// SPDX-License-Identifier: GPL-2.012//! The `kernel` crate.3//!4//! This crate contains the kernel APIs that have been ported or wrapped for5//! usage by Rust code in the kernel and is shared by all of them.6//!7//! In other words, all the rest of the Rust code in the kernel (e.g. kernel8//! modules written in Rust) depends on [`core`] and this crate.9//!10//! If you need a kernel C API that is not ported or wrapped yet here, then11//! do so first instead of bypassing this crate.1213#![no_std]14//15// Please see https://github.com/Rust-for-Linux/linux/issues/2 for details on16// the unstable features in use.17//18// Stable since Rust 1.79.0.19#![feature(generic_nonzero)]20#![feature(inline_const)]21#![feature(pointer_is_aligned)]22//23// Stable since Rust 1.81.0.24#![feature(lint_reasons)]25//26// Stable since Rust 1.82.0.27#![feature(raw_ref_op)]28//29// Stable since Rust 1.83.0.30#![feature(const_maybe_uninit_as_mut_ptr)]31#![feature(const_mut_refs)]32#![feature(const_option)]33#![feature(const_ptr_write)]34#![feature(const_refs_to_cell)]35//36// Expected to become stable.37#![feature(arbitrary_self_types)]38//39// To be determined.40#![feature(used_with_arg)]41//42// `feature(derive_coerce_pointee)` is expected to become stable. Before Rust43// 1.84.0, it did not exist, so enable the predecessor features.44#![cfg_attr(CONFIG_RUSTC_HAS_COERCE_POINTEE, feature(derive_coerce_pointee))]45#![cfg_attr(not(CONFIG_RUSTC_HAS_COERCE_POINTEE), feature(coerce_unsized))]46#![cfg_attr(not(CONFIG_RUSTC_HAS_COERCE_POINTEE), feature(dispatch_from_dyn))]47#![cfg_attr(not(CONFIG_RUSTC_HAS_COERCE_POINTEE), feature(unsize))]48//49// `feature(file_with_nul)` is expected to become stable. Before Rust 1.89.0, it did not exist, so50// enable it conditionally.51#![cfg_attr(CONFIG_RUSTC_HAS_FILE_WITH_NUL, feature(file_with_nul))]5253// Ensure conditional compilation based on the kernel configuration works;54// otherwise we may silently break things like initcall handling.55#[cfg(not(CONFIG_RUST))]56compile_error!("Missing kernel configuration for conditional compilation");5758// Allow proc-macros to refer to `::kernel` inside the `kernel` crate (this crate).59extern crate self as kernel;6061pub use ffi;6263pub mod acpi;64pub mod alloc;65#[cfg(CONFIG_AUXILIARY_BUS)]66pub mod auxiliary;67pub mod bitmap;68pub mod bits;69#[cfg(CONFIG_BLOCK)]70pub mod block;71pub mod bug;72#[doc(hidden)]73pub mod build_assert;74pub mod clk;75#[cfg(CONFIG_CONFIGFS_FS)]76pub mod configfs;77pub mod cpu;78#[cfg(CONFIG_CPU_FREQ)]79pub mod cpufreq;80pub mod cpumask;81pub mod cred;82pub mod debugfs;83pub mod device;84pub mod device_id;85pub mod devres;86pub mod dma;87pub mod driver;88#[cfg(CONFIG_DRM = "y")]89pub mod drm;90pub mod error;91pub mod faux;92#[cfg(CONFIG_RUST_FW_LOADER_ABSTRACTIONS)]93pub mod firmware;94pub mod fmt;95pub mod fs;96pub mod id_pool;97pub mod init;98pub mod io;99pub mod ioctl;100pub mod irq;101pub mod jump_label;102#[cfg(CONFIG_KUNIT)]103pub mod kunit;104pub mod list;105pub mod maple_tree;106pub mod miscdevice;107pub mod mm;108#[cfg(CONFIG_NET)]109pub mod net;110pub mod of;111#[cfg(CONFIG_PM_OPP)]112pub mod opp;113pub mod page;114#[cfg(CONFIG_PCI)]115pub mod pci;116pub mod pid_namespace;117pub mod platform;118pub mod prelude;119pub mod print;120pub mod processor;121pub mod ptr;122pub mod rbtree;123pub mod regulator;124pub mod revocable;125pub mod scatterlist;126pub mod security;127pub mod seq_file;128pub mod sizes;129mod static_assert;130#[doc(hidden)]131pub mod std_vendor;132pub mod str;133pub mod sync;134pub mod task;135pub mod time;136pub mod tracepoint;137pub mod transmute;138pub mod types;139pub mod uaccess;140pub mod workqueue;141pub mod xarray;142143#[doc(hidden)]144pub use bindings;145pub use macros;146pub use uapi;147148/// Prefix to appear before log messages printed from within the `kernel` crate.149const __LOG_PREFIX: &[u8] = b"rust_kernel\0";150151/// The top level entrypoint to implementing a kernel module.152///153/// For any teardown or cleanup operations, your type may implement [`Drop`].154pub trait Module: Sized + Sync + Send {155/// Called at module initialization time.156///157/// Use this method to perform whatever setup or registration your module158/// should do.159///160/// Equivalent to the `module_init` macro in the C API.161fn init(module: &'static ThisModule) -> error::Result<Self>;162}163164/// A module that is pinned and initialised in-place.165pub trait InPlaceModule: Sync + Send {166/// Creates an initialiser for the module.167///168/// It is called when the module is loaded.169fn init(module: &'static ThisModule) -> impl pin_init::PinInit<Self, error::Error>;170}171172impl<T: Module> InPlaceModule for T {173fn init(module: &'static ThisModule) -> impl pin_init::PinInit<Self, error::Error> {174let initer = move |slot: *mut Self| {175let m = <Self as Module>::init(module)?;176177// SAFETY: `slot` is valid for write per the contract with `pin_init_from_closure`.178unsafe { slot.write(m) };179Ok(())180};181182// SAFETY: On success, `initer` always fully initialises an instance of `Self`.183unsafe { pin_init::pin_init_from_closure(initer) }184}185}186187/// Metadata attached to a [`Module`] or [`InPlaceModule`].188pub trait ModuleMetadata {189/// The name of the module as specified in the `module!` macro.190const NAME: &'static crate::str::CStr;191}192193/// Equivalent to `THIS_MODULE` in the C API.194///195/// C header: [`include/linux/init.h`](srctree/include/linux/init.h)196pub struct ThisModule(*mut bindings::module);197198// SAFETY: `THIS_MODULE` may be used from all threads within a module.199unsafe impl Sync for ThisModule {}200201impl ThisModule {202/// Creates a [`ThisModule`] given the `THIS_MODULE` pointer.203///204/// # Safety205///206/// The pointer must be equal to the right `THIS_MODULE`.207pub const unsafe fn from_ptr(ptr: *mut bindings::module) -> ThisModule {208ThisModule(ptr)209}210211/// Access the raw pointer for this module.212///213/// It is up to the user to use it correctly.214pub const fn as_ptr(&self) -> *mut bindings::module {215self.0216}217}218219#[cfg(not(testlib))]220#[panic_handler]221fn panic(info: &core::panic::PanicInfo<'_>) -> ! {222pr_emerg!("{}\n", info);223// SAFETY: FFI call.224unsafe { bindings::BUG() };225}226227/// Produces a pointer to an object from a pointer to one of its fields.228///229/// If you encounter a type mismatch due to the [`Opaque`] type, then use [`Opaque::cast_into`] or230/// [`Opaque::cast_from`] to resolve the mismatch.231///232/// [`Opaque`]: crate::types::Opaque233/// [`Opaque::cast_into`]: crate::types::Opaque::cast_into234/// [`Opaque::cast_from`]: crate::types::Opaque::cast_from235///236/// # Safety237///238/// The pointer passed to this macro, and the pointer returned by this macro, must both be in239/// bounds of the same allocation.240///241/// # Examples242///243/// ```244/// # use kernel::container_of;245/// struct Test {246/// a: u64,247/// b: u32,248/// }249///250/// let test = Test { a: 10, b: 20 };251/// let b_ptr: *const _ = &test.b;252/// // SAFETY: The pointer points at the `b` field of a `Test`, so the resulting pointer will be253/// // in-bounds of the same allocation as `b_ptr`.254/// let test_alias = unsafe { container_of!(b_ptr, Test, b) };255/// assert!(core::ptr::eq(&test, test_alias));256/// ```257#[macro_export]258macro_rules! container_of {259($field_ptr:expr, $Container:ty, $($fields:tt)*) => {{260let offset: usize = ::core::mem::offset_of!($Container, $($fields)*);261let field_ptr = $field_ptr;262let container_ptr = field_ptr.byte_sub(offset).cast::<$Container>();263$crate::assert_same_type(field_ptr, (&raw const (*container_ptr).$($fields)*).cast_mut());264container_ptr265}}266}267268/// Helper for [`container_of!`].269#[doc(hidden)]270pub fn assert_same_type<T>(_: T, _: T) {}271272/// Helper for `.rs.S` files.273#[doc(hidden)]274#[macro_export]275macro_rules! concat_literals {276($( $asm:literal )* ) => {277::core::concat!($($asm),*)278};279}280281/// Wrapper around `asm!` configured for use in the kernel.282///283/// Uses a semicolon to avoid parsing ambiguities, even though this does not match native `asm!`284/// syntax.285// For x86, `asm!` uses intel syntax by default, but we want to use at&t syntax in the kernel.286#[cfg(any(target_arch = "x86", target_arch = "x86_64"))]287#[macro_export]288macro_rules! asm {289($($asm:expr),* ; $($rest:tt)*) => {290::core::arch::asm!( $($asm)*, options(att_syntax), $($rest)* )291};292}293294/// Wrapper around `asm!` configured for use in the kernel.295///296/// Uses a semicolon to avoid parsing ambiguities, even though this does not match native `asm!`297/// syntax.298// For non-x86 arches we just pass through to `asm!`.299#[cfg(not(any(target_arch = "x86", target_arch = "x86_64")))]300#[macro_export]301macro_rules! asm {302($($asm:expr),* ; $($rest:tt)*) => {303::core::arch::asm!( $($asm)*, $($rest)* )304};305}306307/// Gets the C string file name of a [`Location`].308///309/// If `Location::file_as_c_str()` is not available, returns a string that warns about it.310///311/// [`Location`]: core::panic::Location312///313/// # Examples314///315/// ```316/// # use kernel::file_from_location;317///318/// #[track_caller]319/// fn foo() {320/// let caller = core::panic::Location::caller();321///322/// // Output:323/// // - A path like "rust/kernel/example.rs" if `file_as_c_str()` is available.324/// // - "<Location::file_as_c_str() not supported>" otherwise.325/// let caller_file = file_from_location(caller);326///327/// // Prints out the message with caller's file name.328/// pr_info!("foo() called in file {caller_file:?}\n");329///330/// # if cfg!(CONFIG_RUSTC_HAS_FILE_WITH_NUL) {331/// # assert_eq!(Ok(caller.file()), caller_file.to_str());332/// # }333/// }334///335/// # foo();336/// ```337#[inline]338pub fn file_from_location<'a>(loc: &'a core::panic::Location<'a>) -> &'a core::ffi::CStr {339#[cfg(CONFIG_RUSTC_HAS_FILE_AS_C_STR)]340{341loc.file_as_c_str()342}343344#[cfg(all(CONFIG_RUSTC_HAS_FILE_WITH_NUL, not(CONFIG_RUSTC_HAS_FILE_AS_C_STR)))]345{346loc.file_with_nul()347}348349#[cfg(not(CONFIG_RUSTC_HAS_FILE_WITH_NUL))]350{351let _ = loc;352c"<Location::file_as_c_str() not supported>"353}354}355356357