Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp1909096rwd; Wed, 17 May 2023 03:09:33 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5kgefFtbDAKtHUdFGjNg+sWbU0IrZs3Rrr/DZL7Vf3WmAfx8+HXwcN8cyYvisZpO+9ekec X-Received: by 2002:a17:902:f682:b0:1a0:7156:f8d1 with SMTP id l2-20020a170902f68200b001a07156f8d1mr53171571plg.19.1684318173190; Wed, 17 May 2023 03:09:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684318173; cv=none; d=google.com; s=arc-20160816; b=zyHAsfi5G2oS9c4dI4ejzgrjb6V56+F+ksZG5ipfhDJGgY3nyY1YXBr65XewD7LKiW AIxhnNBPprvXz8Uh4f6Xq8kLCMQSTr8/LSuNCRAFW3lJ4aNYWha+Iv0dW/2y+rCQNGlU ujw2rj9AGhRpPKM1xIp3fThVhwjR4+wjyxPsaYUnSJZky+w4Sb4KkFoEuQ4mIj+tw/dd OjI4e9mh2eMWzanW/Ay7mtwrsNHi4mLvVQ1+62rhZoQqLphONJCBoo8R39HsTh/WPAeC UkTBZmnfgAql1Z2C/nuYWmeiSA6RVChjIbHug3uVuHw4Y2K0FB6lqe9/sXreWm8hDPrP ibxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :dkim-signature; bh=oVJvngviayRWrsi8hPEk5VyWaF+LdxzTgL6t46JKF4M=; b=yXBBvQLZ38tcZIH4HCNpZBtpCXDC56JP39HxGJ47Nn/dmDGXxZA1dX5K6pc1kWNLy/ 8xHO7MnbZu7eRAWxvbTOigg2LLHNAWPxLeXfNAT37XSnsaG0CqZTvB6qQuDgVBvB8W/K QUZhoxAto6IY4SQ1xRRBOAwVO0S+WCl3A1pN2TQdWxiXYM8meYGTmzPNJfdEiNCZG6nS bHWGmj1sDyJ3gefwfKQDb+sxFK/ln54AHAI/mPeaeQ1MAG2Zw4ixLfruYvPUkgNiVmLz iYt97kh/oCkqjto57GBqbT0QfVsMb4QKwLx5EKPUCBdRBuWkcNIU/GdBzdgku8rgz1YD eXpg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=KecI38Q9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l16-20020a170902f69000b001ab18d794a5si22830096plg.297.2023.05.17.03.09.20; Wed, 17 May 2023 03:09:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=KecI38Q9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230194AbjEQJ71 (ORCPT + 99 others); Wed, 17 May 2023 05:59:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34796 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230184AbjEQJ7V (ORCPT ); Wed, 17 May 2023 05:59:21 -0400 Received: from mail-ej1-x649.google.com (mail-ej1-x649.google.com [IPv6:2a00:1450:4864:20::649]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 639A95FE2 for ; Wed, 17 May 2023 02:59:15 -0700 (PDT) Received: by mail-ej1-x649.google.com with SMTP id a640c23a62f3a-94a34d3e5ebso61580766b.3 for ; Wed, 17 May 2023 02:59:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1684317554; x=1686909554; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=oVJvngviayRWrsi8hPEk5VyWaF+LdxzTgL6t46JKF4M=; b=KecI38Q9xTWAE0PprFQml7YSBfXofANn7rQwnOlqGZQhMFXccrFjTplXYrzs4eN+zL EOs4w1CsvnWy4Sl7/g2Q04dfjnQcFZ0PU3eNVE3of+GxwjTtqvjXaMMaCLB45mXBvxQ8 XQyUxZ+6WAI4I+ZwpHt8lMyNKBe30GTIDb3KwJZOIP8cWvdLWbRNUfSab3fBbxm/wQU6 4GBbokznler4dGVzWDXLxxPibCJKbrZkNleLTOX149a8i79MvxPSG9vVwxARsKwBi6x8 VL6QSfteq/nEsNQCxnnU6qdc7q9PZquW7l+93/XCP0DeU/rYfLLxKVvpu0Psb7JsdBk5 NELg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1684317554; x=1686909554; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=oVJvngviayRWrsi8hPEk5VyWaF+LdxzTgL6t46JKF4M=; b=L0qmQS9hUmgfJj5rut/zWavK+t7gaB/4jB0FjQy5miJAQXrwaDRaVsDVbk7FuRgPk4 os3NYXWESmeX0hYkNt5bJxvWym1jkFK8cZguJyMkKaWx2TBzZalzqAjfBM+Jrpsq4SIv It9tj2cXE9HlJikeh9w5BDGdtGIl6Efy4SvnoNF+dSvqt0P4MXxydfVVsU5CaT3GZXMl l/N2hcDHvstkEs19UqRKAfNHrzZ3fqB+SCVTKvGgBbDh4ApHFVZoXhbnBNZMeje2Oo0S TNjJ6Yjli5pydyg/2vMRoeSazpAd5ogN5zRFnCPB8csOzYBSC+NwlI8SDS/9QvNV43rJ 5Qng== X-Gm-Message-State: AC+VfDzQikbXiAeFR4QfO4k/ccYRcn9HljX9XYbV7MicaMKP8fWqAWLa kf6ObeDAZlNsXUMQe9rRGjtgQQjjXmQ4pYk= X-Received: from aliceryhl.c.googlers.com ([fda3:e722:ac3:cc00:31:98fb:c0a8:6c8]) (user=aliceryhl job=sendgmr) by 2002:a17:906:9bc2:b0:94f:23d8:839 with SMTP id de2-20020a1709069bc200b0094f23d80839mr13337271ejc.10.1684317553900; Wed, 17 May 2023 02:59:13 -0700 (PDT) Date: Wed, 17 May 2023 09:59:04 +0000 Mime-Version: 1.0 X-Mailer: git-send-email 2.40.1.606.ga4b1b128d6-goog Message-ID: <20230517095905.3548100-1-aliceryhl@google.com> Subject: [PATCH v1 1/2] rust: specify when `ARef` is thread safe From: Alice Ryhl To: Miguel Ojeda , Wedson Almeida Filho , Alex Gaynor Cc: Boqun Feng , Gary Guo , "=?UTF-8?q?Bj=C3=B6rn=20Roy=20Baron?=" , Benno Lossin , Alice Ryhl , Ingo Molnar , Peter Zijlstra , Will Deacon , Mark Rutland , rust-for-linux@vger.kernel.org, linux-kernel@vger.kernel.org, patches@lists.linux.dev Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED, USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org An `ARef` behaves just like the `Arc` when it comes to thread safety, so we can reuse the thread safety comments from `Arc` here. This is necessary because without this change, the Rust compiler will assume that things are not thread safe even though they are. Signed-off-by: Alice Ryhl --- rust/kernel/types.rs | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/rust/kernel/types.rs b/rust/kernel/types.rs index 29db59d6119a..9c8d94c04deb 100644 --- a/rust/kernel/types.rs +++ b/rust/kernel/types.rs @@ -321,6 +321,17 @@ pub struct ARef { _p: PhantomData, } +// SAFETY: It is safe to send `ARef` to another thread when the underlying `T` is `Sync` because +// it effectively means sharing `&T` (which is safe because `T` is `Sync`); additionally, it needs +// `T` to be `Send` because any thread that has an `ARef` may ultimately access `T` directly, for +// example, when the reference count reaches zero and `T` is dropped. +unsafe impl Send for ARef {} + +// SAFETY: It is safe to send `&ARef` to another thread when the underlying `T` is `Sync` for the +// same reason as above. `T` needs to be `Send` as well because a thread can clone an `&ARef` +// into an `ARef`, which may lead to `T` being accessed by the same reasoning as above. +unsafe impl Sync for ARef {} + impl ARef { /// Creates a new instance of [`ARef`]. /// base-commit: ac9a78681b921877518763ba0e89202254349d1b -- 2.40.1.606.ga4b1b128d6-goog