Subject: [PATCH v3] rust: locks: Add `get_mut` method to `Lock`

From: Mathys-Gasnier <[email protected]>

Having a mutable reference guarantees that no other threads have
access to the lock, so we can take advantage of that to grant callers
access to the protected data without the the cost of acquiring and
releasing the locks. Since the lifetime of the data is tied to the
mutable reference, the borrow checker guarantees that the usage is safe.

Signed-off-by: Mathys-Gasnier <[email protected]>
---
Changes in v3:
- Changing the function to take a `Pin<&mut self>` instead of a `&mut self`
- Removed reviewed-by's since big changes were made. Please take another
look.
- Link to v2: https://lore.kernel.org/r/[email protected]

Changes in v2:
- Improved doc comment.
- Link to v1: https://lore.kernel.org/r/[email protected]
---
rust/kernel/sync/lock.rs | 16 +++++++++++++++-
1 file changed, 15 insertions(+), 1 deletion(-)

diff --git a/rust/kernel/sync/lock.rs b/rust/kernel/sync/lock.rs
index f12a684bc957..0c8faf36d654 100644
--- a/rust/kernel/sync/lock.rs
+++ b/rust/kernel/sync/lock.rs
@@ -7,7 +7,11 @@

use super::LockClassKey;
use crate::{bindings, init::PinInit, pin_init, str::CStr, types::Opaque, types::ScopeGuard};
-use core::{cell::UnsafeCell, marker::PhantomData, marker::PhantomPinned};
+use core::{
+ cell::UnsafeCell,
+ marker::{PhantomData, PhantomPinned},
+ pin::Pin,
+};
use macros::pin_data;

pub mod mutex;
@@ -121,6 +125,16 @@ pub fn lock(&self) -> Guard<'_, T, B> {
// SAFETY: The lock was just acquired.
unsafe { Guard::new(self, state) }
}
+
+ /// Gets the data contained in the lock
+ /// Having a mutable reference to the lock guarantees that no other threads have access to the lock.
+ /// Making it safe to get a mutable reference to the lock content.
+ pub fn get_mut(self: Pin<&mut Self>) -> &mut T {
+ // SAFETY: Since the data is not pinned (No structural pinning for data).
+ // It is safe to get a mutable reference to the data and we never move the state.
+ let lock = unsafe { self.get_unchecked_mut() };
+ lock.data.get_mut()
+ }
}

/// A lock guard.

---
base-commit: 711cbfc717650532624ca9f56fbaf191bed56e67
change-id: 20240118-rust-locks-get-mut-c42072101d7a

Best regards,
--
Mathys-Gasnier <[email protected]>



Subject: Re: [PATCH v3] rust: locks: Add `get_mut` method to `Lock`

On 2/22/24 13:26, Mathys-Gasnier via B4 Relay wrote:
> From: Mathys-Gasnier <[email protected]>
>
> Having a mutable reference guarantees that no other threads have
> access to the lock, so we can take advantage of that to grant callers
> access to the protected data without the the cost of acquiring and
> releasing the locks. Since the lifetime of the data is tied to the
> mutable reference, the borrow checker guarantees that the usage is safe.
>
> Signed-off-by: Mathys-Gasnier <[email protected]>
> ---
> [...]

This looks magnificent as is.

Reviewed-by: Martin Rodriguez Reboredo <[email protected]>

2024-02-23 02:52:47

by Boqun Feng

[permalink] [raw]
Subject: Re: [PATCH v3] rust: locks: Add `get_mut` method to `Lock`

Hi,

Thanks for the patch! Please see a few comments below.

On Thu, Feb 22, 2024 at 05:26:44PM +0100, Mathys-Gasnier via B4 Relay wrote:
> From: Mathys-Gasnier <[email protected]>
>
> Having a mutable reference guarantees that no other threads have
> access to the lock, so we can take advantage of that to grant callers
> access to the protected data without the the cost of acquiring and
> releasing the locks. Since the lifetime of the data is tied to the
> mutable reference, the borrow checker guarantees that the usage is safe.
>
> Signed-off-by: Mathys-Gasnier <[email protected]>
> ---
> Changes in v3:
> - Changing the function to take a `Pin<&mut self>` instead of a `&mut self`
> - Removed reviewed-by's since big changes were made. Please take another
> look.
> - Link to v2: https://lore.kernel.org/r/[email protected]
>
> Changes in v2:
> - Improved doc comment.
> - Link to v1: https://lore.kernel.org/r/[email protected]
> ---
> rust/kernel/sync/lock.rs | 16 +++++++++++++++-
> 1 file changed, 15 insertions(+), 1 deletion(-)
>
> diff --git a/rust/kernel/sync/lock.rs b/rust/kernel/sync/lock.rs
> index f12a684bc957..0c8faf36d654 100644
> --- a/rust/kernel/sync/lock.rs
> +++ b/rust/kernel/sync/lock.rs
> @@ -7,7 +7,11 @@
>
> use super::LockClassKey;
> use crate::{bindings, init::PinInit, pin_init, str::CStr, types::Opaque, types::ScopeGuard};
> -use core::{cell::UnsafeCell, marker::PhantomData, marker::PhantomPinned};
> +use core::{
> + cell::UnsafeCell,
> + marker::{PhantomData, PhantomPinned},
> + pin::Pin,
> +};
> use macros::pin_data;
>
> pub mod mutex;
> @@ -121,6 +125,16 @@ pub fn lock(&self) -> Guard<'_, T, B> {
> // SAFETY: The lock was just acquired.
> unsafe { Guard::new(self, state) }
> }
> +
> + /// Gets the data contained in the lock

This above line could use a period and a new line.

> + /// Having a mutable reference to the lock guarantees that no other threads have access to the lock.
> + /// Making it safe to get a mutable reference to the lock content.
> + pub fn get_mut(self: Pin<&mut Self>) -> &mut T {
> + // SAFETY: Since the data is not pinned (No structural pinning for data).
> + // It is safe to get a mutable reference to the data and we never move the state.

Compare to "never move the state", a more accurate safety guarantee is
"the `&mut Self` is only used to get the reference of the `data` field,
therefore `self` won't get moved", I think.

BTW, while we are at it, I think we should document the
"structural/non-structural pinning" design decisions somewhere, for
example in the struct definition:

#[pin_data]
pub struct Lock<T: ?Sized, B: Backend> {
...
/// The data protected by the lock.
/// This field is non-structural pinned.
pub(crate) data: UnsafeCell<T>,
}

Thoughts? Or do we think "non-structural pinned" should be the default
case so no need to document it? I want to have a clear document for each
field to avoid the accidental "everyone forgets what's the decision
here" ;-)

Regards,
Boqun

> + let lock = unsafe { self.get_unchecked_mut() };
> + lock.data.get_mut()
> + }
> }
>
> /// A lock guard.
>
> ---
> base-commit: 711cbfc717650532624ca9f56fbaf191bed56e67
> change-id: 20240118-rust-locks-get-mut-c42072101d7a
>
> Best regards,
> --
> Mathys-Gasnier <[email protected]>
>

2024-02-23 11:36:16

by Alice Ryhl

[permalink] [raw]
Subject: Re: [PATCH v3] rust: locks: Add `get_mut` method to `Lock`

On Fri, Feb 23, 2024 at 3:52 AM Boqun Feng <[email protected]> wrote:
> BTW, while we are at it, I think we should document the
> "structural/non-structural pinning" design decisions somewhere, for
> example in the struct definition:
>
> #[pin_data]
> pub struct Lock<T: ?Sized, B: Backend> {
> ...
> /// The data protected by the lock.
> /// This field is non-structural pinned.
> pub(crate) data: UnsafeCell<T>,
> }
>
> Thoughts? Or do we think "non-structural pinned" should be the default
> case so no need to document it? I want to have a clear document for each
> field to avoid the accidental "everyone forgets what's the decision
> here" ;-)

I would normally assume that "field is not marked #[pin]" implies that
it's not structurally pinned. But it could still be worth to call out
here.

I prefer the wording "not structurally pinnned" over "non-structural pinned".

Alice

2024-02-25 19:57:30

by Boqun Feng

[permalink] [raw]
Subject: Re: [PATCH v3] rust: locks: Add `get_mut` method to `Lock`

On Sun, Feb 25, 2024 at 10:21:23AM +0100, Mathys Gasnier wrote:
> Should i include this comment in this patch ?
>

My suggestion is 1) in the comment of the `get_mut()` function, mention
that "`data` is not structurally pinned, so return a `&mut T` here" and
2) in the function body of `get_mut()`, at the safety comments, you only
need to put the reasoning explaining that `self` wouldn't get moved via
the return value of `self.get_unchecked_mut()`.

With these (along with the period and newline added), it'll be good to
me.

Regards,
Boqun

> Le ven. 23 févr. 2024 à 11:49, Alice Ryhl <[email protected]> a écrit :
>
> > On Fri, Feb 23, 2024 at 3:52 AM Boqun Feng <[email protected]> wrote:
> > > BTW, while we are at it, I think we should document the
> > > "structural/non-structural pinning" design decisions somewhere, for
> > > example in the struct definition:
> > >
> > > #[pin_data]
> > > pub struct Lock<T: ?Sized, B: Backend> {
> > > ...
> > > /// The data protected by the lock.
> > > /// This field is non-structural pinned.
> > > pub(crate) data: UnsafeCell<T>,
> > > }
> > >
> > > Thoughts? Or do we think "non-structural pinned" should be the default
> > > case so no need to document it? I want to have a clear document for each
> > > field to avoid the accidental "everyone forgets what's the decision
> > > here" ;-)
> >
> > I would normally assume that "field is not marked #[pin]" implies that
> > it's not structurally pinned. But it could still be worth to call out
> > here.
> >
> > I prefer the wording "not structurally pinnned" over "non-structural
> > pinned".
> >
> > Alice
> >