Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1038186rwl; Wed, 5 Apr 2023 10:55:43 -0700 (PDT) X-Google-Smtp-Source: AKy350YcqXyQ+RDCtZg4/iQeNBwdZVU3zUH9lRFPpvW1YC5GEJ0E5JC8i4ZI6Cj/CmgYi8wgcL2Z X-Received: by 2002:a05:6a20:669a:b0:d9:b820:10a4 with SMTP id o26-20020a056a20669a00b000d9b82010a4mr109531pzh.8.1680717343404; Wed, 05 Apr 2023 10:55:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680717343; cv=none; d=google.com; s=arc-20160816; b=VEl2ZYfEmp7PWQkr0x20TYeSCsuw8sTT+OpF4usy29hCrY5joqB1KSvMfcvtiPsSDE GRuoxHzxkIP+3HbMIvdvZKFa0qcRFXQXMDiOEoqcW3HBcjYCzPXzmmzW6vi9fege9y6F Sa2UxUH7ZYB6us1Gqs3dZUSKMEM0sdHzvfFaIEKNIDhAVs8ebmEHAg0uPvoQDITkebb7 7bOQcXlhCSsAAi5F57k0q21YYxLDInxkZGwCikyA5mtOUjy6aBei1FwY+F5VqhCvXOo8 2okimKirZTtVTeB42PRTFVtCzHBQqnxcQK3vVjz0h9ng8+7Uk/6GXGmHdxIwcJ4tYp5w 3Z/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=N+gZiyyLxRiSG37zAfSNgoy4l7b34DC1t6Bz5rq/u0E=; b=tX42/0SuSVxcuZyM5u30AhLdvutPm8zQBSi/Uf0uWTY5/LtJihgPy+crykJepfyr7n /DPXkBRgFrQUaYPN1E5yzvFfXzZ4U5OQu3tvTYmlf1acO09QvLvER6tHZvIEas8hm20W kR5srmGATgSIieiyD1fsyCBux8AOj4VaebdZu3nI/Jp+ikMMiQcNSYBgX2ym7zp6zqM+ rgpMvfmnHa94llK1eDcvdU6gWCQELyfUV3e5/q3hbxvTUjG/B/bJV06ByAl2CeGG+wM/ W++F91tOepvyKF5kBRAIS1Ugr/ftAOdmIqQFZNdwq0dbp69J8CXc8rEIcPEZhnIsFQ+j YWKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=j5XuEcww; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x70-20020a638649000000b004fbd79d66c9si12643456pgd.23.2023.04.05.10.55.31; Wed, 05 Apr 2023 10:55:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=j5XuEcww; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233726AbjDERxK (ORCPT + 99 others); Wed, 5 Apr 2023 13:53:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40616 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233282AbjDERxA (ORCPT ); Wed, 5 Apr 2023 13:53:00 -0400 Received: from mail-oi1-x22d.google.com (mail-oi1-x22d.google.com [IPv6:2607:f8b0:4864:20::22d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 674DD65A6; Wed, 5 Apr 2023 10:52:36 -0700 (PDT) Received: by mail-oi1-x22d.google.com with SMTP id r16so27166592oij.5; Wed, 05 Apr 2023 10:52:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; t=1680717155; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=N+gZiyyLxRiSG37zAfSNgoy4l7b34DC1t6Bz5rq/u0E=; b=j5XuEcwwKsKpNqfakkkqT8jKEOUWA+DuyM9I5THZx1ldm3xH+qLHaQjMAIm1dyTGy0 nlTAoY7F1B5Z5hwP5RkYpBme+Cg89dpUE9pdb5DlqU1/D6WnQsocuTQC7aN8qlh3Tdq6 fIp1LK7IOFve3+4n40nHMR6aIOYykCtpQ7NnVFVSE8ZftV7nQ/zYdzQFcHogANFCGGhj uZ3jrbyJbbQqe2AAvUaSZnFiDIL+GS26Uj8GLA5oeJXsxn7x4Kyp8Z50CGXZesK7X8GY qDQX/ZNMPsRQV2/omgM7KJ6Ddb0ByY39689OuAkW/r0Iv+y+xFvq+EXvheIRfMxse7Rk YG/w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680717155; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=N+gZiyyLxRiSG37zAfSNgoy4l7b34DC1t6Bz5rq/u0E=; b=cDzdD0vkZRJ4KS+lU5zCesxEbu3z2d3BOkS+hz7Tsl3dVs8NmFGuSM4CLAlEqOkcJy 3d4UpWNOeZuSUKRLIMOojS30e+jTYbx7Qzp5QK3h5zOHqNQnXPu4eS7n/t0KvVcPP+jD /gCwHLGpf/yfLRJJRmbIJKy9xNwwwn86mOrWVep23ngsc73awzMYMBeIeReyYNsgpKtX rX6HVRJdM2akOWU2m5EY/uS/pLLcoJ6YqYieOZCLhDTOrPzRa2uO1VSGQS9ulV4/83gs igDLDUcatb/+Fi5/ujibNkEWUqN/QHubnNc+5tCokNqCKnaEuito9IWiXDQ0BayfFswD gtOg== X-Gm-Message-State: AAQBX9cXGPQIknikIRK8FLZu2zPvvYEFVjZjHUDAgQnaak9yXPv+drV8 85wmiHZbS7LDCrgWg+DZehSHCvQLNL3RvQ== X-Received: by 2002:aca:ba56:0:b0:387:1e10:2dc5 with SMTP id k83-20020acaba56000000b003871e102dc5mr3214280oif.20.1680717154690; Wed, 05 Apr 2023 10:52:34 -0700 (PDT) Received: from wedsonaf-dev.home.lan ([189.124.190.154]) by smtp.googlemail.com with ESMTPSA id w185-20020aca62c2000000b003896e31867esm6604045oib.49.2023.04.05.10.52.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 05 Apr 2023 10:52:34 -0700 (PDT) From: Wedson Almeida Filho To: rust-for-linux@vger.kernel.org Cc: Miguel Ojeda , Alex Gaynor , Boqun Feng , Gary Guo , =?UTF-8?q?Bj=C3=B6rn=20Roy=20Baron?= , linux-kernel@vger.kernel.org, Wedson Almeida Filho , Peter Zijlstra , Ingo Molnar , Will Deacon , Waiman Long Subject: [PATCH v2 12/13] rust: sync: introduce `CondVar` Date: Wed, 5 Apr 2023 14:51:10 -0300 Message-Id: <20230405175111.5974-12-wedsonaf@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230405175111.5974-1-wedsonaf@gmail.com> References: <20230405175111.5974-1-wedsonaf@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Wedson Almeida Filho This is the traditional condition variable or monitor synchronisation primitive. It is implemented with C's `wait_queue_head_t`. It allows users to release a lock and go to sleep while guaranteeing that notifications won't be missed. This is achieved by enqueuing a wait entry before releasing the lock. Cc: Peter Zijlstra Cc: Ingo Molnar Cc: Will Deacon Cc: Waiman Long Signed-off-by: Wedson Almeida Filho --- v1 -> v2: Use the new `current` macro rust/bindings/bindings_helper.h | 1 + rust/helpers.c | 7 ++ rust/kernel/sync.rs | 2 + rust/kernel/sync/condvar.rs | 178 ++++++++++++++++++++++++++++++++ rust/kernel/sync/lock.rs | 1 - 5 files changed, 188 insertions(+), 1 deletion(-) create mode 100644 rust/kernel/sync/condvar.rs diff --git a/rust/bindings/bindings_helper.h b/rust/bindings/bindings_helper.h index 03656a44a83f..50e7a76d5455 100644 --- a/rust/bindings/bindings_helper.h +++ b/rust/bindings/bindings_helper.h @@ -8,6 +8,7 @@ #include #include +#include #include /* `bindgen` gets confused at certain things. */ diff --git a/rust/helpers.c b/rust/helpers.c index 96441744030e..8ff2559c1572 100644 --- a/rust/helpers.c +++ b/rust/helpers.c @@ -24,6 +24,7 @@ #include #include #include +#include __noreturn void rust_helper_BUG(void) { @@ -76,6 +77,12 @@ void rust_helper_spin_unlock_irqrestore(spinlock_t *lock, unsigned long flags) } EXPORT_SYMBOL_GPL(rust_helper_spin_unlock_irqrestore); +void rust_helper_init_wait(struct wait_queue_entry *wq_entry) +{ + init_wait(wq_entry); +} +EXPORT_SYMBOL_GPL(rust_helper_init_wait); + int rust_helper_signal_pending(struct task_struct *t) { return signal_pending(t); diff --git a/rust/kernel/sync.rs b/rust/kernel/sync.rs index ed07437d7d55..d6dd0e2c1678 100644 --- a/rust/kernel/sync.rs +++ b/rust/kernel/sync.rs @@ -8,9 +8,11 @@ use crate::types::Opaque; mod arc; +mod condvar; pub mod lock; pub use arc::{Arc, ArcBorrow, UniqueArc}; +pub use condvar::CondVar; pub use lock::{mutex::Mutex, spinlock::SpinLock}; /// Represents a lockdep class. It's a wrapper around C's `lock_class_key`. diff --git a/rust/kernel/sync/condvar.rs b/rust/kernel/sync/condvar.rs new file mode 100644 index 000000000000..9de76110e6b5 --- /dev/null +++ b/rust/kernel/sync/condvar.rs @@ -0,0 +1,178 @@ +// SPDX-License-Identifier: GPL-2.0 + +//! A condition variable. +//! +//! This module allows Rust code to use the kernel's [`struct wait_queue_head`] as a condition +//! variable. + +use super::{lock::Backend, lock::Guard, LockClassKey}; +use crate::{bindings, init::PinInit, pin_init, str::CStr, types::Opaque}; +use core::marker::PhantomPinned; +use macros::pin_data; + +/// Creates a [`CondVar`] initialiser with the given name and a newly-created lock class. +#[macro_export] +macro_rules! new_condvar { + ($($name:literal)?) => { + $crate::sync::CondVar::new($crate::optional_name!($($name)?), $crate::static_lock_class!()) + }; +} + +/// A conditional variable. +/// +/// Exposes the kernel's [`struct wait_queue_head`] as a condition variable. It allows the caller to +/// atomically release the given lock and go to sleep. It reacquires the lock when it wakes up. And +/// it wakes up when notified by another thread (via [`CondVar::notify_one`] or +/// [`CondVar::notify_all`]) or because the thread received a signal. It may also wake up +/// spuriously. +/// +/// Instances of [`CondVar`] need a lock class and to be pinned. The recommended way to create such +/// instances is with the [`pin_init`](crate::pin_init) and [`new_condvar`] macros. +/// +/// # Examples +/// +/// The following is an example of using a condvar with a mutex: +/// +/// ``` +/// use kernel::sync::{CondVar, Mutex}; +/// use kernel::{new_condvar, new_mutex}; +/// +/// #[pin_data] +/// pub struct Example { +/// #[pin] +/// value: Mutex, +/// +/// #[pin] +/// value_changed: CondVar, +/// } +/// +/// /// Waits for `e.value` to become `v`. +/// fn wait_for_vaue(e: &Example, v: u32) { +/// let mut guard = e.value.lock(); +/// while *guard != v { +/// e.value_changed.wait_uninterruptible(&mut guard); +/// } +/// } +/// +/// /// Increments `e.value` and notifies all potential waiters. +/// fn increment(e: &Example) { +/// *e.value.lock() += 1; +/// e.value_changed.notify_all(); +/// } +/// +/// /// Allocates a new boxed `Example`. +/// fn new_example() -> Result>> { +/// Box::pin_init(pin_init!(Example { +/// value <- new_mutex!(0), +/// value_changed <- new_condvar!(), +/// })) +/// } +/// ``` +/// +/// [`struct wait_queue_head`]: ../../../include/linux/wait.h +#[pin_data] +pub struct CondVar { + #[pin] + pub(crate) wait_list: Opaque, + + /// A condvar needs to be pinned because it contains a [`struct list_head`] that is + /// self-referential, so it cannot be safely moved once it is initialised. + #[pin] + _pin: PhantomPinned, +} + +// SAFETY: `CondVar` only uses a `struct wait_queue_head`, which is safe to use on any thread. +#[allow(clippy::non_send_fields_in_send_ty)] +unsafe impl Send for CondVar {} + +// SAFETY: `CondVar` only uses a `struct wait_queue_head`, which is safe to use on multiple threads +// concurrently. +unsafe impl Sync for CondVar {} + +impl CondVar { + /// Constructs a new condvar initialiser. + #[allow(clippy::new_ret_no_self)] + pub fn new(name: &'static CStr, key: &'static LockClassKey) -> impl PinInit { + pin_init!(Self { + _pin: PhantomPinned, + // SAFETY: `__init_waitqueue_head` initialises the waitqueue head, and both `name` and + // `key` have static lifetimes so they live indefinitely. + wait_list <- unsafe { + Opaque::ffi_init2( + bindings::__init_waitqueue_head, + name.as_char_ptr(), + key.as_ptr(), + ) + }, + }) + } + + fn wait_internal(&self, wait_state: u32, guard: &mut Guard<'_, T, B>) { + let wait = Opaque::::uninit(); + + // SAFETY: `wait` points to valid memory. + unsafe { bindings::init_wait(wait.get()) }; + + // SAFETY: Both `wait` and `wait_list` point to valid memory. + unsafe { + bindings::prepare_to_wait_exclusive(self.wait_list.get(), wait.get(), wait_state as _) + }; + + // SAFETY: No arguments, switches to another thread. + guard.do_unlocked(|| unsafe { bindings::schedule() }); + + // SAFETY: Both `wait` and `wait_list` point to valid memory. + unsafe { bindings::finish_wait(self.wait_list.get(), wait.get()) }; + } + + /// Releases the lock and waits for a notification in interruptible mode. + /// + /// Atomically releases the given lock (whose ownership is proven by the guard) and puts the + /// thread to sleep, reacquiring the lock on wake up. It wakes up when notified by + /// [`CondVar::notify_one`] or [`CondVar::notify_all`], or when the thread receives a signal. + /// It may also wake up spuriously. + /// + /// Returns whether there is a signal pending. + #[must_use = "wait returns if a signal is pending, so the caller must check the return value"] + pub fn wait(&self, guard: &mut Guard<'_, T, B>) -> bool { + self.wait_internal(bindings::TASK_INTERRUPTIBLE, guard); + crate::current!().signal_pending() + } + + /// Releases the lock and waits for a notification in uninterruptible mode. + /// + /// Similar to [`CondVar::wait`], except that the wait is not interruptible. That is, the + /// thread won't wake up due to signals. It may, however, wake up supirously. + pub fn wait_uninterruptible(&self, guard: &mut Guard<'_, T, B>) { + self.wait_internal(bindings::TASK_UNINTERRUPTIBLE, guard) + } + + /// Calls the kernel function to notify the appropriate number of threads with the given flags. + fn notify(&self, count: i32, flags: u32) { + // SAFETY: `wait_list` points to valid memory. + unsafe { + bindings::__wake_up( + self.wait_list.get(), + bindings::TASK_NORMAL, + count, + flags as _, + ) + }; + } + + /// Wakes a single waiter up, if any. + /// + /// This is not 'sticky' in the sense that if no thread is waiting, the notification is lost + /// completely (as opposed to automatically waking up the next waiter). + pub fn notify_one(&self) { + self.notify(1, 0); + } + + /// Wakes all waiters up, if any. + /// + /// This is not 'sticky' in the sense that if no thread is waiting, the notification is lost + /// completely (as opposed to automatically waking up the next waiter). + pub fn notify_all(&self) { + self.notify(0, 0); + } +} diff --git a/rust/kernel/sync/lock.rs b/rust/kernel/sync/lock.rs index ae20277c39c8..f52ba9ab1b70 100644 --- a/rust/kernel/sync/lock.rs +++ b/rust/kernel/sync/lock.rs @@ -177,7 +177,6 @@ pub struct Guard<'a, T: ?Sized, B: Backend> { unsafe impl Sync for Guard<'_, T, B> {} impl Guard<'_, T, B> { - #[allow(dead_code)] pub(crate) fn do_unlocked(&mut self, cb: impl FnOnce()) { // SAFETY: The caller owns the lock, so it is safe to unlock it. unsafe { B::unlock(self.lock.state.get(), &self.state) }; -- 2.34.1