kernel/
init.rs

1// SPDX-License-Identifier: GPL-2.0
2
3//! Extensions to the [`pin-init`] crate.
4//!
5//! Most `struct`s from the [`sync`] module need to be pinned, because they contain self-referential
6//! `struct`s from C. [Pinning][pinning] is Rust's way of ensuring data does not move.
7//!
8//! The [`pin-init`] crate is the way such structs are initialized on the Rust side. Please refer
9//! to its documentation to better understand how to use it. Additionally, there are many examples
10//! throughout the kernel, such as the types from the [`sync`] module. And the ones presented
11//! below.
12//!
13//! [`sync`]: crate::sync
14//! [pinning]: https://doc.rust-lang.org/std/pin/index.html
15//! [`pin-init`]: https://rust.docs.kernel.org/pin_init/
16//!
17//! # [`Opaque<T>`]
18//!
19//! For the special case where initializing a field is a single FFI-function call that cannot fail,
20//! there exist the helper function [`Opaque::ffi_init`]. This function initialize a single
21//! [`Opaque<T>`] field by just delegating to the supplied closure. You can use these in
22//! combination with [`pin_init!`].
23//!
24//! [`Opaque<T>`]: crate::types::Opaque
25//! [`Opaque::ffi_init`]: crate::types::Opaque::ffi_init
26//! [`pin_init!`]: pin_init::pin_init
27//!
28//! # Examples
29//!
30//! ## General Examples
31//!
32//! ```rust
33//! # #![expect(clippy::undocumented_unsafe_blocks)]
34//! use kernel::types::Opaque;
35//! use pin_init::pin_init_from_closure;
36//!
37//! // assume we have some `raw_foo` type in C:
38//! #[repr(C)]
39//! struct RawFoo([u8; 16]);
40//! extern "C" {
41//!     fn init_foo(_: *mut RawFoo);
42//! }
43//!
44//! #[pin_data]
45//! struct Foo {
46//!     #[pin]
47//!     raw: Opaque<RawFoo>,
48//! }
49//!
50//! impl Foo {
51//!     fn setup(self: Pin<&mut Self>) {
52//!         pr_info!("Setting up foo\n");
53//!     }
54//! }
55//!
56//! let foo = pin_init!(Foo {
57//!     raw <- unsafe {
58//!         Opaque::ffi_init(|s| {
59//!             // note that this cannot fail.
60//!             init_foo(s);
61//!         })
62//!     },
63//! }).pin_chain(|foo| {
64//!     foo.setup();
65//!     Ok(())
66//! });
67//! ```
68//!
69//! ```rust
70//! use kernel::{prelude::*, types::Opaque};
71//! use core::{ptr::addr_of_mut, marker::PhantomPinned, pin::Pin};
72//! # mod bindings {
73//! #     #![expect(non_camel_case_types, clippy::missing_safety_doc)]
74//! #     pub struct foo;
75//! #     pub unsafe fn init_foo(_ptr: *mut foo) {}
76//! #     pub unsafe fn destroy_foo(_ptr: *mut foo) {}
77//! #     pub unsafe fn enable_foo(_ptr: *mut foo, _flags: u32) -> i32 { 0 }
78//! # }
79//! /// # Invariants
80//! ///
81//! /// `foo` is always initialized
82//! #[pin_data(PinnedDrop)]
83//! pub struct RawFoo {
84//!     #[pin]
85//!     foo: Opaque<bindings::foo>,
86//!     #[pin]
87//!     _p: PhantomPinned,
88//! }
89//!
90//! impl RawFoo {
91//!     pub fn new(flags: u32) -> impl PinInit<Self, Error> {
92//!         // SAFETY:
93//!         // - when the closure returns `Ok(())`, then it has successfully initialized and
94//!         //   enabled `foo`,
95//!         // - when it returns `Err(e)`, then it has cleaned up before
96//!         unsafe {
97//!             pin_init::pin_init_from_closure(move |slot: *mut Self| {
98//!                 // `slot` contains uninit memory, avoid creating a reference.
99//!                 let foo = addr_of_mut!((*slot).foo);
100//!
101//!                 // Initialize the `foo`
102//!                 bindings::init_foo(Opaque::cast_into(foo));
103//!
104//!                 // Try to enable it.
105//!                 let err = bindings::enable_foo(Opaque::cast_into(foo), flags);
106//!                 if err != 0 {
107//!                     // Enabling has failed, first clean up the foo and then return the error.
108//!                     bindings::destroy_foo(Opaque::cast_into(foo));
109//!                     return Err(Error::from_errno(err));
110//!                 }
111//!
112//!                 // All fields of `RawFoo` have been initialized, since `_p` is a ZST.
113//!                 Ok(())
114//!             })
115//!         }
116//!     }
117//! }
118//!
119//! #[pinned_drop]
120//! impl PinnedDrop for RawFoo {
121//!     fn drop(self: Pin<&mut Self>) {
122//!         // SAFETY: Since `foo` is initialized, destroying is safe.
123//!         unsafe { bindings::destroy_foo(self.foo.get()) };
124//!     }
125//! }
126//! ```
127
128use crate::{
129    alloc::{AllocError, Flags},
130    error::{self, Error},
131};
132use pin_init::{init_from_closure, pin_init_from_closure, Init, PinInit};
133
134/// Smart pointer that can initialize memory in-place.
135pub trait InPlaceInit<T>: Sized {
136    /// Pinned version of `Self`.
137    ///
138    /// If a type already implicitly pins its pointee, `Pin<Self>` is unnecessary. In this case use
139    /// `Self`, otherwise just use `Pin<Self>`.
140    type PinnedSelf;
141
142    /// Use the given pin-initializer to pin-initialize a `T` inside of a new smart pointer of this
143    /// type.
144    ///
145    /// If `T: !Unpin` it will not be able to move afterwards.
146    fn try_pin_init<E>(init: impl PinInit<T, E>, flags: Flags) -> Result<Self::PinnedSelf, E>
147    where
148        E: From<AllocError>;
149
150    /// Use the given pin-initializer to pin-initialize a `T` inside of a new smart pointer of this
151    /// type.
152    ///
153    /// If `T: !Unpin` it will not be able to move afterwards.
154    fn pin_init<E>(init: impl PinInit<T, E>, flags: Flags) -> error::Result<Self::PinnedSelf>
155    where
156        Error: From<E>,
157    {
158        // SAFETY: We delegate to `init` and only change the error type.
159        let init = unsafe {
160            pin_init_from_closure(|slot| init.__pinned_init(slot).map_err(|e| Error::from(e)))
161        };
162        Self::try_pin_init(init, flags)
163    }
164
165    /// Use the given initializer to in-place initialize a `T`.
166    fn try_init<E>(init: impl Init<T, E>, flags: Flags) -> Result<Self, E>
167    where
168        E: From<AllocError>;
169
170    /// Use the given initializer to in-place initialize a `T`.
171    fn init<E>(init: impl Init<T, E>, flags: Flags) -> error::Result<Self>
172    where
173        Error: From<E>,
174    {
175        // SAFETY: We delegate to `init` and only change the error type.
176        let init = unsafe {
177            init_from_closure(|slot| init.__pinned_init(slot).map_err(|e| Error::from(e)))
178        };
179        Self::try_init(init, flags)
180    }
181}
182
183/// Construct an in-place fallible initializer for `struct`s.
184///
185/// This macro defaults the error to [`Error`]. If you need [`Infallible`], then use
186/// [`init!`].
187///
188/// The syntax is identical to [`try_pin_init!`]. If you want to specify a custom error,
189/// append `? $type` after the `struct` initializer.
190/// The safety caveats from [`try_pin_init!`] also apply:
191/// - `unsafe` code must guarantee either full initialization or return an error and allow
192///   deallocation of the memory.
193/// - the fields are initialized in the order given in the initializer.
194/// - no references to fields are allowed to be created inside of the initializer.
195///
196/// # Examples
197///
198/// ```rust
199/// use kernel::error::Error;
200/// use pin_init::init_zeroed;
201/// struct BigBuf {
202///     big: KBox<[u8; 1024 * 1024 * 1024]>,
203///     small: [u8; 1024 * 1024],
204/// }
205///
206/// impl BigBuf {
207///     fn new() -> impl Init<Self, Error> {
208///         try_init!(Self {
209///             big: KBox::init(init_zeroed(), GFP_KERNEL)?,
210///             small: [0; 1024 * 1024],
211///         }? Error)
212///     }
213/// }
214/// ```
215///
216/// [`Infallible`]: core::convert::Infallible
217/// [`init!`]: pin_init::init
218/// [`try_pin_init!`]: crate::try_pin_init!
219/// [`Error`]: crate::error::Error
220#[macro_export]
221macro_rules! try_init {
222    ($(&$this:ident in)? $t:ident $(::<$($generics:ty),* $(,)?>)? {
223        $($fields:tt)*
224    }) => {
225        ::pin_init::try_init!($(&$this in)? $t $(::<$($generics),*>)? {
226            $($fields)*
227        }? $crate::error::Error)
228    };
229    ($(&$this:ident in)? $t:ident $(::<$($generics:ty),* $(,)?>)? {
230        $($fields:tt)*
231    }? $err:ty) => {
232        ::pin_init::try_init!($(&$this in)? $t $(::<$($generics),*>)? {
233            $($fields)*
234        }? $err)
235    };
236}
237
238/// Construct an in-place, fallible pinned initializer for `struct`s.
239///
240/// If the initialization can complete without error (or [`Infallible`]), then use [`pin_init!`].
241///
242/// You can use the `?` operator or use `return Err(err)` inside the initializer to stop
243/// initialization and return the error.
244///
245/// IMPORTANT: if you have `unsafe` code inside of the initializer you have to ensure that when
246/// initialization fails, the memory can be safely deallocated without any further modifications.
247///
248/// This macro defaults the error to [`Error`].
249///
250/// The syntax is identical to [`pin_init!`] with the following exception: you can append `? $type`
251/// after the `struct` initializer to specify the error type you want to use.
252///
253/// # Examples
254///
255/// ```rust
256/// # #![feature(new_uninit)]
257/// use kernel::error::Error;
258/// use pin_init::init_zeroed;
259/// #[pin_data]
260/// struct BigBuf {
261///     big: KBox<[u8; 1024 * 1024 * 1024]>,
262///     small: [u8; 1024 * 1024],
263///     ptr: *mut u8,
264/// }
265///
266/// impl BigBuf {
267///     fn new() -> impl PinInit<Self, Error> {
268///         try_pin_init!(Self {
269///             big: KBox::init(init_zeroed(), GFP_KERNEL)?,
270///             small: [0; 1024 * 1024],
271///             ptr: core::ptr::null_mut(),
272///         }? Error)
273///     }
274/// }
275/// ```
276///
277/// [`Infallible`]: core::convert::Infallible
278/// [`pin_init!`]: pin_init::pin_init
279/// [`Error`]: crate::error::Error
280#[macro_export]
281macro_rules! try_pin_init {
282    ($(&$this:ident in)? $t:ident $(::<$($generics:ty),* $(,)?>)? {
283        $($fields:tt)*
284    }) => {
285        ::pin_init::try_pin_init!($(&$this in)? $t $(::<$($generics),*>)? {
286            $($fields)*
287        }? $crate::error::Error)
288    };
289    ($(&$this:ident in)? $t:ident $(::<$($generics:ty),* $(,)?>)? {
290        $($fields:tt)*
291    }? $err:ty) => {
292        ::pin_init::try_pin_init!($(&$this in)? $t $(::<$($generics),*>)? {
293            $($fields)*
294        }? $err)
295    };
296}