// SPDX-License-Identifier: GPL-2.0 use crate::helpers::*; use proc_macro::{token_stream, Delimiter, Literal, TokenStream, TokenTree}; use std::fmt::Write; fn expect_string_array(it: &mut token_stream::IntoIter) -> Vec { let group = expect_group(it); assert_eq!(group.delimiter(), Delimiter::Bracket); let mut values = Vec::new(); let mut it = group.stream().into_iter(); while let Some(val) = try_string(&mut it) { assert!(val.is_ascii(), "Expected ASCII string"); values.push(val); match it.next() { Some(TokenTree::Punct(punct)) => assert_eq!(punct.as_char(), ','), None => break, _ => panic!("Expected ',' or end of array"), } } values } struct ModInfoBuilder<'a> { module: &'a str, counter: usize, buffer: String, } impl<'a> ModInfoBuilder<'a> { fn new(module: &'a str) -> Self { ModInfoBuilder { module, counter: 0, buffer: String::new(), } } fn emit_base(&mut self, field: &str, content: &str, builtin: bool) { let string = if builtin { // Built-in modules prefix their modinfo strings by `module.`. format!( "{module}.{field}={content}\0", module = self.module, field = field, content = content ) } else { // Loadable modules' modinfo strings go as-is. format!("{field}={content}\0", field = field, content = content) }; write!( &mut self.buffer, " {cfg} #[doc(hidden)] #[link_section = \".modinfo\"] #[used] pub static __{module}_{counter}: [u8; {length}] = *{string}; ", cfg = if builtin { "#[cfg(not(MODULE))]" } else { "#[cfg(MODULE)]" }, module = self.module.to_uppercase(), counter = self.counter, length = string.len(), string = Literal::byte_string(string.as_bytes()), ) .unwrap(); self.counter += 1; } fn emit_only_builtin(&mut self, field: &str, content: &str) { self.emit_base(field, content, true) } fn emit_only_loadable(&mut self, field: &str, content: &str) { self.emit_base(field, content, false) } fn emit(&mut self, field: &str, content: &str) { self.emit_only_builtin(field, content); self.emit_only_loadable(field, content); } } #[derive(Debug, Default)] struct ModuleInfo { type_: String, license: String, name: String, author: Option, description: Option, alias: Option>, firmware: Option>, } impl ModuleInfo { fn parse(it: &mut token_stream::IntoIter) -> Self { let mut info = ModuleInfo::default(); const EXPECTED_KEYS: &[&str] = &[ "type", "name", "author", "description", "license", "alias", "firmware", ]; const REQUIRED_KEYS: &[&str] = &["type", "name", "license"]; let mut seen_keys = Vec::new(); loop { let key = match it.next() { Some(TokenTree::Ident(ident)) => ident.to_string(), Some(_) => panic!("Expected Ident or end"), None => break, }; if seen_keys.contains(&key) { panic!( "Duplicated key \"{}\". Keys can only be specified once.", key ); } assert_eq!(expect_punct(it), ':'); match key.as_str() { "type" => info.type_ = expect_ident(it), "name" => info.name = expect_string_ascii(it), "author" => info.author = Some(expect_string(it)), "description" => info.description = Some(expect_string(it)), "license" => info.license = expect_string_ascii(it), "alias" => info.alias = Some(expect_string_array(it)), "firmware" => info.firmware = Some(expect_string_array(it)), _ => panic!( "Unknown key \"{}\". Valid keys are: {:?}.", key, EXPECTED_KEYS ), } assert_eq!(expect_punct(it), ','); seen_keys.push(key); } expect_end(it); for key in REQUIRED_KEYS { if !seen_keys.iter().any(|e| e == key) { panic!("Missing required key \"{}\".", key); } } let mut ordered_keys: Vec<&str> = Vec::new(); for key in EXPECTED_KEYS { if seen_keys.iter().any(|e| e == key) { ordered_keys.push(key); } } if seen_keys != ordered_keys { panic!( "Keys are not ordered as expected. Order them like: {:?}.", ordered_keys ); } info } } pub(crate) fn module(ts: TokenStream) -> TokenStream { let mut it = ts.into_iter(); let info = ModuleInfo::parse(&mut it); let mut modinfo = ModInfoBuilder::new(info.name.as_ref()); if let Some(author) = info.author { modinfo.emit("author", &author); } if let Some(description) = info.description { modinfo.emit("description", &description); } modinfo.emit("license", &info.license); if let Some(aliases) = info.alias { for alias in aliases { modinfo.emit("alias", &alias); } } if let Some(firmware) = info.firmware { for fw in firmware { modinfo.emit("firmware", &fw); } } // Built-in modules also export the `file` modinfo string. let file = std::env::var("RUST_MODFILE").expect("Unable to fetch RUST_MODFILE environmental variable"); modinfo.emit_only_builtin("file", &file); format!( " /// The module name. /// /// Used by the printing macros, e.g. [`info!`]. const __LOG_PREFIX: &[u8] = b\"{name}\\0\"; // SAFETY: `__this_module` is constructed by the kernel at load time and will not be // freed until the module is unloaded. #[cfg(MODULE)] static THIS_MODULE: kernel::ThisModule = unsafe {{ extern \"C\" {{ static __this_module: kernel::types::Opaque; }} kernel::ThisModule::from_ptr(__this_module.get()) }}; #[cfg(not(MODULE))] static THIS_MODULE: kernel::ThisModule = unsafe {{ kernel::ThisModule::from_ptr(core::ptr::null_mut()) }}; // Double nested modules, since then nobody can access the public items inside. mod __module_init {{ mod __module_init {{ use super::super::{type_}; use kernel::init::PinInit; /// The \"Rust loadable module\" mark. // // This may be best done another way later on, e.g. as a new modinfo // key or a new section. For the moment, keep it simple. #[cfg(MODULE)] #[doc(hidden)] #[used] static __IS_RUST_MODULE: () = (); static mut __MOD: core::mem::MaybeUninit<{type_}> = core::mem::MaybeUninit::uninit(); // Loadable modules need to export the `{{init,cleanup}}_module` identifiers. /// # Safety /// /// This function must not be called after module initialization, because it may be /// freed after that completes. #[cfg(MODULE)] #[doc(hidden)] #[no_mangle] #[link_section = \".init.text\"] pub unsafe extern \"C\" fn init_module() -> kernel::ffi::c_int {{ // SAFETY: This function is inaccessible to the outside due to the double // module wrapping it. It is called exactly once by the C side via its // unique name. unsafe {{ __init() }} }} #[cfg(MODULE)] #[doc(hidden)] #[used] #[link_section = \".init.data\"] static __UNIQUE_ID___addressable_init_module: unsafe extern \"C\" fn() -> i32 = init_module; #[cfg(MODULE)] #[doc(hidden)] #[no_mangle] pub extern \"C\" fn cleanup_module() {{ // SAFETY: // - This function is inaccessible to the outside due to the double // module wrapping it. It is called exactly once by the C side via its // unique name, // - furthermore it is only called after `init_module` has returned `0` // (which delegates to `__init`). unsafe {{ __exit() }} }} #[cfg(MODULE)] #[doc(hidden)] #[used] #[link_section = \".exit.data\"] static __UNIQUE_ID___addressable_cleanup_module: extern \"C\" fn() = cleanup_module; // Built-in modules are initialized through an initcall pointer // and the identifiers need to be unique. #[cfg(not(MODULE))] #[cfg(not(CONFIG_HAVE_ARCH_PREL32_RELOCATIONS))] #[doc(hidden)] #[link_section = \"{initcall_section}\"] #[used] pub static __{name}_initcall: extern \"C\" fn() -> kernel::ffi::c_int = __{name}_init; #[cfg(not(MODULE))] #[cfg(CONFIG_HAVE_ARCH_PREL32_RELOCATIONS)] core::arch::global_asm!( r#\".section \"{initcall_section}\", \"a\" __{name}_initcall: .long __{name}_init - . .previous \"# ); #[cfg(not(MODULE))] #[doc(hidden)] #[no_mangle] pub extern \"C\" fn __{name}_init() -> kernel::ffi::c_int {{ // SAFETY: This function is inaccessible to the outside due to the double // module wrapping it. It is called exactly once by the C side via its // placement above in the initcall section. unsafe {{ __init() }} }} #[cfg(not(MODULE))] #[doc(hidden)] #[no_mangle] pub extern \"C\" fn __{name}_exit() {{ // SAFETY: // - This function is inaccessible to the outside due to the double // module wrapping it. It is called exactly once by the C side via its // unique name, // - furthermore it is only called after `__{name}_init` has returned `0` // (which delegates to `__init`). unsafe {{ __exit() }} }} /// # Safety /// /// This function must only be called once. unsafe fn __init() -> kernel::ffi::c_int {{ let initer = <{type_} as kernel::InPlaceModule>::init(&super::super::THIS_MODULE); // SAFETY: No data race, since `__MOD` can only be accessed by this module // and there only `__init` and `__exit` access it. These functions are only // called once and `__exit` cannot be called before or during `__init`. match unsafe {{ initer.__pinned_init(__MOD.as_mut_ptr()) }} {{ Ok(m) => 0, Err(e) => e.to_errno(), }} }} /// # Safety /// /// This function must /// - only be called once, /// - be called after `__init` has been called and returned `0`. unsafe fn __exit() {{ // SAFETY: No data race, since `__MOD` can only be accessed by this module // and there only `__init` and `__exit` access it. These functions are only // called once and `__init` was already called. unsafe {{ // Invokes `drop()` on `__MOD`, which should be used for cleanup. __MOD.assume_init_drop(); }} }} {modinfo} }} }} ", type_ = info.type_, name = info.name, modinfo = modinfo.buffer, initcall_section = ".initcall6.init" ) .parse() .expect("Error parsing formatted string into token stream.") }