Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp2219246rwp; Fri, 14 Jul 2023 02:46:24 -0700 (PDT) X-Google-Smtp-Source: APBJJlF7hMttJ121vtbQG0HiEEhBiU7JCREaFgcwlczB3B10hIoSUcXhIzKD21314ePWaJ0OEnVP X-Received: by 2002:a17:906:539a:b0:993:dd1d:8252 with SMTP id g26-20020a170906539a00b00993dd1d8252mr3550703ejo.22.1689327984260; Fri, 14 Jul 2023 02:46:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689327984; cv=none; d=google.com; s=arc-20160816; b=Yj/kdNoyGpkc7C39qfK3L8mc8rNI55+g6tVipz2UMmgaE9J/Y6qeSt15nGYXtuHksq SqXc3ax44OgZunQMj/3nF1LKT6oVrgOVePDvkV1h3yVQoX3dJXl3/lV73QvImnYraEAO 1V3sytajF1SEd7OeG00m9ALqQ7SCDkOlxsGSJdPEmvo5P2C0lnZ+rCRiLr+fmPE++mhF Z5KlooLR3xFFscZvIhpc/pAVAS/jMDViuwFCTxzY0KCtJ+yVqJcIyvLur9c3uyfcVonb 0qIH1FInS3klT5c73WLbmUn3ieoEXeLxvUZunONIsxFZpKyB3OY4SuGgsQ5CRYOGdqbO S3Gg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:content-transfer-encoding:mime-version :message-id:date:subject:from:dkim-signature; bh=VgFOL/DOZ0RFLoZeig2O8qe+zSDKuIFhr99IoBL3Gr8=; fh=P69duW5QZmRj9b1Pp5XKOSqIgFMUDbjoyFZWqOwQYzw=; b=HCDZ3oYvusfX9IuF0yBEKZCyuFgfj2TBRjke5uOphFR1IHQE+mdxTMJrhQe4+arCq1 StC4LPzDhurlKlcpW+PyuexJHYr/U3keicyUXNIFoUnwiqhSVgOne5g2nmCgCQRBKDOh UmOxy+/m/8Sw2FimctB9TWoPdySdf+vbQAhGLx6YMr2EexpXCDbxC60sBE1lBdsm5r6V mxPCjzTu9S5ObYv/5YY8TnanOazJiXj1GMa+qbawjfD4c2bYt7hM3J/wCwVBSBZGWisc qp0MroMTjAaNWTacU3fmMqWRlsvnX/l+2+gy4Duq2xWga/gynK9NDABec30J+TICS1Ne VxHA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@asahilina.net header.s=default header.b=DWOuvqjn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=asahilina.net Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h10-20020a1709067cca00b009926928d482si8779112ejp.447.2023.07.14.02.45.59; Fri, 14 Jul 2023 02:46:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@asahilina.net header.s=default header.b=DWOuvqjn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=asahilina.net Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235876AbjGNJbv (ORCPT + 99 others); Fri, 14 Jul 2023 05:31:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55864 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234417AbjGNJbn (ORCPT ); Fri, 14 Jul 2023 05:31:43 -0400 Received: from mail.marcansoft.com (marcansoft.com [212.63.210.85]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A5A793599; Fri, 14 Jul 2023 02:31:14 -0700 (PDT) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: linasend@asahilina.net) by mail.marcansoft.com (Postfix) with ESMTPSA id 2DD105BC3A; Fri, 14 Jul 2023 09:14:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=asahilina.net; s=default; t=1689326046; bh=NNlQg01GoROuwHT7V4Ok4QbA2Wacecl8a9cR39wPQX4=; h=From:Subject:Date:To:Cc; b=DWOuvqjnL+WVRlQCchmZp/1Q5QSmwk1TXPN8elD+Lr+TEOyfN68h44fdUmUcdHUN2 7A4F4XNCMes02IwEzHvDFlsJpVL0C1B4V1z1Ue0okL8UxvAiq4YGiBco3taDmSFjt/ jS1+M7N5xtG4lbjc5aUXgomR7zvuNjImD/mfiMO2d2SBUVIwbYtnjKb3nbQzJMX+ol vHAaNDJRwALfpj1vg6IIcWkXw5ZDFpjpkKMYGKkPHoYaEQR6LoFiC9FK29dna86ls9 2qOlhTZmdmXLAN5YMfQKDpOaFiZjQ2tR+HS58wyprIbaP33CVyONvqagYL1nunBGyZ /QtxTuAPRiOWQ== From: Asahi Lina Subject: [PATCH RFC 00/11] rust: Implicit lock class creation & Arc Lockdep integration Date: Fri, 14 Jul 2023 18:13:52 +0900 Message-Id: <20230714-classless_lockdep-v1-0-229b9671ce31@asahilina.net> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-B4-Tracking: v=1; b=H4sIANARsWQC/6tWKk4tykwtVrJSqFYqSi3LLM7MzwNyDHUUlJIzE vPSU3UzU4B8JSMDI2MDc0MT3eScxOLinNTi4vic/OTslNQC3TTDFFNLc6O0JJOkRCWgvoKi1LT MCrCZ0UpBbs5KsbW1AJoiJw1oAAAA To: Miguel Ojeda , Alex Gaynor , Wedson Almeida Filho , Boqun Feng , Gary Guo , =?utf-8?q?Bj=C3=B6rn_Roy_Baron?= , Benno Lossin , Masahiro Yamada , Nathan Chancellor , Nick Desaulniers , Nicolas Schier , Tom Rix , Daniel Vetter Cc: Hector Martin , Sven Peter , Alyssa Rosenzweig , asahi@lists.linux.dev, rust-for-linux@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kbuild@vger.kernel.org, llvm@lists.linux.dev, Asahi Lina X-Mailer: b4 0.12.3 X-Developer-Signature: v=1; a=ed25519-sha256; t=1689326040; l=3990; i=lina@asahilina.net; s=20230221; h=from:subject:message-id; bh=NNlQg01GoROuwHT7V4Ok4QbA2Wacecl8a9cR39wPQX4=; b=/iyr7ancBEF0XHvo1tC+PR5V7K/FO06oJ0Cy/w4WDvBHh+I0Op8T6d5uYejSOZ+TUqNdVn/Ns klBa8CShSlIAxB40VpRMh8VI93PqdHiAsoOvp8NK/p+ZA/7SUcFENqu X-Developer-Key: i=lina@asahilina.net; a=ed25519; pk=Qn8jZuOtR1m5GaiDfTrAoQ4NE1XoYVZ/wmt5YtXWFC4= X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Begone, lock classes! As discussed in meetings/etc, we would really like to support implicit lock class creation for Rust code. Right now, lock classes are created using macros and passed around (similar to C). Unfortunately, Rust macros don't look like Rust functions, which means adding lockdep to a type is a breaking API change. This makes Rust mutex creation rather ugly, with the new_mutex!() macro and friends. Implicit lock classes have to be unique per instantiation code site. Notably, with Rust generics and monomorphization, this is not the same as unique per generated code instance. If this weren't the case, we could use inline functions and asm!() magic to try to create lock classes that have the right uniqueness semantics. But that doesn't work, since it would create too many lock classes for the same actual lock creation in the source code. But Rust does have one trick we can use: it can track the caller location (as file:line:column), across multiple functions. This works using an implicit argument that gets passed around, which is exactly the thing we do for lock classes. The tricky bit is that, while the value of these Location objects has the semantics we want (unique value per source code location), there is no guarantee that they are deduplicated in memory. So we use a hash table, and map Location values to lock classes. Et voila, implicit lock class support! This lets us clean up the Mutex & co APIs and make them look a lot more Rust-like, but it also means we can now throw Lockdep into more APIs without breaking the API. And so we can pull a neat trick: adding Lockdep support into Arc. This catches cases where the Arc Drop implementation could create a locking correctness violation only when the reference count drops to 0 at that particular drop site, which is otherwise not detectable unless that condition actually happens at runtime. Since Drop is "magic" in Rust and Drop codepaths very difficult to audit, this helps a lot. For the initial RFC, this implements the new API only for Mutex. If this looks good, I can extend it to CondVar & friends in the next version. This series also folds in a few related minor dependencies / changes (like the pin_init mutex stuff). Signed-off-by: Asahi Lina --- Asahi Lina (11): rust: types: Add Opaque::zeroed() rust: lock: Add Lock::pin_init() rust: Use absolute paths to build Rust objects rust: siphash: Add a simple siphash abstraction rust: sync: Add dummy LockClassKey implementation for !CONFIG_LOCKDEP rust: sync: Replace static LockClassKey refs with a pointer wrapper rust: sync: Implement dynamic lockdep class creation rust: sync: Classless Lock::new() and pin_init() rust: init: Update documentation for new mutex init style rust: sync: Add LockdepMap abstraction rust: sync: arc: Add lockdep integration lib/Kconfig.debug | 8 ++ rust/Makefile | 2 +- rust/bindings/bindings_helper.h | 2 + rust/helpers.c | 24 ++++ rust/kernel/init.rs | 22 ++-- rust/kernel/lib.rs | 1 + rust/kernel/siphash.rs | 39 +++++++ rust/kernel/sync.rs | 33 ++---- rust/kernel/sync/arc.rs | 71 +++++++++++- rust/kernel/sync/condvar.rs | 2 +- rust/kernel/sync/lock.rs | 68 ++++++++++- rust/kernel/sync/lock/mutex.rs | 15 ++- rust/kernel/sync/lock/spinlock.rs | 2 +- rust/kernel/sync/lockdep.rs | 229 ++++++++++++++++++++++++++++++++++++++ rust/kernel/sync/no_lockdep.rs | 38 +++++++ rust/kernel/types.rs | 7 +- scripts/Makefile.build | 8 +- 17 files changed, 525 insertions(+), 46 deletions(-) --- base-commit: 7eb28ae62e16abc207c90064ad2b824c19566fe2 change-id: 20230714-classless_lockdep-f1d5972fb4ba Thank you, ~~ Lina