critical_section/lib.rs
1#![cfg_attr(not(feature = "std"), no_std)]
2#![doc = include_str!("../README.md")]
3
4mod mutex;
5#[cfg(feature = "std")]
6mod std;
7
8use core::marker::PhantomData;
9
10pub use self::mutex::Mutex;
11
12/// Critical section token.
13///
14/// An instance of this type indicates that the current thread is executing code within a critical
15/// section.
16#[derive(Clone, Copy, Debug)]
17pub struct CriticalSection<'cs> {
18 _private: PhantomData<&'cs ()>,
19
20 // Prevent CriticalSection from being Send or Sync
21 // https://github.com/rust-embedded/critical-section/issues/55
22 _not_send_sync: PhantomData<*mut ()>,
23}
24
25impl<'cs> CriticalSection<'cs> {
26 /// Creates a critical section token.
27 ///
28 /// This method is meant to be used to create safe abstractions rather than being directly used
29 /// in applications.
30 ///
31 /// # Safety
32 ///
33 /// This must only be called when the current thread is in a critical section. The caller must
34 /// ensure that the returned instance will not live beyond the end of the critical section.
35 ///
36 /// The caller must use adequate fences to prevent the compiler from moving the
37 /// instructions inside the critical section to the outside of it. Sequentially consistent fences are
38 /// suggested immediately after entry and immediately before exit from the critical section.
39 ///
40 /// Note that the lifetime `'cs` of the returned instance is unconstrained. User code must not
41 /// be able to influence the lifetime picked for this type, since that might cause it to be
42 /// inferred to `'static`.
43 #[inline(always)]
44 pub unsafe fn new() -> Self {
45 CriticalSection {
46 _private: PhantomData,
47 _not_send_sync: PhantomData,
48 }
49 }
50}
51
52#[cfg(any(
53 all(feature = "restore-state-none", feature = "restore-state-bool"),
54 all(feature = "restore-state-none", feature = "restore-state-u8"),
55 all(feature = "restore-state-none", feature = "restore-state-u16"),
56 all(feature = "restore-state-none", feature = "restore-state-u32"),
57 all(feature = "restore-state-none", feature = "restore-state-u64"),
58 all(feature = "restore-state-bool", feature = "restore-state-u8"),
59 all(feature = "restore-state-bool", feature = "restore-state-u16"),
60 all(feature = "restore-state-bool", feature = "restore-state-u32"),
61 all(feature = "restore-state-bool", feature = "restore-state-u64"),
62 all(feature = "restore-state-bool", feature = "restore-state-usize"),
63 all(feature = "restore-state-u8", feature = "restore-state-u16"),
64 all(feature = "restore-state-u8", feature = "restore-state-u32"),
65 all(feature = "restore-state-u8", feature = "restore-state-u64"),
66 all(feature = "restore-state-u8", feature = "restore-state-usize"),
67 all(feature = "restore-state-u16", feature = "restore-state-u32"),
68 all(feature = "restore-state-u16", feature = "restore-state-u64"),
69 all(feature = "restore-state-u16", feature = "restore-state-usize"),
70 all(feature = "restore-state-u32", feature = "restore-state-u64"),
71 all(feature = "restore-state-u32", feature = "restore-state-usize"),
72 all(feature = "restore-state-u64", feature = "restore-state-usize"),
73))]
74compile_error!("You must set at most one of these Cargo features: restore-state-none, restore-state-bool, restore-state-u8, restore-state-u16, restore-state-u32, restore-state-u64, restore-state-usize");
75
76#[cfg(not(any(
77 feature = "restore-state-bool",
78 feature = "restore-state-u8",
79 feature = "restore-state-u16",
80 feature = "restore-state-u32",
81 feature = "restore-state-u64",
82 feature = "restore-state-usize"
83)))]
84type RawRestoreStateInner = ();
85
86#[cfg(feature = "restore-state-bool")]
87type RawRestoreStateInner = bool;
88
89#[cfg(feature = "restore-state-u8")]
90type RawRestoreStateInner = u8;
91
92#[cfg(feature = "restore-state-u16")]
93type RawRestoreStateInner = u16;
94
95#[cfg(feature = "restore-state-u32")]
96type RawRestoreStateInner = u32;
97
98#[cfg(feature = "restore-state-u64")]
99type RawRestoreStateInner = u64;
100
101#[cfg(feature = "restore-state-usize")]
102type RawRestoreStateInner = usize;
103
104// We have RawRestoreStateInner and RawRestoreState so that we don't have to copypaste the docs 5 times.
105// In the docs this shows as `pub type RawRestoreState = u8` or whatever the selected type is, because
106// the "inner" type alias is private.
107
108/// Raw, transparent "restore state".
109///
110/// This type changes based on which Cargo feature is selected, out of
111/// - `restore-state-none` (default, makes the type be `()`)
112/// - `restore-state-bool`
113/// - `restore-state-u8`
114/// - `restore-state-u16`
115/// - `restore-state-u32`
116/// - `restore-state-u64`
117/// - `restore-state-usize`
118///
119/// See [`RestoreState`].
120///
121/// User code uses [`RestoreState`] opaquely, critical section implementations
122/// use [`RawRestoreState`] so that they can use the inner value.
123pub type RawRestoreState = RawRestoreStateInner;
124
125/// Opaque "restore state".
126///
127/// Implementations use this to "carry over" information between acquiring and releasing
128/// a critical section. For example, when nesting two critical sections of an
129/// implementation that disables interrupts globally, acquiring the inner one won't disable
130/// the interrupts since they're already disabled. The impl would use the restore state to "tell"
131/// the corresponding release that it does *not* have to reenable interrupts yet, only the
132/// outer release should do so.
133///
134/// User code uses [`RestoreState`] opaquely, critical section implementations
135/// use [`RawRestoreState`] so that they can use the inner value.
136#[derive(Clone, Copy, Debug)]
137pub struct RestoreState(RawRestoreState);
138
139impl RestoreState {
140 /// Create an invalid, dummy `RestoreState`.
141 ///
142 /// This can be useful to avoid `Option` when storing a `RestoreState` in a
143 /// struct field, or a `static`.
144 ///
145 /// Note that due to the safety contract of [`acquire`]/[`release`], you must not pass
146 /// a `RestoreState` obtained from this method to [`release`].
147 pub const fn invalid() -> Self {
148 #[cfg(not(any(
149 feature = "restore-state-bool",
150 feature = "restore-state-u8",
151 feature = "restore-state-u16",
152 feature = "restore-state-u32",
153 feature = "restore-state-u64",
154 feature = "restore-state-usize"
155 )))]
156 return Self(());
157
158 #[cfg(feature = "restore-state-bool")]
159 return Self(false);
160
161 #[cfg(feature = "restore-state-u8")]
162 return Self(0);
163
164 #[cfg(feature = "restore-state-u16")]
165 return Self(0);
166
167 #[cfg(feature = "restore-state-u32")]
168 return Self(0);
169
170 #[cfg(feature = "restore-state-u64")]
171 return Self(0);
172
173 #[cfg(feature = "restore-state-usize")]
174 return Self(0);
175 }
176}
177
178/// Acquire a critical section in the current thread.
179///
180/// This function is extremely low level. Strongly prefer using [`with`] instead.
181///
182/// Nesting critical sections is allowed. The inner critical sections
183/// are mostly no-ops since they're already protected by the outer one.
184///
185/// # Safety
186///
187/// - Each `acquire` call must be paired with exactly one `release` call in the same thread.
188/// - `acquire` returns a "restore state" that you must pass to the corresponding `release` call.
189/// - `acquire`/`release` pairs must be "properly nested", ie it's not OK to do `a=acquire(); b=acquire(); release(a); release(b);`.
190/// - It is UB to call `release` if the critical section is not acquired in the current thread.
191/// - It is UB to call `release` with a "restore state" that does not come from the corresponding `acquire` call.
192/// - It must provide ordering guarantees at least equivalent to a [`core::sync::atomic::Ordering::Acquire`]
193/// on a memory location shared by all critical sections, on which the `release` call will do a
194/// [`core::sync::atomic::Ordering::Release`] operation.
195#[inline(always)]
196pub unsafe fn acquire() -> RestoreState {
197 extern "Rust" {
198 fn _critical_section_1_0_acquire() -> RawRestoreState;
199 }
200
201 #[allow(clippy::unit_arg)]
202 RestoreState(_critical_section_1_0_acquire())
203}
204
205/// Release the critical section.
206///
207/// This function is extremely low level. Strongly prefer using [`with`] instead.
208///
209/// # Safety
210///
211/// See [`acquire`] for the safety contract description.
212#[inline(always)]
213pub unsafe fn release(restore_state: RestoreState) {
214 extern "Rust" {
215 fn _critical_section_1_0_release(restore_state: RawRestoreState);
216 }
217
218 #[allow(clippy::unit_arg)]
219 _critical_section_1_0_release(restore_state.0)
220}
221
222/// Execute closure `f` in a critical section.
223///
224/// Nesting critical sections is allowed. The inner critical sections
225/// are mostly no-ops since they're already protected by the outer one.
226///
227/// # Panics
228///
229/// This function panics if the given closure `f` panics. In this case
230/// the critical section is released before unwinding.
231#[inline]
232pub fn with<R>(f: impl FnOnce(CriticalSection) -> R) -> R {
233 // Helper for making sure `release` is called even if `f` panics.
234 struct Guard {
235 state: RestoreState,
236 }
237
238 impl Drop for Guard {
239 #[inline(always)]
240 fn drop(&mut self) {
241 unsafe { release(self.state) }
242 }
243 }
244
245 let state = unsafe { acquire() };
246 let _guard = Guard { state };
247
248 unsafe { f(CriticalSection::new()) }
249}
250
251/// Methods required for a critical section implementation.
252///
253/// This trait is not intended to be used except when implementing a critical section.
254///
255/// # Safety
256///
257/// Implementations must uphold the contract specified in [`crate::acquire`] and [`crate::release`].
258pub unsafe trait Impl {
259 /// Acquire the critical section.
260 ///
261 /// # Safety
262 ///
263 /// Callers must uphold the contract specified in [`crate::acquire`] and [`crate::release`].
264 unsafe fn acquire() -> RawRestoreState;
265
266 /// Release the critical section.
267 ///
268 /// # Safety
269 ///
270 /// Callers must uphold the contract specified in [`crate::acquire`] and [`crate::release`].
271 unsafe fn release(restore_state: RawRestoreState);
272}
273
274/// Set the critical section implementation.
275///
276/// # Example
277///
278/// ```
279/// # #[cfg(not(feature = "std"))] // needed for `cargo test --features std`
280/// # mod no_std {
281/// use critical_section::RawRestoreState;
282///
283/// struct MyCriticalSection;
284/// critical_section::set_impl!(MyCriticalSection);
285///
286/// unsafe impl critical_section::Impl for MyCriticalSection {
287/// unsafe fn acquire() -> RawRestoreState {
288/// // ...
289/// }
290///
291/// unsafe fn release(restore_state: RawRestoreState) {
292/// // ...
293/// }
294/// }
295/// # }
296#[macro_export]
297macro_rules! set_impl {
298 ($t: ty) => {
299 #[no_mangle]
300 unsafe fn _critical_section_1_0_acquire() -> $crate::RawRestoreState {
301 <$t as $crate::Impl>::acquire()
302 }
303 #[no_mangle]
304 unsafe fn _critical_section_1_0_release(restore_state: $crate::RawRestoreState) {
305 <$t as $crate::Impl>::release(restore_state)
306 }
307 };
308}