mirror of
				https://github.com/torvalds/linux.git
				synced 2025-10-31 08:38:45 +02:00 
			
		
		
		
	 07dad44aa9
			
		
	
	
		07dad44aa9
		
	
	
	
	
		
			
			Move the definitions of `ARef` and `AlwaysRefCounted` from `types.rs` to a new file `sync/aref.rs`. Define the corresponding `aref` module under `rust/kernel/sync.rs`. These types are better grouped in `sync`. To avoid breaking existing imports, they are re-exported from `types.rs`. Drop unused imports `mem::ManuallyDrop`, `ptr::NonNull` from `types.rs`, they are now only used in `sync/aref.rs`, where they are already imported. Suggested-by: Benno Lossin <lossin@kernel.org> Link: https://github.com/Rust-for-Linux/linux/issues/1173 Signed-off-by: Shankari Anand <shankari.ak0208@gmail.com> Reviewed-by: Benno Lossin <lossin@kernel.org> Link: https://lore.kernel.org/r/20250715110423.334744-1-shankari.ak0208@gmail.com [ Added missing `///`. Changed module title. Reworded slightly. - Miguel ] Signed-off-by: Miguel Ojeda <ojeda@kernel.org>
		
			
				
	
	
		
			120 lines
		
	
	
	
		
			4 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
			
		
		
	
	
			120 lines
		
	
	
	
		
			4 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
| // SPDX-License-Identifier: GPL-2.0
 | |
| 
 | |
| //! Synchronisation primitives.
 | |
| //!
 | |
| //! This module contains the kernel APIs related to synchronisation that have been ported or
 | |
| //! wrapped for usage by Rust code in the kernel.
 | |
| 
 | |
| use crate::prelude::*;
 | |
| use crate::types::Opaque;
 | |
| use pin_init;
 | |
| 
 | |
| mod arc;
 | |
| pub mod aref;
 | |
| pub mod completion;
 | |
| mod condvar;
 | |
| pub mod lock;
 | |
| mod locked_by;
 | |
| pub mod poll;
 | |
| pub mod rcu;
 | |
| 
 | |
| pub use arc::{Arc, ArcBorrow, UniqueArc};
 | |
| pub use completion::Completion;
 | |
| pub use condvar::{new_condvar, CondVar, CondVarTimeoutResult};
 | |
| pub use lock::global::{global_lock, GlobalGuard, GlobalLock, GlobalLockBackend, GlobalLockedBy};
 | |
| pub use lock::mutex::{new_mutex, Mutex, MutexGuard};
 | |
| pub use lock::spinlock::{new_spinlock, SpinLock, SpinLockGuard};
 | |
| pub use locked_by::LockedBy;
 | |
| 
 | |
| /// Represents a lockdep class. It's a wrapper around C's `lock_class_key`.
 | |
| #[repr(transparent)]
 | |
| #[pin_data(PinnedDrop)]
 | |
| pub struct LockClassKey {
 | |
|     #[pin]
 | |
|     inner: Opaque<bindings::lock_class_key>,
 | |
| }
 | |
| 
 | |
| // SAFETY: `bindings::lock_class_key` is designed to be used concurrently from multiple threads and
 | |
| // provides its own synchronization.
 | |
| unsafe impl Sync for LockClassKey {}
 | |
| 
 | |
| impl LockClassKey {
 | |
|     /// Initializes a dynamically allocated lock class key. In the common case of using a
 | |
|     /// statically allocated lock class key, the static_lock_class! macro should be used instead.
 | |
|     ///
 | |
|     /// # Examples
 | |
|     /// ```
 | |
|     /// # use kernel::c_str;
 | |
|     /// # use kernel::alloc::KBox;
 | |
|     /// # use kernel::types::ForeignOwnable;
 | |
|     /// # use kernel::sync::{LockClassKey, SpinLock};
 | |
|     /// # use pin_init::stack_pin_init;
 | |
|     ///
 | |
|     /// let key = KBox::pin_init(LockClassKey::new_dynamic(), GFP_KERNEL)?;
 | |
|     /// let key_ptr = key.into_foreign();
 | |
|     ///
 | |
|     /// {
 | |
|     ///     stack_pin_init!(let num: SpinLock<u32> = SpinLock::new(
 | |
|     ///         0,
 | |
|     ///         c_str!("my_spinlock"),
 | |
|     ///         // SAFETY: `key_ptr` is returned by the above `into_foreign()`, whose
 | |
|     ///         // `from_foreign()` has not yet been called.
 | |
|     ///         unsafe { <Pin<KBox<LockClassKey>> as ForeignOwnable>::borrow(key_ptr) }
 | |
|     ///     ));
 | |
|     /// }
 | |
|     ///
 | |
|     /// // SAFETY: We dropped `num`, the only use of the key, so the result of the previous
 | |
|     /// // `borrow` has also been dropped. Thus, it's safe to use from_foreign.
 | |
|     /// unsafe { drop(<Pin<KBox<LockClassKey>> as ForeignOwnable>::from_foreign(key_ptr)) };
 | |
|     ///
 | |
|     /// # Ok::<(), Error>(())
 | |
|     /// ```
 | |
|     pub fn new_dynamic() -> impl PinInit<Self> {
 | |
|         pin_init!(Self {
 | |
|             // SAFETY: lockdep_register_key expects an uninitialized block of memory
 | |
|             inner <- Opaque::ffi_init(|slot| unsafe { bindings::lockdep_register_key(slot) })
 | |
|         })
 | |
|     }
 | |
| 
 | |
|     pub(crate) fn as_ptr(&self) -> *mut bindings::lock_class_key {
 | |
|         self.inner.get()
 | |
|     }
 | |
| }
 | |
| 
 | |
| #[pinned_drop]
 | |
| impl PinnedDrop for LockClassKey {
 | |
|     fn drop(self: Pin<&mut Self>) {
 | |
|         // SAFETY: self.as_ptr was registered with lockdep and self is pinned, so the address
 | |
|         // hasn't changed. Thus, it's safe to pass to unregister.
 | |
|         unsafe { bindings::lockdep_unregister_key(self.as_ptr()) }
 | |
|     }
 | |
| }
 | |
| 
 | |
| /// Defines a new static lock class and returns a pointer to it.
 | |
| #[doc(hidden)]
 | |
| #[macro_export]
 | |
| macro_rules! static_lock_class {
 | |
|     () => {{
 | |
|         static CLASS: $crate::sync::LockClassKey =
 | |
|             // Lockdep expects uninitialized memory when it's handed a statically allocated `struct
 | |
|             // lock_class_key`.
 | |
|             //
 | |
|             // SAFETY: `LockClassKey` transparently wraps `Opaque` which permits uninitialized
 | |
|             // memory.
 | |
|             unsafe { ::core::mem::MaybeUninit::uninit().assume_init() };
 | |
|         $crate::prelude::Pin::static_ref(&CLASS)
 | |
|     }};
 | |
| }
 | |
| 
 | |
| /// Returns the given string, if one is provided, otherwise generates one based on the source code
 | |
| /// location.
 | |
| #[doc(hidden)]
 | |
| #[macro_export]
 | |
| macro_rules! optional_name {
 | |
|     () => {
 | |
|         $crate::c_str!(::core::concat!(::core::file!(), ":", ::core::line!()))
 | |
|     };
 | |
|     ($name:literal) => {
 | |
|         $crate::c_str!($name)
 | |
|     };
 | |
| }
 |