diff options
Diffstat (limited to 'rust/kernel')
| -rw-r--r-- | rust/kernel/allocator.rs | 74 | ||||
| -rw-r--r-- | rust/kernel/sync/arc.rs | 3 | ||||
| -rw-r--r-- | rust/kernel/types.rs | 22 | 
3 files changed, 62 insertions, 37 deletions
| diff --git a/rust/kernel/allocator.rs b/rust/kernel/allocator.rs index 397a3dd57a9b..9363b527be66 100644 --- a/rust/kernel/allocator.rs +++ b/rust/kernel/allocator.rs @@ -9,6 +9,36 @@ use crate::bindings;  struct KernelAllocator; +/// Calls `krealloc` with a proper size to alloc a new object aligned to `new_layout`'s alignment. +/// +/// # Safety +/// +/// - `ptr` can be either null or a pointer which has been allocated by this allocator. +/// - `new_layout` must have a non-zero size. +unsafe fn krealloc_aligned(ptr: *mut u8, new_layout: Layout, flags: bindings::gfp_t) -> *mut u8 { +    // Customized layouts from `Layout::from_size_align()` can have size < align, so pad first. +    let layout = new_layout.pad_to_align(); + +    let mut size = layout.size(); + +    if layout.align() > bindings::BINDINGS_ARCH_SLAB_MINALIGN { +        // The alignment requirement exceeds the slab guarantee, thus try to enlarge the size +        // to use the "power-of-two" size/alignment guarantee (see comments in `kmalloc()` for +        // more information). +        // +        // Note that `layout.size()` (after padding) is guaranteed to be a multiple of +        // `layout.align()`, so `next_power_of_two` gives enough alignment guarantee. +        size = size.next_power_of_two(); +    } + +    // SAFETY: +    // - `ptr` is either null or a pointer returned from a previous `k{re}alloc()` by the +    //   function safety requirement. +    // - `size` is greater than 0 since it's either a `layout.size()` (which cannot be zero +    //    according to the function safety requirement) or a result from `next_power_of_two()`. +    unsafe { bindings::krealloc(ptr as *const core::ffi::c_void, size, flags) as *mut u8 } +} +  unsafe impl GlobalAlloc for KernelAllocator {      unsafe fn alloc(&self, layout: Layout) -> *mut u8 {          // `krealloc()` is used instead of `kmalloc()` because the latter is @@ -30,10 +60,20 @@ static ALLOCATOR: KernelAllocator = KernelAllocator;  // to extract the object file that has them from the archive. For the moment,  // let's generate them ourselves instead.  // +// Note: Although these are *safe* functions, they are called by the compiler +// with parameters that obey the same `GlobalAlloc` function safety +// requirements: size and align should form a valid layout, and size is +// greater than 0. +//  // Note that `#[no_mangle]` implies exported too, nowadays.  #[no_mangle] -fn __rust_alloc(size: usize, _align: usize) -> *mut u8 { -    unsafe { bindings::krealloc(core::ptr::null(), size, bindings::GFP_KERNEL) as *mut u8 } +fn __rust_alloc(size: usize, align: usize) -> *mut u8 { +    // SAFETY: See assumption above. +    let layout = unsafe { Layout::from_size_align_unchecked(size, align) }; + +    // SAFETY: `ptr::null_mut()` is null, per assumption above the size of `layout` is greater +    // than 0. +    unsafe { krealloc_aligned(ptr::null_mut(), layout, bindings::GFP_KERNEL) }  }  #[no_mangle] @@ -42,23 +82,27 @@ fn __rust_dealloc(ptr: *mut u8, _size: usize, _align: usize) {  }  #[no_mangle] -fn __rust_realloc(ptr: *mut u8, _old_size: usize, _align: usize, new_size: usize) -> *mut u8 { -    unsafe { -        bindings::krealloc( -            ptr as *const core::ffi::c_void, -            new_size, -            bindings::GFP_KERNEL, -        ) as *mut u8 -    } +fn __rust_realloc(ptr: *mut u8, _old_size: usize, align: usize, new_size: usize) -> *mut u8 { +    // SAFETY: See assumption above. +    let new_layout = unsafe { Layout::from_size_align_unchecked(new_size, align) }; + +    // SAFETY: Per assumption above, `ptr` is allocated by `__rust_*` before, and the size of +    // `new_layout` is greater than 0. +    unsafe { krealloc_aligned(ptr, new_layout, bindings::GFP_KERNEL) }  }  #[no_mangle] -fn __rust_alloc_zeroed(size: usize, _align: usize) -> *mut u8 { +fn __rust_alloc_zeroed(size: usize, align: usize) -> *mut u8 { +    // SAFETY: See assumption above. +    let layout = unsafe { Layout::from_size_align_unchecked(size, align) }; + +    // SAFETY: `ptr::null_mut()` is null, per assumption above the size of `layout` is greater +    // than 0.      unsafe { -        bindings::krealloc( -            core::ptr::null(), -            size, +        krealloc_aligned( +            ptr::null_mut(), +            layout,              bindings::GFP_KERNEL | bindings::__GFP_ZERO, -        ) as *mut u8 +        )      }  } diff --git a/rust/kernel/sync/arc.rs b/rust/kernel/sync/arc.rs index a89843cacaad..172f563976a9 100644 --- a/rust/kernel/sync/arc.rs +++ b/rust/kernel/sync/arc.rs @@ -243,8 +243,7 @@ impl<T: 'static> ForeignOwnable for Arc<T> {          let inner = NonNull::new(ptr as *mut ArcInner<T>).unwrap();          // SAFETY: The safety requirements of `from_foreign` ensure that the object remains alive -        // for the lifetime of the returned value. Additionally, the safety requirements of -        // `ForeignOwnable::borrow_mut` ensure that no new mutable references are created. +        // for the lifetime of the returned value.          unsafe { ArcBorrow::new(inner) }      } diff --git a/rust/kernel/types.rs b/rust/kernel/types.rs index 1e5380b16ed5..d479f8da8f38 100644 --- a/rust/kernel/types.rs +++ b/rust/kernel/types.rs @@ -35,34 +35,16 @@ pub trait ForeignOwnable: Sized {      ///      /// `ptr` must have been returned by a previous call to [`ForeignOwnable::into_foreign`] for      /// which a previous matching [`ForeignOwnable::from_foreign`] hasn't been called yet. -    /// Additionally, all instances (if any) of values returned by [`ForeignOwnable::borrow_mut`] -    /// for this object must have been dropped.      unsafe fn borrow<'a>(ptr: *const core::ffi::c_void) -> Self::Borrowed<'a>; -    /// Mutably borrows a foreign-owned object. -    /// -    /// # Safety -    /// -    /// `ptr` must have been returned by a previous call to [`ForeignOwnable::into_foreign`] for -    /// which a previous matching [`ForeignOwnable::from_foreign`] hasn't been called yet. -    /// Additionally, all instances (if any) of values returned by [`ForeignOwnable::borrow`] and -    /// [`ForeignOwnable::borrow_mut`] for this object must have been dropped. -    unsafe fn borrow_mut(ptr: *const core::ffi::c_void) -> ScopeGuard<Self, fn(Self)> { -        // SAFETY: The safety requirements ensure that `ptr` came from a previous call to -        // `into_foreign`. -        ScopeGuard::new_with_data(unsafe { Self::from_foreign(ptr) }, |d| { -            d.into_foreign(); -        }) -    } -      /// Converts a foreign-owned object back to a Rust-owned one.      ///      /// # Safety      ///      /// `ptr` must have been returned by a previous call to [`ForeignOwnable::into_foreign`] for      /// which a previous matching [`ForeignOwnable::from_foreign`] hasn't been called yet. -    /// Additionally, all instances (if any) of values returned by [`ForeignOwnable::borrow`] and -    /// [`ForeignOwnable::borrow_mut`] for this object must have been dropped. +    /// Additionally, all instances (if any) of values returned by [`ForeignOwnable::borrow`] for +    /// this object must have been dropped.      unsafe fn from_foreign(ptr: *const core::ffi::c_void) -> Self;  } |