diff --git a/.gitignore b/.gitignore
index 8bc31d43a2d39b57699e85de873a64b479ab7556..29204d6567b48016c04211c07f63c1e25313ff02 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,5 +1,6 @@
 **/*.rs.bk
 *.org
+.#*
 .gdb_history
 Cargo.lock
 target/
diff --git a/Cargo.toml b/Cargo.toml
index 37db8565e5758e0ca98f3a451e97ee41e76aa8b8..05f90ab0009674ab5910fb36ea8d26dd98a97c24 100644
--- a/Cargo.toml
+++ b/Cargo.toml
@@ -15,11 +15,13 @@ version = "0.3.0"
 [dependencies]
 cortex-m = { git = "https://github.com/japaric/cortex-m" }
 untagged-option = "0.1.1"
-rtfm-core = "0.1.0"
+# rtfm-core = "0.2.0"
+rtfm-core = { git = "https://github.com/japaric/rtfm-core" }
 cortex-m-rtfm-macros = { path = "macros" }
 
 [target.'cfg(target_arch = "x86_64")'.dev-dependencies]
-compiletest_rs = "0.3.3"
+# compiletest_rs = "0.3.4"
+compiletest_rs = { git = "https://github.com/dwrensha/compiletest-rs", branch = "rustup" }
 
 [dev-dependencies.cortex-m-rt]
 features = ["abort-on-panic"]
diff --git a/examples/custom-type.rs b/examples/custom-type.rs
new file mode 100644
index 0000000000000000000000000000000000000000..79d6cc461ce01941dcf0518d328f092ece1be0c5
--- /dev/null
+++ b/examples/custom-type.rs
@@ -0,0 +1,50 @@
+#![deny(unsafe_code)]
+#![deny(warnings)]
+#![feature(proc_macro)]
+#![no_std]
+
+extern crate cortex_m_rtfm as rtfm;
+extern crate stm32f103xx;
+
+use rtfm::{app, Threshold};
+
+pub struct Foo;
+
+app! {
+    device: stm32f103xx,
+
+    resources: {
+        static CO_OWNED: Foo = Foo;
+        static ON: Foo = Foo;
+        static OWNED: Foo = Foo;
+        static SHARED: Foo = Foo;
+    },
+
+    idle: {
+        resources: [OWNED, SHARED],
+    },
+
+    tasks: {
+        SYS_TICK: {
+            path: sys_tick,
+            resources: [CO_OWNED, ON, SHARED],
+        },
+
+        TIM2: {
+            enabled: false,
+            path: tim2,
+            priority: 1,
+            resources: [CO_OWNED],
+        },
+    },
+}
+
+fn init(_p: ::init::Peripherals, _r: ::init::Resources) {}
+
+fn idle(_t: &mut Threshold, _r: ::idle::Resources) -> ! {
+    loop {}
+}
+
+fn sys_tick(_t: &mut Threshold, _r: SYS_TICK::Resources) {}
+
+fn tim2(_t: &mut Threshold, _r: TIM2::Resources) {}
diff --git a/examples/full-syntax.rs b/examples/full-syntax.rs
index a8f79a7210d3a0e022a44593f049c71cede52762..5b27412265a32d86d4a00d95ce8a2dd73a0fdbe2 100644
--- a/examples/full-syntax.rs
+++ b/examples/full-syntax.rs
@@ -63,22 +63,22 @@ mod main {
             *r.OWNED != *r.OWNED;
 
             if *r.OWNED {
-                if r.SHARED.claim(t, |shared, _| **shared) {
+                if r.SHARED.claim(t, |shared, _| *shared) {
                     rtfm::wfi();
                 }
             } else {
-                r.SHARED.claim_mut(t, |shared, _| **shared = !**shared);
+                r.SHARED.claim_mut(t, |shared, _| *shared = !*shared);
             }
         }
     }
 }
 
-fn sys_tick(_t: &mut Threshold, r: SYS_TICK::Resources) {
-    **r.ON = !**r.ON;
+fn sys_tick(_t: &mut Threshold, mut r: SYS_TICK::Resources) {
+    *r.ON = !*r.ON;
 
-    **r.CO_OWNED += 1;
+    *r.CO_OWNED += 1;
 }
 
-fn tim2(_t: &mut Threshold, r: TIM2::Resources) {
-    **r.CO_OWNED += 1;
+fn tim2(_t: &mut Threshold, mut r: TIM2::Resources) {
+    *r.CO_OWNED += 1;
 }
diff --git a/examples/generics.rs b/examples/generics.rs
index 7cf9257b32db041257a9d02ec5c70f38a953c229..ca7726d0b7735f599319cb4fadca168ac1fc7db9 100644
--- a/examples/generics.rs
+++ b/examples/generics.rs
@@ -70,5 +70,5 @@ fn exti0(t: &mut Threshold, r: EXTI0::Resources) {
 
 // This task has direct access to the resources
 fn exti1(t: &mut Threshold, r: EXTI1::Resources) {
-    work(t, r.GPIOA, r.SPI1);
+    work(t, &r.GPIOA, &r.SPI1);
 }
diff --git a/examples/late-resources.rs b/examples/late-resources.rs
index d42431c28a403b3d2e4dbfe5587bf35c7cc04bbb..07c321f6731aa195c21d3298482b6348e42925ae 100644
--- a/examples/late-resources.rs
+++ b/examples/late-resources.rs
@@ -1,5 +1,4 @@
 //! Demonstrates initialization of resources in `init`.
-
 #![deny(unsafe_code)]
 #![deny(warnings)]
 #![feature(proc_macro)]
diff --git a/examples/one-task.rs b/examples/one-task.rs
index 2e7767689191dd44e29975a71026a0e3906049f1..07def59ba7bbae917a72271ef8365069a2d8fa8a 100644
--- a/examples/one-task.rs
+++ b/examples/one-task.rs
@@ -77,11 +77,11 @@ fn idle() -> ! {
 // `r` is the set of resources this task has access to. `SYS_TICK::Resources`
 // has one field per resource declared in `app!`.
 #[allow(unsafe_code)]
-fn sys_tick(_t: &mut Threshold, r: SYS_TICK::Resources) {
+fn sys_tick(_t: &mut Threshold, mut r: SYS_TICK::Resources) {
     // toggle state
-    **r.ON = !**r.ON;
+    *r.ON = !*r.ON;
 
-    if **r.ON {
+    if *r.ON {
         // set the pin PC13 high
         // NOTE(unsafe) atomic write to a stateless register
         unsafe {
diff --git a/examples/preemption.rs b/examples/preemption.rs
index 98dde8d1f3992c657f5dbef11af351eb6fef701c..8e501887c3fef680e594e062d34e326986e5afe6 100644
--- a/examples/preemption.rs
+++ b/examples/preemption.rs
@@ -42,12 +42,12 @@ fn idle() -> ! {
     }
 }
 
-fn sys_tick(_t: &mut Threshold, r: SYS_TICK::Resources) {
+fn sys_tick(_t: &mut Threshold, mut r: SYS_TICK::Resources) {
     // ..
 
     // This task can't be preempted by `tim2` so it has direct access to the
     // resource data
-    **r.COUNTER += 1;
+    *r.COUNTER += 1;
 
     // ..
 }
@@ -61,7 +61,7 @@ fn tim2(t: &mut Threshold, mut r: TIM2::Resources) {
     // lead to undefined behavior.
     r.COUNTER.claim_mut(t, |counter, _t| {
         // `claim_mut` creates a critical section
-        **counter += 1;
+        *counter += 1;
     });
 
     // ..
diff --git a/examples/safe-static-mut-ref.rs b/examples/safe-static-mut-ref.rs
new file mode 100644
index 0000000000000000000000000000000000000000..bb87212281b0a06649e7c7874681aef156e35a0f
--- /dev/null
+++ b/examples/safe-static-mut-ref.rs
@@ -0,0 +1,32 @@
+//! Safe creation of `&'static mut` references
+#![deny(unsafe_code)]
+#![deny(warnings)]
+#![feature(proc_macro)]
+#![no_std]
+
+extern crate cortex_m_rtfm as rtfm;
+extern crate stm32f103xx;
+
+use rtfm::app;
+
+app! {
+    device: stm32f103xx,
+
+    resources: {
+        static BUFFER: [u8; 16] = [0; 16];
+    },
+
+    init: {
+        resources: [BUFFER],
+    },
+}
+
+fn init(_p: init::Peripherals, r: init::Resources) {
+    let _buf: &'static mut [u8] = r.BUFFER;
+}
+
+fn idle() -> ! {
+    loop {
+        rtfm::wfi();
+    }
+}
diff --git a/examples/two-tasks.rs b/examples/two-tasks.rs
index df6e784a97974956c3a1ba36e40ccf15cf63a5ed..4f567f0cead3337f9306f38432b100b79cb05d06 100644
--- a/examples/two-tasks.rs
+++ b/examples/two-tasks.rs
@@ -42,18 +42,18 @@ fn idle() -> ! {
 
 // As both tasks are running at the same priority one can't preempt the other.
 // Thus both tasks have direct access to the resource
-fn sys_tick(_t: &mut Threshold, r: SYS_TICK::Resources) {
+fn sys_tick(_t: &mut Threshold, mut r: SYS_TICK::Resources) {
     // ..
 
-    **r.COUNTER += 1;
+    *r.COUNTER += 1;
 
     // ..
 }
 
-fn tim2(_t: &mut Threshold, r: TIM2::Resources) {
+fn tim2(_t: &mut Threshold, mut r: TIM2::Resources) {
     // ..
 
-    **r.COUNTER += 1;
+    *r.COUNTER += 1;
 
     // ..
 }
diff --git a/macros/Cargo.toml b/macros/Cargo.toml
index d51cbc26292ad4e2960d055253e7f9e6de94b3ce..27bd1f56a11ae221d37717c4798f57f989dd1441 100644
--- a/macros/Cargo.toml
+++ b/macros/Cargo.toml
@@ -12,7 +12,8 @@ version = "0.2.1"
 [dependencies]
 error-chain = "0.10.0"
 quote = "0.3.15"
-rtfm-syntax = "0.2.0"
+# rtfm-syntax = "0.2.0"
+rtfm-syntax = { git = "https://github.com/japaric/rtfm-syntax" }
 syn = "0.11.11"
 
 [lib]
diff --git a/macros/src/analyze.rs b/macros/src/analyze.rs
index 0fc125dabae0a4b4072b14702d7ab8cd2034bebe..65d98e69606f89c1bd3c3e6957b995509d799cb1 100644
--- a/macros/src/analyze.rs
+++ b/macros/src/analyze.rs
@@ -17,6 +17,13 @@ pub enum Ownership {
 }
 
 impl Ownership {
+    pub fn ceiling(&self) -> u8 {
+        match *self {
+            Ownership::Owned { priority } => priority,
+            Ownership::Shared { ceiling } => ceiling,
+        }
+    }
+
     pub fn is_owned(&self) -> bool {
         match *self {
             Ownership::Owned { .. } => true,
diff --git a/macros/src/check.rs b/macros/src/check.rs
index 63cac1fa5eda47cf63199be704db8d8df9b5b800..f6fd9cc60923570a11a3be8af7e55e3fe8b3cac3 100644
--- a/macros/src/check.rs
+++ b/macros/src/check.rs
@@ -77,7 +77,38 @@ pub fn app(app: check::App) -> Result<App> {
 }
 
 fn resources(app: &App) -> Result<()> {
+    for name in &app.init.resources {
+        if let Some(resource) = app.resources.get(name) {
+            ensure!(
+                resource.expr.is_some(),
+                "resource `{}`, allocated to `init`, must have an initial value",
+                name
+            );
+        } else {
+            bail!(
+                "resource `{}`, allocated to `init`, must be a data resource",
+                name
+            );
+        }
+
+        ensure!(
+            !app.idle.resources.contains(name),
+            "resources assigned to `init` can't be shared with `idle`"
+        );
+
+        ensure!(
+            app.tasks
+                .iter()
+                .all(|(_, task)| !task.resources.contains(name)),
+            "resources assigned to `init` can't be shared with tasks"
+        )
+    }
+
     for resource in app.resources.keys() {
+        if app.init.resources.contains(resource) {
+            continue;
+        }
+
         if app.idle.resources.contains(resource) {
             continue;
         }
diff --git a/macros/src/trans.rs b/macros/src/trans.rs
index 9bf1e2a9dc40b9272b67163ffc089b38bada67c6..b50c73df29149844057b7a8beeb0c8ec9b05ef98 100644
--- a/macros/src/trans.rs
+++ b/macros/src/trans.rs
@@ -1,7 +1,7 @@
 use quote::{Ident, Tokens};
 use syn::{Lit, StrStyle};
 
-use analyze::{Ownership, Ownerships};
+use analyze::Ownerships;
 use check::{App, Kind};
 
 fn krate() -> Ident {
@@ -81,11 +81,11 @@ fn idle(app: &App, ownerships: &Ownerships, main: &mut Vec<Tokens>, root: &mut V
                 });
             } else {
                 rfields.push(quote! {
-                    pub #name: #super_::_resource::#name,
+                    pub #name: ::idle::#name,
                 });
 
                 rexprs.push(quote! {
-                    #name: #super_::_resource::#name::new(),
+                    #name: ::idle::#name { _0: core::marker::PhantomData },
                 });
             }
         }
@@ -126,6 +126,85 @@ fn idle(app: &App, ownerships: &Ownerships, main: &mut Vec<Tokens>, root: &mut V
         exprs.push(quote!(unsafe { idle::Resources::new() }));
     }
 
+    let device = &app.device;
+    for name in &app.idle.resources {
+        let ceiling = ownerships[name].ceiling();
+
+        // owned resource
+        if ceiling == 0 {
+            continue
+        }
+
+        let _name = Ident::new(format!("_{}", name.as_ref()));
+        let resource = app.resources
+            .get(name)
+            .expect(&format!("BUG: resource {} has no definition", name));
+
+        let ty = &resource.ty;
+        let _static = if resource.expr.is_some() {
+            quote!(#_name)
+        } else {
+            quote!(#_name.some)
+        };
+
+        mod_items.push(quote! {
+            #[allow(non_camel_case_types)]
+            pub struct #name { _0: core::marker::PhantomData<*const ()> }
+        });
+
+        root.push(quote! {
+            #[allow(unsafe_code)]
+            unsafe impl #krate::Resource for idle::#name {
+                type Data = #ty;
+
+                fn borrow<'cs>(&'cs self, t: &'cs Threshold) -> &'cs Self::Data {
+                    assert!(t.value() >= #ceiling);
+
+                    unsafe { &#_static }
+                }
+
+                fn borrow_mut<'cs>(
+                    &'cs mut self,
+                    t: &'cs Threshold,
+                ) -> &'cs mut Self::Data {
+                    assert!(t.value() >= #ceiling);
+
+                    unsafe { &mut #_static }
+                }
+
+                fn claim<R, F>(&self, t: &mut Threshold, f: F) -> R
+                where
+                    F: FnOnce(&Self::Data, &mut Threshold) -> R
+                {
+                    unsafe {
+                        #krate::claim(
+                            &#_static,
+                            #ceiling,
+                            #device::NVIC_PRIO_BITS,
+                            t,
+                            f,
+                        )
+                    }
+                }
+
+                fn claim_mut<R, F>(&mut self, t: &mut Threshold, f: F) -> R
+                where
+                    F: FnOnce(&mut Self::Data, &mut Threshold) -> R
+                {
+                    unsafe {
+                        #krate::claim(
+                            &mut #_static,
+                            #ceiling,
+                            #device::NVIC_PRIO_BITS,
+                            t,
+                            f,
+                        )
+                    }
+                }
+            }
+        });
+    }
+
     if !mod_items.is_empty() {
         root.push(quote! {
             #[allow(unsafe_code)]
@@ -170,18 +249,30 @@ fn init(app: &App, main: &mut Vec<Tokens>, root: &mut Vec<Tokens>) {
         let mut rexprs = vec![];
 
         for (name, resource) in init_resources {
-            let _name = Ident::new(format!("_{}", name.as_ref()));
-            lifetime = Some(quote!('a));
-
             let ty = &resource.ty;
 
-            fields.push(quote! {
-                pub #name: &'a mut #krate::Static<#ty>,
-            });
+            if app.init.resources.contains(name) {
+                fields.push(quote! {
+                    pub #name: &'static mut #ty,
+                });
 
-            rexprs.push(quote! {
-                #name: ::#krate::Static::ref_mut(&mut ::#_name),
-            });
+                let expr = &resource.expr;
+                rexprs.push(quote!(#name: {
+                    static mut #name: #ty = #expr;
+                    &mut #name
+                },));
+            } else {
+                let _name = Ident::new(format!("_{}", name.as_ref()));
+                lifetime = Some(quote!('a));
+
+                fields.push(quote! {
+                    pub #name: &'a mut #ty,
+                });
+
+                rexprs.push(quote! {
+                    #name: &mut ::#_name,
+                });
+            }
         }
 
         root.push(quote! {
@@ -323,234 +414,153 @@ fn init(app: &App, main: &mut Vec<Tokens>, root: &mut Vec<Tokens>) {
 
 fn resources(app: &App, ownerships: &Ownerships, root: &mut Vec<Tokens>) {
     let krate = krate();
-    let device = &app.device;
 
-    let mut items = vec![];
-    let mut impls = vec![];
-    for (name, ownership) in ownerships {
+    for name in ownerships.keys() {
         let _name = Ident::new(format!("_{}", name.as_ref()));
 
-        if let Some(resource) = app.resources.get(name) {
-            // Declare the static that holds the resource
-            let expr = &resource.expr;
-            let ty = &resource.ty;
+        // Declare the static that holds the resource
+        let resource = app.resources
+            .get(name)
+            .expect(&format!("BUG: resource {} has no definition", name));
+
+        let expr = &resource.expr;
+        let ty = &resource.ty;
+
+        root.push(match *expr {
+            Some(ref expr) => quote! {
+                static mut #_name: #ty = #expr;
+            },
+            None => quote! {
+                // Resource initialized in `init`
+                static mut #_name: #krate::UntaggedOption<#ty> =
+                    #krate::UntaggedOption { none: () };
+            },
+        });
+    }
+}
 
-            root.push(match *expr {
-                Some(ref expr) => quote! {
-                    static mut #_name: #ty = #expr;
-                },
-                None => quote! {
-                    // Resource initialized in `init`
-                    static mut #_name: #krate::UntaggedOption<#ty> = #krate::UntaggedOption { none: () };
-                },
-            });
-        }
+fn tasks(app: &App, ownerships: &Ownerships, root: &mut Vec<Tokens>) {
+    let device = &app.device;
+    let krate = krate();
 
-        let mut impl_items = vec![];
+    for (tname, task) in &app.tasks {
+        let mut exprs = vec![];
+        let mut fields = vec![];
+        let mut items = vec![];
 
-        match *ownership {
-            Ownership::Owned { .. } => {
-                // For owned resources we don't need claim() or borrow()
-            }
-            Ownership::Shared { ceiling } => {
+        let has_resources = !task.resources.is_empty();
+
+        if has_resources {
+            for rname in &task.resources {
+                let ceiling = ownerships[rname].ceiling();
+                let _rname = Ident::new(format!("_{}", rname.as_ref()));
                 let resource = app.resources
-                    .get(name)
-                    .expect(&format!("BUG: resource {} has no definition", name));
+                    .get(rname)
+                    .expect(&format!("BUG: resource {} has no definition", rname));
+
                 let ty = &resource.ty;
-                let res_rvalue = if resource.expr.is_some() {
-                    quote!(#_name)
+                let _static = if resource.expr.is_some() {
+                    quote!(#_rname)
                 } else {
-                    quote!(#_name.some)
+                    quote!(#_rname.some)
                 };
 
-                impl_items.push(quote! {
-                    type Data = #ty;
-
-                    fn borrow<'cs>(
-                        &'cs self,
-                        t: &'cs #krate::Threshold,
-                    ) -> &'cs #krate::Static<#ty> {
-                        assert!(t.value() >= #ceiling);
+                items.push(quote! {
+                    #[allow(non_camel_case_types)]
+                    pub struct #rname { _0: PhantomData<*const ()> }
+                });
 
-                        unsafe { #krate::Static::ref_(&#res_rvalue) }
-                    }
+                root.push(quote! {
+                    #[allow(unsafe_code)]
+                    unsafe impl #krate::Resource for #tname::#rname {
+                        type Data = #ty;
 
-                    fn borrow_mut<'cs>(
-                        &'cs mut self,
-                        t: &'cs #krate::Threshold,
-                    ) -> &'cs mut #krate::Static<#ty> {
-                        assert!(t.value() >= #ceiling);
+                        fn borrow<'cs>(&'cs self, t: &'cs Threshold) -> &'cs Self::Data {
+                            assert!(t.value() >= #ceiling);
 
-                        unsafe {
-                            #krate::Static::ref_mut(&mut #res_rvalue)
+                            unsafe { &#_static }
                         }
-                    }
 
-                    fn claim<R, F>(
-                        &self,
-                        t: &mut #krate::Threshold,
-                        f: F,
-                    ) -> R
-                    where
-                        F: FnOnce(
-                            &#krate::Static<#ty>,
-                            &mut #krate::Threshold) -> R
-                    {
-                        unsafe {
-                            #krate::claim(
-                                #krate::Static::ref_(&#res_rvalue),
-                                #ceiling,
-                                #device::NVIC_PRIO_BITS,
-                                t,
-                                f,
-                            )
-                        }
-                    }
+                        fn borrow_mut<'cs>(
+                            &'cs mut self,
+                            t: &'cs Threshold,
+                        ) -> &'cs mut Self::Data {
+                            assert!(t.value() >= #ceiling);
 
-                    fn claim_mut<R, F>(
-                        &mut self,
-                        t: &mut #krate::Threshold,
-                        f: F,
-                    ) -> R
-                    where
-                        F: FnOnce(
-                            &mut #krate::Static<#ty>,
-                            &mut #krate::Threshold) -> R
-                    {
-                        unsafe {
-                            #krate::claim(
-                                #krate::Static::ref_mut(&mut #res_rvalue),
-                                #ceiling,
-                                #device::NVIC_PRIO_BITS,
-                                t,
-                                f,
-                            )
+                            unsafe { &mut #_static }
                         }
-                    }
-                });
-
-                impls.push(quote! {
-                    #[allow(unsafe_code)]
-                    unsafe impl #krate::Resource for _resource::#name {
-                        #(#impl_items)*
-                    }
-                });
 
-                items.push(quote! {
-                    #[allow(non_camel_case_types)]
-                    pub struct #name { _0: PhantomData<*const ()> }
+                        fn claim<R, F>(&self, t: &mut Threshold, f: F) -> R
+                        where
+                            F: FnOnce(&Self::Data, &mut Threshold) -> R
+                        {
+                            unsafe {
+                                #krate::claim(
+                                    &#_static,
+                                    #ceiling,
+                                    #device::NVIC_PRIO_BITS,
+                                    t,
+                                    f,
+                                )
+                            }
+                        }
 
-                    #[allow(unsafe_code)]
-                    impl #name {
-                        pub unsafe fn new() -> Self {
-                            #name { _0: PhantomData }
+                        fn claim_mut<R, F>(&mut self, t: &mut Threshold, f: F) -> R
+                        where
+                            F: FnOnce(&mut Self::Data, &mut Threshold) -> R
+                        {
+                            unsafe {
+                                #krate::claim(
+                                    &mut #_static,
+                                    #ceiling,
+                                    #device::NVIC_PRIO_BITS,
+                                    t,
+                                    f,
+                                )
+                            }
                         }
                     }
                 });
-            }
-        }
-    }
-
-    if !items.is_empty() {
-        root.push(quote! {
-            #[allow(unsafe_code)]
-            mod _resource {
-                use core::marker::PhantomData;
-
-                #(#items)*
-            }
-        })
-    }
-    root.push(quote! {
-        #(#impls)*
-    });
-}
-
-fn tasks(app: &App, ownerships: &Ownerships, root: &mut Vec<Tokens>) {
-    let device = &app.device;
-    let krate = krate();
-
-    for (name, task) in &app.tasks {
-        let mut exprs = vec![];
-        let mut fields = vec![];
-        let mut items = vec![];
-
-        let mut lifetime = None;
-        let mut needs_reexport = false;
-        let mut needs_threshold = false;
-        let has_resources = !task.resources.is_empty();
-
-        if has_resources {
-            needs_threshold = !task.resources.is_empty();
 
-            for name in &task.resources {
-                let _name = Ident::new(format!("_{}", name.as_ref()));
-
-                match ownerships[name] {
-                    Ownership::Shared { ceiling } if ceiling > task.priority => {
-                        needs_threshold = true;
-
-                        fields.push(quote! {
-                            pub #name: ::_resource::#name,
-                        });
+                if ceiling <= task.priority {
+                    root.push(quote! {
+                        #[allow(unsafe_code)]
+                        impl core::ops::Deref for #tname::#rname {
+                            type Target = #ty;
 
-                        exprs.push(quote! {
-                            #name: {
-                                ::_resource::#name::new()
-                            },
-                        });
-                    }
-                    _ => {
-                        lifetime = Some(quote!('a));
-                        let resource = app.resources
-                            .get(name)
-                            .expect(&format!("BUG: resource {} has no definition", name));
-
-                        needs_reexport = true;
-                        let ty = &resource.ty;
-
-                        fields.push(quote! {
-                            pub #name: &'a mut ::#krate::Static<#ty>,
-                        });
-
-                        exprs.push(if resource.expr.is_some() {
-                            quote! {
-                                #name: ::#krate::Static::ref_mut(&mut ::#_name),
+                            fn deref(&self) -> &Self::Target {
+                                unsafe { &#_static }
                             }
-                        } else {
-                            quote! {
-                                #name: ::#krate::Static::ref_mut(::#_name.as_mut()),
+                        }
+
+                        #[allow(unsafe_code)]
+                        impl core::ops::DerefMut for #tname::#rname {
+                            fn deref_mut(&mut self) -> &mut Self::Target {
+                                unsafe { &mut #_static }
                             }
-                        });
-                    }
+                        }
+                    })
                 }
-            }
 
-            if needs_reexport {
-                let rname = Ident::new(format!("_{}Resources", name));
-                root.push(quote! {
-                    #[allow(non_camel_case_types)]
-                    #[allow(non_snake_case)]
-                    pub struct #rname<#lifetime> {
-                        #(#fields)*
-                    }
+                fields.push(quote! {
+                    pub #rname: #rname,
                 });
 
-                items.push(quote! {
-                    pub use ::#rname as Resources;
-                });
-            } else {
-                items.push(quote! {
-                    #[allow(non_snake_case)]
-                    pub struct Resources<#lifetime> {
-                        #(#fields)*
-                    }
+                exprs.push(quote! {
+                    #rname: #rname { _0: PhantomData },
                 });
             }
 
+            items.push(quote! {
+                #[allow(non_snake_case)]
+                pub struct Resources {
+                    #(#fields)*
+                }
+            });
+
             items.push(quote! {
                 #[allow(unsafe_code)]
-                impl<#lifetime> Resources<#lifetime> {
+                impl Resources {
                     pub unsafe fn new() -> Self {
                         Resources {
                             #(#exprs)*
@@ -564,7 +574,7 @@ fn tasks(app: &App, ownerships: &Ownerships, root: &mut Vec<Tokens>) {
         let mut exprs = vec![];
 
         let priority = task.priority;
-        if needs_threshold {
+        if has_resources {
             tys.push(quote!(&mut #krate::Threshold));
             exprs.push(quote! {
                 &mut if #priority == 1 << #device::NVIC_PRIO_BITS {
@@ -576,18 +586,18 @@ fn tasks(app: &App, ownerships: &Ownerships, root: &mut Vec<Tokens>) {
         }
 
         if has_resources {
-            tys.push(quote!(#name::Resources));
-            exprs.push(quote!(#name::Resources::new()));
+            tys.push(quote!(#tname::Resources));
+            exprs.push(quote!(#tname::Resources::new()));
         }
 
         let path = &task.path;
-        let _name = Ident::new(format!("_{}", name));
-        let export_name = Lit::Str(name.as_ref().to_owned(), StrStyle::Cooked);
+        let _tname = Ident::new(format!("_{}", tname));
+        let export_name = Lit::Str(tname.as_ref().to_owned(), StrStyle::Cooked);
         root.push(quote! {
             #[allow(non_snake_case)]
             #[allow(unsafe_code)]
             #[export_name = #export_name]
-            pub unsafe extern "C" fn #_name() {
+            pub unsafe extern "C" fn #_tname() {
                 let f: fn(#(#tys,)*) = #path;
 
                 f(#(#exprs,)*)
@@ -597,7 +607,9 @@ fn tasks(app: &App, ownerships: &Ownerships, root: &mut Vec<Tokens>) {
         root.push(quote!{
             #[allow(non_snake_case)]
             #[allow(unsafe_code)]
-            mod #name {
+            mod #tname {
+                use core::marker::PhantomData;
+
                 #[allow(dead_code)]
                 #[deny(const_err)]
                 const CHECK_PRIORITY: (u8, u8) = (
diff --git a/src/lib.rs b/src/lib.rs
index f5481bc401b83b1e406ee66bd04656ca13886d11..be670490e772042b95c39ca7abd062f860f842d9 100644
--- a/src/lib.rs
+++ b/src/lib.rs
@@ -84,7 +84,7 @@ extern crate untagged_option;
 
 use core::u8;
 
-pub use rtfm_core::{Resource, Static, Threshold};
+pub use rtfm_core::{Resource, Threshold};
 pub use cortex_m::asm::{bkpt, wfi};
 pub use cortex_m_rtfm_macros::app;
 #[doc(hidden)]
diff --git a/tests/cfail/init-resource-share-idle.rs b/tests/cfail/init-resource-share-idle.rs
new file mode 100644
index 0000000000000000000000000000000000000000..d8332469d8e173bf7fde5397c602b8e0d4b9702a
--- /dev/null
+++ b/tests/cfail/init-resource-share-idle.rs
@@ -0,0 +1,31 @@
+#![deny(warnings)]
+#![feature(proc_macro)]
+#![no_std]
+
+extern crate cortex_m_rtfm as rtfm;
+extern crate stm32f103xx;
+
+use rtfm::app;
+
+app! { //~ proc macro panicked
+    device: stm32f103xx,
+
+    resources: {
+        static BUFFER: [u8; 16] = [0; 16];
+    },
+
+    init: {
+        resources: [BUFFER],
+    },
+
+    idle: {
+        // ERROR resources assigned to `init` can't be shared with `idle`
+        resources: [BUFFER],
+    },
+}
+
+fn init(_p: init::Peripherals, _r: init::Resources) {}
+
+fn idle(_r: init::Resources) -> ! {
+    loop {}
+}
diff --git a/tests/cfail/init-resource-share-task.rs b/tests/cfail/init-resource-share-task.rs
new file mode 100644
index 0000000000000000000000000000000000000000..8fe688993e3359ff39e656fdcca398af70ab9df5
--- /dev/null
+++ b/tests/cfail/init-resource-share-task.rs
@@ -0,0 +1,36 @@
+#![deny(warnings)]
+#![feature(proc_macro)]
+#![no_std]
+
+extern crate cortex_m_rtfm as rtfm;
+extern crate stm32f103xx;
+
+use rtfm::app;
+
+app! { //~ proc macro panicked
+    device: stm32f103xx,
+
+    resources: {
+        static BUFFER: [u8; 16] = [0; 16];
+    },
+
+    init: {
+        resources: [BUFFER],
+    },
+
+    tasks: {
+        SYS_TICK: {
+            path: sys_tick,
+            // ERROR resources assigned to `init` can't be shared with tasks
+            resources: [BUFFER],
+        },
+    },
+}
+
+fn init(_p: init::Peripherals) {}
+
+fn idle() -> ! {
+    loop {}
+}
+
+fn sys_tick() {}
diff --git a/tests/cfail/lock.rs b/tests/cfail/lock.rs
index 5630649aeb89bae58311adbf9846df114c176183..eb03b7d541222c5a8efabb06adf75c483fcb56be 100644
--- a/tests/cfail/lock.rs
+++ b/tests/cfail/lock.rs
@@ -45,22 +45,24 @@ fn idle() -> ! {
 }
 
 fn exti0(mut t: &mut Threshold, mut r: EXTI0::Resources) {
+    // ERROR need to lock to access the resource because priority < ceiling
+    if *r.ON {
+        //~^ error type `EXTI0::ON` cannot be dereferenced
+    }
+
     // OK need to lock to access the resource
-    if r.ON.claim(&mut t, |on, _| **on) {}
+    if r.ON.claim(&mut t, |on, _| *on) {}
 
     // OK can claim a resource with maximum ceiling
-    r.MAX.claim_mut(&mut t, |max, _| **max += 1);
+    r.MAX.claim_mut(&mut t, |max, _| *max += 1);
 }
 
 fn exti1(mut t: &mut Threshold, r: EXTI1::Resources) {
-    // ERROR no need to lock. Has direct access because priority == ceiling
-    if (**r.ON).claim(&mut t, |on, _| **on) {
-        //~^ error no method named `claim` found for type
-    }
+    // OK to directly access the resource because priority == ceiling
+    if *r.ON {}
 
-    if **r.ON {
-        // OK
-    }
+    // though the resource can still be claimed -- the claim is a no-op
+    if r.ON.claim(&mut t, |on, _| *on) {}
 }
 
 fn exti2(_t: &mut Threshold, _r: EXTI2::Resources) {}
diff --git a/tests/cfail/token-transfer.rs b/tests/cfail/token-transfer.rs
index bc6205217a67933d0cb4238b946af9e509d5406d..f92e4b2b73ed3f7298bf39066a887b560229968b 100644
--- a/tests/cfail/token-transfer.rs
+++ b/tests/cfail/token-transfer.rs
@@ -9,7 +9,7 @@ extern crate stm32f103xx;
 
 use rtfm::{app, Threshold};
 
-app! { //~ error bound `rtfm::Threshold: core::marker::Send` is not satisfied
+app! { //~ error bound `*const (): core::marker::Send` is not satisfied
     device: stm32f103xx,
 
     resources: {