Remove `libtock_platform::allows`.
Tock 2.0 system calls do not need the types in `allows`. Now that I'm reworking `libtock_platform` to use Tock 2.0 system calls, we can get rid of the module.
diff --git a/core/platform/src/allows/allow_readable.rs b/core/platform/src/allows/allow_readable.rs
deleted file mode 100644
index c35701b..0000000
--- a/core/platform/src/allows/allow_readable.rs
+++ /dev/null
@@ -1,18 +0,0 @@
-/// Because the kernel may modify shared memory and place any bit pattern into
-/// that memory, we can only read types out of shared memory if every bit
-/// pattern is a valid value of that type. `AllowReadable` types are safe to
-/// read out of a shared buffer.
-pub unsafe trait AllowReadable {}
-
-unsafe impl AllowReadable for i8 {}
-unsafe impl AllowReadable for i16 {}
-unsafe impl AllowReadable for i32 {}
-unsafe impl AllowReadable for i64 {}
-unsafe impl AllowReadable for i128 {}
-unsafe impl AllowReadable for isize {}
-unsafe impl AllowReadable for u8 {}
-unsafe impl AllowReadable for u16 {}
-unsafe impl AllowReadable for u32 {}
-unsafe impl AllowReadable for u64 {}
-unsafe impl AllowReadable for u128 {}
-unsafe impl AllowReadable for usize {}
diff --git a/core/platform/src/allows/allowed.rs b/core/platform/src/allows/allowed.rs
deleted file mode 100644
index 386562f..0000000
--- a/core/platform/src/allows/allowed.rs
+++ /dev/null
@@ -1,71 +0,0 @@
-/// An individual value that has been shared with the kernel using the `allow`
-/// system call.
-// Allowed's implementation does not directly use the 'b lifetime. Platform uses
-// 'b to prevent the Allowed from accessing the buffer after the buffer becomes
-// invalid.
-// Allowed requires T to be Copy due to concerns about the semantics of
-// non-copyable types in shared memory as well as concerns about unexpected
-// behavior with Drop types. See the following PR discussion for more
-// information: https://github.com/tock/libtock-rs/pull/222
-pub struct Allowed<'b, T: Copy + 'b> {
- // Safety properties:
- // 1. `buffer` remains valid and usable for the lifetime of this Allowed
- // instance.
- // 2. Read and write accesses of `buffer`'s pointee must be performed as a
- // volatile operation, as the kernel may mutate buffer's pointee at any
- // time.
- // 3. The value `buffer` points to may have an arbitrary bit pattern in
- // it, so reading from `buffer` is only safe if the type contained
- // within is AllowReadable.
- buffer: core::ptr::NonNull<T>,
-
- // We need to use the 'b lifetime in Allowed to prevent an "unused lifetime"
- // compiler error. We use it here. Note that the phantom data must be an
- // &mut rather than a shared reference in order to make Allowed invariant
- // with respect to T. Invariance is required because Allowed allows us to
- // mutate the value in buffer, and invariance is the required property to do
- // so without allowing callers to produce dangling references. This is
- // documented at https://doc.rust-lang.org/nomicon/subtyping.html.
- _phantom: core::marker::PhantomData<&'b mut T>,
-}
-
-// Allowed's API is based on that of core::cell::Cell, but removes some methods
-// that are not safe for use with shared memory.
-//
-// Internally, Allowed performs accesses to the shared memory using volatile
-// reads and writes through raw pointers. We avoid constructing references to
-// shared memory because that leads to undefined behavior (there is some
-// background on this in the following discussion:
-// https://github.com/rust-lang/unsafe-code-guidelines/issues/33). Tock runs on
-// single-threaded platforms, some of which lack atomic instructions, so we only
-// need to be able to deconflict races between the kernel (which will never
-// interrupt an instruction's execution) and this process. Therefore volatile
-// accesses are sufficient to deconflict races.
-impl<'b, T: Copy + 'b> Allowed<'b, T> {
- // Allowed can only be constructed by the Platform. It is constructed after
- // the `allow` system call, and as such must accept a raw pointer rather
- // than a reference. The caller must make sure the following are true:
- // 1. buffer points to a valid instance of type T
- // 2. There are no references to buffer's pointee
- // 3. buffer remains usable until the Allowed's lifetime has ended.
- #[allow(dead_code)] // TODO: Remove when Platform is implemented
- pub(crate) unsafe fn new(buffer: core::ptr::NonNull<T>) -> Allowed<'b, T> {
- Allowed {
- buffer,
- _phantom: core::marker::PhantomData,
- }
- }
-
- // Sets the value in the buffer.
- pub fn set(&self, value: T) {
- unsafe {
- core::ptr::write_volatile(self.buffer.as_ptr(), value);
- }
- }
-}
-
-impl<'b, T: crate::AllowReadable + Copy + 'b> Allowed<'b, T> {
- pub fn get(&self) -> T {
- unsafe { core::ptr::read_volatile(self.buffer.as_ptr()) }
- }
-}
diff --git a/core/platform/src/allows/allowed_tests.rs b/core/platform/src/allows/allowed_tests.rs
deleted file mode 100644
index 1859dd1..0000000
--- a/core/platform/src/allows/allowed_tests.rs
+++ /dev/null
@@ -1,98 +0,0 @@
-use crate::Allowed;
-use core::marker::PhantomData;
-use core::ptr::NonNull;
-
-// How do we simulate accesses to the shared buffer by the kernel?
-//
-// Well, a naive way would be to mutate the `buffer` variable directly. Because
-// Allowed accesses the memory through a *mut pointer, such a test would compile
-// and run fine with the current Rust compiler. As far as I can tell, it would
-// not hit any behavior documented as undefined at
-// https://doc.rust-lang.org/stable/reference/behavior-considered-undefined.html,
-// nor would it cause rustc to generate LLVM bitcode that encounters undefined
-// behavior.
-//
-// However, the naive approach will throw an "undefined behavior" error when run
-// under Miri (e.g. with `cargo miri test`), which uses the stacked borrows
-// model [1]. In particular, accessing the `buffer` variable directly pops the
-// SharedRW off buffer's borrow stack, which prevents Allowed from using its
-// *mut pointer to access `buffer` afterwards. It is likely that Rust will adopt
-// the stacked borrows model as its formal model for borrow validity, and in
-// that case accessing `buffer` in that manner will become undefined behavior.
-// In addition, running these tests under Miri is highly valuable, as this is
-// tricky code to get correct and an unsound API may be hard to fix.
-//
-// Instead, we explicitly refer to buffer through use of a KernelPtr that
-// simulates the pointer that `allow()` would hand to the Tock kernel. As far as
-// the stacked borrows model is concerned, accesses through the KernelPtr
-// variable behave identically to mutations performed by the kernel. This
-// pattern allows us to use `cargo miri test` to not only execute the unit
-// tests, but to test whether Allowed would encounter undefined behavior when
-// interacting with a real Tock kernel.
-//
-// [1] https://plv.mpi-sws.org/rustbelt/stacked-borrows/paper.pdf
-struct KernelPtr<'b, T: Copy + 'b> {
- ptr: NonNull<T>,
-
- // We need to consume the 'b lifetime. This is very similar to Allowed's
- // implementation.
- _phantom: PhantomData<&'b mut T>,
-}
-
-impl<'b, T: Copy + 'b> KernelPtr<'b, T> {
- // The constructor for KernelPtr; simulates allow(). Returns both the
- // Allowed instance the Platform would return and a KernelPtr the test can
- // use to simulate a kernel.
- pub fn allow(buffer: &'b mut T) -> (Allowed<'b, T>, KernelPtr<'b, T>) {
- let ptr = NonNull::new(buffer).unwrap();
- // Discard buffer *without* creating a reference to it, as would be done
- // if we called drop().
- let _ = buffer;
- // All 3 preconditions of Allowed::new are satisfied by the fact that
- // `buffer` is directly derived from a &'b mut T.
- let allowed = unsafe { Allowed::new(ptr) };
- let kernel_ptr = KernelPtr {
- ptr,
- _phantom: PhantomData,
- };
- (allowed, kernel_ptr)
- }
-
- // Replaces the value in the buffer with a new one.
- pub fn set(&self, value: T) {
- unsafe {
- core::ptr::write(self.ptr.as_ptr(), value);
- }
- }
-
- // Copies the contained value out of the buffer.
- pub fn get(&self) -> T {
- unsafe { core::ptr::read(self.ptr.as_ptr()) }
- }
-}
-
-#[test]
-fn set() {
- let mut buffer = 1;
- let (allowed, kernel_ptr) = KernelPtr::allow(&mut buffer);
- assert_eq!(kernel_ptr.get(), 1);
-
- // Simulate the kernel replacing the value in buffer.
- kernel_ptr.set(2);
- allowed.set(3);
- assert_eq!(kernel_ptr.get(), 3);
-}
-
-#[test]
-fn get() {
- let mut buffer = 1;
- let (allowed, kernel_ptr) = KernelPtr::allow(&mut buffer);
- assert_eq!(kernel_ptr.get(), 1);
-
- assert_eq!(allowed.get(), 1);
- assert_eq!(kernel_ptr.get(), 1);
-
- kernel_ptr.set(2);
- assert_eq!(allowed.get(), 2);
- assert_eq!(kernel_ptr.get(), 2);
-}
diff --git a/core/platform/src/allows/mod.rs b/core/platform/src/allows/mod.rs
deleted file mode 100644
index 8cb2158..0000000
--- a/core/platform/src/allows/mod.rs
+++ /dev/null
@@ -1,8 +0,0 @@
-mod allow_readable;
-mod allowed;
-
-pub use allow_readable::AllowReadable;
-pub use allowed::Allowed;
-
-#[cfg(test)]
-mod allowed_tests;
diff --git a/core/platform/src/lib.rs b/core/platform/src/lib.rs
index 7237a1d..6a23dc5 100644
--- a/core/platform/src/lib.rs
+++ b/core/platform/src/lib.rs
@@ -1,17 +1,7 @@
#![no_std]
-// TODO: Implement this crate, which will be done piece-by-piece. Platform will
-// include:
-// 1. The Allowed and AllowedSlice abstractions for sharing memory with the
-// kernel
-// 2. The PlatformApi trait and Platform implementation.
-// 3. A system call trait so that Platform works in both real Tock apps and
-// unit test environments. [DONE]
-
-mod allows;
mod error_code;
mod syscalls;
-pub use allows::{AllowReadable, Allowed};
pub use error_code::ErrorCode;
pub use syscalls::{MemopNoArg, MemopWithArg, Syscalls};