Skip to content

Commit 3c131a3

Browse files
authored
Rollup merge of rust-lang#129490 - randomPoison:trusty-os-support, r=Urgau
Add Trusty OS as tier 3 target This PR adds support for the [Trusty secure operating system](https://source.android.com/docs/security/features/trusty) as a Tier 3 supported target. This upstreams [the patch that we have been using](https://cs.android.com/android/platform/superproject/+/master:external/rust/crates/libc/patches/trusty.patch;l=1;drc=122e586e93a534160230dc10ae3474cf31dd8f7f) internally. This also revives rust-lang#103895 which was closed due to inactivity, and is being resumed now that time allows. And MCP has already been done for adding this platform: rust-lang/compiler-team/issues/568 # Target Tier Policy Acknowledgements > A tier 3 target must have a designated developer or developers (the "target maintainers") on record to be CCed when issues arise regarding the target. (The mechanism to track and CC such developers may evolve over time.) - Nicole LeGare (``@randomPoison)`` - Stephen Crane (``@rinon)`` - As a fallback [email protected] can be contacted > Targets must use naming consistent with any existing targets; for instance, a target for the same CPU or OS as an existing Rust target should use the same name for that CPU or OS. Targets should normally use the same names and naming conventions as used elsewhere in the broader ecosystem beyond Rust (such as in other toolchains), unless they have a very good reason to diverge. Changing the name of a target can be highly disruptive, especially once the target reaches a higher tier, so getting the name right is important even for a tier 3 target. The two new Trusty targets, `aarch64-unknown-trusty` and `armv7-unknown-trusty` both follow the existing naming convention for similar targets. > Target names should not introduce undue confusion or ambiguity unless absolutely necessary to maintain ecosystem compatibility. For example, if the name of the target makes people extremely likely to form incorrect beliefs about what it targets, the name should be changed or augmented to disambiguate it. 👍 > Tier 3 targets may have unusual requirements to build or use, but must not create legal issues or impose onerous legal terms for the Rust project or for Rust developers or users. There are no known legal issues or license incompatibilities. > Neither this policy nor any decisions made regarding targets shall create any binding agreement or estoppel by any party. If any member of an approving Rust team serves as one of the maintainers of a target, or has any legal or employment requirement (explicit or implicit) that might affect their decisions regarding a target, they must recuse themselves from any approval decisions regarding the target's tier status, though they may otherwise participate in discussions. 👍 > Tier 3 targets should attempt to implement as much of the standard libraries as possible and appropriate (core for most targets, alloc for targets that can support dynamic memory allocation, std for targets with an operating system or equivalent layer of system-provided functionality), but may leave some code unimplemented (either unavailable or stubbed out as appropriate), whether because the target makes it impossible to implement or challenging to implement. The authors of pull requests are not obligated to avoid calling any portions of the standard library on the basis of a tier 3 target not implementing those portions. This PR only adds the targets for the platform. `std` support will be added once platform support is added to the libc crate, which depends on the language targets being added to rustc. > The target must provide documentation for the Rust community explaining how to build for the target, using cross-compilation if possible. If the target supports running binaries, or running tests (even if they do not pass), the documentation must explain how to run such binaries or tests for the target, using emulation if possible or dedicated hardware if necessary. 👍 > Tier 3 targets must not impose burden on the authors of pull requests, or other developers in the community, to maintain the target. In particular, do not post comments (automated or manual) on a PR that derail or suggest a block on the PR based on a tier 3 target. Do not send automated messages or notifications (via any medium, including via ``@)`` to a PR author or others involved with a PR regarding a tier 3 target, unless they have opted into such messages. 👍 > Patches adding or updating tier 3 targets must not break any existing tier 2 or tier 1 target, and must not knowingly break another tier 3 target without approval of either the compiler team or the maintainers of the other tier 3 target. 👍 > Tier 3 targets must be able to produce assembly using at least one of rustc's supported backends from any host target. (Having support in a fork of the backend is not sufficient, it must be upstream.) 👍
2 parents 42cd3c6 + 5d0ce4c commit 3c131a3

File tree

8 files changed

+136
-2
lines changed

8 files changed

+136
-2
lines changed

compiler/rustc_target/src/spec/mod.rs

+3
Original file line numberDiff line numberDiff line change
@@ -1750,6 +1750,9 @@ supported_targets! {
17501750

17511751
("x86_64-unikraft-linux-musl", x86_64_unikraft_linux_musl),
17521752

1753+
("armv7-unknown-trusty", armv7_unknown_trusty),
1754+
("aarch64-unknown-trusty", aarch64_unknown_trusty),
1755+
17531756
("riscv32i-unknown-none-elf", riscv32i_unknown_none_elf),
17541757
("riscv32im-risc0-zkvm-elf", riscv32im_risc0_zkvm_elf),
17551758
("riscv32im-unknown-none-elf", riscv32im_unknown_none_elf),
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
// Trusty OS target for AArch64.
2+
3+
use crate::spec::{LinkSelfContainedDefault, PanicStrategy, RelroLevel, Target, TargetOptions};
4+
5+
pub fn target() -> Target {
6+
Target {
7+
llvm_target: "aarch64-unknown-unknown-musl".into(),
8+
metadata: crate::spec::TargetMetadata {
9+
description: Some("ARM64 Trusty".into()),
10+
tier: Some(2),
11+
host_tools: Some(false),
12+
std: Some(false),
13+
},
14+
pointer_width: 64,
15+
data_layout: "e-m:e-i8:8:32-i16:16:32-i64:64-i128:128-n32:64-S128-Fn32".into(),
16+
arch: "aarch64".into(),
17+
options: TargetOptions {
18+
features: "+neon,+fp-armv8,+reserve-x18".into(),
19+
executables: true,
20+
max_atomic_width: Some(128),
21+
panic_strategy: PanicStrategy::Abort,
22+
os: "trusty".into(),
23+
position_independent_executables: true,
24+
static_position_independent_executables: true,
25+
crt_static_default: true,
26+
crt_static_respected: true,
27+
dynamic_linking: false,
28+
link_self_contained: LinkSelfContainedDefault::InferredForMusl,
29+
relro_level: RelroLevel::Full,
30+
mcount: "\u{1}_mcount".into(),
31+
..Default::default()
32+
},
33+
}
34+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
use crate::spec::{LinkSelfContainedDefault, PanicStrategy, RelroLevel, Target, TargetOptions};
2+
3+
pub fn target() -> Target {
4+
Target {
5+
// It's important we use "gnueabi" and not "musleabi" here. LLVM uses it
6+
// to determine the calling convention and float ABI, and it doesn't
7+
// support the "musleabi" value.
8+
llvm_target: "armv7-unknown-unknown-gnueabi".into(),
9+
metadata: crate::spec::TargetMetadata {
10+
description: Some("Armv7-A Trusty".into()),
11+
tier: Some(2),
12+
host_tools: Some(false),
13+
std: Some(false),
14+
},
15+
pointer_width: 32,
16+
data_layout: "e-m:e-p:32:32-Fi8-i64:64-v128:64:128-a:0:32-n32-S64".into(),
17+
arch: "arm".into(),
18+
options: TargetOptions {
19+
abi: "eabi".into(),
20+
features: "+v7,+thumb2,+soft-float,-neon".into(),
21+
max_atomic_width: Some(64),
22+
mcount: "\u{1}mcount".into(),
23+
os: "trusty".into(),
24+
link_self_contained: LinkSelfContainedDefault::InferredForMusl,
25+
dynamic_linking: false,
26+
executables: true,
27+
crt_static_default: true,
28+
crt_static_respected: true,
29+
relro_level: RelroLevel::Full,
30+
panic_strategy: PanicStrategy::Abort,
31+
position_independent_executables: true,
32+
static_position_independent_executables: true,
33+
34+
..Default::default()
35+
},
36+
}
37+
}

src/doc/rustc/src/SUMMARY.md

+1
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@
4949
- [aarch64-unknown-teeos](platform-support/aarch64-unknown-teeos.md)
5050
- [\*-espidf](platform-support/esp-idf.md)
5151
- [\*-unknown-fuchsia](platform-support/fuchsia.md)
52+
- [\*-unknown-trusty](platform-support/trusty.md)
5253
- [\*-kmc-solid_\*](platform-support/kmc-solid.md)
5354
- [csky-unknown-linux-gnuabiv2\*](platform-support/csky-unknown-linux-gnuabiv2.md)
5455
- [hexagon-unknown-linux-musl](platform-support/hexagon-unknown-linux-musl.md)

src/doc/rustc/src/platform-support.md

+2
Original file line numberDiff line numberDiff line change
@@ -264,6 +264,7 @@ target | std | host | notes
264264
[`aarch64-unknown-netbsd`](platform-support/netbsd.md) | ✓ | ✓ | ARM64 NetBSD
265265
[`aarch64-unknown-openbsd`](platform-support/openbsd.md) | ✓ | ✓ | ARM64 OpenBSD
266266
[`aarch64-unknown-redox`](platform-support/redox.md) | ✓ | | ARM64 Redox OS
267+
[`aarch64-unknown-trusty`](platform-support/trusty.md) | ? | |
267268
`aarch64-uwp-windows-msvc` | ✓ | |
268269
[`aarch64-wrs-vxworks`](platform-support/vxworks.md) | ✓ | | ARM64 VxWorks OS
269270
`aarch64_be-unknown-linux-gnu_ilp32` | ✓ | ✓ | ARM64 Linux (big-endian, ILP32 ABI)
@@ -283,6 +284,7 @@ target | std | host | notes
283284
[`armv7-unknown-linux-uclibceabihf`](platform-support/armv7-unknown-linux-uclibceabihf.md) | ✓ | ? | Armv7-A Linux with uClibc, hardfloat
284285
`armv7-unknown-freebsd` | ✓ | ✓ | Armv7-A FreeBSD
285286
[`armv7-unknown-netbsd-eabihf`](platform-support/netbsd.md) | ✓ | ✓ | Armv7-A NetBSD w/hard-float
287+
[`armv7-unknown-trusty`](platform-support/trusty.md) | ? | |
286288
[`armv7-wrs-vxworks-eabihf`](platform-support/vxworks.md) | ✓ | | Armv7-A for VxWorks
287289
[`armv7a-kmc-solid_asp3-eabi`](platform-support/kmc-solid.md) | ✓ | | ARM SOLID with TOPPERS/ASP3
288290
[`armv7a-kmc-solid_asp3-eabihf`](platform-support/kmc-solid.md) | ✓ | | ARM SOLID with TOPPERS/ASP3, hardfloat
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
# `aarch64-unknown-trusty` and `armv7-unknown-trusty`
2+
3+
**Tier: 3**
4+
5+
[Trusty] is a secure Operating System that provides a Trusted Execution
6+
Environment (TEE) for Android.
7+
8+
## Target maintainers
9+
10+
- Nicole LeGare (@randomPoison)
11+
- Stephen Crane (@rinon)
12+
- As a fallback [email protected] can be contacted
13+
14+
## Requirements
15+
16+
These targets are cross-compiled. They have no special requirements for the host.
17+
18+
Support for the standard library is work-in-progress. It is expected that
19+
they will support alloc with the default allocator, and partially support std.
20+
21+
Trusty uses the ELF file format.
22+
23+
## Building the target
24+
25+
The targets can be built by enabling them for a `rustc` build, for example:
26+
27+
```toml
28+
[build]
29+
build-stage = 1
30+
target = ["aarch64-unknown-trusty", "armv7-unknown-trusty"]
31+
```
32+
33+
## Building Rust programs
34+
35+
There is currently no supported way to build a Trusty app with Cargo. You can
36+
follow the [Trusty build instructions] to build the Trusty kernel along with any
37+
Rust apps that are setup in the project.
38+
39+
## Testing
40+
41+
See the [Trusty build instructions] for information on how to build Rust code
42+
within the main Trusty project. The main project also includes infrastructure
43+
for testing Rust applications within a QEMU emulator.
44+
45+
## Cross-compilation toolchains and C code
46+
47+
See the [Trusty build instructions] for information on how C code is built
48+
within Trusty.
49+
50+
[Trusty]: https://source.android.com/docs/security/features/trusty
51+
[Trusty build instructions]: https://source.android.com/docs/security/features/trusty/download-and-build

tests/assembly/targets/targets-elf.rs

+6
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,9 @@
6666
//@ revisions: aarch64_unknown_teeos
6767
//@ [aarch64_unknown_teeos] compile-flags: --target aarch64-unknown-teeos
6868
//@ [aarch64_unknown_teeos] needs-llvm-components: aarch64
69+
//@ revisions: aarch64_unknown_trusty
70+
//@ [aarch64_unknown_trusty] compile-flags: --target aarch64-unknown-trusty
71+
//@ [aarch64_unknown_trusty] needs-llvm-components: aarch64
6972
//@ revisions: aarch64_wrs_vxworks
7073
//@ [aarch64_wrs_vxworks] compile-flags: --target aarch64-wrs-vxworks
7174
//@ [aarch64_wrs_vxworks] needs-llvm-components: aarch64
@@ -153,6 +156,9 @@
153156
//@ revisions: armv7_unknown_netbsd_eabihf
154157
//@ [armv7_unknown_netbsd_eabihf] compile-flags: --target armv7-unknown-netbsd-eabihf
155158
//@ [armv7_unknown_netbsd_eabihf] needs-llvm-components: arm
159+
//@ revisions: armv7_unknown_trusty
160+
//@ [armv7_unknown_trusty] compile-flags: --target armv7-unknown-trusty
161+
//@ [armv7_unknown_trusty] needs-llvm-components: arm
156162
//@ revisions: armv7_wrs_vxworks_eabihf
157163
//@ [armv7_wrs_vxworks_eabihf] compile-flags: --target armv7-wrs-vxworks-eabihf
158164
//@ [armv7_wrs_vxworks_eabihf] needs-llvm-components: arm

tests/ui/check-cfg/well-known-values.stderr

+2-2
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,7 @@ warning: unexpected `cfg` condition value: `_UNEXPECTED_VALUE`
201201
LL | target_os = "_UNEXPECTED_VALUE",
202202
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
203203
|
204-
= note: expected values for `target_os` are: `aix`, `android`, `cuda`, `dragonfly`, `emscripten`, `espidf`, `freebsd`, `fuchsia`, `haiku`, `hermit`, `horizon`, `hurd`, `illumos`, `ios`, `l4re`, `linux`, `macos`, `netbsd`, `none`, `nto`, `nuttx`, `openbsd`, `psp`, `redox`, `solaris`, `solid_asp3`, `teeos`, `tvos`, `uefi`, `unknown`, `visionos`, `vita`, `vxworks`, `wasi`, `watchos`, `windows`, `xous`, and `zkvm`
204+
= note: expected values for `target_os` are: `aix`, `android`, `cuda`, `dragonfly`, `emscripten`, `espidf`, `freebsd`, `fuchsia`, `haiku`, `hermit`, `horizon`, `hurd`, `illumos`, `ios`, `l4re`, `linux`, `macos`, `netbsd`, `none`, `nto`, `nuttx`, `openbsd`, `psp`, `redox`, `solaris`, `solid_asp3`, `teeos`, `trusty`, `tvos`, `uefi`, `unknown`, `visionos`, `vita`, `vxworks`, `wasi`, `watchos`, `windows`, `xous`, and `zkvm`
205205
= note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg.html> for more information about checking conditional configuration
206206

207207
warning: unexpected `cfg` condition value: `_UNEXPECTED_VALUE`
@@ -285,7 +285,7 @@ LL | #[cfg(target_os = "linuz")] // testing that we suggest `linux`
285285
| |
286286
| help: there is a expected value with a similar name: `"linux"`
287287
|
288-
= note: expected values for `target_os` are: `aix`, `android`, `cuda`, `dragonfly`, `emscripten`, `espidf`, `freebsd`, `fuchsia`, `haiku`, `hermit`, `horizon`, `hurd`, `illumos`, `ios`, `l4re`, `linux`, `macos`, `netbsd`, `none`, `nto`, `nuttx`, `openbsd`, `psp`, `redox`, `solaris`, `solid_asp3`, `teeos`, `tvos`, `uefi`, `unknown`, `visionos`, `vita`, `vxworks`, `wasi`, `watchos`, `windows`, `xous`, and `zkvm`
288+
= note: expected values for `target_os` are: `aix`, `android`, `cuda`, `dragonfly`, `emscripten`, `espidf`, `freebsd`, `fuchsia`, `haiku`, `hermit`, `horizon`, `hurd`, `illumos`, `ios`, `l4re`, `linux`, `macos`, `netbsd`, `none`, `nto`, `nuttx`, `openbsd`, `psp`, `redox`, `solaris`, `solid_asp3`, `teeos`, `trusty`, `tvos`, `uefi`, `unknown`, `visionos`, `vita`, `vxworks`, `wasi`, `watchos`, `windows`, `xous`, and `zkvm`
289289
= note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg.html> for more information about checking conditional configuration
290290

291291
warning: 29 warnings emitted

0 commit comments

Comments
 (0)