Received: by 2002:a05:7412:6592:b0:d7:7d3a:4fe2 with SMTP id m18csp2458621rdg; Mon, 14 Aug 2023 03:19:19 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEd4NbscfPN+iDUJXnARNo2hI6dmQDTxoKbyy5PEvVWBvBxDUcMoXionQPUZujbZtcES+2/ X-Received: by 2002:a05:6a20:3246:b0:131:6464:217b with SMTP id hm6-20020a056a20324600b001316464217bmr8010079pzc.16.1692008358618; Mon, 14 Aug 2023 03:19:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1692008358; cv=none; d=google.com; s=arc-20160816; b=w1nLARKF3koQRhKa3DkY6cRg/DsMCKdjnt6jaY6ui57Y6NEgqEiXyY7lnDr/T/ozvJ PrOyTKHE/NdZtvWCpU+k+IhxXAAMBdydyjk7xL90Hw8//GR9tfixa2vJJCbvNfvYjNKx /8Cf6bVZqRhlSHVatS7LZ8g7IBYN1W0jwHSx9fsFBMzwpoRQHjI0pjwhlJzqFXQyFyQl kV0JFr6dbQA7U23o/SYU0eG3aBcuED9o1JUZg0Pug9BwxEncFomMJ/kz2lMmHc8xO/Yk /85k41s+tf11raPZutTg8zWhvofSzp7TGvJ/yO6hvaKDKicIoHyl2CMKgjaHBfc8c39H VaTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :feedback-id:references:in-reply-to:message-id:subject:cc:from:to :dkim-signature:date; bh=BM+ndpgoaIa28MW959xE4f6HCZcpfHae5spTLfBk2Ho=; fh=TE4onW3Du2FQ1EsedDK8TzgRHOYndfJXYpOtlseWrM0=; b=KcpFWdz8KUY6RjnzU+0U0GKKX7sCJS5MpDkIxV3qXpaqVrLtTwrhrXBKHlDCFUvoNR HeFEV3Bo1vxuWzXxYCzRsq8BAKYEcjMmwEZtAdvKgtLpmsKH8u6MFrAzbg5KF5eS9sBE zXMDlktiLTigWuqgDaxV+///RcihS/ijS8/l4Tn0ZNKSkptOIVyGr7snKtMkfnSQCuZj 7nPaZFu5Orycfeu+rfAeC1jThYBUrdLQ5po9bH5+jh+Y5EtS+V+YKjFgrSpRXv5Y+7Lk Kngv9YA6nrPfGn+nnePpmoJdGI0KMhdrt2BHd3CPZugVYzP5f4q0Foo/JK3oRjFoEe/P lDzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@proton.me header.s=pxdyxhsc5zgjrepj7b2v2ltcyq.protonmail header.b=EZ4YpFZj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=proton.me Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id az1-20020a056a02004100b00565bf7ce0a6si1310874pgb.93.2023.08.14.03.19.05; Mon, 14 Aug 2023 03:19:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@proton.me header.s=pxdyxhsc5zgjrepj7b2v2ltcyq.protonmail header.b=EZ4YpFZj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=proton.me Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234945AbjHNIrr (ORCPT + 99 others); Mon, 14 Aug 2023 04:47:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55658 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235065AbjHNIr1 (ORCPT ); Mon, 14 Aug 2023 04:47:27 -0400 Received: from mail-4322.protonmail.ch (mail-4322.protonmail.ch [185.70.43.22]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 41AA210E5; Mon, 14 Aug 2023 01:47:23 -0700 (PDT) Date: Mon, 14 Aug 2023 08:47:03 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=proton.me; s=pxdyxhsc5zgjrepj7b2v2ltcyq.protonmail; t=1692002841; x=1692262041; bh=BM+ndpgoaIa28MW959xE4f6HCZcpfHae5spTLfBk2Ho=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector; b=EZ4YpFZjH4dQ/P5XmIh0QjJWVL2O+OOOGrpHpVy1dZ7Tz4co9qn7Om0WECgCOcAzJ qRO9RgUIu1B+3VSgLzyCHaDSGputiYoY3zXVzTI1REi2yRnI0YbzTi2x7xp8oYq+9T d1Qi3RGgR2nhb0uEoRdrAhSN3FFiENW0UhYSeh9IBQcSXMR6fq+eTSmuP/XBg5U5dg mNKdGKovn5QZcSeEboo8SxC4peZLAdEX/jKOhhN6Rqfz0siuEYwciwGY/+wvnKPxbJ tuAsWeskPSu0sLjC1jYBptDReJAgYWrxOyz8FVhjGnmHGrI0+nA14JREu6HfkczFT3 PtAsPqPX+w+PA== To: Miguel Ojeda , Wedson Almeida Filho , Alex Gaynor From: Benno Lossin Cc: Boqun Feng , Gary Guo , =?utf-8?Q?Bj=C3=B6rn_Roy_Baron?= , Benno Lossin , Alice Ryhl , Andreas Hindborg , rust-for-linux@vger.kernel.org, linux-kernel@vger.kernel.org, patches@lists.linux.dev, Martin Rodriguez Reboredo Subject: [PATCH v4 06/13] rust: init: make initializer values inaccessible after initializing Message-ID: <20230814084602.25699-7-benno.lossin@proton.me> In-Reply-To: <20230814084602.25699-1-benno.lossin@proton.me> References: <20230814084602.25699-1-benno.lossin@proton.me> Feedback-ID: 71780778:user:proton MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Previously the init macros would create a local variable with the name and hygiene of the field that is being initialized to store the value of the field. This would override any user defined variables. For example: ``` struct Foo { a: usize, b: usize, } let a =3D 10; let foo =3D init!(Foo{ a: a + 1, // This creates a local variable named `a`. b: a, // This refers to that variable! }); let foo =3D Box::init!(foo)?; assert_eq!(foo.a, 11); assert_eq!(foo.b, 11); ``` This patch changes this behavior, so the above code would panic at the last assertion, since `b` would have value 10. Reviewed-by: Martin Rodriguez Reboredo Reviewed-by: Alice Ryhl Reviewed-by: Gary Guo Signed-off-by: Benno Lossin --- v3 -> v4: - added Reviewed-by from Gary. v2 -> v3: - added Reviewed-by's from Martin and Alice. rust/kernel/init/macros.rs | 20 +++++++++++--------- 1 file changed, 11 insertions(+), 9 deletions(-) diff --git a/rust/kernel/init/macros.rs b/rust/kernel/init/macros.rs index 2bad086cda0a..cfeacc4b3f7d 100644 --- a/rust/kernel/init/macros.rs +++ b/rust/kernel/init/macros.rs @@ -1075,13 +1075,13 @@ macro_rules! __init_internal { // In-place initialization syntax. @munch_fields($field:ident <- $val:expr, $($rest:tt)*), ) =3D> { - let $field =3D $val; + let init =3D $val; // Call the initializer. // // SAFETY: `slot` is valid, because we are inside of an initialize= r closure, we // return when an error/panic occurs. // We also use the `data` to require the correct trait (`Init` or = `PinInit`) for `$field`. - unsafe { $data.$field(::core::ptr::addr_of_mut!((*$slot).$field), = $field)? }; + unsafe { $data.$field(::core::ptr::addr_of_mut!((*$slot).$field), = init)? }; // Create the drop guard: // // We rely on macro hygiene to make it impossible for users to acc= ess this local variable. @@ -1107,12 +1107,12 @@ macro_rules! __init_internal { // In-place initialization syntax. @munch_fields($field:ident <- $val:expr, $($rest:tt)*), ) =3D> { - let $field =3D $val; + let init =3D $val; // Call the initializer. // // SAFETY: `slot` is valid, because we are inside of an initialize= r closure, we // return when an error/panic occurs. - unsafe { $crate::init::Init::__init($field, ::core::ptr::addr_of_m= ut!((*$slot).$field))? }; + unsafe { $crate::init::Init::__init(init, ::core::ptr::addr_of_mut= !((*$slot).$field))? }; // Create the drop guard: // // We rely on macro hygiene to make it impossible for users to acc= ess this local variable. @@ -1138,11 +1138,13 @@ macro_rules! __init_internal { // Init by-value. @munch_fields($field:ident $(: $val:expr)?, $($rest:tt)*), ) =3D> { - $(let $field =3D $val;)? - // Initialize the field. - // - // SAFETY: The memory at `slot` is uninitialized. - unsafe { ::core::ptr::write(::core::ptr::addr_of_mut!((*$slot).$fi= eld), $field) }; + { + $(let $field =3D $val;)? + // Initialize the field. + // + // SAFETY: The memory at `slot` is uninitialized. + unsafe { ::core::ptr::write(::core::ptr::addr_of_mut!((*$slot)= .$field), $field) }; + } // Create the drop guard: // // We rely on macro hygiene to make it impossible for users to acc= ess this local variable. --=20 2.41.0