Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1042595rwl; Fri, 31 Mar 2023 06:05:33 -0700 (PDT) X-Google-Smtp-Source: AKy350YGR8B8ML4ZZJv7WVve90uh/MGJgm6NlRuesn/EZ9PGkoSnI/32U/qN8yJnrqN4LBESrr9U X-Received: by 2002:a17:906:21b:b0:947:ce0b:246b with SMTP id 27-20020a170906021b00b00947ce0b246bmr587326ejd.3.1680267932783; Fri, 31 Mar 2023 06:05:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680267932; cv=none; d=google.com; s=arc-20160816; b=cgU5G3UL6nj9JTb7/VFi3zigKH1sTHEyfc/rYqnqknIFeK6VOEV63bnURs1MJFelDn sGTI5L832EnaviobyaP3TsVVoDGI1fT4lIkJg9u51SuI4mbIW/Rqu+CMSTZcWqgbA2ml npmmYfR1JUgEgntlQXJEk53zbLvzXILAz40/DYUo9r+sNRk4vBjnbXlUmbiYIvMhkF2B pSd/zC+ovXwtJ8cilPQjf9uv6sQLTsxUbnNIvF8aWvDykhEWAXaEMX8xRCBc+cv9eeKK +kFo78KUu+sQoHcKtntA/MGIFXb6hQSgvKVSHzsHkfZx/PxOWqr75o3gKQOdyg092V1p q1NQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:in-reply-to:date:subject :cc:to:from:user-agent:references:dkim-signature; bh=nDWXEeZ/uffescHeQSMnMnwMWLgrz19ofXim1Y+HCJI=; b=cWUADchNYqYfF/8nNvF3uXJL1m9wTX89KAyVi/qDusILnFihnRLMEPUQN/tGuHTUBt VVKlEBh5BF6QPerCctJVn1mLI9kVhdABX/UdD/5SRH1x/kJhurWefMo+wJiGvivUwyje r7gOyqxHsLIUHDaie2jZ5EV8Wdmy2J+fWTZgyE60ofizPITz6jXkniqu9f0+WHNOqaBE aa9o/MFMIna8PCaXbHMtFmozyUeUKoFToGQmJ5R+ecsSSrP+unF/gt1m53/bdpGa4K4y dmRPhg2QUWvzsnuotDq9qM/NzyOEq6b4gdE0kLChz0UYbV3GJDGbtBZF17ToCJ04Or2v DcJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@metaspace-dk.20210112.gappssmtp.com header.s=20210112 header.b=lX3rTtbd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n15-20020a1709061d0f00b00946c1d28b59si1953162ejh.355.2023.03.31.06.04.52; Fri, 31 Mar 2023 06:05:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@metaspace-dk.20210112.gappssmtp.com header.s=20210112 header.b=lX3rTtbd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232678AbjCaNDs (ORCPT + 99 others); Fri, 31 Mar 2023 09:03:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39272 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232676AbjCaNDq (ORCPT ); Fri, 31 Mar 2023 09:03:46 -0400 Received: from mail-wr1-x435.google.com (mail-wr1-x435.google.com [IPv6:2a00:1450:4864:20::435]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 07B00AF18 for ; Fri, 31 Mar 2023 06:03:45 -0700 (PDT) Received: by mail-wr1-x435.google.com with SMTP id m2so22314499wrh.6 for ; Fri, 31 Mar 2023 06:03:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=metaspace-dk.20210112.gappssmtp.com; s=20210112; t=1680267823; h=mime-version:message-id:in-reply-to:date:subject:cc:to:from :user-agent:references:from:to:cc:subject:date:message-id:reply-to; bh=nDWXEeZ/uffescHeQSMnMnwMWLgrz19ofXim1Y+HCJI=; b=lX3rTtbdKu1vFSdVWAWg2eJdqkpxKvBOZ8N9aru4GUYxwpnKmO4v5GkonTvRrgwTGR HfLeQ7BxHeMMVucPjj/49KxJb5bMkRD+5SoVmm8rD6srvx3qWvM7rqOFgys4i+PTDF+L UhUpNEsv4Cxbv9CXNVb5JesIHM28Z4EWp2H171ir/lUz8HCgoUlYKxlvBCqcqKFkE/Yc LJER3dRIKT8A6xTu1MTObKbLqvpKlIfK+uZ9r029ZaLyVZUiEgLYQZ5dcJiYULnewp63 jKAUmnB2w8bY1SNxHX/4Kp/PWENfAa2kgoXENGpDzwbWJjxI5WdAva26gYqU2rshG1Bw deZQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680267823; h=mime-version:message-id:in-reply-to:date:subject:cc:to:from :user-agent:references:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=nDWXEeZ/uffescHeQSMnMnwMWLgrz19ofXim1Y+HCJI=; b=qkaIutJrALpmUMXgIrcb8MaUOj7J8rPHQCxFncyLFChKnJilgaRSsYZPubrcs9rwP6 hGFTV2Mr+t1Rw8gmK3i9A9v7Gx4eig8YPormhT0j8XzWqlPgs1PFW2D0tJxlYwL4Fh7p xwGDA8ZNRavDXwrTcuESFY7arpr7vx+8oY4bR1IWMa/ftSvn+X7Cwc6xvcvGtHFF9wRI VLGvJxf3F3vRlmiK6EBvzVjfp7vQasXp8a4LHB3hdYZmNn9bRmyY5nnQrlDMtx11FEMO fKweZIj+wreqtxGWCgN20/M+JmO/krhcBCtu7QuA+jw7z9Y3yF89xiCkeuRjCmou5Sd+ PTWg== X-Gm-Message-State: AAQBX9fLNLqcKmTts6bx0sJUOCmOC5agnv3PKUR2Ce/Mk4DFJUr/YA65 wsGJ6dcCmn/ctFsGRFw9OqHI9Q== X-Received: by 2002:a5d:6dcc:0:b0:2ce:ab76:cc8c with SMTP id d12-20020a5d6dcc000000b002ceab76cc8cmr7486660wrz.2.1680267823444; Fri, 31 Mar 2023 06:03:43 -0700 (PDT) Received: from localhost ([165.225.194.194]) by smtp.gmail.com with ESMTPSA id o5-20020adfcf05000000b002c592535839sm2183743wrj.17.2023.03.31.06.03.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 31 Mar 2023 06:03:43 -0700 (PDT) References: <20230329223239.138757-13-y86-dev@protonmail.com> User-agent: mu4e 1.9.18; emacs 28.2.50 From: Andreas Hindborg To: y86-dev@protonmail.com Cc: Miguel Ojeda , Alex Gaynor , Wedson Almeida Filho , Boqun Feng , Gary Guo , =?utf-8?Q?Bj=C3=B6rn?= Roy Baron , Alice Ryhl , rust-for-linux@vger.kernel.org, linux-kernel@vger.kernel.org, patches@lists.linux.dev, Andreas Hindborg Subject: Re: [PATCH v3 12/13] rust: sync: reduce stack usage of `UniqueArc::try_new_uninit` Date: Fri, 31 Mar 2023 15:03:13 +0200 In-reply-to: <20230329223239.138757-13-y86-dev@protonmail.com> Message-ID: <87355l2hu9.fsf@metaspace.dk> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=0.0 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org y86-dev@protonmail.com writes: > From: Benno Lossin > > `UniqueArc::try_new_uninit` calls `Arc::try_new(MaybeUninit::uninit())`. > This results in the uninitialized memory being placed on the stack, > which may be arbitrarily large due to the generic `T` and thus could > cause a stack overflow for large types. > > Change the implementation to use the pin-init API which enables in-place > initialization. In particular it avoids having to first construct and > then move the uninitialized memory from the stack into the final location. > > Signed-off-by: Benno Lossin > --- Reviewed-by Andreas Hindborg > rust/kernel/lib.rs | 1 - > rust/kernel/sync/arc.rs | 14 ++++++++++++-- > 2 files changed, 12 insertions(+), 3 deletions(-) > > diff --git a/rust/kernel/lib.rs b/rust/kernel/lib.rs > index 3e2777d26ff5..d9df77132fa2 100644 > --- a/rust/kernel/lib.rs > +++ b/rust/kernel/lib.rs > @@ -27,7 +27,6 @@ > #[cfg(not(CONFIG_RUST))] > compile_error!("Missing kernel configuration for conditional compilation"); > > -#[allow(unused_extern_crates)] > // Allow proc-macros to refer to `::kernel` inside the `kernel` crate (this crate). > extern crate self as kernel; > > diff --git a/rust/kernel/sync/arc.rs b/rust/kernel/sync/arc.rs > index 77a3833cc265..4ed6329a5e5f 100644 > --- a/rust/kernel/sync/arc.rs > +++ b/rust/kernel/sync/arc.rs > @@ -18,6 +18,7 @@ > use crate::{ > bindings, > error::{Error, Result}, > + init, > init::{InPlaceInit, Init, PinInit}, > types::{ForeignOwnable, Opaque}, > }; > @@ -29,6 +30,7 @@ use core::{ > pin::Pin, > ptr::NonNull, > }; > +use macros::pin_data; > > /// A reference-counted pointer to an instance of `T`. > /// > @@ -121,6 +123,7 @@ pub struct Arc { > _p: PhantomData>, > } > > +#[pin_data] > #[repr(C)] > struct ArcInner { > refcount: Opaque, > @@ -501,9 +504,16 @@ impl UniqueArc { > > /// Tries to allocate a new [`UniqueArc`] instance whose contents are not initialised yet. > pub fn try_new_uninit() -> Result>> { > - Ok(UniqueArc::> { > + // INVARIANT: The refcount is initialised to a non-zero value. > + let inner = Box::init(init!(ArcInner { > + // SAFETY: There are no safety requirements for this FFI call. > + refcount: Opaque::new(unsafe { bindings::REFCOUNT_INIT(1) }), > + data <- init::uninit(), > + }))?; > + Ok(UniqueArc { > // INVARIANT: The newly-created object has a ref-count of 1. > - inner: Arc::try_new(MaybeUninit::uninit())?, > + // SAFETY: The pointer from the `Box` is valid. > + inner: unsafe { Arc::from_inner(Box::leak(inner).into()) }, > }) > } > }