Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[strict provenance] Provide a way to "create allocations at a fixed address" #98593

Open
RalfJung opened this issue Jun 27, 2022 · 98 comments
Open
Labels
A-strict-provenance Area: Strict provenance for raw pointers T-lang Relevant to the language team, which will review and decide on the PR/issue. T-libs-api Relevant to the library API team, which will review and decide on the PR/issue. WG-embedded Working group: Embedded systems

Comments

@RalfJung
Copy link
Member

RalfJung commented Jun 27, 2022

This issue is part of the Strict Provenance Experiment - #95228

On some platforms it makes sense to just take a hard-coded address, cast it to a pointer, and starting working with that pointer -- because there are external environment assumptions that say that certain things are provided at certain addresses.

This is perfectly fine for Rust as long as that memory is entirely disjoint from all the memory that Rust understands (static globals, stack allocations, heap allocations). Basically we can think of there being a single hard-coded provenance for "all the memory that is disjoint from the Abstract Machine", and that is the provenance we would like to use for these pointers created from hard-coded addresses. These restrictions make this operation a lot easier to specify than from_exposed_addr. (Remember: from_exposed_addr is outside of Strict Provenance. The goal of this issue is to provide a way to write such code while following Strict Provenance.)

In the spirit of the Strict Provenance APIs, that means we probably want a function that does this, and that we can attach suitable documentation to. There are some open questions for the syntax and semantics of that function:

  • What should it be called? make_alloc, assume_alloc, hard_coded_alloc? I am leaning towards something with "alloc" because this function is basically like an allocator, except that you tell it at which address to allocate and you have to promise that that is Okay To Do.
  • It should definitely take a usize for the address and return *mut T. Should it also take a size, saying how large this assumed allocation is?
  • Should each invocation return a fresh provenance, or should they all return the same provenance? Probably the latter; using a fresh provenance comes with a bunch of restrictions that I doubt such low-level code will be happy about.
  • (other things I have not thought of)

Cc @Lokathor who keeps mentioning this usecase every time I want to ban int2ptr casts. ;)
Tagging WG-embedded since that's where this kind of stuff mostly happens (AFAIK)

@RalfJung RalfJung added T-lang Relevant to the language team, which will review and decide on the PR/issue. T-libs-api Relevant to the library API team, which will review and decide on the PR/issue. WG-embedded Working group: Embedded systems A-strict-provenance Area: Strict provenance for raw pointers labels Jun 27, 2022
@RalfJung
Copy link
Member Author

Until such a function exists, one can use from_exposed_addr_mut for this purpose. The "provenance for all things outside the Abstract Machine" is definitely exposed and can hence be picked up by that function.

@Lokathor
Copy link
Contributor

One thing I'd like to mention at the start is that hardware addresses should not be modeled as "owned" by anything inside Rust. They're generally volatile, and generally what you read from them might change without Rust doing anything on its end. At best we should think of them as Rust sharing the address with some external force.

Because of this, I think a name like "alloc" would be a misstep. People have the notion/understanding that when you alloc some memory you own it while it's live, and then you (or some drop glue) explicitly does a "free", and and it's dead. That's not really how hardware access works at all, so for a new situation we pick a new name.

Particularly, lots of existing and well working rust code doesn't bother with a "free" step at all when using hardware pointers. You just make up a pointer that you know is good, you read or write, and then you forget the pointer, and someone else might even be holding a pointer to that same location while you're doing all this, and it's all fine. If a person wants to build an ownership-style API on top of this using the borrow checker they can do that (there's several such examples), but that's separate from the base requirements of the abstract machine interacting with the hardware.

@clarfonthey
Copy link
Contributor

Perhaps directly labelling these addresses as volatile might be the best way to go? This would also help for FFI as well, since you could make the distinction between an address for something that is "owned" inside the Rust code until passed back via FFI, or something that could concurrently be modified outside of Rust, by hardware or another thread.

@RalfJung
Copy link
Member Author

@Lokathor what you say also confirms my thoughts above that we want to use the same provenance for all calls to this function, and not generate a fresh one. That provenance is assumed to be exposed from the start, so it is basically public and can change any time control is given to other code (including via another thread).

Using volatile accesses is a separate concern; Rust assumes for all pointers that if you do 2 non-atomic loads immediately after one another, they will give the same result -- there is no good way to opt-out of that assumption just for a specific provenance; this needs a more explicit marker at the relevant access. (I.e., making it volatile.)

Perhaps directly labelling these addresses as volatile might be the best way to go?

There is no such thing as a volatile address. Being volatile is the property of an access.
If you want to ensure that all accesses to an address are volatile, that's fine, but this can't be automatic or else Rust would have to assume that any raw pointer access might have to be volatile.

There are plenty of discussions around the semantics of volatile, their interaction with reference types, and so on; I would like to keep them out of here. This thread is solely about the name, signature, and provenance interaction of the function that is intended to replace those casts.

@Lokathor

This comment was marked as off-topic.

@RalfJung

This comment was marked as off-topic.

@RalfJung
Copy link
Member Author

RalfJung commented Jun 27, 2022

There are plenty of cases where you want access at a particular address that has nothing to do with volatile. For example, you might write a kernel and know that the firmware put some data structure with important info at a hard-coded address.

So, this API certainly should not be tied to volatile in any way. Just like ownership/borrowing, APIs for convenient (and maybe even safe) volatile access can be built on top of this lower-level primitive. That's why I marked the previous posts about volatile as off-topic.

@adamgreig
Copy link
Member

I'll raise this at the next embedded WG meeting (tues 28th 20:00 CEST) to see if anyone else has thoughts.

It should definitely take a usize for the address and return *mut T. Should it also take a size, saying how large this assumed allocation is?

I'd think so, we will often have a pointer to a large struct or array or quite possibly an entire memory region that is only for MMIO with fixed addresses (e.g. on Cortex-M, 0x4000_0000 through 0x5FFF_FFFF is all peripheral MMIO).

@RalfJung
Copy link
Member Author

I'd think so, we will often have a pointer to a large struct or array or quite possibly an entire memory region that is only for MMIO with fixed addresses (e.g. on Cortex-M, 0x4000_0000 through 0x5FFF_FFFF is all peripheral MMIO).

And then would you want it to be UB to use that pointer outside the given range? Or what would the exact consequence be of setting a particular size?

@adamgreig
Copy link
Member

If it didn't take a size, would you assume a single word provenance or the whole memory, like an escaped pointer? I was imagining you'd want to be able to restrict it to the smallest usable provenance, which is generally known statically or easily bounded to a memory region.

If there's not really any advantage to the compiler to knowing the possible valid range of the pointer, then I suppose just taking the address and giving it a whole-memory provenance is a simpler API.

My guess for a typical embedded use-case is you'd create one of these pointers for each instance of a peripheral on your chip, so each has a non-overlapping size of say <100 words, and probably create them on-demand each time you accessed the peripheral.

@RalfJung
Copy link
Member Author

RalfJung commented Jun 27, 2022

If it didn't take a size, would you assume a single word provenance or the whole memory, like an escaped pointer?

It would be allowed to access all memory that is outside of what the Abstract Machine knows about (static, stack, heap, anything internal to the implementation like compiler-generated data).

probably create them on-demand each time you accessed the peripheral.

This means multiple calls to that function can overlap anyway, so a size does not give any disjointness guarantees.

@Lokathor
Copy link
Contributor

A size/span restriction does not seem useful.

@adamgreig
Copy link
Member

It would be allowed to access all memory that is outside of what the Abstract Machine knows about (static, stack, heap, anything internal to the implementation like compiler-generated data).

Right, I should have read the issue more carefully. I agree then, it doesn't seem like there'd be any benefit to giving a size, even if it is known.

For naming, I'm also not entirely sure about saying alloc; maybe the thing to express is that we're making a pointer that shares some global disjoint-from-known-universe provenance with all other similarly-created pointers? I think extern has too many other meanings, but if it didn't, something like make_extern or assume_extern could work.

@jamesmunns
Copy link
Member

Thinking a bit about the use cases here, just to make sure I understand:

  • Fixed memory map addresses (e.g. MMIO pointers)
  • Runtime mapped regions (virtual memory mapping?), created by the code itself
  • Runtime mapped regions done indirectly from the code (i.e. mmap - this might have a separate function for provenance? Or is this just handled by "pointer escaping" in the compiler currently?)

You mention specifically "for these pointers created from hard-coded addresses", would the latter two runtime-y cases also follow/benefit from this API?

If all three are relevant, I'd propose make_mapped or assume_mapped (or maybe make|assume_extern_mapped, as these all seem to derive from cases where we have memory that has been mapped (either statically or at runtime) into an address space outside of Rust's control.

@Lokathor
Copy link
Contributor

Lokathor commented Jun 28, 2022

"external address" seems like a good term, <*mut T>::from_extern(usize) seems maybe like a fine way to make them.

@RalfJung
Copy link
Member Author

Yeah I considered "extern", too -- but the term is awfully overloaded.

You mention specifically "for these pointers created from hard-coded addresses", would the latter two runtime-y cases also follow/benefit from this API?

This is specifically to replace current uses of int as *mut PTR. Functions like mmap already return a pointer and that one for all intents and purposes will have a fresh provenance -- they are like malloc, I think.

@jamesmunns
Copy link
Member

That makes sense for the third point!

My second item is more for implementing an operating system, where you might want to map a page, zero it, then pass it on to "userspace".

If you were implementing ASLR for example, you'd (more or less) be generating the base mapped address from an RNG, which would probably have come from some kind of integer rather than pointer. That being said, the OS itself probably sees the physical memory address the same as case one. Once the OS establishes the pointer, and passes it to userspace (where userspace is in case three), you're right that userspace doesn't have to re-establish provenance, I guess.

@Dirbaio
Copy link
Contributor

Dirbaio commented Jun 28, 2022

"foreign" maybe? so there's "program memory" and "foreign memory". The function could be ptr::from_foreign_addr().

@RalfJung
Copy link
Member Author

@jamesmunns from the kernel perspective this is memory outside of what Rust knows about, so if there are int2ptr casts there then using this function probably makes sense.

However now that if you e.g. implement a global allocator, then the memory return by that is considered to be "known to Rust" and thus must not be accessed with that "external"/"foreign" provenance.

@A1-Triard
Copy link

A1-Triard commented Jun 28, 2022

Functions like mmap already return a pointer and that one for all intents and purposes will have a fresh provenance -- they are like malloc, I think.

But what if I want to perform mmap syscall using asm? Looks like you need a way to create a new, unique provenance for a such case.

@Lokathor
Copy link
Contributor

Lokathor commented Jun 28, 2022

inline asm provenance creation rules should be the same as FFI provenance creation rules (whatever those are).

I don't know if that's fully decided yet, but in all other situations inline asm works "basically like FFI with a weird calling convention", and I see no reason to break from that convention.

@RalfJung
Copy link
Member Author

asm! block semantics are axiomatized anyway. You just have to be able to describe what happens in terms of the Abstract Machine state (in a way that is consistent with the actions of the asm! on the physical state); so that description can just state that it generates a fresh provenance since that is something the Abstract Machine can do.

@programmerjake
Copy link
Member

one other case to consider is where the program picks an address, and then memmaps to that address, using something like MAP_FIXED:

let addr: *mut u8 = 0x12340000 as *mut u8; // pick an arbitrary page-aligned address
let addr = mmap(addr as *mut c_void, 0x10000, PROT_READ | PROT_WRITE, MAP_FIXED | MAP_PRIVATE, fd, 0);

imho mmap here should return the same provenance as the addr argument even though that addr argument wasn't valid until the mmap call.

@RalfJung
Copy link
Member Author

imho mmap here should return the same provenance as the addr argument even though that addr argument wasn't valid until the mmap call.

That sounds pretty reasonable to me.
In particular you also must stay clear of any Rust-managed memory when doing this.

@algesten
Copy link
Contributor

In the embedded code I've encountered (STM32 mainly), this is the common pattern.

unsafe {
    // NOTE(unsafe) this reference will only be used for atomic writes with no side effects.
    let rcc = &(*RCC::ptr());

    // Enable clock.
    $GPIOX::enable(rcc);
    $GPIOX::reset(rcc);
}

There will be an underlying crate that is mostly generated from the MCU vendor's SVD-files (often with some patch set with correction on top). The maps each MCU peripheral to a specific memory address RCC::ptr() etc.

impl GPIOA {
    pub const PTR: *const gpioa::RegisterBlock = 0x4002_0000 as *const _;
    pub const fn ptr() -> *const gpioa::RegisterBlock {
        Self::PTR
    }
}

The pointer will be into some block, probably "Peripherals" below starting 0x4000_0000 (from reference manual).

image

For the proposed provenance API, are we saying that we will declare the entire Peripheral block on startup and then take additional offsets from inside that block for the individual pointers?

Given the current embedded landscape, I believe that having an API to declare provenance for an individual pointer would be less of an upheaval than going via a block.

(As an aside, I'm also not keen on the name alloc for this – not sure what I'd call it though)

@Lokathor
Copy link
Contributor

Lokathor commented Nov 21, 2022

Currently, when using as, the user doesn't have to worry about if the usize is previously a runtime exposed pointer or a hardware address, they just do the as cast. This has less chance of screwing up, because it's one less thing that matters. So personally I wouldn't want to use extern_addr or anything like that, I'd just wait longer for from_exposed_addr to stabilize.

EDIT: as one example: it would break all my tests in voladdress if I can't allocate a vec and work within the vec the same as I can use real hardware access.

@LunarLambda
Copy link

Personally I think "each calls returns a unique provenance of a given size" makes the most sense. It covers the most use cases with the least API surface area. Whole memory regions, splitting memory regions, "magical" allocators, etc.

I'm not sure how useful it is to have "The One Unknowable Everything-Else Provenance" (i.e. no size parameter, single provenance for all "external"/non-rust addresses). Feels like that's only a very slightly smaller hammer than from_exposed_addr, and the only use it serves is "being able to arbitrarily offset into all possible external memory", which I think is basically never done outside of asm, which should already be covered by the FFI-ish provenance?

On that note, what about memory regions that can be relocated at runtime? Is this something that can be at all expressed under strict provenance (other than for discarding and re-creating the existing provenances)? I thought of with_addr, but the documentation says it's equivalent to wrapping_offset, which in turn says the pointer must not leave the memory range of the allocation, which I think implicitly assumes that the allocation cannot move?

@RalfJung
Copy link
Member Author

RalfJung commented Nov 7, 2023

Allocated objects in Rust cannot move. So such relocations (in general) have to be modeled like realloc, and they generate a fresh provenance, where all old pointers now have a dangling provenance that must not be used any more.

@joboet
Copy link
Member

joboet commented Dec 19, 2023

Supposing that this function did take a size, what would the semantics of a pointer created with size zero be? Would calling offset(n) with $n \ne 0$ on it be undefined behaviour, or would it behave the same way as for a pointer returned by ptr::invalid (or whatever that function will be named in the future)?

@LunarLambda
Copy link

Doesn't Rust disallow memory allocations of size 0 (which is why Vec/Box/etc have special cases for ZSTs)?

I would assume the same to apply here

@joboet
Copy link
Member

joboet commented Dec 19, 2023

It does not.

@LunarLambda
Copy link

https://doc.rust-lang.org/nightly/std/alloc/trait.GlobalAlloc.html#safety-1 says it's UB to request allocations of size 0, which is different from creating an invalid pointer which is okay to be used for accesses of size 0

So my assumption is "Rust allocations cannot be zero-sized" would hold here?

@RalfJung
Copy link
Member Author

RalfJung commented Dec 19, 2023

Heap allocations of size zero cannot be created with our global allocator. However, stack variables and global static with size 0 can exist and those are allocations, too.

@programmerjake
Copy link
Member

heap allocations of size zero can be created with some implementations of malloc, e.g.glibc 2.38:
https://sourceware.org/git/?p=glibc.git;a=blob;f=malloc/malloc.c;h=e2f1a615a4fc7b036e188a28de9cfb132b2351df;hb=36f2487f13e3540be9ee0fb51876b1da72176d3f#l115

@Lokathor
Copy link
Contributor

If only some native allocators support it then rust overall must assume it's not supported.

@programmerjake
Copy link
Member

If only some native allocators support it then rust overall must assume it's not supported.

yes, except that Rust can't declare that no zero-sized heap allocations are possible, they just can't be done with Rust's standard methods of allocating memory.

@joboet
Copy link
Member

joboet commented Dec 19, 2023

Supposing that this function did take a size, what would the semantics of a pointer created with size zero be? Would calling offset(n) with n≠0 on it be undefined behaviour, or would it behave the same way as for a pointer returned by ptr::invalid (or whatever that function will be named in the future)?

I'm asking, because if so, it would make sense to implement ptr::invalid via this new function and avoid another intrinsic once strict-provenance is implemented using those.

@RalfJung
Copy link
Member Author

RalfJung commented Dec 20, 2023 via email

@RalfJung
Copy link
Member Author

RalfJung commented Oct 5, 2024

Okay, after we spent most of the discussion above clarifying various misunderstandings -- how do we stand wrt adding an explicit operation here? Yes, we could tell people to use with_exposed_provenance for MMIO addresses, but once #130350 lands, with_exposed_provenance will have extremely vague docs that guarantee very little. In contrast, I think we could provide a from_extern_addr function that is way more definite in what it guarantees. Something like:

/// Converts an address to a pointer. The address must be referring to "external" memory, i.e. memory that is not
/// already part of a Rust allocated object.
///
/// Pointers derived from the result of this function may not be used to access any memory that Rust "knows about"
/// (such as `static`s including `extern static`s, stack variables, or heap allocations).
/// In other words, the returned pointer will have a [provenance] that indicates that it is specifically only allowed to
/// access "external", non-Rust memory.
/// It is okay to call this function multiple times for the same memory; it will return the same pointer each time.
///
/// You may derive references
/// from the result of this function, but note that these references come with the usual Rust aliasing requirements:
/// mutable references must be unique, and shared references must be read-only (except for bytes inside `UnsafeCell`).
/// This means that when multiple calls to `from_extern_addr_mut` are used to obtain pointers to the same memory,
/// and one of these pointers is used to create a reference, it is Undefined Behavior to use any of the other pointers
/// in a way that conflicts with the requirements of this reference.
/// Furthermore, note that Rust references allow spurious memory accesses, so it is a bad idea to create references
/// to MMIO memory regions.
///
/// # Example
///
/// Using `from_extern_addr_mut` to access an MMIO register that is known to reside at a particular
/// offset within an MMIO block at a fixed address:
///
/// ```no_run
/// const MMIO_ADDR: usize = 0xaffe_0000;
/// const REGISTER_OFFSET: usize = 0xfe;
///
/// let ptr: *mut u8 = std::ptr::from_extern_addr_mut(MMIO_ADDR);
/// ptr.add(REGISTER_OFFSET).write_volatile(0x01);
/// ```
fn from_extern_addr_mut<T>(addr: usize) -> *mut T { ... }

I don't think we want this function to take a size, unless we are willing to say "any access outside that size is UB" -- which would make it harder for people to migrate from as casts to this method. The size will be defined implicitly by the pointers derived from the result of this function.

@rust-lang/opsem what do you think?

@DemiMarie
Copy link
Contributor

@RalfJung What if the allocation will back the stack, heap, or other memory locations Rust does know about? Normal code will never need to do that, but operating system code (such as kernels and threading libraries) absolutely will.

@Lokathor
Copy link
Contributor

Lokathor commented Oct 6, 2024

For first boot procedures on baremetal systems the answer is "you must do this in assembly, before entering Rust code". I suspect setting up a thread's stack and the global heap might have similar "don't let rust actually know you're doing it" rules.

@RalfJung
Copy link
Member Author

RalfJung commented Oct 6, 2024

@DemiMarie that memory needs to go through some sort of "phase transition", similar to memory returned by the global allocator, where it is removed from the "external memory allocation" it was in and instead becomes part of a newly born native Rust allocated object. That is beyond the scope of this issue.

To me, the main thing I was unsure about in these docs is whether we want to describe this function as "create a new allocated object from outside-Rust memory", or "give access to some outside-Rust memory". The former would imply that you can only call this function once for each memory range, which seems too limiting. But at some point a Rust allocated object is logically being created, and I feel it would be good to talk about that -- I am just not sure how, since that action is entirely axiomatic, i.e. we never actually tell the compiler about it, we just "imagine" that such objects exist and then they appear (assuming there is actually accessible memory there and they are disjoint from stack/heap/statics).

@Lokathor
Copy link
Contributor

Lokathor commented Oct 6, 2024

Well if (1) this really is for MMIO and so (2) the target is only accessed with volatile, then do we need to consider it a standard rust allocated object at all?

Within the llvm lang ref it's stated that a volatile access of an address isn't used as evidence that a normal access of the address is also allowed. Do we want to try and accept a logic of this sort into rust?

@RalfJung
Copy link
Member Author

RalfJung commented Oct 6, 2024

I don't think it's just MMIO. It's also relevant for cases where particular things are stored at particular addresses, e.g. the interrupt vector or other kinds of communication with the firmware in a freestanding environment. Not sure if some OSes don't also put particular information (such as the environment or args block) at particular addresses.

@ketsuban
Copy link
Contributor

ketsuban commented Oct 6, 2024

I feel like magic addresses for communicating with firmware are spiritually MMIO, even if they're actually stored in normal memory. The edge case is probably something like the memory address 0x3007FFC on the Game Boy Advance, which is kind of like an interrupt vector but not really - the firmware is sitting on the actual hardware interrupt vector, and 0x3007FFC is just an address in work RAM that the firmware happens to pick up and use to call user code when an interrupt fires.

@RalfJung
Copy link
Member Author

RalfJung commented Oct 6, 2024

I feel like magic addresses for communicating with firmware are spiritually MMIO,

One doesn't use volatile to talk to them, does one?

I would prefer to use MMIO only for memory that needs volatile. So no, I don't think we should call this "spiritually MMIO", that just causes confusion.

@bjorn3
Copy link
Member

bjorn3 commented Oct 6, 2024

Addresses that are used for communication with the firmware may need volatile if the firmware accesses them from asynchronous smm interrupts, right?

@ketsuban
Copy link
Contributor

ketsuban commented Oct 6, 2024

One doesn't use volatile to talk to them, does one?

I mean, I do. Rust eliding a subsequent access is probably fine when it's 0x3007FFC where normal usage is setting it once and then forgetting about it; less so when I'm trying to signal that I handled an interrupt by setting a bit in the value at 0x3007FF8.

@RalfJung
Copy link
Member Author

RalfJung commented Oct 6, 2024

Addresses that are used for communication with the firmware may need volatile if the firmware accesses them from asynchronous smm interrupts, right?

That sounds more like a usecase for atomics and atomic_signal_fence / compiler_fence to me?

@xmh0511
Copy link
Contributor

xmh0511 commented Oct 11, 2024

There also has a corner case, what if MMIO has a fixed address 0? According to https://doc.rust-lang.org/std/ptr/fn.null.html

This function is equivalent to zero-initializing the pointer: MaybeUninit::<*const T>::zeroed().assume_init(). The resulting pointer has the address 0.

Accessing (loading from or storing to) a place that is dangling or based on a misaligned pointer.

This still falls into UB domain

@programmerjake
Copy link
Member

There also has a corner case, what if MMIO has a fixed address 0?

you'd probably have to rely on inline assembly for that then.

@Lokathor
Copy link
Contributor

Yeah, asm doesn't have a specific restriction against using 0 as an address like Rust does. Bonus: you know that it's outside of Rust's address space and can't interfere with Rust.

Aside: extremely silly that they zero initialize the pointer that way in the docs.

@RalfJung
Copy link
Member Author

Accessing address 0 is a separate issue, see rust-lang/unsafe-code-guidelines#29. That's off-topic here since it has a bunch of extra complications.

linkmauve added a commit to linkmauve/luma that referenced this issue Dec 15, 2024
Now that the `exposed_provenance` and `strict_provenance` features have
been stabilized, but `with_exposed_provenance_mut()` isn’t const, and
`without_provenance_mut()` is UB to dereference.

`core::ptr`’s documentation says:
> Situations where a valid pointer must be created from just an address,
> such as baremetal code accessing a memory-mapped interface at a fixed
> address, are an open question on how to support. These situations will
> still be allowed, but we might require some kind of “I know what I’m
> doing” annotation to explain the situation to the compiler. It’s also
> possible they need no special attention at all, because they’re
> generally accessing memory outside the scope of “the abstract machine”,
> or already using “I know what I’m doing” annotations like “volatile”.

See rust-lang/rust#98593 for more information
about future development around converting MMIO addresses to pointers.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
A-strict-provenance Area: Strict provenance for raw pointers T-lang Relevant to the language team, which will review and decide on the PR/issue. T-libs-api Relevant to the library API team, which will review and decide on the PR/issue. WG-embedded Working group: Embedded systems
Projects
None yet
Development

No branches or pull requests