Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp865905rwl; Fri, 31 Mar 2023 03:41:02 -0700 (PDT) X-Google-Smtp-Source: AKy350YqZsclcGFsoQHJ4tFB1WbFh12RquBKFkuI2ntb9TrpJrPQGPbPub766+u06IV3B6ID8vJM X-Received: by 2002:a05:6402:34c6:b0:502:1cf6:f52c with SMTP id w6-20020a05640234c600b005021cf6f52cmr6370262edc.4.1680259261978; Fri, 31 Mar 2023 03:41:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680259261; cv=none; d=google.com; s=arc-20160816; b=wXVqAlWBhDNLijYaYi3ObxGQS0nZCTqRJrLzJuC5WHl7LCMC7pWvagUNYTGsL4HfRT ws34IrsSxXrqoE7SsX90FnYVbGJMyS7YFqiJSVFhFrGY/KcnEopHjOh8Wp7BafOIsRrY vSlnRLY77Wupc+ffzvAXJugsynfkgFfQ91Ar7wcoFbSpvcOaILh68LOwXx+EhXVmy4sX uQ8M2125i2Qdg4u/KtFZ9vBEex6HhndVi6uVNCFIWLByAuVdQvGF8k1/E5aTbWTmyRXj WkScbeon3mt/zS7nc+QM9ld/ji8CP46aUPfeGR6zfZeuG6WVRRKCUHLZ0hvcdVL2Htvn xX4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:feedback-id:dkim-signature:dkim-signature; bh=IAUYlN6ZX9KmpLznUElPyykiXEIEj7JDkrq5lxF0Jpo=; b=AcX3Cu3wn0Sh01DGO4NT9JkP4IGTXnKnsOkRwO9FCU9zZReiVhlU7cfnXucAakl3Nr 7rWo5seinv7v5y3Lwg+vSCFxD7k7dUEqFrASpnLeViQNE2baMpoWuy/8xz1MzY845X4J NiTWVKcO/Wzhyt2wejU9X+J05lDgVCRZJ5KrI2YBUP7dTc3rfea50H72+UuPashQ0rTg c3DfaQhO97MJL37ajtQyAQiG/zTacp+zvtJ8wzFgI6Nsrx7q+qCNO0pyAfWx+bMwiC41 xpPtZ0xAVRfms9uDmzA6g7SycQvOm17U1VpsEScdi/XLMXM508wX6tHfnTx2OD0pTtlj naHg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ryhl.io header.s=fm2 header.b=We6GmbfV; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b="JhhQ/17Y"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ryhl.io Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n17-20020aa7c451000000b004acbdf2227dsi1986239edr.82.2023.03.31.03.40.37; Fri, 31 Mar 2023 03:41:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@ryhl.io header.s=fm2 header.b=We6GmbfV; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b="JhhQ/17Y"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ryhl.io Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231723AbjCaKiv (ORCPT + 99 others); Fri, 31 Mar 2023 06:38:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42156 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231213AbjCaKiQ (ORCPT ); Fri, 31 Mar 2023 06:38:16 -0400 Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com [66.111.4.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 104C4B762; Fri, 31 Mar 2023 03:38:09 -0700 (PDT) Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id BDC535C00D3; Fri, 31 Mar 2023 06:38:06 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute5.internal (MEProxy); Fri, 31 Mar 2023 06:38:06 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ryhl.io; h=cc:cc :content-transfer-encoding:content-type:content-type:date:date :from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:sender:subject:subject:to:to; s=fm2; t= 1680259086; x=1680345486; bh=IAUYlN6ZX9KmpLznUElPyykiXEIEj7JDkrq 5lxF0Jpo=; b=We6GmbfVHcv6/odFl2zKdqgqYikEl6UeOp8bTHvZr/cokhZ4KRk ++/c9iEv5y0DngitCvrANsRH4uje7alHDpk4AA6KU09whuREhDZ8pxi/us6DKGHb 7jy5Rp0IkNEvyi+Qdhtmt7lAorV/mcpf47ZaRvpVyvcU5+T+Fr/eu3Td+mGICyQM j1FBPFeTYKEJqgONvuFOXDFt3OSjneIavd63WZN6mBUpAZoUcMSG0Rb5gePLKJ5S FMd9zoupzb9CnlfAxjhwBy3+MDjGLEXxY0AhrHMPjF7tMhv6i5JPj7vOvuG0ETYQ D3DsXUBt67AqrtiVWpyRPJu9qkmz4VZne5Q== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-transfer-encoding :content-type:content-type:date:date:feedback-id:feedback-id :from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:sender:subject:subject:to:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; t= 1680259086; x=1680345486; bh=IAUYlN6ZX9KmpLznUElPyykiXEIEj7JDkrq 5lxF0Jpo=; b=JhhQ/17YchaW+5wl7OkL49ulHNQpCTnYjW9CCbi0LHKYeHjvOuy EvrEispF9SKuqej5ngIzoqrunJVKFJTUgy9bqIfqHTUcEqLkAZWn6vQy0oXTu6xV AE8lOox/MMouBL0W0x0wWnKvDn4YhfqSaOX5eJX8DwEoZn1SBBY6GT615IrZ8bWr pwDagwP6A5RU1bLxtYLrHoRfCgUueZMkTK7W3iur/ywUIjojg5V6Q+ufejdfUQXq LaV8uSTpjfxtQtn3vIH4zApsyWyd+9z6WKXLzocOzBV6bd6CgxHpZydt5hMTWC0O UcOh0C1lA+xitgr5MOf6XdKdh7I0WtF5pjw== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvhedrvdeiuddgvdejucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne cujfgurhepkfffgggfuffvvehfhfgjtgfgsehtjeertddtfeejnecuhfhrohhmpeetlhhi tggvucfthihhlhcuoegrlhhitggvsehrhihhlhdrihhoqeenucggtffrrghtthgvrhhnpe etgeevveeviefhleevjeevteeitdegveehieejudeiiefhveejjedutdeuteekfeenucff ohhmrghinheprhhushhtqdhfohhrqdhlihhnuhigrdgtohhmpdhgihhthhhusgdrtghomh dprhhushhtmhhishgtuggvvhdrrhhspdgtrhgrthgvshdrihhopdhruhhsthdqlhgrnhhg rdhorhhgnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomh eprghlihgtvgesrhihhhhlrdhioh X-ME-Proxy: Feedback-ID: i56684263:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Fri, 31 Mar 2023 06:38:04 -0400 (EDT) Message-ID: <6ab69027-b1c8-2d83-b402-ec5e301e9bf6@ryhl.io> Date: Thu, 30 Mar 2023 15:17:54 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.9.0 Subject: Re: [PATCH v3 04/13] rust: add pin-init API core Content-Language: en-US To: y86-dev@protonmail.com, Miguel Ojeda , Alex Gaynor , Wedson Almeida Filho , Boqun Feng , Gary Guo , =?UTF-8?Q?Bj=c3=b6rn_Roy_Baron?= Cc: rust-for-linux@vger.kernel.org, linux-kernel@vger.kernel.org, patches@lists.linux.dev References: <20230329223239.138757-1-y86-dev@protonmail.com> <20230329223239.138757-5-y86-dev@protonmail.com> From: Alice Ryhl In-Reply-To: <20230329223239.138757-5-y86-dev@protonmail.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.1 required=5.0 tests=DATE_IN_PAST_12_24, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_LOW,SPF_HELO_PASS,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/30/23 00:33, y86-dev@protonmail.com wrote: > From: Benno Lossin > > This API is used to facilitate safe pinned initialization of structs. It > replaces cumbersome `unsafe` manual initialization with elegant safe macro > invocations. > > Due to the size of this change it has been split into six commits: > 1. This commit introducing the basic public interface: traits and > functions to represent and create initializers. > 2. Adds the `#[pin_data]`, `pin_init!`, `try_pin_init!`, `init!` and > `try_init!` macros along with their internal types. > 3. Adds the `InPlaceInit` trait that allows using an initializer to create > an object inside of a `Box` and other smart pointers. > 4. Adds the `PinnedDrop` trait and adds macro support for it in > the `#[pin_data]` macro. > 5. Adds the `stack_pin_init!` macro allowing to pin-initialize a struct on > the stack. > 6. Adds the `Zeroable` trait and `init::zeroed` function to initialize > types that have `0x00` in all bytes as a valid bit pattern. > > -- > > In this section the problem that the new pin-init API solves is outlined. > This message describes the entirety of the API, not just the parts > introduced in this commit. For a more granular explanation and additional > information on pinning and this issue, view [1]. > > Pinning is Rust's way of enforcing the address stability of a value. When a > value gets pinned it will be impossible for safe code to move it to another > location. This is done by wrapping pointers to said object with `Pin

`. > This wrapper prevents safe code from creating mutable references to the > object, preventing mutable access, which is needed to move the value. > `Pin

` provides `unsafe` functions to circumvent this and allow > modifications regardless. It is then the programmer's responsibility to > uphold the pinning guarantee. > > Many kernel data structures require a stable address, because there are > foreign pointers to them which would get invalidated by moving the > structure. Since these data structures are usually embedded in structs to > use them, this pinning property propagates to the container struct. > Resulting in most structs in both Rust and C code needing to be pinned. > > So if we want to have a `mutex` field in a Rust struct, this struct also > needs to be pinned, because a `mutex` contains a `list_head`. Additionally > initializing a `list_head` requires already having the final memory > location available, because it is initialized by pointing it to itself. But > this presents another challenge in Rust: values have to be initialized at > all times. There is the `MaybeUninit` wrapper type, which allows > handling uninitialized memory, but this requires using the `unsafe` raw > pointers and a casting the type to the initialized variant. > > This problem gets exacerbated when considering encapsulation and the normal > safety requirements of Rust code. The fields of the Rust `Mutex` should > not be accessible to normal driver code. After all if anyone can modify > the fields, there is no way to ensure the invariants of the `Mutex` are > upheld. But if the fields are inaccessible, then initialization of a > `Mutex` needs to be somehow achieved via a function or a macro. Because > the `Mutex` must be pinned in memory, the function cannot return it by > value. It also cannot allocate a `Box` to put the `Mutex` into, because > that is an unnecessary allocation and indirection which would hurt > performance. > > The current solution was to split this function into two parts: > > 1. A `new` function that returns a partially initialized `Mutex`, > 2. An `init` function that requires the `Mutex` to be pinned and that > fully initializes the `Mutex`. > > Both of these functions have to be marked `unsafe`, since a call to `new` > needs to be accompanied with a call to `init`, otherwise using the > `Mutex` could result in UB. And because calling `init` twice also is not > safe. While `Mutex` initialization cannot fail, other structs might > also have to allocate memory, which would result in conditional successful > initialization requiring even more manual accommodation work. > > Combine this with the problem of pin-projections -- the way of accessing > fields of a pinned struct -- which also have an `unsafe` API, pinned > initialization is riddled with `unsafe` resulting in very poor ergonomics. > Not only that, but also having to call two functions possibly multiple > lines apart makes it very easy to forget it outright or during refactoring. > > Here is an example of the current way of initializing a struct with two > synchronization primitives (see [2] for the full example): > > struct SharedState { > state_changed: CondVar, > inner: Mutex, > } > > impl SharedState { > fn try_new() -> Result> { > let mut state = Pin::from(UniqueArc::try_new(Self { > // SAFETY: `condvar_init!` is called below. > state_changed: unsafe { CondVar::new() }, > // SAFETY: `mutex_init!` is called below. > inner: unsafe { > Mutex::new(SharedStateInner { token_count: 0 }) > }, > })?); > > // SAFETY: `state_changed` is pinned when `state` is. > let pinned = unsafe { > state.as_mut().map_unchecked_mut(|s| &mut s.state_changed) > }; > kernel::condvar_init!(pinned, "SharedState::state_changed"); > > // SAFETY: `inner` is pinned when `state` is. > let pinned = unsafe { > state.as_mut().map_unchecked_mut(|s| &mut s.inner) > }; > kernel::mutex_init!(pinned, "SharedState::inner"); > > Ok(state.into()) > } > } > > The pin-init API of this patch solves this issue by providing a > comprehensive solution comprised of macros and traits. Here is the example > from above using the pin-init API: > > #[pin_data] > struct SharedState { > #[pin] > state_changed: CondVar, > #[pin] > inner: Mutex, > } > > impl SharedState { > fn new() -> impl PinInit { > pin_init!(Self { > state_changed <- new_condvar!("SharedState::state_changed"), > inner <- new_mutex!( > SharedStateInner { token_count: 0 }, > "SharedState::inner", > ), > }) > } > } > > Notably the way the macro is used here requires no `unsafe` and thus comes > with the usual Rust promise of safe code not introducing any memory > violations. Additionally it is now up to the caller of `new()` to decide > the memory location of the `SharedState`. They can choose at the moment > `Arc`, `Box` or the stack. > > -- > > The API has the following architecture: > 1. Initializer traits `PinInit` and `Init` that act like > closures. > 2. Macros to create these initializer traits safely. > 3. Functions to allow manually writing initializers. > > The initializers (an `impl PinInit`) receive a raw pointer pointing > to uninitialized memory and their job is to fully initialize a `T` at that > location. If initialization fails, they return an error (`E`) by value. > > This way of initializing cannot be safely exposed to the user, since it > relies upon these properties outside of the control of the trait: > - the memory location (slot) needs to be valid memory, > - if initialization fails, the slot should not be read from, > - the value in the slot should be pinned, so it cannot move and the memory > cannot be deallocated until the value is dropped. > > This is why using an initializer is facilitated by another trait that > ensures these requirements. > > These initializers can be created manually by just supplying a closure that > fulfills the same safety requirements as `PinInit`. But this is an > `unsafe` operation. To allow safe initializer creation, the `pin_init!` is > provided along with three other variants: `try_pin_init!`, `try_init!` and > `init!`. These take a modified struct initializer as a parameter and > generate a closure that initializes the fields in sequence. > The macros take great care in upholding the safety requirements: > - A shadowed struct type is used as the return type of the closure instead > of `()`. This is to prevent early returns, as these would prevent full > initialization. > - To ensure every field is only initialized once, a normal struct > initializer is placed in unreachable code. The type checker will emit > errors if a field is missing or specified multiple times. > - When initializing a field fails, the whole initializer will fail and > automatically drop fields that have been initialized earlier. > - Only the correct initializer type is allowed for unpinned fields. You > cannot use a `impl PinInit` to initialize a structurally not pinned > field. > > To ensure the last point, an additional macro `#[pin_data]` is needed. This > macro annotates the struct itself and the user specifies structurally > pinned and not pinned fields. > > Because dropping a pinned struct is also not allowed to break the pinning > invariants, another macro attribute `#[pinned_drop]` is needed. This > macro is introduced in a following commit. > > These two macros also have mechanisms to ensure the overall safety of the > API. Additionally, they utilize a combined proc-macro, declarative macro > design: first a proc-macro enables the outer attribute syntax `#[...]` and > does some important pre-parsing. Notably this prepares the generics such > that the declarative macro can handle them using token trees. Then the > actual parsing of the structure and the emission of code is handled by a > declarative macro. > > For pin-projections the crates `pin-project` [3] and `pin-project-lite` [4] > had been considered, but were ultimately rejected: > - `pin-project` depends on `syn` [5] which is a very big dependency, around > 50k lines of code. > - `pin-project-lite` is a more reasonable 5k lines of code, but contains a > very complex declarative macro to parse generics. On top of that it > would require modification that would need to be maintained > independently. > > Link: https://rust-for-linux.com/the-safe-pinned-initialization-problem [1] > Link: https://github.com/Rust-for-Linux/linux/blob/f509ede33fc10a07eba3da14aa00302bd4b5dddd/samples/rust/rust_miscdev.rs [2] > Link: https://crates.io/crates/pin-project [3] > Link: https://crates.io/crates/pin-project-lite [4] > Link: https://crates.io/crates/syn [5] > Co-developed-by: Gary Guo > Signed-off-by: Gary Guo > Signed-off-by: Benno Lossin > --- > rust/kernel/init.rs | 210 +++++++++++++++++++++++++++++++++++++++++ > rust/kernel/lib.rs | 7 ++ > scripts/Makefile.build | 2 +- > 3 files changed, 218 insertions(+), 1 deletion(-) > create mode 100644 rust/kernel/init.rs > > diff --git a/rust/kernel/init.rs b/rust/kernel/init.rs > new file mode 100644 > index 000000000000..5e5e4dc6bae7 > --- /dev/null > +++ b/rust/kernel/init.rs > @@ -0,0 +1,210 @@ > +// SPDX-License-Identifier: Apache-2.0 OR MIT > + > +//! API to safely and fallibly initialize pinned `struct`s using in-place constructors. > +//! > +//! It also allows in-place initialization of big `struct`s that would otherwise produce a stack > +//! overflow. > +//! > +//! Most `struct`s from the [`sync`] module need to be pinned, because they contain self-referential > +//! `struct`s from C. [Pinning][pinning] is Rust's way of ensuring data does not move. > +//! > +//! # Overview > +//! > +//! To initialize a `struct` with an in-place constructor you will need two things: > +//! - an in-place constructor, > +//! - a memory location that can hold your `struct`. > +//! > +//! To get an in-place constructor there are generally two options: > +//! - a custom function/macro returning an in-place constructor provided by someone else, > +//! - using the unsafe function [`pin_init_from_closure()`] to manually create an initializer. > +//! > +//! Aside from pinned initialization, this API also supports in-place construction without pinning, > +//! the marcos/types/functions are generally named like the pinned variants without the `pin` > +//! prefix. Typo: Should be "macros". > +//! > +//! [`sync`]: kernel::sync > +//! [pinning]: https://doc.rust-lang.org/std/pin/index.html > +//! [structurally pinned fields]: > +//! https://doc.rust-lang.org/std/pin/index.html#pinning-is-structural-for-field > +//! [`Arc`]: crate::sync::Arc > +//! [`impl PinInit`]: PinInit > +//! [`impl PinInit`]: PinInit > +//! [`impl Init`]: Init > +//! [`Opaque`]: kernel::types::Opaque > +//! [`pin_data`]: ::macros::pin_data > +//! [`UniqueArc`]: kernel::sync::UniqueArc > +//! [`Box`]: alloc::boxed::Box > + > +use core::{convert::Infallible, marker::PhantomData, mem::MaybeUninit}; > + > +/// A pinned initializer for `T`. > +/// > +/// To use this initializer, you will need a suitable memory location that can hold a `T`. This can > +/// be [`Box`], [`Arc`], [`UniqueArc`]. > +/// > +/// Also see the [module description](self). > +/// > +/// # Safety > +/// > +/// When implementing this type you will need to take great care. Also there are probably very few > +/// cases where a manual implementation is necessary. Use [`pin_init_from_closure`] where possible. > +/// > +/// The [`PinInit::__pinned_init`] function > +/// - returns `Ok(())` if it initialized every field of `slot`, > +/// - returns `Err(err)` if it encountered an error and then cleaned `slot`, this means: > +/// - `slot` can be deallocated without UB occurring, > +/// - `slot` does not need to be dropped, > +/// - `slot` is not partially initialized. > +/// - while constructing the `T` at `slot` it upholds the pinning invariants of `T`. > +/// > +/// [`Arc`]: crate::sync::Arc > +/// [`Arc::pin_init`]: crate::sync::Arc::pin_init > +/// [`UniqueArc`]: kernel::sync::UniqueArc > +/// [`Box`]: alloc::boxed::Box > +#[must_use = "An initializer must be used in order to create its value."] > +pub unsafe trait PinInit: Sized { > + /// Initializes `slot`. > + /// > + /// # Safety > + /// > + /// - `slot` is a valid pointer to uninitialized memory. > + /// - the caller does not touch `slot` when `Err` is returned, they are only permitted to > + /// deallocate. > + /// - `slot` will not move until it is dropped, i.e. it will be pinned. > + unsafe fn __pinned_init(self, slot: *mut T) -> Result<(), E>; > +} > + > +/// An initializer for `T`. > +/// > +/// To use this initializer, you will need a suitable memory location that can hold a `T`. This can > +/// be [`Box`], [`Arc`], [`UniqueArc`]. Because [`PinInit`] is a super trait, you can > +/// use every function that takes it as well. > +/// > +/// Also see the [module description](self). > +/// > +/// # Safety > +/// > +/// When implementing this type you will need to take great care. Also there are probably very few > +/// cases where a manual implementation is necessary. Use [`init_from_closure`] where possible. > +/// > +/// The [`Init::__init`] function > +/// - returns `Ok(())` if it initialized every field of `slot`, > +/// - returns `Err(err)` if it encountered an error and then cleaned `slot`, this means: > +/// - `slot` can be deallocated without UB occurring, > +/// - `slot` does not need to be dropped, > +/// - `slot` is not partially initialized. > +/// - while constructing the `T` at `slot` it upholds the pinning invariants of `T`. > +/// > +/// The `__pinned_init` function from the supertrait [`PinInit`] needs to execute the exact same > +/// code as `__init`. > +/// > +/// Contrary to its supertype [`PinInit`] the caller is allowed to > +/// move the pointee after initialization. > +/// > +/// [`Arc`]: crate::sync::Arc > +/// [`UniqueArc`]: kernel::sync::UniqueArc > +/// [`Box`]: alloc::boxed::Box > +#[must_use = "An initializer must be used in order to create its value."] > +pub unsafe trait Init: PinInit { > + /// Initializes `slot`. > + /// > + /// # Safety > + /// > + /// - `slot` is a valid pointer to uninitialized memory. > + /// - the caller does not touch `slot` when `Err` is returned, they are only permitted to > + /// deallocate. > + unsafe fn __init(self, slot: *mut T) -> Result<(), E>; > +} > + > +type Invariant = PhantomData *mut T>; I think it would make sense to include a link to the nomicon on the documentation for the Invariant type. > +// This is the module-internal type implementing `PinInit` and `Init`. It is unsafe to create this > +// type, since the closure needs to fulfill the same safety requirement as the > +// `__pinned_init`/`__init` functions. > +struct InitClosure(F, Invariant<(E, T)>); > + > +// SAFETY: While constructing the `InitClosure`, the user promised that it upholds the > +// `__pinned_init` invariants. > +unsafe impl PinInit for InitClosure > +where > + F: FnOnce(*mut T) -> Result<(), E>, > +{ > + #[inline] > + unsafe fn __pinned_init(self, slot: *mut T) -> Result<(), E> { > + (self.0)(slot) > + } > +} > + > +// SAFETY: While constructing the `InitClosure`, the user promised that it upholds the > +// `__init` invariants. > +unsafe impl Init for InitClosure > +where > + F: FnOnce(*mut T) -> Result<(), E>, > +{ > + #[inline] > + unsafe fn __init(self, slot: *mut T) -> Result<(), E> { > + (self.0)(slot) > + } > +} > + > +/// Creates a new [`PinInit`] from the given closure. > +/// > +/// # Safety > +/// > +/// The closure: > +/// - returns `Ok(())` if it initialized every field of `slot`, > +/// - returns `Err(err)` if it encountered an error and then cleaned `slot`, this means: > +/// - `slot` can be deallocated without UB occurring, > +/// - `slot` does not need to be dropped, > +/// - `slot` is not partially initialized. > +/// - may assume that the `slot` does not move if `T: !Unpin`, > +/// - while constructing the `T` at `slot` it upholds the pinning invariants of `T`. > +#[inline] > +pub const unsafe fn pin_init_from_closure( > + f: impl FnOnce(*mut T) -> Result<(), E>, > +) -> impl PinInit { > + InitClosure(f, PhantomData) > +} > + > +/// Creates a new [`Init`] from the given closure. > +/// > +/// # Safety > +/// > +/// The closure: > +/// - returns `Ok(())` if it initialized every field of `slot`, > +/// - returns `Err(err)` if it encountered an error and then cleaned `slot`, this means: > +/// - `slot` can be deallocated without UB occurring, > +/// - `slot` does not need to be dropped, > +/// - `slot` is not partially initialized. > +/// - the `slot` may move after initialization. > +/// - while constructing the `T` at `slot` it upholds the pinning invariants of `T`. > +#[inline] > +pub const unsafe fn init_from_closure( > + f: impl FnOnce(*mut T) -> Result<(), E>, > +) -> impl Init { > + InitClosure(f, PhantomData) > +} > + > +/// An initializer that leaves the memory uninitialized. > +/// > +/// The initializer is a no-op. The `slot` memory is not changed. > +#[inline] > +pub fn uninit() -> impl Init> { > + // SAFETY: The memory is allowed to be uninitialized. > + unsafe { init_from_closure(|_| Ok(())) } > +} > + > +// SAFETY: Every type can be initialized by-value. > +unsafe impl PinInit for T { > + unsafe fn __pinned_init(self, slot: *mut T) -> Result<(), Infallible> { > + unsafe { slot.write(self) }; > + Ok(()) > + } > +} > + > +// SAFETY: Every type can be initialized by-value. > +unsafe impl Init for T { > + unsafe fn __init(self, slot: *mut T) -> Result<(), Infallible> { > + unsafe { slot.write(self) }; > + Ok(()) > + } > +} > diff --git a/rust/kernel/lib.rs b/rust/kernel/lib.rs > index 223564f9f0cc..3e2777d26ff5 100644 > --- a/rust/kernel/lib.rs > +++ b/rust/kernel/lib.rs > @@ -16,7 +16,9 @@ > #![feature(coerce_unsized)] > #![feature(core_ffi_c)] > #![feature(dispatch_from_dyn)] > +#![feature(explicit_generic_args_with_impl_trait)] > #![feature(generic_associated_types)] > +#![feature(new_uninit)] > #![feature(receiver_trait)] > #![feature(unsize)] > > @@ -25,11 +27,16 @@ > #[cfg(not(CONFIG_RUST))] > compile_error!("Missing kernel configuration for conditional compilation"); > > +#[allow(unused_extern_crates)] > +// Allow proc-macros to refer to `::kernel` inside the `kernel` crate (this crate). > +extern crate self as kernel; > + > #[cfg(not(test))] > #[cfg(not(testlib))] > mod allocator; > mod build_assert; > pub mod error; > +pub mod init; > pub mod prelude; > pub mod print; > mod static_assert; > diff --git a/scripts/Makefile.build b/scripts/Makefile.build > index 76323201232a..f9bdc01c8191 100644 > --- a/scripts/Makefile.build > +++ b/scripts/Makefile.build > @@ -277,7 +277,7 @@ $(obj)/%.lst: $(src)/%.c FORCE > # Compile Rust sources (.rs) > # --------------------------------------------------------------------------- > > -rust_allowed_features := core_ffi_c > +rust_allowed_features := core_ffi_c,explicit_generic_args_with_impl_trait > > rust_common_cmd = \ > RUST_MODFILE=$(modfile) $(RUSTC_OR_CLIPPY) $(rust_flags) \ > -- > 2.39.2 > >