From: Asahi Lina <lina@xxxxxxxxxxxxx> The XArray is an abstract data type which behaves like a very large array of pointers. Add a Rust abstraction for this data type. The initial implementation uses explicit locking on get operations and returns a guard which blocks mutation, ensuring that the referenced object remains alive. To avoid excessive serialization, users are expected to use an inner type that can be efficiently cloned (such as Arc<T>), and eagerly clone and drop the guard to unblock other users after a lookup. Future variants may support using RCU instead to avoid mutex locking. This abstraction also introduces a reservation mechanism, which can be used by alloc-capable XArrays to reserve a free slot without immediately filling it, and then do so at a later time. If the reservation is dropped without being filled, the slot is freed again for other users, which eliminates the need for explicit cleanup code. Signed-off-by: Asahi Lina <lina@xxxxxxxxxxxxx> Co-developed-by: Maíra Canal <mcanal@xxxxxxxxxx> Signed-off-by: Maíra Canal <mcanal@xxxxxxxxxx> Reviewed-by: Andreas Hindborg <a.hindborg@xxxxxxxxxxx> --- rust/bindings/bindings_helper.h | 17 ++ rust/helpers.c | 37 +++ rust/kernel/lib.rs | 1 + rust/kernel/xarray.rs | 407 ++++++++++++++++++++++++++++++++ 4 files changed, 462 insertions(+) create mode 100644 rust/kernel/xarray.rs diff --git a/rust/bindings/bindings_helper.h b/rust/bindings/bindings_helper.h index 65b98831b975..7a6be07038ce 100644 --- a/rust/bindings/bindings_helper.h +++ b/rust/bindings/bindings_helper.h @@ -17,8 +17,25 @@ #include <linux/slab.h> #include <linux/wait.h> #include <linux/workqueue.h> +#include <linux/xarray.h> /* `bindgen` gets confused at certain things. */ const size_t RUST_CONST_HELPER_ARCH_SLAB_MINALIGN = ARCH_SLAB_MINALIGN; const gfp_t RUST_CONST_HELPER_GFP_KERNEL = GFP_KERNEL; const gfp_t RUST_CONST_HELPER___GFP_ZERO = __GFP_ZERO; + +const gfp_t RUST_CONST_HELPER_XA_FLAGS_LOCK_IRQ = XA_FLAGS_LOCK_IRQ; +const gfp_t RUST_CONST_HELPER_XA_FLAGS_LOCK_BH = XA_FLAGS_LOCK_BH; +const gfp_t RUST_CONST_HELPER_XA_FLAGS_TRACK_FREE = XA_FLAGS_TRACK_FREE; +const gfp_t RUST_CONST_HELPER_XA_FLAGS_ZERO_BUSY = XA_FLAGS_ZERO_BUSY; +const gfp_t RUST_CONST_HELPER_XA_FLAGS_ALLOC_WRAPPED = XA_FLAGS_ALLOC_WRAPPED; +const gfp_t RUST_CONST_HELPER_XA_FLAGS_ACCOUNT = XA_FLAGS_ACCOUNT; +const gfp_t RUST_CONST_HELPER_XA_FLAGS_ALLOC = XA_FLAGS_ALLOC; +const gfp_t RUST_CONST_HELPER_XA_FLAGS_ALLOC1 = XA_FLAGS_ALLOC1; + +const xa_mark_t RUST_CONST_HELPER_XA_MARK_0 = XA_MARK_0; +const xa_mark_t RUST_CONST_HELPER_XA_MARK_1 = XA_MARK_1; +const xa_mark_t RUST_CONST_HELPER_XA_MARK_2 = XA_MARK_2; +const xa_mark_t RUST_CONST_HELPER_XA_PRESENT = XA_PRESENT; +const xa_mark_t RUST_CONST_HELPER_XA_MARK_MAX = XA_MARK_MAX; +const xa_mark_t RUST_CONST_HELPER_XA_FREE_MARK = XA_FREE_MARK; diff --git a/rust/helpers.c b/rust/helpers.c index 70e59efd92bc..72a7f9c596ad 100644 --- a/rust/helpers.c +++ b/rust/helpers.c @@ -31,6 +31,7 @@ #include <linux/spinlock.h> #include <linux/wait.h> #include <linux/workqueue.h> +#include <linux/xarray.h> __noreturn void rust_helper_BUG(void) { @@ -157,6 +158,42 @@ void rust_helper_init_work_with_key(struct work_struct *work, work_func_t func, } EXPORT_SYMBOL_GPL(rust_helper_init_work_with_key); +void rust_helper_xa_init_flags(struct xarray *xa, gfp_t flags) +{ + xa_init_flags(xa, flags); +} +EXPORT_SYMBOL_GPL(rust_helper_xa_init_flags); + +bool rust_helper_xa_empty(struct xarray *xa) +{ + return xa_empty(xa); +} +EXPORT_SYMBOL_GPL(rust_helper_xa_empty); + +int rust_helper_xa_alloc(struct xarray *xa, u32 *id, void *entry, struct xa_limit limit, gfp_t gfp) +{ + return xa_alloc(xa, id, entry, limit, gfp); +} +EXPORT_SYMBOL_GPL(rust_helper_xa_alloc); + +void rust_helper_xa_lock(struct xarray *xa) +{ + xa_lock(xa); +} +EXPORT_SYMBOL_GPL(rust_helper_xa_lock); + +void rust_helper_xa_unlock(struct xarray *xa) +{ + xa_unlock(xa); +} +EXPORT_SYMBOL_GPL(rust_helper_xa_unlock); + +int rust_helper_xa_err(void *entry) +{ + return xa_err(entry); +} +EXPORT_SYMBOL_GPL(rust_helper_xa_err); + /* * `bindgen` binds the C `size_t` type as the Rust `usize` type, so we can * use it in contexts where Rust expects a `usize` like slice (array) indices. diff --git a/rust/kernel/lib.rs b/rust/kernel/lib.rs index be68d5e567b1..ec7e5b5c2d0a 100644 --- a/rust/kernel/lib.rs +++ b/rust/kernel/lib.rs @@ -50,6 +50,7 @@ pub mod time; pub mod types; pub mod workqueue; +pub mod xarray; #[doc(hidden)] pub use bindings; diff --git a/rust/kernel/xarray.rs b/rust/kernel/xarray.rs new file mode 100644 index 000000000000..02ca6ae2d160 --- /dev/null +++ b/rust/kernel/xarray.rs @@ -0,0 +1,407 @@ +// SPDX-License-Identifier: GPL-2.0 + +//! XArray abstraction. +//! +//! C header: [`include/linux/xarray.h`](srctree/include/linux/xarray.h) + +use crate::{ + bindings, + error::{to_result, Error, Result}, + prelude::*, + types::{ForeignOwnable, Opaque, ScopeGuard}, +}; +use core::{ffi::{c_void, c_ulong}, marker::PhantomData, mem, ops::Deref, ptr::NonNull}; + +/// Flags passed to [`XArray::new`] to configure the [`XArray`]. +type Flags = bindings::gfp_t; + +/// Flag values passed to [`XArray::new`] to configure the [`XArray`]. +pub mod flags { + /// Use IRQ-safe locking. + pub const LOCK_IRQ: super::Flags = bindings::XA_FLAGS_LOCK_IRQ; + /// Use softirq-safe locking. + pub const LOCK_BH: super::Flags = bindings::XA_FLAGS_LOCK_BH; + /// Track which entries are free (distinct from [`None`]). + pub const TRACK_FREE: super::Flags = bindings::XA_FLAGS_TRACK_FREE; + /// Initialize array index 0 as busy. + pub const ZERO_BUSY: super::Flags = bindings::XA_FLAGS_ZERO_BUSY; + /// Use GFP_ACCOUNT for internal memory allocations. + pub const ACCOUNT: super::Flags = bindings::XA_FLAGS_ACCOUNT; + /// Create an allocating [`XArray`] starting at index 0. + pub const ALLOC: super::Flags = bindings::XA_FLAGS_ALLOC; + /// Create an allocating [`XArray`] starting at index 1. + pub const ALLOC1: super::Flags = bindings::XA_FLAGS_ALLOC1; +} + +/// An array which efficiently maps sparse integer indices to owned objects. +/// +/// This is similar to a [`Vec<Option<T>>`], but more efficient when there are +/// holes in the index space, and can be efficiently grown. +/// +/// This structure is expected to often be used with an inner type that +/// can be efficiently cloned, such as an [`Arc<T>`]. +/// +/// # Invariants +/// +/// All pointers stored in the array are pointers obtained by calling +/// `T::into_foreign` or are NULL pointers. `self.xa` is always an +/// initialized and valid [`XArray`]. +#[pin_data(PinnedDrop)] +pub struct XArray<T: ForeignOwnable> { + #[pin] + xa: Opaque<bindings::xarray>, + _p: PhantomData<T>, +} + +/// Wrapper for a value owned by the [`XArray`] which holds the [`XArray`] lock until +/// dropped. +/// +/// You can use the [`into_foreign`] method to obtain a pointer to the foreign +/// representation of the owned value, which is valid for the lifetime of the [`Guard`]. +/// +/// # Invariants +/// +/// [`Guard`] holds a reference (`self.0`) to the underlying value owned by the +/// [`XArray`] (`self.1`) with its lock held. +pub struct Guard<'a, T: ForeignOwnable>(NonNull<c_void>, &'a XArray<T>); + +impl<'a, T: ForeignOwnable> Guard<'a, T> { + /// Borrow the underlying value wrapped by the [`Guard`]. + /// + /// Returns a [`T::Borrowed`] type for the owned [`ForeignOwnable`] type. + pub fn borrow(&self) -> T::Borrowed<'_> { + // SAFETY: The value is owned by the [`XArray`], the lifetime it is + // borrowed for must not outlive the [`XArray`] itself, nor the [`Guard`] + // that holds the lock ensuring the value remains in the [`XArray`]. + // + // By the type invariant of [`Guard`], we can guarantee that [`Guard`] + // holds this reference (`self.0`). + unsafe { T::borrow(self.0.as_ptr()) } + } +} + +// Convenience impl for [`ForeignOwnable`] types whose [`Borrowed`] form +// implements [`Deref`]. +impl<'a, T: ForeignOwnable> Deref for Guard<'a, T> +where + T::Borrowed<'a>: Deref, + for<'b> T::Borrowed<'b>: Into<&'b <T::Borrowed<'a> as Deref>::Target>, +{ + type Target = <T::Borrowed<'a> as Deref>::Target; + + fn deref(&self) -> &Self::Target { + self.borrow().into() + } +} + +impl<'a, T: ForeignOwnable> Drop for Guard<'a, T> { + fn drop(&mut self) { + // SAFETY: By the type invariant, we own the [`XArray`] lock, so we must + // unlock it here. + unsafe { bindings::xa_unlock(self.1.xa.get()) }; + } +} + +/// Represents a reserved slot in an [`XArray`], which does not yet have a value +/// but has an assigned index and may not be allocated by any other user. If the +/// [`Reservation`] is dropped without being filled, the entry is marked as +/// available again. +/// +/// Users must ensure that reserved slots are not filled by other mechanisms, or +/// otherwise their contents may be dropped and replaced (which will print a warning). +pub struct Reservation<'a, T: ForeignOwnable>(&'a XArray<T>, usize); + +impl<'a, T: ForeignOwnable> Reservation<'a, T> { + /// Stores a value into the reserved slot. + pub fn store(self, value: T) -> Result<usize> { + if self.0.replace(self.1, value)?.is_some() { + crate::pr_err!("XArray: Reservation stored but the entry already had data!\n"); + // Consider it a success anyway, not much we can do. + } + let index = self.1; + // The reservation is now fulfilled, so do not run our destructor. + core::mem::forget(self); + Ok(index) + } + + /// Returns the index of this reservation. + pub fn index(&self) -> usize { + self.1 + } +} + +impl<'a, T: ForeignOwnable> Drop for Reservation<'a, T> { + fn drop(&mut self) { + if self.0.remove(self.1).is_some() { + crate::pr_err!("XArray: Reservation dropped but the entry was not empty!\n"); + } + } +} + +/// # Examples +/// +/// ```rust +/// use kernel::xarray::{XArray, flags}; +/// use kernel::sync::Arc; +/// +/// struct Foo { +/// a: u32, +/// b: u32, +/// } +/// +/// let arr = Box::pin_init(XArray::<Arc<Foo>>::new(flags::ALLOC1))?; +/// +/// let item = Arc::try_new(Foo { a : 1, b: 2 })?; +/// let index = arr.alloc(item)?; +/// +/// if let Some(guard) = arr.get_locked(index) { +/// assert_eq!(guard.borrow().a, 1); +/// assert_eq!(guard.borrow().b, 2); +/// } else { +/// pr_info!("No value found in index {}", index); +/// } +/// +/// let item = Arc::try_new(Foo { a : 3, b: 4 })?; +/// let index = arr.alloc(item)?; +/// +/// if let Some(removed_data) = arr.remove(index) { +/// assert_eq!(removed_data.a, 3); +/// assert_eq!(removed_data.b, 4); +/// } else { +/// pr_info!("No value found in index {}", index); +/// } +/// # Ok::<(), Error>(()) +/// ``` +impl<T: ForeignOwnable> XArray<T> { + /// Creates a new [`XArray`] with the given flags. + pub fn new(flags: Flags) -> impl PinInit<Self> { + pin_init!(Self { + // SAFETY: `xa` is valid while the closure is called. + xa <- Opaque::ffi_init(|xa| unsafe { + bindings::xa_init_flags(xa, flags) + }), + _p: PhantomData, + }) + } + + /// Converts [`usize`] to `unsigned long`. + fn to_index(i: usize) -> c_ulong { + // The type is `unsigned long`, which is always the same as `usize` in + // the kernel. + build_assert!(mem::size_of::<usize>() == mem::size_of::<c_ulong>()); + i as c_ulong + } + + /// Replaces an entry with a new value, returning the old value (if any). + pub fn replace(&self, index: usize, value: T) -> Result<Option<T>> { + let new = value.into_foreign(); + + build_assert!(T::FOREIGN_ALIGN >= 4); + + // SAFETY: `new` just came from [`into_foreign()`], and we dismiss this guard + // if the `xa_store` operation succeeds and takes ownership of the pointer. + let guard = ScopeGuard::new(|| unsafe { + drop(T::from_foreign(new)); + }); + + // SAFETY: `self.xa` is always valid by the type invariant, and we are + // storing a [`T::into_foreign()`] result which upholds the later invariants. + let old = unsafe { + bindings::xa_store( + self.xa.get(), + Self::to_index(index), + new.cast_mut(), + bindings::GFP_KERNEL, + ) + }; + + // SAFETY: `xa_store` returns the old entry at this index on success or + // a [`XArray`] result, which can be turn into an errno through `xa_err`. + to_result(unsafe { bindings::xa_err(old) })?; + guard.dismiss(); + + Ok(if old.is_null() { + None + } else { + // SAFETY: The old value must have been stored by either this function or + // `insert_between`, both of which ensure non-NULL entries are valid + // [`ForeignOwnable`] pointers. + Some(unsafe { T::from_foreign(old) }) + }) + } + + /// Replaces an entry with a new value, dropping the old value (if any). + pub fn set(&self, index: usize, value: T) -> Result { + self.replace(index, value)?; + Ok(()) + } + + /// Looks up and returns a reference to an entry in the array, returning a + /// [`Guard`] if it exists. + /// + /// This guard blocks all other actions on the [`XArray`]. Callers are expected + /// to drop the [`Guard`] eagerly to avoid blocking other users, such as by + /// taking a clone of the value. + pub fn get_locked(&self, index: usize) -> Option<Guard<'_, T>> { + // SAFETY: `self.xa` is always valid by the type invariant. + unsafe { bindings::xa_lock(self.xa.get()) }; + + // SAFETY: `self.xa` is always valid by the type invariant. + let guard = ScopeGuard::new(|| unsafe { bindings::xa_unlock(self.xa.get()) }); + + // SAFETY: `self.xa` is always valid by the type invariant. + // + // We currently hold the `xa_lock`, which is allowed by `xa_load`. The + // returned pointer `p` is only valid until we release the lock, which + // is okay here, since the returned [`Guard`] ensures that the pointer can + // only be used while the lock is still held. + let p = unsafe { bindings::xa_load(self.xa.get(), Self::to_index(index)) }; + + let p = NonNull::new(p)?; + guard.dismiss(); + + // INVARIANT: We just dismissed the `guard`, so we can pass ownership of + // the lock to the returned [`Guard`]. + Some(Guard(p, self)) + } + + /// Removes and returns an entry, returning it if it existed. + pub fn remove(&self, index: usize) -> Option<T> { + // SAFETY: `self.xa` is always valid by the type invariant. + let p = unsafe { bindings::xa_erase(self.xa.get(), Self::to_index(index)) }; + if p.is_null() { + None + } else { + // SAFETY: By the type invariant of `Self`, all pointers stored in + // the array are pointers obtained by calling [`T::into_foreign`]. + Some(unsafe { T::from_foreign(p) }) + } + } + + /// Allocates a new index in the array, optionally storing a new value into + /// it, with configurable bounds for the index range to allocate from. + /// + /// If `value` is [`None`], then the index is reserved from further allocation + /// but remains free for storing a value into it. + fn insert_between(&self, value: Option<T>, min: u32, max: u32) -> Result<usize> { + let new = value.map_or(core::ptr::null(), |a| a.into_foreign()); + let mut id: u32 = 0; + + let guard = ScopeGuard::new(|| { + if !new.is_null() { + // SAFETY: If `new` is not NULL, it came from the [`ForeignOwnable`] + // we got from the caller. + unsafe { drop(T::from_foreign(new)) }; + } + }); + + // SAFETY: `self.xa` is always valid by the type invariant. + // + // If this succeeds, it takes ownership of the passed `T` (if any). + // If it fails, we must drop the `T` again. + let ret = unsafe { + bindings::xa_alloc( + self.xa.get(), + &mut id, + new.cast_mut(), + bindings::xa_limit { min, max }, + bindings::GFP_KERNEL, + ) + }; + + if ret < 0 { + Err(Error::from_errno(ret)) + } else { + guard.dismiss(); + Ok(id as usize) + } + } + + /// Allocates a new index in the array, storing a new value into it, with + /// configurable bounds for the index range to allocate from. + pub fn alloc_limits(&self, value: T, min: u32, max: u32) -> Result<usize> { + self.insert_between(Some(value), min, max) + } + + /// Allocates a new index in the array, storing a new value into it. + pub fn alloc(&self, value: T) -> Result<usize> { + self.alloc_limits(value, 0, u32::MAX) + } + + /// Reserves a new index in the array within configurable bounds for the index. + /// + /// Returns a [`Reservation`] object, which can then be used to store a value + /// at this index or otherwise free it for reuse. + pub fn reserve_limits(&self, min: u32, max: u32) -> Result<Reservation<'_, T>> { + Ok(Reservation( + self, + self.insert_between(None, min, max)?, + )) + } + + /// Reserves a new index in the array. + /// + /// Returns a `Reservation` object, which can then be used to store a value + /// at this index or otherwise free it for reuse. + pub fn reserve(&self) -> Result<Reservation<'_, T>> { + Ok(Reservation( + self, + self.insert_between(None, 0, u32::MAX)?, + )) + } +} + +#[pinned_drop] +impl<T: ForeignOwnable> PinnedDrop for XArray<T> { + fn drop(self: Pin<&mut Self>) { + let mut index:c_ulong = 0; + let mut entry; + + // SAFETY: `self.xa` is valid by the type invariant. + unsafe { + entry = bindings::xa_find( + self.xa.get(), + &mut index, + c_ulong::MAX, + bindings::XA_PRESENT, + ); + } + + while !entry.is_null() { + // SAFETY: All pointers stored in the array are pointers obtained by + // calling [`T::into_foreign`]. + unsafe { drop(T::from_foreign(entry)) }; + + // SAFETY: `self.xa` is valid by the type invariant, and as we have + // the only reference to the [`XArray`] we can safely iterate its + // contents and drop everything. + unsafe { + entry = bindings::xa_find_after( + self.xa.get(), + &mut index, + c_ulong::MAX, + bindings::XA_PRESENT, + ); + } + } + + // SAFETY: By the type invariants, we have ownership of the [`XArray`], + // and we don't use it after this call, so we can destroy it. + unsafe { bindings::xa_destroy(self.xa.get()) }; + } +} + +// SAFETY: It is safe to send `XArray<T>` to another thread when the underlying +// `T` is `Send` because XArray is thread-safe and all mutation operations are +// internally locked. `T` must be `ForeignOwnable` because all pointers stored +// in the array are pointers obtained by calling `T::into_foreign` or are NULL +// pointers. +unsafe impl<T: Send + ForeignOwnable> Send for XArray<T> {} +// +// SAFETY: It is safe to send `&XArray<T>` to another thread when the underlying +// `T` is `Sync` because it effectively means sharing `&T` (which is safe because +// `T` is `Sync`). Additionally, `T` is `Send` because XArray is thread-safe and +// all mutation operations are internally locked. `T` must be `ForeignOwnable` +// because all pointers stored in the array are pointers obtained by calling +// `T::into_foreign` or are NULL pointers. +unsafe impl<T: Send + Sync + ForeignOwnable> Sync for XArray<T> {} -- 2.43.0