Skip to content

Commit e32cca3

Browse files
wedsonafojeda
authored andcommitted
rust: lock: add Guard::do_unlocked
It releases the lock, executes some function provided by the caller, then reacquires the lock. This is preparation for the implementation of condvars, which will sleep after between unlocking and relocking. We need an explicit `relock` method for primitives like `SpinLock` that have an irqsave variant: we use the guard state to determine if the lock was originally acquired with the regular `lock` function or `lock_irqsave`. Reviewed-by: Martin Rodriguez Reboredo <[email protected]> Signed-off-by: Wedson Almeida Filho <[email protected]> Link: https://lore.kernel.org/rust-for-linux/[email protected]/ [ Removed the irqsave bits as discussed. ] Signed-off-by: Miguel Ojeda <[email protected]>
1 parent 7b1f55e commit e32cca3

File tree

2 files changed

+30
-2
lines changed

2 files changed

+30
-2
lines changed

rust/kernel/sync/lock.rs

+28-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
//! spinlocks, raw spinlocks) to be provided with minimal effort.
77
88
use super::LockClassKey;
9-
use crate::{bindings, init::PinInit, pin_init, str::CStr, types::Opaque};
9+
use crate::{bindings, init::PinInit, pin_init, str::CStr, types::Opaque, types::ScopeGuard};
1010
use core::{cell::UnsafeCell, marker::PhantomData, marker::PhantomPinned};
1111
use macros::pin_data;
1212

@@ -22,6 +22,8 @@ pub mod spinlock;
2222
///
2323
/// - Implementers must ensure that only one thread/CPU may access the protected data once the lock
2424
/// is owned, that is, between calls to `lock` and `unlock`.
25+
/// - Implementers must also ensure that `relock` uses the same locking method as the original
26+
/// lock operation.
2527
pub unsafe trait Backend {
2628
/// The state required by the lock.
2729
type State;
@@ -55,6 +57,17 @@ pub unsafe trait Backend {
5557
///
5658
/// It must only be called by the current owner of the lock.
5759
unsafe fn unlock(ptr: *mut Self::State, guard_state: &Self::GuardState);
60+
61+
/// Reacquires the lock, making the caller its owner.
62+
///
63+
/// # Safety
64+
///
65+
/// Callers must ensure that `guard_state` comes from a previous call to [`Backend::lock`] (or
66+
/// variant) that has been unlocked with [`Backend::unlock`] and will be relocked now.
67+
unsafe fn relock(ptr: *mut Self::State, guard_state: &mut Self::GuardState) {
68+
// SAFETY: The safety requirements ensure that the lock is initialised.
69+
*guard_state = unsafe { Self::lock(ptr) };
70+
}
5871
}
5972

6073
/// A mutual exclusion primitive.
@@ -126,6 +139,20 @@ pub struct Guard<'a, T: ?Sized, B: Backend> {
126139
// SAFETY: `Guard` is sync when the data protected by the lock is also sync.
127140
unsafe impl<T: Sync + ?Sized, B: Backend> Sync for Guard<'_, T, B> {}
128141

142+
impl<T: ?Sized, B: Backend> Guard<'_, T, B> {
143+
#[allow(dead_code)]
144+
pub(crate) fn do_unlocked(&mut self, cb: impl FnOnce()) {
145+
// SAFETY: The caller owns the lock, so it is safe to unlock it.
146+
unsafe { B::unlock(self.lock.state.get(), &self.state) };
147+
148+
// SAFETY: The lock was just unlocked above and is being relocked now.
149+
let _relock =
150+
ScopeGuard::new(|| unsafe { B::relock(self.lock.state.get(), &mut self.state) });
151+
152+
cb();
153+
}
154+
}
155+
129156
impl<T: ?Sized, B: Backend> core::ops::Deref for Guard<'_, T, B> {
130157
type Target = T;
131158

rust/kernel/sync/lock/spinlock.rs

+2-1
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,8 @@ pub type SpinLock<T> = super::Lock<T, SpinLockBackend>;
8787
/// A kernel `spinlock_t` lock backend.
8888
pub struct SpinLockBackend;
8989

90-
// SAFETY: The underlying kernel `spinlock_t` object ensures mutual exclusion.
90+
// SAFETY: The underlying kernel `spinlock_t` object ensures mutual exclusion. `relock` uses the
91+
// default implementation that always calls the same locking method.
9192
unsafe impl super::Backend for SpinLockBackend {
9293
type State = bindings::spinlock_t;
9394
type GuardState = ();

0 commit comments

Comments
 (0)