1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97
//! Abstractions common to bare metal systems. #![deny(missing_docs)] #![no_std] #![doc(html_root_url="https://docs.rs/bare-metal/1.0")] use core::cell::UnsafeCell; use core::marker::PhantomData; /// Critical section token. /// /// An instance of this type indicates that the current core is executing code within a critical /// section. This means that no interrupts must be enabled that could preempt the currently running /// code. #[derive(Clone, Copy, Debug)] pub struct CriticalSection<'cs> { _0: PhantomData<&'cs ()>, } impl<'cs> CriticalSection<'cs> { /// Creates a critical section token. /// /// This method is meant to be used to create safe abstractions rather than being directly used /// in applications. /// /// # Safety /// /// This must only be called when the current core is in a critical section. The caller must /// ensure that the returned instance will not live beyond the end of the critical section. /// Moreover, the caller must use adequate fences to prevent the compiler from moving the /// instructions inside the critical section to the outside of it. Sequentially consistent fences are /// suggested immediately after entry and immediately before exit from the critical section. /// /// Note that the lifetime `'cs` of the returned instance is unconstrained. User code must not /// be able to influence the lifetime picked for this type, since that might cause it to be /// inferred to `'static`. #[inline(always)] pub unsafe fn new() -> Self { CriticalSection { _0: PhantomData } } } /// A "mutex" based on critical sections. /// /// # Safety /// /// **This Mutex is only safe on single-core systems.** /// /// On multi-core systems, a `CriticalSection` **is not sufficient** to ensure exclusive access. #[derive(Debug)] pub struct Mutex<T> { inner: UnsafeCell<T>, } impl<T> Mutex<T> { /// Creates a new mutex. pub const fn new(value: T) -> Self { Mutex { inner: UnsafeCell::new(value), } } /// Gets a mutable reference to the contained value when the mutex is already uniquely borrowed. /// /// This does not require locking or a critical section since it takes `&mut self`, which /// guarantees unique ownership already. Care must be taken when using this method to /// **unsafely** access `static mut` variables, appropriate fences must be used to prevent /// unwanted optimizations. pub fn get_mut(&mut self) -> &mut T { unsafe { &mut *self.inner.get() } } /// Unwraps the contained value, consuming the mutex. pub fn into_inner(self) -> T { self.inner.into_inner() } /// Borrows the data for the duration of the critical section. pub fn borrow<'cs>(&'cs self, _cs: CriticalSection<'cs>) -> &'cs T { unsafe { &*self.inner.get() } } } // NOTE A `Mutex` can be used as a channel so the protected data must be `Send` // to prevent sending non-Sendable stuff (e.g. access tokens) across different // execution contexts (e.g. interrupts) unsafe impl<T> Sync for Mutex<T> where T: Send {} /// ``` compile_fail /// fn bad(cs: bare_metal::CriticalSection) -> &u32 { /// let x = bare_metal::Mutex::new(42u32); /// x.borrow(cs) /// } /// ``` #[allow(dead_code)] #[doc(hidden)] const GH_6: () = ();