Received: by 2002:a05:6358:c692:b0:131:369:b2a3 with SMTP id fe18csp2292185rwb; Sat, 29 Jul 2023 04:10:04 -0700 (PDT) X-Google-Smtp-Source: APBJJlEWTxc9vNR32EugusXMPm2PQDQiNxEfFVR9TOlRON6igWZspHPppv15uFBf20xy7QuJcDdA X-Received: by 2002:a17:907:7851:b0:98d:4000:1bf9 with SMTP id lb17-20020a170907785100b0098d40001bf9mr2158769ejc.65.1690629004478; Sat, 29 Jul 2023 04:10:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690629004; cv=none; d=google.com; s=arc-20160816; b=t9oB4DABR8GheZFa3rs8IHSql8Tsi6sKz7TzNi7OGpY1jaosIIta6MQjxi4uzgOQhi 7pNeSEFPR/rDhjxXD9zeMiQIojmegeGOBXnEPrcO4rnhNW/o0XUPP/7uauxi8R65g/iH sWQz0w4C2pKIDI9qkbzXqBgmnpq0/zgbfVzRX0ViSCSAYkL2hFVPAGWQF+sNE6ad/czN c2gYaYdteFshyzQ/Rq7oh/XMu5L3MFx2pcfmZhW0TmmYyoZBFSu+39cPEg3KDit+AK+i ZLLONl15tCctnIoKzg4pFw/HUsfpiRC/WSCvhlhRwQc5UHuIWDckEKltk5GJvNvIjIBZ o+MA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :feedback-id:references:in-reply-to:message-id:subject:cc:from:to :dkim-signature:date; bh=AH0HIEGjoQqibf1kDSLrSuvQlmckx0/sN/Y3zMQ9l2E=; fh=Kxkq5MAR/ee06c4zNa7/ow9QmWBIyeCoT7WYYnSSoIA=; b=ssY3Qu5IwNpgStJQCK1u/DOA1qiyIwZlRg7K1QHhko8pLciypuCGaTYjuTvYLLmhxd aFimmG8PgRqOGWFjQEDN0fIV533Qxgg/EvJGD42ANWrd2G+/SQrcwlFpgKa+UJBBERhp IkORsv3CqiKSXIpo+/IjFsXYYf+o3BC56kr8gs5sK0n7QaQbo9J9ZqNH8MT00qV4YuoM 2jiOi+6TuYqIXELU6HMSRidWeRTF485yRZPNY96215G6E/z9UeZnA60f/yJMvjRcBspo 2WDDujXWQrgtk+WjlLzQEWT5suXCC4Oixbhe9rIWPG1viRFG+2MzmhPScTu+60jYaOgI 9Nzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@proton.me header.s=protonmail header.b="e6Ee/Ay2"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=proton.me Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i15-20020a1709063c4f00b00987d66e6d26si4080137ejg.250.2023.07.29.04.09.39; Sat, 29 Jul 2023 04:10:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@proton.me header.s=protonmail header.b="e6Ee/Ay2"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=proton.me Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231919AbjG2JLv (ORCPT + 99 others); Sat, 29 Jul 2023 05:11:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40826 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231886AbjG2JLW (ORCPT ); Sat, 29 Jul 2023 05:11:22 -0400 Received: from mail-4322.protonmail.ch (mail-4322.protonmail.ch [185.70.43.22]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1231249F3; Sat, 29 Jul 2023 02:10:44 -0700 (PDT) Date: Sat, 29 Jul 2023 09:10:22 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=proton.me; s=protonmail; t=1690621836; x=1690881036; bh=AH0HIEGjoQqibf1kDSLrSuvQlmckx0/sN/Y3zMQ9l2E=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector; b=e6Ee/Ay28m2aF8g71TkVLHYPgKrHIsI6ZnO0XItdUgFnAlfOZSA0C3ivHqZ7l19nR hbHmpw/U7YDSNwfQChTDKu2zRmAru/SNNYCkExVdJYg91XUqmdTL+Ioi8LoWSjVcLo r7PRiooEkosYRC95ou+HpyIJV+0Bk5JWKIYr2TR4Sv6lrPp851efgebomRNzFnWoEg e9BchDE0QgFYQJewCJ1Go702HyCVikozp1mDXtQ3LhGxmKlc2D22cQHjtjib7jR+Ky 0KetuWGDpxhVa3h6xC0QG9l7I6QmXKayDlv7WOVubrgXIRzgNhrEtHx//WiNnrTikG N+Hff4uUNhzjA== To: Miguel Ojeda , Wedson Almeida Filho , Alex Gaynor From: Benno Lossin Cc: Boqun Feng , Gary Guo , =?utf-8?Q?Bj=C3=B6rn_Roy_Baron?= , Benno Lossin , Alice Ryhl , Andreas Hindborg , rust-for-linux@vger.kernel.org, linux-kernel@vger.kernel.org, Martin Rodriguez Reboredo Subject: [PATCH v3 11/13] rust: init: make `PinInit` a supertrait of `Init` Message-ID: <20230729090838.225225-12-benno.lossin@proton.me> In-Reply-To: <20230729090838.225225-1-benno.lossin@proton.me> References: <20230729090838.225225-1-benno.lossin@proton.me> Feedback-ID: 71780778:user:proton MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_MSPIKE_H5, RCVD_IN_MSPIKE_WL,SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Remove the blanket implementation of `PinInit for I where I: Init`. This blanket implementation prevented custom types that implement `PinInit`. Reviewed-by: Martin Rodriguez Reboredo Reviewed-by: Alice Ryhl Signed-off-by: Benno Lossin --- v2 -> v3: - add blank missing line, - added Reviewed-by's from Martin and Alice. rust/kernel/init.rs | 21 ++++++++------------- rust/kernel/init/__internal.rs | 12 ++++++++++++ 2 files changed, 20 insertions(+), 13 deletions(-) diff --git a/rust/kernel/init.rs b/rust/kernel/init.rs index 06ecab4901f2..040dc9a5f9fd 100644 --- a/rust/kernel/init.rs +++ b/rust/kernel/init.rs @@ -807,7 +807,7 @@ pub unsafe trait PinInit: = Sized { /// /// [`Arc`]: crate::sync::Arc #[must_use =3D "An initializer must be used in order to create its value."= ] -pub unsafe trait Init: Sized { +pub unsafe trait Init: PinInit { /// Initializes `slot`. /// /// # Safety @@ -818,18 +818,6 @@ pub unsafe trait Init: Si= zed { unsafe fn __init(self, slot: *mut T) -> Result<(), E>; } =20 -// SAFETY: Every in-place initializer can also be used as a pin-initialize= r. -unsafe impl PinInit for I -where - I: Init, -{ - unsafe fn __pinned_init(self, slot: *mut T) -> Result<(), E> { - // SAFETY: `__init` meets the same requirements as `__pinned_init`= , except that it does not - // require `slot` to not move after init. - unsafe { self.__init(slot) } - } -} - /// Creates a new [`PinInit`] from the given closure. /// /// # Safety @@ -971,6 +959,13 @@ unsafe fn __init(self, slot: *mut T) -> Result<(), E> = { } } =20 +// SAFETY: Every type can be initialized by-value. `__pinned_init` calls `= __init`. +unsafe impl PinInit for T { + unsafe fn __pinned_init(self, slot: *mut T) -> Result<(), E> { + unsafe { self.__init(slot) } + } +} + /// Smart pointer that can initialize memory in-place. pub trait InPlaceInit: Sized { /// Use the given pin-initializer to pin-initialize a `T` inside of a = new smart pointer of this diff --git a/rust/kernel/init/__internal.rs b/rust/kernel/init/__internal.r= s index 7abd1fb65e41..12e195061525 100644 --- a/rust/kernel/init/__internal.rs +++ b/rust/kernel/init/__internal.rs @@ -32,6 +32,18 @@ unsafe fn __init(self, slot: *mut T) -> Result<(), E> { } } =20 +// SAFETY: While constructing the `InitClosure`, the user promised that it= upholds the +// `__pinned_init` invariants. +unsafe impl PinInit for InitClosure +where + F: FnOnce(*mut T) -> Result<(), E>, +{ + #[inline] + unsafe fn __pinned_init(self, slot: *mut T) -> Result<(), E> { + (self.0)(slot) + } +} + /// This trait is only implemented via the `#[pin_data]` proc-macro. It is= used to facilitate /// the pin projections within the initializers. /// --=20 2.41.0