Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp270880rdb; Thu, 30 Nov 2023 04:36:30 -0800 (PST) X-Google-Smtp-Source: AGHT+IFwrsiIreYmp9uV3mYCcaQRhGIa5OhlzHReIAu2Vc/g63k8q0T8O8s7dImB0n+8nIViYxJ2 X-Received: by 2002:a17:903:4289:b0:1c3:4b24:d89d with SMTP id ju9-20020a170903428900b001c34b24d89dmr21740425plb.40.1701347789946; Thu, 30 Nov 2023 04:36:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701347789; cv=none; d=google.com; s=arc-20160816; b=J+Aq2f3l+GsHrLz5rvqTREqRvCkQSUrNAt5Ahbfuaz82iCd9xkmKDgqHOJdnEf4lPo TQ2CNLwZlZaZyOQYlMUZOEh+97nNoBKOowLXxrG+5uJCyx140qMe8GROCbQ6GLtuI6RM x0gxi0zMyC7PjB0l225Z8Qmz4lo10a4tdJWOuG1MJ+rF+YCM4tRz3x/OBmUOWFuDik45 iGXftPoNkzBScjOI2x42TqGR+iOgKz0ETa/b0mFuLh5oqpaueU1h/wCkvspVyZykkB32 IDT2BVEvY+DZGzASTKugZiWznKThwKqW5EBybMfg7G6zuMDNFwJs7pFD9rQj72bY8e25 PC3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=a8QVQZbSjRfdPGe4BX7s5KZV2nVaQA9KhsOTXnHzoXE=; fh=RSd+TZy+/ERHgQwZJxQcFDN6ZwblMaCj09CeqL1TqaM=; b=iKL9acCwwIGyJRHzjTsBtnfaVcU3+fl5Gc7wRYeXa/xqNDlpzRXqWagTqxIIWQYrtZ VgZcx28rqoLJzOsNcDWlXLhqyI1p5HYlkcbwGzOSPxOqrdRHS9gf9l0DYulZEE+jwmju Zz/8JjvrM7iCePijqODGNohaKck5JWXTRZJN0EpL0TdQBmEtuP78C42dD6gptzbglFXh DQ76baw3DMRRjvI2jpvJQEzBm11NLGkeF6xIS7F+v5bP/2Bcf8isOYxLGVOh+ESaU1Mb I9owUBnkXvcrK/m3qbAj8QNBQuuKU841BfAWgVgPAvlYZm/k5yIXdAFR0/9JuXpdR3+B vd/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=o2QmaEhh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id q1-20020a170902dac100b001c07bac13d0si1147209plx.383.2023.11.30.04.36.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 04:36:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=o2QmaEhh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 3B66E826ED18; Thu, 30 Nov 2023 04:36:27 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345370AbjK3MgJ (ORCPT + 99 others); Thu, 30 Nov 2023 07:36:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56090 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345369AbjK3MgI (ORCPT ); Thu, 30 Nov 2023 07:36:08 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CDED310CE for ; Thu, 30 Nov 2023 04:36:14 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id AF1C4C433C8; Thu, 30 Nov 2023 12:36:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701347774; bh=EtiRcH4voLF+iaE6Nt64ffXFd88eaIh4a9FFJs3FC8M=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=o2QmaEhhoDDSdbFFx2qGmUEuyScr1iGmxSPJtl7f55G3T1z9lN0PdcTPrWuemXoUO IfwzJciOhNTLWL+S71VQnZ7ftEFRkip8GPgjsH0CfyfOjVGmpyg/odMwndGQbGwLZf YYuW1Qu5o2zrpedLP4lYrQQgKlPdFgUv1EeUjfk3Xb3/DFNmMAcmz97JWUNBRlz3qO RZNiwGA8YzLFqk4qRALooT6zm3UdGub8EqrCd73VmL7/HdEAlU2q3r9zTAuUU8vk4O //g4EdtXEG7l8auwNdWNfABGig40Q2jISdg/tYToSdaTbuyjxiY9eZRYWPpJfQUmBt GCmS/ytNEh53A== Date: Thu, 30 Nov 2023 13:36:06 +0100 From: Christian Brauner To: Alice Ryhl Cc: a.hindborg@samsung.com, alex.gaynor@gmail.com, arve@android.com, benno.lossin@proton.me, bjorn3_gh@protonmail.com, boqun.feng@gmail.com, cmllamas@google.com, dan.j.williams@intel.com, dxu@dxuuu.xyz, gary@garyguo.net, gregkh@linuxfoundation.org, joel@joelfernandes.org, keescook@chromium.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, maco@android.com, ojeda@kernel.org, peterz@infradead.org, rust-for-linux@vger.kernel.org, surenb@google.com, tglx@linutronix.de, tkjos@android.com, viro@zeniv.linux.org.uk, wedsonaf@gmail.com, willy@infradead.org Subject: Re: [PATCH 1/7] rust: file: add Rust abstraction for `struct file` Message-ID: <20231130-zweig-mitleid-2ba3ef78145e@brauner> References: <20231130-sackgasse-abdichtung-62c23edd9a9f@brauner> <20231130121013.140671-1-aliceryhl@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20231130121013.140671-1-aliceryhl@google.com> X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Thu, 30 Nov 2023 04:36:27 -0800 (PST) On Thu, Nov 30, 2023 at 12:10:12PM +0000, Alice Ryhl wrote: > Christian Brauner writes: > >> This is the backdoor. You use it when *you* know that the file is okay > > > > And a huge one. > > > >> to access, but Rust doesn't. It's unsafe because it's not checked by > >> Rust. > >> > >> For example you could do this: > >> > >> let ptr = unsafe { bindings::fdget(fd) }; > >> > >> // SAFETY: We just called `fdget`. > >> let file = unsafe { File::from_ptr(ptr) }; > >> use_file(file); > >> > >> // SAFETY: We're not using `file` after this call. > >> unsafe { bindings::fdput(ptr) }; > >> > >> It's used in Binder here: > >> https://github.com/Darksonn/linux/blob/dca45e6c7848e024709b165a306cdbe88e5b086a/drivers/android/rust_binder.rs#L331-L332 > >> > >> Basically, I use it to say "C code has called fdget for us so it's okay > >> to access the file", whenever userspace uses a syscall to call into the > >> driver. > > > > Yeah, ok, because the fd you're operating on may be coming from fdget(). Iirc, > > binder is almost by default used multi-threaded with a shared file descriptor > > table? But while that means fdget() will usually bump the reference count you > > can't be sure. Hmkay. > > Even if the syscall used `fget` instead of `fdget`, I would still be > using `from_ptr` here. The `ARef` type only really makes sense when *we* > have ownership of the ref-count, but in this case we don't own it. We're > just given a promise that the caller is keeping it alive for us using > some mechanism or another. > > >>>> +// SAFETY: It's OK to access `File` through shared references from other threads because we're > >>>> +// either accessing properties that don't change or that are properly synchronised by C code. > >>> > >>> Uhm, what guarantees are you talking about specifically, please? > >>> Examples would help. > >>> > >>>> +unsafe impl Sync for File {} > >> > >> The Sync trait defines whether a value may be accessed from several > >> threads in parallel (using shared/immutable references). In our case, > > > > So let me put this into my own words and you correct me, please: > > > > So, this really just means that if I have two processes both with their own > > fdtable and they happen to hold fds that refer to the same @file: > > > > P1 P2 > > struct fd fd1 = fdget(1234); > > struct fd fd2 = fdget(5678); > > if (!fd1.file) if (!fd2.file) > > return -EBADF; return -EBADF; > > > > // fd1.file == fd2.file > > > > the only if the Sync trait is implemented both P1 and P2 can in parallel call > > file->f_op->poll(@file)? > > > > So if the Sync trait isn't implemented then the compiler will prohibit that P1 > > and P2 at the same time call file->f_op->poll(@file)? And that's all that's > > meant by a shared reference? It's really about sharing the pointer. > > Yeah, what you're saying sounds correct. For a type that is not Sync, > you would need a lock around the call to `poll` before the compiler > would accept the call. > > (Or some other mechanism to convince the compiler that no other thread > is looking at the file at the same time. Of course, a lock is just one > way to do that.) > > > The thing is that "shared reference" gets a bit in our way here: > > > > (1) If you have SCM_RIGHTs in the mix then P1 can open fd1 to @file and then > > send that @file to P2 which now has fd2 refering to @file as well. The > > @file->f_count is bumped in that process. So @file->f_count is now 2. > > > > Now both P1 and P2 call fdget(). Since they don't have a shared fdtable > > none of them take an additional reference to @file. IOW, @file->f_count > > may remain 2 all throughout the @file->f_op->*() operation. > > > > So they share a reference to that file and elide both the > > atomic_inc_not_zero() and the atomic_dec_not_zero(). > > > > (2) io_uring has fixed files whose reference count always stays at 1. > > So all io_uring operations on such fixed files share a single reference. > > > > So that's why this is a bit confusing at first to read "shared reference". > > > > Please add a comment on top of unsafe impl Sync for File {} > > explaining/clarifying this a little that it's about calling methods on the same > > file. > > Yeah, I agree, the terminology gets a bit mixed up here because we both > use the word "reference" for different things. > > How about this comment? Sounds good.