFETY: We dropped `num`, the only use of the key, so the result of the previous
|
|
/// // `borrow` has also been dropped. Thus, it's safe to use from_foreign.
|
|
/// unsafe { drop(<Pin<KBox<LockClassKey>> as ForeignOwnable>::from_foreign(key_ptr)) };
|
|
///
|
|
/// # Ok::<(), Error>(())
|
|
/// ```
|
|
pub fn new_dynamic() -> impl PinInit<Self> {
|
|
pin_init!(Self {
|
|
// SAFETY: lockdep_register_key expects an uninitialized block of memory
|
|
inner <- Opaque::ffi_init(|slot| unsafe { bindings::lockdep_register_key(slot) })
|
|
})
|
|
}
|
|
|
|
pub(crate) fn as_ptr(&self) -> *mut bindings::lock_class_key {
|
|
self.inner.get()
|
|
}
|
|
}
|
|
|
|
#[pinned_drop]
|
|
impl PinnedDrop for LockClassKey {
|
|
fn drop(self: Pin<&mut Self>) {
|
|
// SAFETY: self.as_ptr was registered with lockdep and self is pinned, so the address
|
|
// hasn't changed. Thus, it's safe to pass to unregister.
|
|
unsafe { bindings::lockdep_unregister_key(self.as_ptr()) }
|
|
}
|
|
}
|
|
|
|
/// Defines a new static lock class and returns a pointer to it.
|
|
#[doc(hidden)]
|
|
#[macro_export]
|
|
macro_rules! static_lock_class {
|
|
() => {{
|
|
static CLASS: $crate::sync::LockClassKey =
|
|
// Lockdep expects uninitialized memory when it's handed a statically allocated `struct
|
|
// lock_class_key`.
|
|
//
|
|
// SAFETY: `LockClassKey` transparently wraps `Opaque` which permits uninitialized
|
|
// memory.
|
|
unsafe { ::core::mem::MaybeUninit::uninit().assume_init() };
|
|
$crate::prelude::Pin::static_ref(&CLASS)
|
|
}};
|
|
}
|
|
|
|
/// Returns the given string, if one is provided, otherwise generates one based on the source code
|
|
/// location.
|
|
#[doc(hidden)]
|
|
#[macro_export]
|
|
macro_rules! optional_name {
|
|
() => {
|
|
$crate::c_str!(::core::concat!(::core::file!(), ":", ::core::line!()))
|
|
};
|
|
($name:literal) => {
|
|
$crate::c_str!($name)
|
|
};
|
|
}
|