Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp2128908rwl; Thu, 30 Mar 2023 06:27:52 -0700 (PDT) X-Google-Smtp-Source: AKy350YszTKClMX9WruoV+JWtdv7MEdn6e4c9kPQLBukGzxCc8KUYNOi4Og6EJkPBxsvf+sU5Myd X-Received: by 2002:a17:902:e54c:b0:1a2:1a52:14b3 with SMTP id n12-20020a170902e54c00b001a21a5214b3mr2301632plf.4.1680182872304; Thu, 30 Mar 2023 06:27:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680182872; cv=none; d=google.com; s=arc-20160816; b=KbWnmNJWgMkl85lNIehUJ0A7LLdtDtDGrzSdL/e2cfRAOXpus3q02FQdPfnHrPJ5fb oTq1jtgMuClfcAHjGPuJhwUOX4ywFilRHYFg520ToQTgykb2tqMtQT+jyb2w8+GRU0Ls SViulwkuOiexNBTSOEsBGyk9C3mYT1GzgIL2wuLRWPgAP2Pe2Ul94af3waq6u7fS4pw+ hhNsczvczFGL5LNMNXnEuHnj85rWaLum1rwoi+woexaoqHhH0bG75BPIIYmShnRdGWiE 5neN/zYwSGv77aBRcHDtGfYpR7Z8hpvocaWRgk91pHr2/PWFA4bTWk6rEzaR6ovSFUGF hHLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:in-reply-to:date:subject :cc:to:from:user-agent:references:dkim-signature; bh=CLHWhnRwL/9zW1WSASP/lRIcPcgQjigzejZqo6Yxpas=; b=g2bziEHMcKqO8Besh4JzbalVTLFEMvB4D0jlMgDMsyWQrqk7UM4a4Td8zAwMkHLYdk yrmEmfTMZ/YCcR/HNzXdklv931R+jjh0szuA0bAKjs5ZFHZ9CUcIpFAUxqmdO6YixrCC EwdcUhn1PgVXaoH4SY3vlOoZiNCQxtDc6MH1ToypZggNSntHz3C40FuREY9PsnRrRa3D lIdv2V6/kwQ2fMD6DkZBopJXVGbOItfLxhvbzcCt2PJNgk4WxwIal/HqykforKB1z8B5 rlg/Ggl4XW0d78Zs9kj0Mm2CUaUOpEFAiWs892d7jIudlLIBHbUSRCNlKDmRTblv3X3G Eb8g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@metaspace-dk.20210112.gappssmtp.com header.s=20210112 header.b=dS7g0hMI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b2-20020a170902b60200b001a22e9d0291si12625465pls.570.2023.03.30.06.27.40; Thu, 30 Mar 2023 06:27:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@metaspace-dk.20210112.gappssmtp.com header.s=20210112 header.b=dS7g0hMI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229590AbjC3NZJ (ORCPT + 99 others); Thu, 30 Mar 2023 09:25:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57018 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229902AbjC3NZI (ORCPT ); Thu, 30 Mar 2023 09:25:08 -0400 Received: from mail-ed1-x531.google.com (mail-ed1-x531.google.com [IPv6:2a00:1450:4864:20::531]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1C02CB2 for ; Thu, 30 Mar 2023 06:25:05 -0700 (PDT) Received: by mail-ed1-x531.google.com with SMTP id eh3so76355519edb.11 for ; Thu, 30 Mar 2023 06:25:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=metaspace-dk.20210112.gappssmtp.com; s=20210112; t=1680182703; h=mime-version:message-id:in-reply-to:date:subject:cc:to:from :user-agent:references:from:to:cc:subject:date:message-id:reply-to; bh=CLHWhnRwL/9zW1WSASP/lRIcPcgQjigzejZqo6Yxpas=; b=dS7g0hMI2zX0wMYfUDpFVeAFimotm6jQsSzWEghgSV20iP3VqiSnugGpZLeTQpncfV MfEoqVgoZ+3UWQgRfCIUFn33ucW7+xZD1JYKk2UgTCFgsU5WfFjcJNtmpjYDfaxXeOUW c6EnELa7vsJG97OmgVBgnwfeb3tglb2v29a0ASu0jHc1dgGU/LhcAZinZIr5mcAegRxU cz+14aRoaBgXBDMvxvlqB0RBOltVEQ1aB8hY6wCu1/1F5ucRTnquhvUTioABzxefo70m Ti4t17/5eidVTmwccnyytUVVK812sv1sK1k1QbVzV1czaCAMdrcmjMRx1G96SVit/YcU Bpyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680182703; h=mime-version:message-id:in-reply-to:date:subject:cc:to:from :user-agent:references:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=CLHWhnRwL/9zW1WSASP/lRIcPcgQjigzejZqo6Yxpas=; b=UbehdvJBSY2WSnIbzgk3E+6WLmmoliN7XiPHxr5uhMY0t6Cu6MqDU5DG24MhPbK95J 0sdUGZpuGosk4DbPlehEsT5l23t5PlRETy7obm1hI6FVFM9cYFkOuSHl2kstS+e2PHQB 3Pitn/kuR0YsdqJmdc8Xt21qS4rKsSUAn7ktoNG1tQGdPcgvLrZcchjlg5ecv+ZwXNdg gy2mpTcslRsj9lrJL8+Sfh2lE10WXY6FqMhhEuuunVhm5KoPOvz94UUfIY9bn/+DrUhu Y5o3P2Yr/nM9p4SalyAWVy/xl+MV39b4Dt3f+AAap+qzWS/ISexkPSt8x5mP/p/9sQ0U lMEw== X-Gm-Message-State: AAQBX9cJpP5FjEmW9pno21CnuN3wtQBroo8wBa6W8tI+IFEYBf0V63La S7WEwKg+wzyMH+vAULqMiAblECZa2Q/4fGbTK0I= X-Received: by 2002:a17:907:170d:b0:947:8162:60da with SMTP id le13-20020a170907170d00b00947816260damr594245ejc.33.1680182703363; Thu, 30 Mar 2023 06:25:03 -0700 (PDT) Received: from localhost ([194.62.217.4]) by smtp.gmail.com with ESMTPSA id s17-20020a170906961100b009316783c92csm17895511ejx.12.2023.03.30.06.25.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 06:25:03 -0700 (PDT) References: <20230329223239.138757-1-y86-dev@protonmail.com> <20230329223239.138757-5-y86-dev@protonmail.com> User-agent: mu4e 1.9.18; emacs 28.2.50 From: Andreas Hindborg To: y86-dev@protonmail.com Cc: Miguel Ojeda , Alex Gaynor , Wedson Almeida Filho , Boqun Feng , Gary Guo , =?utf-8?Q?Bj=C3=B6rn?= Roy Baron , Alice Ryhl , rust-for-linux@vger.kernel.org, linux-kernel@vger.kernel.org, patches@lists.linux.dev Subject: Re: [PATCH v3 04/13] rust: add pin-init API core Date: Thu, 30 Mar 2023 15:05:25 +0200 In-reply-to: <20230329223239.138757-5-y86-dev@protonmail.com> Message-ID: <87h6u24bip.fsf@metaspace.dk> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=0.0 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org y86-dev@protonmail.com writes: > From: Benno Lossin > > This API is used to facilitate safe pinned initialization of structs. It > replaces cumbersome `unsafe` manual initialization with elegant safe macro > invocations. > > Due to the size of this change it has been split into six commits: > 1. This commit introducing the basic public interface: traits and > functions to represent and create initializers. > 2. Adds the `#[pin_data]`, `pin_init!`, `try_pin_init!`, `init!` and > `try_init!` macros along with their internal types. > 3. Adds the `InPlaceInit` trait that allows using an initializer to create > an object inside of a `Box` and other smart pointers. > 4. Adds the `PinnedDrop` trait and adds macro support for it in > the `#[pin_data]` macro. > 5. Adds the `stack_pin_init!` macro allowing to pin-initialize a struct on > the stack. > 6. Adds the `Zeroable` trait and `init::zeroed` function to initialize > types that have `0x00` in all bytes as a valid bit pattern. > > -- > > In this section the problem that the new pin-init API solves is outlined. > This message describes the entirety of the API, not just the parts > introduced in this commit. For a more granular explanation and additional > information on pinning and this issue, view [1]. > > Pinning is Rust's way of enforcing the address stability of a value. When a > value gets pinned it will be impossible for safe code to move it to another > location. This is done by wrapping pointers to said object with `Pin

`. > This wrapper prevents safe code from creating mutable references to the > object, preventing mutable access, which is needed to move the value. > `Pin

` provides `unsafe` functions to circumvent this and allow > modifications regardless. It is then the programmer's responsibility to > uphold the pinning guarantee. > > Many kernel data structures require a stable address, because there are > foreign pointers to them which would get invalidated by moving the > structure. Since these data structures are usually embedded in structs to > use them, this pinning property propagates to the container struct. > Resulting in most structs in both Rust and C code needing to be pinned. > > So if we want to have a `mutex` field in a Rust struct, this struct also > needs to be pinned, because a `mutex` contains a `list_head`. Additionally > initializing a `list_head` requires already having the final memory > location available, because it is initialized by pointing it to itself. But > this presents another challenge in Rust: values have to be initialized at > all times. There is the `MaybeUninit` wrapper type, which allows > handling uninitialized memory, but this requires using the `unsafe` raw > pointers and a casting the type to the initialized variant. > > This problem gets exacerbated when considering encapsulation and the normal > safety requirements of Rust code. The fields of the Rust `Mutex` should > not be accessible to normal driver code. After all if anyone can modify > the fields, there is no way to ensure the invariants of the `Mutex` are > upheld. But if the fields are inaccessible, then initialization of a > `Mutex` needs to be somehow achieved via a function or a macro. Because > the `Mutex` must be pinned in memory, the function cannot return it by > value. It also cannot allocate a `Box` to put the `Mutex` into, because > that is an unnecessary allocation and indirection which would hurt > performance. > > The current solution was to split this function into two parts: > > 1. A `new` function that returns a partially initialized `Mutex`, > 2. An `init` function that requires the `Mutex` to be pinned and that > fully initializes the `Mutex`. > > Both of these functions have to be marked `unsafe`, since a call to `new` > needs to be accompanied with a call to `init`, otherwise using the > `Mutex` could result in UB. And because calling `init` twice also is not > safe. While `Mutex` initialization cannot fail, other structs might > also have to allocate memory, which would result in conditional successful > initialization requiring even more manual accommodation work. > > Combine this with the problem of pin-projections -- the way of accessing > fields of a pinned struct -- which also have an `unsafe` API, pinned > initialization is riddled with `unsafe` resulting in very poor ergonomics. > Not only that, but also having to call two functions possibly multiple > lines apart makes it very easy to forget it outright or during refactoring. > > Here is an example of the current way of initializing a struct with two > synchronization primitives (see [2] for the full example): > > struct SharedState { > state_changed: CondVar, > inner: Mutex, > } > > impl SharedState { > fn try_new() -> Result> { > let mut state = Pin::from(UniqueArc::try_new(Self { > // SAFETY: `condvar_init!` is called below. > state_changed: unsafe { CondVar::new() }, > // SAFETY: `mutex_init!` is called below. > inner: unsafe { > Mutex::new(SharedStateInner { token_count: 0 }) > }, > })?); > > // SAFETY: `state_changed` is pinned when `state` is. > let pinned = unsafe { > state.as_mut().map_unchecked_mut(|s| &mut s.state_changed) > }; > kernel::condvar_init!(pinned, "SharedState::state_changed"); > > // SAFETY: `inner` is pinned when `state` is. > let pinned = unsafe { > state.as_mut().map_unchecked_mut(|s| &mut s.inner) > }; > kernel::mutex_init!(pinned, "SharedState::inner"); > > Ok(state.into()) > } > } > > The pin-init API of this patch solves this issue by providing a > comprehensive solution comprised of macros and traits. Here is the example > from above using the pin-init API: > > #[pin_data] > struct SharedState { > #[pin] > state_changed: CondVar, > #[pin] > inner: Mutex, > } > > impl SharedState { > fn new() -> impl PinInit { > pin_init!(Self { > state_changed <- new_condvar!("SharedState::state_changed"), > inner <- new_mutex!( > SharedStateInner { token_count: 0 }, > "SharedState::inner", > ), > }) > } > } > > Notably the way the macro is used here requires no `unsafe` and thus comes > with the usual Rust promise of safe code not introducing any memory > violations. Additionally it is now up to the caller of `new()` to decide > the memory location of the `SharedState`. They can choose at the moment > `Arc`, `Box` or the stack. > > -- > > The API has the following architecture: > 1. Initializer traits `PinInit` and `Init` that act like > closures. > 2. Macros to create these initializer traits safely. > 3. Functions to allow manually writing initializers. > > The initializers (an `impl PinInit`) receive a raw pointer pointing > to uninitialized memory and their job is to fully initialize a `T` at that > location. If initialization fails, they return an error (`E`) by value. > > This way of initializing cannot be safely exposed to the user, since it > relies upon these properties outside of the control of the trait: > - the memory location (slot) needs to be valid memory, > - if initialization fails, the slot should not be read from, > - the value in the slot should be pinned, so it cannot move and the memory > cannot be deallocated until the value is dropped. > > This is why using an initializer is facilitated by another trait that > ensures these requirements. > > These initializers can be created manually by just supplying a closure that > fulfills the same safety requirements as `PinInit`. But this is an > `unsafe` operation. To allow safe initializer creation, the `pin_init!` is > provided along with three other variants: `try_pin_init!`, `try_init!` and > `init!`. These take a modified struct initializer as a parameter and > generate a closure that initializes the fields in sequence. > The macros take great care in upholding the safety requirements: > - A shadowed struct type is used as the return type of the closure instead > of `()`. This is to prevent early returns, as these would prevent full > initialization. > - To ensure every field is only initialized once, a normal struct > initializer is placed in unreachable code. The type checker will emit > errors if a field is missing or specified multiple times. > - When initializing a field fails, the whole initializer will fail and > automatically drop fields that have been initialized earlier. > - Only the correct initializer type is allowed for unpinned fields. You > cannot use a `impl PinInit` to initialize a structurally not pinned > field. > > To ensure the last point, an additional macro `#[pin_data]` is needed. This > macro annotates the struct itself and the user specifies structurally > pinned and not pinned fields. > > Because dropping a pinned struct is also not allowed to break the pinning > invariants, another macro attribute `#[pinned_drop]` is needed. This > macro is introduced in a following commit. > > These two macros also have mechanisms to ensure the overall safety of the > API. Additionally, they utilize a combined proc-macro, declarative macro > design: first a proc-macro enables the outer attribute syntax `#[...]` and > does some important pre-parsing. Notably this prepares the generics such > that the declarative macro can handle them using token trees. Then the > actual parsing of the structure and the emission of code is handled by a > declarative macro. > > For pin-projections the crates `pin-project` [3] and `pin-project-lite` [4] > had been considered, but were ultimately rejected: > - `pin-project` depends on `syn` [5] which is a very big dependency, around > 50k lines of code. > - `pin-project-lite` is a more reasonable 5k lines of code, but contains a > very complex declarative macro to parse generics. On top of that it > would require modification that would need to be maintained > independently. > > Link: https://rust-for-linux.com/the-safe-pinned-initialization-problem [1] > Link: https://github.com/Rust-for-Linux/linux/blob/f509ede33fc10a07eba3da14aa00302bd4b5dddd/samples/rust/rust_miscdev.rs [2] > Link: https://crates.io/crates/pin-project [3] > Link: https://crates.io/crates/pin-project-lite [4] > Link: https://crates.io/crates/syn [5] > Co-developed-by: Gary Guo > Signed-off-by: Gary Guo > Signed-off-by: Benno Lossin > --- > rust/kernel/init.rs | 210 +++++++++++++++++++++++++++++++++++++++++ > rust/kernel/lib.rs | 7 ++ > scripts/Makefile.build | 2 +- > 3 files changed, 218 insertions(+), 1 deletion(-) > create mode 100644 rust/kernel/init.rs > > diff --git a/rust/kernel/init.rs b/rust/kernel/init.rs > new file mode 100644 > index 000000000000..5e5e4dc6bae7 > --- /dev/null > +++ b/rust/kernel/init.rs > @@ -0,0 +1,210 @@ > +// SPDX-License-Identifier: Apache-2.0 OR MIT > + > +//! API to safely and fallibly initialize pinned `struct`s using in-place constructors. > +//! > +//! It also allows in-place initialization of big `struct`s that would otherwise produce a stack > +//! overflow. > +//! > +//! Most `struct`s from the [`sync`] module need to be pinned, because they contain self-referential > +//! `struct`s from C. [Pinning][pinning] is Rust's way of ensuring data does not move. > +//! > +//! # Overview > +//! > +//! To initialize a `struct` with an in-place constructor you will need two things: > +//! - an in-place constructor, > +//! - a memory location that can hold your `struct`. > +//! > +//! To get an in-place constructor there are generally two options: > +//! - a custom function/macro returning an in-place constructor provided by someone else, > +//! - using the unsafe function [`pin_init_from_closure()`] to manually create an initializer. > +//! > +//! Aside from pinned initialization, this API also supports in-place construction without pinning, > +//! the marcos/types/functions are generally named like the pinned variants without the `pin` > +//! prefix. > +//! > +//! [`sync`]: kernel::sync > +//! [pinning]: https://doc.rust-lang.org/std/pin/index.html > +//! [structurally pinned fields]: > +//! https://doc.rust-lang.org/std/pin/index.html#pinning-is-structural-for-field > +//! [`Arc`]: crate::sync::Arc > +//! [`impl PinInit`]: PinInit > +//! [`impl PinInit`]: PinInit > +//! [`impl Init`]: Init > +//! [`Opaque`]: kernel::types::Opaque > +//! [`pin_data`]: ::macros::pin_data > +//! [`UniqueArc`]: kernel::sync::UniqueArc > +//! [`Box`]: alloc::boxed::Box > + > +use core::{convert::Infallible, marker::PhantomData, mem::MaybeUninit}; > + > +/// A pinned initializer for `T`. "An initializer for a pinned `T`" instead? BR Andreas > +/// > +/// To use this initializer, you will need a suitable memory location that can hold a `T`. This can > +/// be [`Box`], [`Arc`], [`UniqueArc`]. > +/// > +/// Also see the [module description](self). > +/// > +/// # Safety > +/// > +/// When implementing this type you will need to take great care. Also there are probably very few > +/// cases where a manual implementation is necessary. Use [`pin_init_from_closure`] where possible. > +/// > +/// The [`PinInit::__pinned_init`] function > +/// - returns `Ok(())` if it initialized every field of `slot`, > +/// - returns `Err(err)` if it encountered an error and then cleaned `slot`, this means: > +/// - `slot` can be deallocated without UB occurring, > +/// - `slot` does not need to be dropped, > +/// - `slot` is not partially initialized. > +/// - while constructing the `T` at `slot` it upholds the pinning invariants of `T`. > +/// > +/// [`Arc`]: crate::sync::Arc > +/// [`Arc::pin_init`]: crate::sync::Arc::pin_init > +/// [`UniqueArc`]: kernel::sync::UniqueArc > +/// [`Box`]: alloc::boxed::Box > +#[must_use = "An initializer must be used in order to create its value."] > +pub unsafe trait PinInit: Sized { > + /// Initializes `slot`. > + /// > + /// # Safety > + /// > + /// - `slot` is a valid pointer to uninitialized memory. > + /// - the caller does not touch `slot` when `Err` is returned, they are only permitted to > + /// deallocate. > + /// - `slot` will not move until it is dropped, i.e. it will be pinned. > + unsafe fn __pinned_init(self, slot: *mut T) -> Result<(), E>; > +} > + > +/// An initializer for `T`. > +/// > +/// To use this initializer, you will need a suitable memory location that can hold a `T`. This can > +/// be [`Box`], [`Arc`], [`UniqueArc`]. Because [`PinInit`] is a super trait, you can > +/// use every function that takes it as well. > +/// > +/// Also see the [module description](self). > +/// > +/// # Safety > +/// > +/// When implementing this type you will need to take great care. Also there are probably very few > +/// cases where a manual implementation is necessary. Use [`init_from_closure`] where possible. > +/// > +/// The [`Init::__init`] function > +/// - returns `Ok(())` if it initialized every field of `slot`, > +/// - returns `Err(err)` if it encountered an error and then cleaned `slot`, this means: > +/// - `slot` can be deallocated without UB occurring, > +/// - `slot` does not need to be dropped, > +/// - `slot` is not partially initialized. > +/// - while constructing the `T` at `slot` it upholds the pinning invariants of `T`. > +/// > +/// The `__pinned_init` function from the supertrait [`PinInit`] needs to execute the exact same > +/// code as `__init`. > +/// > +/// Contrary to its supertype [`PinInit`] the caller is allowed to > +/// move the pointee after initialization. > +/// > +/// [`Arc`]: crate::sync::Arc > +/// [`UniqueArc`]: kernel::sync::UniqueArc > +/// [`Box`]: alloc::boxed::Box > +#[must_use = "An initializer must be used in order to create its value."] > +pub unsafe trait Init: PinInit { > + /// Initializes `slot`. > + /// > + /// # Safety > + /// > + /// - `slot` is a valid pointer to uninitialized memory. > + /// - the caller does not touch `slot` when `Err` is returned, they are only permitted to > + /// deallocate. > + unsafe fn __init(self, slot: *mut T) -> Result<(), E>; > +} > + > +type Invariant = PhantomData *mut T>; > +// This is the module-internal type implementing `PinInit` and `Init`. It is unsafe to create this > +// type, since the closure needs to fulfill the same safety requirement as the > +// `__pinned_init`/`__init` functions. > +struct InitClosure(F, Invariant<(E, T)>); > + > +// SAFETY: While constructing the `InitClosure`, the user promised that it upholds the > +// `__pinned_init` invariants. > +unsafe impl PinInit for InitClosure > +where > + F: FnOnce(*mut T) -> Result<(), E>, > +{ > + #[inline] > + unsafe fn __pinned_init(self, slot: *mut T) -> Result<(), E> { > + (self.0)(slot) > + } > +} > + > +// SAFETY: While constructing the `InitClosure`, the user promised that it upholds the > +// `__init` invariants. > +unsafe impl Init for InitClosure > +where > + F: FnOnce(*mut T) -> Result<(), E>, > +{ > + #[inline] > + unsafe fn __init(self, slot: *mut T) -> Result<(), E> { > + (self.0)(slot) > + } > +} > + > +/// Creates a new [`PinInit`] from the given closure. > +/// > +/// # Safety > +/// > +/// The closure: > +/// - returns `Ok(())` if it initialized every field of `slot`, > +/// - returns `Err(err)` if it encountered an error and then cleaned `slot`, this means: > +/// - `slot` can be deallocated without UB occurring, > +/// - `slot` does not need to be dropped, > +/// - `slot` is not partially initialized. > +/// - may assume that the `slot` does not move if `T: !Unpin`, > +/// - while constructing the `T` at `slot` it upholds the pinning invariants of `T`. > +#[inline] > +pub const unsafe fn pin_init_from_closure( > + f: impl FnOnce(*mut T) -> Result<(), E>, > +) -> impl PinInit { > + InitClosure(f, PhantomData) > +} > + > +/// Creates a new [`Init`] from the given closure. > +/// > +/// # Safety > +/// > +/// The closure: > +/// - returns `Ok(())` if it initialized every field of `slot`, > +/// - returns `Err(err)` if it encountered an error and then cleaned `slot`, this means: > +/// - `slot` can be deallocated without UB occurring, > +/// - `slot` does not need to be dropped, > +/// - `slot` is not partially initialized. > +/// - the `slot` may move after initialization. > +/// - while constructing the `T` at `slot` it upholds the pinning invariants of `T`. > +#[inline] > +pub const unsafe fn init_from_closure( > + f: impl FnOnce(*mut T) -> Result<(), E>, > +) -> impl Init { > + InitClosure(f, PhantomData) > +} > + > +/// An initializer that leaves the memory uninitialized. > +/// > +/// The initializer is a no-op. The `slot` memory is not changed. > +#[inline] > +pub fn uninit() -> impl Init> { > + // SAFETY: The memory is allowed to be uninitialized. > + unsafe { init_from_closure(|_| Ok(())) } > +} > + > +// SAFETY: Every type can be initialized by-value. > +unsafe impl PinInit for T { > + unsafe fn __pinned_init(self, slot: *mut T) -> Result<(), Infallible> { > + unsafe { slot.write(self) }; > + Ok(()) > + } > +} > + > +// SAFETY: Every type can be initialized by-value. > +unsafe impl Init for T { > + unsafe fn __init(self, slot: *mut T) -> Result<(), Infallible> { > + unsafe { slot.write(self) }; > + Ok(()) > + } > +} > diff --git a/rust/kernel/lib.rs b/rust/kernel/lib.rs > index 223564f9f0cc..3e2777d26ff5 100644 > --- a/rust/kernel/lib.rs > +++ b/rust/kernel/lib.rs > @@ -16,7 +16,9 @@ > #![feature(coerce_unsized)] > #![feature(core_ffi_c)] > #![feature(dispatch_from_dyn)] > +#![feature(explicit_generic_args_with_impl_trait)] > #![feature(generic_associated_types)] > +#![feature(new_uninit)] > #![feature(receiver_trait)] > #![feature(unsize)] > > @@ -25,11 +27,16 @@ > #[cfg(not(CONFIG_RUST))] > compile_error!("Missing kernel configuration for conditional compilation"); > > +#[allow(unused_extern_crates)] > +// Allow proc-macros to refer to `::kernel` inside the `kernel` crate (this crate). > +extern crate self as kernel; > + > #[cfg(not(test))] > #[cfg(not(testlib))] > mod allocator; > mod build_assert; > pub mod error; > +pub mod init; > pub mod prelude; > pub mod print; > mod static_assert; > diff --git a/scripts/Makefile.build b/scripts/Makefile.build > index 76323201232a..f9bdc01c8191 100644 > --- a/scripts/Makefile.build > +++ b/scripts/Makefile.build > @@ -277,7 +277,7 @@ $(obj)/%.lst: $(src)/%.c FORCE > # Compile Rust sources (.rs) > # --------------------------------------------------------------------------- > > -rust_allowed_features := core_ffi_c > +rust_allowed_features := core_ffi_c,explicit_generic_args_with_impl_trait > > rust_common_cmd = \ > RUST_MODFILE=$(modfile) $(RUSTC_OR_CLIPPY) $(rust_flags) \