summaryrefslogtreecommitdiff
path: root/rust/kernel/devres.rs
diff options
context:
space:
mode:
authorDanilo Krummrich <dakr@kernel.org>2025-01-07 15:25:11 +0300
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2025-01-10 17:49:06 +0300
commit8ff656643d3075154419680470dbfdbd6092e31f (patch)
treeec7bfd6b8c8ab367c6feacdea717dbb8e1c6e1bd /rust/kernel/devres.rs
parentf1725160fd28a2e65e47166637aa44856a1a7f89 (diff)
downloadlinux-8ff656643d3075154419680470dbfdbd6092e31f.tar.xz
rust: devres: remove action in `Devres::drop`
So far `DevresInner` is kept alive, even if `Devres` is dropped until the devres callback is executed to avoid a WARN() when the action has been released already. With the introduction of devm_remove_action_nowarn() we can remove the action in `Devres::drop`, handle the case where the action has been released already and hence also free `DevresInner`. Signed-off-by: Danilo Krummrich <dakr@kernel.org> Link: https://lore.kernel.org/r/20250107122609.8135-2-dakr@kernel.org Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'rust/kernel/devres.rs')
-rw-r--r--rust/kernel/devres.rs47
1 files changed, 35 insertions, 12 deletions
diff --git a/rust/kernel/devres.rs b/rust/kernel/devres.rs
index 9c9dd39584eb..942376f6f3af 100644
--- a/rust/kernel/devres.rs
+++ b/rust/kernel/devres.rs
@@ -10,15 +10,19 @@ use crate::{
bindings,
device::Device,
error::{Error, Result},
+ ffi::c_void,
prelude::*,
revocable::Revocable,
sync::Arc,
+ types::ARef,
};
use core::ops::Deref;
#[pin_data]
struct DevresInner<T> {
+ dev: ARef<Device>,
+ callback: unsafe extern "C" fn(*mut c_void),
#[pin]
data: Revocable<T>,
}
@@ -98,6 +102,8 @@ impl<T> DevresInner<T> {
fn new(dev: &Device, data: T, flags: Flags) -> Result<Arc<DevresInner<T>>> {
let inner = Arc::pin_init(
pin_init!( DevresInner {
+ dev: dev.into(),
+ callback: Self::devres_callback,
data <- Revocable::new(data),
}),
flags,
@@ -109,9 +115,8 @@ impl<T> DevresInner<T> {
// SAFETY: `devm_add_action` guarantees to call `Self::devres_callback` once `dev` is
// detached.
- let ret = unsafe {
- bindings::devm_add_action(dev.as_raw(), Some(Self::devres_callback), data as _)
- };
+ let ret =
+ unsafe { bindings::devm_add_action(dev.as_raw(), Some(inner.callback), data as _) };
if ret != 0 {
// SAFETY: We just created another reference to `inner` in order to pass it to
@@ -124,6 +129,32 @@ impl<T> DevresInner<T> {
Ok(inner)
}
+ fn as_ptr(&self) -> *const Self {
+ self as _
+ }
+
+ fn remove_action(this: &Arc<Self>) {
+ // SAFETY:
+ // - `self.inner.dev` is a valid `Device`,
+ // - the `action` and `data` pointers are the exact same ones as given to devm_add_action()
+ // previously,
+ // - `self` is always valid, even if the action has been released already.
+ let ret = unsafe {
+ bindings::devm_remove_action_nowarn(
+ this.dev.as_raw(),
+ Some(this.callback),
+ this.as_ptr() as _,
+ )
+ };
+
+ if ret == 0 {
+ // SAFETY: We leaked an `Arc` reference to devm_add_action() in `DevresInner::new`; if
+ // devm_remove_action_nowarn() was successful we can (and have to) claim back ownership
+ // of this reference.
+ let _ = unsafe { Arc::from_raw(this.as_ptr()) };
+ }
+ }
+
#[allow(clippy::missing_safety_doc)]
unsafe extern "C" fn devres_callback(ptr: *mut kernel::ffi::c_void) {
let ptr = ptr as *mut DevresInner<T>;
@@ -165,14 +196,6 @@ impl<T> Deref for Devres<T> {
impl<T> Drop for Devres<T> {
fn drop(&mut self) {
- // Revoke the data, such that it gets dropped already and the actual resource is freed.
- //
- // `DevresInner` has to stay alive until the devres callback has been called. This is
- // necessary since we don't know when `Devres` is dropped and calling
- // `devm_remove_action()` instead could race with `devres_release_all()`.
- //
- // SAFETY: When `drop` runs, it's guaranteed that nobody is accessing the revocable data
- // anymore, hence it is safe not to wait for the grace period to finish.
- unsafe { self.revoke_nosync() };
+ DevresInner::remove_action(&self.0);
}
}