kernel/devres.rs
1// SPDX-License-Identifier: GPL-2.0
2
3//! Devres abstraction
4//!
5//! [`Devres`] represents an abstraction for the kernel devres (device resource management)
6//! implementation.
7
8use crate::{
9 alloc::Flags,
10 bindings,
11 device::{
12 Bound,
13 Device, //
14 },
15 error::to_result,
16 prelude::*,
17 revocable::{
18 Revocable,
19 RevocableGuard, //
20 },
21 sync::{
22 aref::ARef,
23 rcu,
24 Arc, //
25 },
26 types::{
27 ForeignOwnable,
28 Opaque, //
29 },
30};
31
32/// Inner type that embeds a `struct devres_node` and the `Revocable<T>`.
33#[repr(C)]
34#[pin_data]
35struct Inner<T> {
36 #[pin]
37 node: Opaque<bindings::devres_node>,
38 #[pin]
39 data: Revocable<T>,
40}
41
42/// This abstraction is meant to be used by subsystems to containerize [`Device`] bound resources to
43/// manage their lifetime.
44///
45/// [`Device`] bound resources should be freed when either the resource goes out of scope or the
46/// [`Device`] is unbound respectively, depending on what happens first. In any case, it is always
47/// guaranteed that revoking the device resource is completed before the corresponding [`Device`]
48/// is unbound.
49///
50/// To achieve that [`Devres`] registers a devres callback on creation, which is called once the
51/// [`Device`] is unbound, revoking access to the encapsulated resource (see also [`Revocable`]).
52///
53/// After the [`Devres`] has been unbound it is not possible to access the encapsulated resource
54/// anymore.
55///
56/// [`Devres`] users should make sure to simply free the corresponding backing resource in `T`'s
57/// [`Drop`] implementation.
58///
59/// # Examples
60///
61/// ```no_run
62/// use kernel::{
63/// bindings,
64/// device::{
65/// Bound,
66/// Device,
67/// },
68/// devres::Devres,
69/// io::{
70/// Io,
71/// IoKnownSize,
72/// Mmio,
73/// MmioRaw,
74/// PhysAddr, //
75/// },
76/// prelude::*,
77/// };
78/// use core::ops::Deref;
79///
80/// // See also [`pci::Bar`] for a real example.
81/// struct IoMem<const SIZE: usize>(MmioRaw<SIZE>);
82///
83/// impl<const SIZE: usize> IoMem<SIZE> {
84/// /// # Safety
85/// ///
86/// /// [`paddr`, `paddr` + `SIZE`) must be a valid MMIO region that is mappable into the CPUs
87/// /// virtual address space.
88/// unsafe fn new(paddr: usize) -> Result<Self>{
89/// // SAFETY: By the safety requirements of this function [`paddr`, `paddr` + `SIZE`) is
90/// // valid for `ioremap`.
91/// let addr = unsafe { bindings::ioremap(paddr as PhysAddr, SIZE) };
92/// if addr.is_null() {
93/// return Err(ENOMEM);
94/// }
95///
96/// Ok(IoMem(MmioRaw::new(addr as usize, SIZE)?))
97/// }
98/// }
99///
100/// impl<const SIZE: usize> Drop for IoMem<SIZE> {
101/// fn drop(&mut self) {
102/// // SAFETY: `self.0.addr()` is guaranteed to be properly mapped by `Self::new`.
103/// unsafe { bindings::iounmap(self.0.addr() as *mut c_void); };
104/// }
105/// }
106///
107/// impl<const SIZE: usize> Deref for IoMem<SIZE> {
108/// type Target = Mmio<SIZE>;
109///
110/// fn deref(&self) -> &Self::Target {
111/// // SAFETY: The memory range stored in `self` has been properly mapped in `Self::new`.
112/// unsafe { Mmio::from_raw(&self.0) }
113/// }
114/// }
115/// # fn no_run(dev: &Device<Bound>) -> Result<(), Error> {
116/// // SAFETY: Invalid usage for example purposes.
117/// let iomem = unsafe { IoMem::<{ core::mem::size_of::<u32>() }>::new(0xBAAAAAAD)? };
118/// let devres = Devres::new(dev, iomem)?;
119///
120/// let res = devres.try_access().ok_or(ENXIO)?;
121/// res.write8(0x42, 0x0);
122/// # Ok(())
123/// # }
124/// ```
125pub struct Devres<T: Send> {
126 dev: ARef<Device>,
127 inner: Arc<Inner<T>>,
128}
129
130// Calling the FFI functions from the `base` module directly from the `Devres<T>` impl may result in
131// them being called directly from driver modules. This happens since the Rust compiler will use
132// monomorphisation, so it might happen that functions are instantiated within the calling driver
133// module. For now, work around this with `#[inline(never)]` helpers.
134//
135// TODO: Remove once a more generic solution has been implemented. For instance, we may be able to
136// leverage `bindgen` to take care of this depending on whether a symbol is (already) exported.
137mod base {
138 use kernel::{
139 bindings,
140 prelude::*, //
141 };
142
143 #[inline(never)]
144 #[allow(clippy::missing_safety_doc)]
145 pub(super) unsafe fn devres_node_init(
146 node: *mut bindings::devres_node,
147 release: bindings::dr_node_release_t,
148 free: bindings::dr_node_free_t,
149 ) {
150 // SAFETY: Safety requirements are the same as `bindings::devres_node_init`.
151 unsafe { bindings::devres_node_init(node, release, free) }
152 }
153
154 #[inline(never)]
155 #[allow(clippy::missing_safety_doc)]
156 pub(super) unsafe fn devres_set_node_dbginfo(
157 node: *mut bindings::devres_node,
158 name: *const c_char,
159 size: usize,
160 ) {
161 // SAFETY: Safety requirements are the same as `bindings::devres_set_node_dbginfo`.
162 unsafe { bindings::devres_set_node_dbginfo(node, name, size) }
163 }
164
165 #[inline(never)]
166 #[allow(clippy::missing_safety_doc)]
167 pub(super) unsafe fn devres_node_add(
168 dev: *mut bindings::device,
169 node: *mut bindings::devres_node,
170 ) {
171 // SAFETY: Safety requirements are the same as `bindings::devres_node_add`.
172 unsafe { bindings::devres_node_add(dev, node) }
173 }
174
175 #[must_use]
176 #[inline(never)]
177 #[allow(clippy::missing_safety_doc)]
178 pub(super) unsafe fn devres_node_remove(
179 dev: *mut bindings::device,
180 node: *mut bindings::devres_node,
181 ) -> bool {
182 // SAFETY: Safety requirements are the same as `bindings::devres_node_remove`.
183 unsafe { bindings::devres_node_remove(dev, node) }
184 }
185}
186
187impl<T: Send> Devres<T> {
188 /// Creates a new [`Devres`] instance of the given `data`.
189 ///
190 /// The `data` encapsulated within the returned `Devres` instance' `data` will be
191 /// (revoked)[`Revocable`] once the device is detached.
192 pub fn new<E>(dev: &Device<Bound>, data: impl PinInit<T, E>) -> Result<Self>
193 where
194 Error: From<E>,
195 {
196 let inner = Arc::pin_init::<Error>(
197 try_pin_init!(Inner {
198 node <- Opaque::ffi_init(|node: *mut bindings::devres_node| {
199 // SAFETY: `node` is a valid pointer to an uninitialized `struct devres_node`.
200 unsafe {
201 base::devres_node_init(
202 node,
203 Some(Self::devres_node_release),
204 Some(Self::devres_node_free_node),
205 )
206 };
207
208 // SAFETY: `node` is a valid pointer to an uninitialized `struct devres_node`.
209 unsafe {
210 base::devres_set_node_dbginfo(
211 node,
212 // TODO: Use `core::any::type_name::<T>()` once it is a `const fn`,
213 // such that we can convert the `&str` to a `&CStr` at compile-time.
214 c"Devres<T>".as_char_ptr(),
215 core::mem::size_of::<Revocable<T>>(),
216 )
217 };
218 }),
219 data <- Revocable::new(data),
220 }),
221 GFP_KERNEL,
222 )?;
223
224 // SAFETY:
225 // - `dev` is a valid pointer to a bound `struct device`.
226 // - `node` is a valid pointer to a `struct devres_node`.
227 // - `devres_node_add()` is guaranteed not to call `devres_node_release()` for the entire
228 // lifetime of `dev`.
229 unsafe { base::devres_node_add(dev.as_raw(), inner.node.get()) };
230
231 // Take additional reference count for `devres_node_add()`.
232 core::mem::forget(inner.clone());
233
234 Ok(Self {
235 dev: dev.into(),
236 inner,
237 })
238 }
239
240 fn data(&self) -> &Revocable<T> {
241 &self.inner.data
242 }
243
244 #[allow(clippy::missing_safety_doc)]
245 unsafe extern "C" fn devres_node_release(
246 _dev: *mut bindings::device,
247 node: *mut bindings::devres_node,
248 ) {
249 let node = Opaque::cast_from(node);
250
251 // SAFETY: `node` is in the same allocation as its container.
252 let inner = unsafe { kernel::container_of!(node, Inner<T>, node) };
253
254 // SAFETY: `inner` is a valid `Inner<T>` pointer.
255 let inner = unsafe { &*inner };
256
257 inner.data.revoke();
258 }
259
260 #[allow(clippy::missing_safety_doc)]
261 unsafe extern "C" fn devres_node_free_node(node: *mut bindings::devres_node) {
262 let node = Opaque::cast_from(node);
263
264 // SAFETY: `node` is in the same allocation as its container.
265 let inner = unsafe { kernel::container_of!(node, Inner<T>, node) };
266
267 // SAFETY: `inner` points to the entire `Inner<T>` allocation.
268 drop(unsafe { Arc::from_raw(inner) });
269 }
270
271 fn remove_node(&self) -> bool {
272 // SAFETY:
273 // - `self.device().as_raw()` is a valid pointer to a bound `struct device`.
274 // - `self.inner.node.get()` is a valid pointer to a `struct devres_node`.
275 unsafe { base::devres_node_remove(self.device().as_raw(), self.inner.node.get()) }
276 }
277
278 /// Return a reference of the [`Device`] this [`Devres`] instance has been created with.
279 pub fn device(&self) -> &Device {
280 &self.dev
281 }
282
283 /// Obtain `&'a T`, bypassing the [`Revocable`].
284 ///
285 /// This method allows to directly obtain a `&'a T`, bypassing the [`Revocable`], by presenting
286 /// a `&'a Device<Bound>` of the same [`Device`] this [`Devres`] instance has been created with.
287 ///
288 /// # Errors
289 ///
290 /// An error is returned if `dev` does not match the same [`Device`] this [`Devres`] instance
291 /// has been created with.
292 ///
293 /// # Examples
294 ///
295 /// ```no_run
296 /// #![cfg(CONFIG_PCI)]
297 /// use kernel::{
298 /// device::Core,
299 /// devres::Devres,
300 /// io::{
301 /// Io,
302 /// IoKnownSize, //
303 /// },
304 /// pci, //
305 /// };
306 ///
307 /// fn from_core(dev: &pci::Device<Core>, devres: Devres<pci::Bar<0x4>>) -> Result {
308 /// let bar = devres.access(dev.as_ref())?;
309 ///
310 /// let _ = bar.read32(0x0);
311 ///
312 /// // might_sleep()
313 ///
314 /// bar.write32(0x42, 0x0);
315 ///
316 /// Ok(())
317 /// }
318 /// ```
319 pub fn access<'a>(&'a self, dev: &'a Device<Bound>) -> Result<&'a T> {
320 if self.dev.as_raw() != dev.as_raw() {
321 return Err(EINVAL);
322 }
323
324 // SAFETY: `dev` being the same device as the device this `Devres` has been created for
325 // proves that `self.data` hasn't been revoked and is guaranteed to not be revoked as long
326 // as `dev` lives; `dev` lives at least as long as `self`.
327 Ok(unsafe { self.data().access() })
328 }
329
330 /// [`Devres`] accessor for [`Revocable::try_access`].
331 pub fn try_access(&self) -> Option<RevocableGuard<'_, T>> {
332 self.data().try_access()
333 }
334
335 /// [`Devres`] accessor for [`Revocable::try_access_with`].
336 pub fn try_access_with<R, F: FnOnce(&T) -> R>(&self, f: F) -> Option<R> {
337 self.data().try_access_with(f)
338 }
339
340 /// [`Devres`] accessor for [`Revocable::try_access_with_guard`].
341 pub fn try_access_with_guard<'a>(&'a self, guard: &'a rcu::Guard) -> Option<&'a T> {
342 self.data().try_access_with_guard(guard)
343 }
344}
345
346// SAFETY: `Devres` can be send to any task, if `T: Send`.
347unsafe impl<T: Send> Send for Devres<T> {}
348
349// SAFETY: `Devres` can be shared with any task, if `T: Sync`.
350unsafe impl<T: Send + Sync> Sync for Devres<T> {}
351
352impl<T: Send> Drop for Devres<T> {
353 fn drop(&mut self) {
354 // SAFETY: When `drop` runs, it is guaranteed that nobody is accessing the revocable data
355 // anymore, hence it is safe not to wait for the grace period to finish.
356 if unsafe { self.data().revoke_nosync() } {
357 // We revoked `self.data` before devres did, hence try to remove it.
358 if self.remove_node() {
359 // SAFETY: In `Self::new` we have taken an additional reference count of `self.data`
360 // for `devres_node_add()`. Since `remove_node()` was successful, we have to drop
361 // this additional reference count.
362 drop(unsafe { Arc::from_raw(Arc::as_ptr(&self.inner)) });
363 }
364 }
365 }
366}
367
368/// Consume `data` and [`Drop::drop`] `data` once `dev` is unbound.
369fn register_foreign<P>(dev: &Device<Bound>, data: P) -> Result
370where
371 P: ForeignOwnable + Send + 'static,
372{
373 let ptr = data.into_foreign();
374
375 #[allow(clippy::missing_safety_doc)]
376 unsafe extern "C" fn callback<P: ForeignOwnable>(ptr: *mut kernel::ffi::c_void) {
377 // SAFETY: `ptr` is the pointer to the `ForeignOwnable` leaked above and hence valid.
378 drop(unsafe { P::from_foreign(ptr.cast()) });
379 }
380
381 // SAFETY:
382 // - `dev.as_raw()` is a pointer to a valid and bound device.
383 // - `ptr` is a valid pointer the `ForeignOwnable` devres takes ownership of.
384 to_result(unsafe {
385 // `devm_add_action_or_reset()` also calls `callback` on failure, such that the
386 // `ForeignOwnable` is released eventually.
387 bindings::devm_add_action_or_reset(dev.as_raw(), Some(callback::<P>), ptr.cast())
388 })
389}
390
391/// Encapsulate `data` in a [`KBox`] and [`Drop::drop`] `data` once `dev` is unbound.
392///
393/// # Examples
394///
395/// ```no_run
396/// use kernel::{
397/// device::{
398/// Bound,
399/// Device, //
400/// },
401/// devres, //
402/// };
403///
404/// /// Registration of e.g. a class device, IRQ, etc.
405/// struct Registration;
406///
407/// impl Registration {
408/// fn new() -> Self {
409/// // register
410///
411/// Self
412/// }
413/// }
414///
415/// impl Drop for Registration {
416/// fn drop(&mut self) {
417/// // unregister
418/// }
419/// }
420///
421/// fn from_bound_context(dev: &Device<Bound>) -> Result {
422/// devres::register(dev, Registration::new(), GFP_KERNEL)
423/// }
424/// ```
425pub fn register<T, E>(dev: &Device<Bound>, data: impl PinInit<T, E>, flags: Flags) -> Result
426where
427 T: Send + 'static,
428 Error: From<E>,
429{
430 let data = KBox::pin_init(data, flags)?;
431
432 register_foreign(dev, data)
433}