Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp543660rwl; Wed, 5 Apr 2023 04:38:59 -0700 (PDT) X-Google-Smtp-Source: AKy350arRuAyYsfbxcRHYZsvG5JJWN2Dx/HiqNgd9AYygEhun9YgAbbreNVcGGYMpk1OFiRgYeda X-Received: by 2002:a05:6a20:45e:b0:da:61e1:913a with SMTP id b30-20020a056a20045e00b000da61e1913amr5409182pzb.23.1680694739052; Wed, 05 Apr 2023 04:38:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680694739; cv=none; d=google.com; s=arc-20160816; b=uBiOPnbl6w+y6PM0Uw31sHsaksGdAhJ6UYjIv6z88PjdxyohfoyL9Qto0IjREyCebz 68hOwpsylptYtct42q/2xTEkvbYaDrKwKl6A1iJ5hscnqxj3VK13CxK7nX7N2AaKfCNv ZIeaHSe+fHN9Whxxvdt1UN8suSG6aSGyfwIMXCkomPVsBhBBbeJMPn8Xzgx0Yrmt0zvA Rj4By0/V9FNci/5DSwct2syx2bNT5I9B7x0znS+wbVZfE3aB2xPgg8ayY4hFo5bUFOdN NBv/jvPMJ68NKYeSxVzy/EJqj9FuuNnCj7cuEEEbsBWC0XsbDr1kuFUx5SIAZwfYQwXA M3WQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:dkim-signature; bh=AI1amrbU+WuMTPC0ykU/yn27gLgJaltOCzBzxnZuJf0=; b=LT0raA2lN4tW2HC5w/mNbKiAxqBeEDQPC/pWCEcCcE2FPF7I+lL9wCAbtyY2PaDBmj zjQknkvudyewBm+zfrLfFAy9pmkz5f+vpy5ilLPk5NieD6WPsePClYZEiSjzVQNnMVI/ XTkXkoE+FNpa8MBgPwLe6rPI2RkOGRcf9DuXZVZqtaDJswJJjTBiGqcuHtETzadBknXN ciH0dd0Dg4WVSGo/9zH/08uu+ilnR2/+BztrAIqwTHvB+8jR/jSUkFL/W0PFTuT88vN7 LNz492sNpO4YiyiAlF4gIfTwQTD0cnNTi5w3Q+BhSIqU5Lu9JIhKcocAdmypJG2HNSd+ oKbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=Ymp6rk8v; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j191-20020a638bc8000000b0051372e8f9b5si11837598pge.791.2023.04.05.04.38.46; Wed, 05 Apr 2023 04:38:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=Ymp6rk8v; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237435AbjDELZi (ORCPT + 99 others); Wed, 5 Apr 2023 07:25:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39264 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237572AbjDELZf (ORCPT ); Wed, 5 Apr 2023 07:25:35 -0400 Received: from mail-ed1-x52c.google.com (mail-ed1-x52c.google.com [IPv6:2a00:1450:4864:20::52c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8885D10CC for ; Wed, 5 Apr 2023 04:25:31 -0700 (PDT) Received: by mail-ed1-x52c.google.com with SMTP id 4fb4d7f45d1cf-5005c57f95cso33668a12.1 for ; Wed, 05 Apr 2023 04:25:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; t=1680693930; x=1683285930; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:mail-followup-to:message-id:subject:cc:to :from:date:from:to:cc:subject:date:message-id:reply-to; bh=AI1amrbU+WuMTPC0ykU/yn27gLgJaltOCzBzxnZuJf0=; b=Ymp6rk8v2u3OJbN1zV0ew8BHZ1sbkm4R4Gygk5vo82Y3wq3VY+2aG2MiolldPOHfx7 nRWiAHDn01FaCoo7mJR7Kgel8lqTeDmjveazh+XNAC5zGNhBue2LD/6NRIUo/bokLy9V xzUcMUdH7MjuaRr9GYy82N93fJGeemmJ8C3Zw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680693930; x=1683285930; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:mail-followup-to:message-id:subject:cc:to :from:date:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=AI1amrbU+WuMTPC0ykU/yn27gLgJaltOCzBzxnZuJf0=; b=JEvpBdZmZL7fPULRavB98ZneHKQOnw/hcJbEPR2b2ifqXwKUOTMdotgn/wWTek8Vsa hIfEDfc8rNggJz+uvS+Na69p35PYxVKukSbqA3tpyDSoGIg3WK19ZYZDszz/hrK333qn /fpM8uZPqzq8dxSXKfgnap+YVtpF9GAWcLBH1YTMXOtfM70ZoN6086IIwbTo0UJvllIY zksvflBjpYjc6Tl/cyfybkGgO9J2dIrx67mTrtotpl22UMXTwYazMcR+dK/V5pfRsyTV A0mH/Ld1fkopN7bc/j25mzofKB2zmvh0LTZTlPoH+oBN0tqVrTNad7PTzVrmcMjDy9jb MUUg== X-Gm-Message-State: AAQBX9fjMDdpeb/bJ/WH6qpTX2kf9UaImNh6dguv2DcB/uokmG5LI+ot jWlb3urJt7iIGRr+JHpejK4fOA== X-Received: by 2002:a05:6402:d0e:b0:502:e50:3358 with SMTP id eb14-20020a0564020d0e00b005020e503358mr1579402edb.3.1680693929873; Wed, 05 Apr 2023 04:25:29 -0700 (PDT) Received: from phenom.ffwll.local (212-51-149-33.fiber7.init7.net. [212.51.149.33]) by smtp.gmail.com with ESMTPSA id z21-20020a056402275500b00501d73cfc86sm7091936edd.9.2023.04.05.04.25.27 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 05 Apr 2023 04:25:29 -0700 (PDT) Date: Wed, 5 Apr 2023 13:25:26 +0200 From: Daniel Vetter To: Boqun Feng Cc: Faith Ekstrand , Asahi Lina , Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , David Airlie , Daniel Vetter , Miguel Ojeda , Alex Gaynor , Wedson Almeida Filho , Gary Guo , =?iso-8859-1?Q?Bj=F6rn?= Roy Baron , Sumit Semwal , Christian =?iso-8859-1?Q?K=F6nig?= , Luben Tuikov , Jarkko Sakkinen , Dave Hansen , Alyssa Rosenzweig , Karol Herbst , Ella Stanforth , Mary , linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, rust-for-linux@vger.kernel.org, linux-media@vger.kernel.org, linaro-mm-sig@lists.linaro.org, linux-sgx@vger.kernel.org, asahi@lists.linux.dev Subject: Re: [PATCH RFC 03/18] rust: drm: file: Add File abstraction Message-ID: Mail-Followup-To: Boqun Feng , Faith Ekstrand , Asahi Lina , Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , David Airlie , Miguel Ojeda , Alex Gaynor , Wedson Almeida Filho , Gary Guo , =?iso-8859-1?Q?Bj=F6rn?= Roy Baron , Sumit Semwal , Christian =?iso-8859-1?Q?K=F6nig?= , Luben Tuikov , Jarkko Sakkinen , Dave Hansen , Alyssa Rosenzweig , Karol Herbst , Ella Stanforth , Mary , linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, rust-for-linux@vger.kernel.org, linux-media@vger.kernel.org, linaro-mm-sig@lists.linaro.org, linux-sgx@vger.kernel.org, asahi@lists.linux.dev References: <20230307-rust-drm-v1-0-917ff5bc80a8@asahilina.net> <20230307-rust-drm-v1-3-917ff5bc80a8@asahilina.net> <9ba89e97155400fb379f5101ccb8960d0bcbc025.camel@collabora.com> <28fa3f97-4c7c-212e-2be2-fb1c05f7f576@asahilina.net> <5a0db63c043adc47b289b3f1d22935a0a63c926e.camel@collabora.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Operating-System: Linux phenom 6.1.0-7-amd64 X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 13, 2023 at 07:07:09PM -0700, Boqun Feng wrote: > On Mon, Mar 13, 2023 at 12:49:57PM -0500, Faith Ekstrand wrote: > > On Fri, 2023-03-10 at 07:16 +0900, Asahi Lina wrote: > > > On 10/03/2023 06.16, Faith Ekstrand wrote: > > > > On Tue, 2023-03-07 at 23:25 +0900, Asahi Lina wrote: > > > > > A DRM File is the DRM counterpart to a kernel file structure, > > > > > representing an open DRM file descriptor. Add a Rust abstraction > > > > > to > > > > > allow drivers to implement their own File types that implement > > > > > the > > > > > DriverFile trait. > > > > > > > > > > Signed-off-by: Asahi Lina > > > > > --- > > > > > ?rust/bindings/bindings_helper.h |?? 1 + > > > > > ?rust/kernel/drm/drv.rs????????? |?? 7 ++- > > > > > ?rust/kernel/drm/file.rs???????? | 113 > > > > > ++++++++++++++++++++++++++++++++++++++++ > > > > > ?rust/kernel/drm/mod.rs????????? |?? 1 + > > > > > ?4 files changed, 120 insertions(+), 2 deletions(-) > > > > > > > > > > diff --git a/rust/bindings/bindings_helper.h > > > > > b/rust/bindings/bindings_helper.h > > > > > index 2a999138c4ae..7d7828faf89c 100644 > > > > > --- a/rust/bindings/bindings_helper.h > > > > > +++ b/rust/bindings/bindings_helper.h > > > > > @@ -8,6 +8,7 @@ > > > > > ? > > > > > ?#include > > > > > ?#include > > > > > +#include > > > > > ?#include > > > > > ?#include > > > > > ?#include > > > > > diff --git a/rust/kernel/drm/drv.rs b/rust/kernel/drm/drv.rs > > > > > index 29a465515dc9..1dcb651e1417 100644 > > > > > --- a/rust/kernel/drm/drv.rs > > > > > +++ b/rust/kernel/drm/drv.rs > > > > > @@ -144,6 +144,9 @@ pub trait Driver { > > > > > ???? /// Should be either `drm::gem::Object` or > > > > > `drm::gem::shmem::Object`. > > > > > ???? type Object: AllocImpl; > > > > > ? > > > > > +??? /// The type used to represent a DRM File (client) > > > > > +??? type File: drm::file::DriverFile; > > > > > + > > > > > ???? /// Driver metadata > > > > > ???? const INFO: DriverInfo; > > > > > ? > > > > > @@ -213,8 +216,8 @@ macro_rules! drm_device_register { > > > > > ?impl Registration { > > > > > ???? const VTABLE: bindings::drm_driver = drm_legacy_fields! { > > > > > ???????? load: None, > > > > > -??????? open: None, // TODO: File abstraction > > > > > -??????? postclose: None, // TODO: File abstraction > > > > > +??????? open: Some(drm::file::open_callback::), > > > > > +??????? postclose: > > > > > Some(drm::file::postclose_callback::), > > > > > ???????? lastclose: None, > > > > > ???????? unload: None, > > > > > ???????? release: None, > > > > > diff --git a/rust/kernel/drm/file.rs b/rust/kernel/drm/file.rs > > > > > new file mode 100644 > > > > > index 000000000000..48751e93c38a > > > > > --- /dev/null > > > > > +++ b/rust/kernel/drm/file.rs > > > > > @@ -0,0 +1,113 @@ > > > > > +// SPDX-License-Identifier: GPL-2.0 OR MIT > > > > > + > > > > > +//! DRM File objects. > > > > > +//! > > > > > +//! C header: > > > > > [`include/linux/drm/drm_file.h`](../../../../include/linux/drm/dr > > > > > m_fi > > > > > le.h) > > > > > + > > > > > +use crate::{bindings, drm, error::Result}; > > > > > +use alloc::boxed::Box; > > > > > +use core::marker::PhantomData; > > > > > +use core::ops::Deref; > > > > > + > > > > > +/// Trait that must be implemented by DRM drivers to represent a > > > > > DRM > > > > > File (a client instance). > > > > > +pub trait DriverFile { > > > > > +??? /// The parent `Driver` implementation for this > > > > > `DriverFile`. > > > > > +??? type Driver: drm::drv::Driver; > > > > > + > > > > > +??? /// Open a new file (called when a client opens the DRM > > > > > device). > > > > > +??? fn open(device: &drm::device::Device) -> > > > > > Result>; > > > > > +} > > > > > + > > > > > +/// An open DRM File. > > > > > +/// > > > > > +/// # Invariants > > > > > +/// `raw` is a valid pointer to a `drm_file` struct. > > > > > +#[repr(transparent)] > > > > > +pub struct File { > > > > > +??? raw: *mut bindings::drm_file, > > > > > +??? _p: PhantomData, > > > > > +} > > > > > + > > > > > +pub(super) unsafe extern "C" fn open_callback( > > > > > +??? raw_dev: *mut bindings::drm_device, > > > > > +??? raw_file: *mut bindings::drm_file, > > > > > +) -> core::ffi::c_int { > > > > > +??? let drm = core::mem::ManuallyDrop::new(unsafe { > > > > > drm::device::Device::from_raw(raw_dev) }); > > > > > > > > Maybe you can help educate me a bit here... This feels like a > > > > really > > > > sketchy pattern.? We're creating a Device from a pointer, an > > > > operation > > > > which inherently consumes a reference but then marking it > > > > ManuallyDrop > > > > so drm_device_put() never gets called.? It took me a while but I > > > > think > > > > I figured out what you're trying to do: Make it so all the Rust > > > > stuff > > > > works with Device, not drm_device but it still feels really wrong.? > > > > It > > > > works, it just feels like there's a lot of unsafe abstraction > > > > juggling > > > > happening here and I expect this operation is going to be pretty > > > > common > > > > in the Rust abstraction layer. > > > > > > So I think this is going to be a pretty common pattern in this kind > > > of > > > abstraction. The problem is that, of course, in C there is no > > > distinction between an owned reference and a borrowed one. Here we > > > have > > > a borrowed reference to a struct drm_device, and we need to turn it > > > into > > > a &Device (which is the Rust equivalent type). But for &Device to > > > exist > > > we need a Device to exist in the first place, and Device normally > > > implies ownership of the underlying drm_device. > > > > Thanks! Putting it in terms of borrow really helps clear up the > > difference. > > > > > We could just acquire a reference here, but then we're needlessly > > > grabbing a ref only to drop it at the end of the function, which is > > > pointless when the caller is holding another reference for us while > > > the > > > callback runs. And of course Rust likes to claim to offer zero-cost > > > abstractions, so it would be kind of sad to have to do that... ^^ > > > > Yeah, I agree we don't want to take extra references. > > > > > Just doing drm::device::Device::from_raw(raw_dev) is a ticking time > > > bomb, because we haven't acquired a reference (which would normally > > > be > > > required). If that Device ever gets dropped, we've messed up the > > > refcounting and stolen the caller's reference. We could try to ensure > > > it > > > gets passed to core::mem::forget in all paths out, but that gets > > > error-prone very quickly when trying to cover error paths. So > > > instead, > > > we put it into a ManuallyDrop. That takes care of neutering the ref > > > drop, so we don't have to worry about messing that up. Then the only > > > remaining safety requirement is that that the ManuallyDrop > > > never > > > escape the callback function, and that's easy to ensure: we only pass > > > a > > > &ref to the user (which via auto-deref ends up being a &Device), and > > > then nothing bad can happen. If the user wants an owned reference to > > > the > > > device to keep around, they can call .clone() on it and that's when > > > the > > > incref happens. > > > > > > Basically, ManuallyDrop where T is a reference counted type > > > represents a borrowed reference to a T coming from the C side. You > > > can > > > see another use of this pattern in gem::Object, which contains a > > > ManuallyDrop that represents a borrowed reference to the > > > device > > > that owns that object. The DRM core (as far as I know!) guarantees > > > that > > > DRM devices outlive all of their GEM objects, so we can materialize a > > > borrowed reference and as long as it never leaves the GEM object, it > > > will be sound. Then we can take &Device references from it whenever > > > we > > > want, and the usual Rust borrow checker rules ensure we can't do > > > something illegal. > > > > Ok, that all matches my understanding of what I thought was going on. I > > do wonder if it would be good to wrap this up in a > > > > struct DeviceBorrow { > > dev: ManuallyDrop > > } > > > > impl DeviceBorrow { > > pub unsafe fn from_raw(*mut bindings::drm_device) -> DeviceBorrow; > > } > > > > impl Deref for DeviceBorrow { > > ... > > } > > > > with documentation, etc. Seeing a ManuallyDrop which is never dropped > > sets my rust senses tingling. Maybe that's too much typing for each > > object? I don't want to add a bunch of extra work but this seems like > > a pretty common pattern we're going to hit everywhere. > > > > I just want to mention, there is a different way to do the abstraction > here: > > similar to https://lore.kernel.org/rust-for-linux/ZA9l0EHCRRr%2Fmyoq@boqun-archlinux > > * Define Device as tranparent represention of struct drm_device: > > #[repr(transparent)] > struct Device(Opaque); > > * impl `AlwaysRefCounted`[1] for `Device`, therefore we can use > `ARef`[2] as a smart pointer to `drm_device`. > > * drm_device related methods are still implemented in `impl Device` > > * In `open_callback`, we can just get a `&Device` from `*mut > bindings::drm_device` unsafely, and that's all. Or introduce a helper > function if we want: > > pub unsafe fn with_device(ptr: *mut drm_device, f: F) -> Result > where > F: FnOnce(&Device) -> Result > { > let d = unsafe { &*ptr }; > f(d) > } > > The main difference is that we now treat a pointer to drm_device as a > reference to the device, not the owner. > > It seems we need to also change our driver/device framework to use this > approach, but it looks better to me. So I really don't have enough rust clue to have any useful opinion on how the glue should look like, but semantically the struct drm_file should only ever be borrowed as a parameter to a driver hook, so that rust can guarantee that the driver doesn't do anything funny and uses it beyond the end of that function. This holds for all the callbacks like open/close or also all the ioctl. The other semantic thing is that that the ioctls should be able to rely on open having fully constructed the thing. I think the trait and dependent type stuff ensure that? What I've missed (but maybe just looked in the wrong place) is that the ioctl support (and really anything else where the driver gets a struct drm_file on the C side, but I don't think there is anything else) should also make sure you get the right driver-specific type and not something else. I did notice the FIXME in the first patch, I guess if it makes landing all this easier we could also keep this as a todo item to improve once things landed. That btw holds for a lot of the big "how to map semantics correctly to rust" questions I'm throwing up here. Maybe a Documentation/gpu/rust.rst file would be good to include, with these todo items noted instead of just FIXME sprinkled in patches? At least for things that will take more effort to polish. -Daniel > > Regards, > Boqun > > [1]: https://rust-for-linux.github.io/docs/kernel/trait.AlwaysRefCounted.html > [2]: https://rust-for-linux.github.io/docs/kernel/struct.ARef.html > > > ~Faith -- Daniel Vetter Software Engineer, Intel Corporation http://blog.ffwll.ch