Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp943725rwd; Wed, 31 May 2023 07:30:56 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6EUhuLX7SCN1S5Z9N9FhoevHhDHicP5evGrrpjDRzuzqVyAjJDlh37bUUPvmhfgcjrbcAC X-Received: by 2002:a17:90a:1d4c:b0:24d:f992:5286 with SMTP id u12-20020a17090a1d4c00b0024df9925286mr5845758pju.36.1685543456389; Wed, 31 May 2023 07:30:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685543456; cv=none; d=google.com; s=arc-20160816; b=VnApsj1Y6q0KXkZOb7ixHM+lfATNTWU8kZmAU+h+7f+iUYvUxK/NQMVKb/ebXLL3Vs GXN2WfMThKUEuiZBcsM+ixEf37gYHIPq2JpnlZyIpaFobyS1pSNi28cbBi2EleMa12TU w6XZOfpBEUu30m07hI8acDhw4EwzgUCq9T0Bg5j/rjWdtILxjHPU5hk2zlQPJWCagfwV 9KWjzwxjokzpyRCzyZjDiC9UBUCF1XdZWucyBJ9mU5oMoLvCnLjGt4cgfZ9d1R09Qz3i fXZU57qZejbEiWvvZFhJMY/gFUAhbH8gfPjCxNNR3I4UGDVD4m/X0V/BczlgVn3a2KHI SrDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=C+3Et5cju5cYIbnO1iHgVsG4nORzzNf7kwjzGpF1D98=; b=tNxGMzUukcQ7AItX456Ckts8Ik7oIZVwdveI8Tg4e2Al/8oAAKrlJ0mbG80lrp4d+Z htwX1dZ+xBA9R3FXp8UPzdjoGVYwCbDMTfMHvdIobNP+n8UiNzFvn2a9QHQJRE6C3raC oP0mGgAgN2z6JBfHVYM8vnlf1EPMcUrslYLSguzws4jJG2pF5RnJdjpyMePrhjWQiKfv kabFXmBCAaX1AQD3ynTI/l4eHvSwCB8slkwlqk9ApoYs6q+Kh9xufu2GO/rsGFCOAAPW weXdDkeG97cq2ckyx4dXaCYPaSJls9ATp20MWpsbU2tfj+oFoz9wUXKK/eF/IwOv9uMJ 2amQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b="fSR/a0RI"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gd9-20020a17090b0fc900b00255fb1f4a17si1067660pjb.42.2023.05.31.07.30.44; Wed, 31 May 2023 07:30:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b="fSR/a0RI"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236197AbjEaORA (ORCPT + 99 others); Wed, 31 May 2023 10:17:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56850 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236880AbjEaOQf (ORCPT ); Wed, 31 May 2023 10:16:35 -0400 Received: from mail-ed1-f74.google.com (mail-ed1-f74.google.com [209.85.208.74]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5B83E1703 for ; Wed, 31 May 2023 07:14:25 -0700 (PDT) Received: by mail-ed1-f74.google.com with SMTP id 4fb4d7f45d1cf-514b8d2b21fso857847a12.1 for ; Wed, 31 May 2023 07:14:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1685542071; x=1688134071; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=C+3Et5cju5cYIbnO1iHgVsG4nORzzNf7kwjzGpF1D98=; b=fSR/a0RIq2Cy5mzkIieekB3gKX1I5GrCdYGfRHVjcL4N9W/KM5z1Sp1MnfrCjE2oKe N8FYnt1/jahwGDrdC+4F5EYePBRPewx4QoM0eLfI49srEYomVFEN8jnsu6wO5KuweTt8 ri3KhOk+zDaY8WvQu9kgGdtxkqUfIUJkbg2caGBB8i3WihtvvXL46IcyT8m9oBzoxdB0 VTj3sn6a0swNGVDJmpI6k7Cu89VMVv2/ET/shIr8PVepO489GnU3l1Nw5ghTOB8vTyoH cWt49Ecc8rUUiEigBPNA7dm4fguCpl/C+VVjFmL+R9ZKC/wcrtyem2wiRfTZNBw5J7pq yZpA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685542071; x=1688134071; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=C+3Et5cju5cYIbnO1iHgVsG4nORzzNf7kwjzGpF1D98=; b=EQZGCecAFowJ7yZgCy472c9nE+75eKtWHMhoKrBICDTQVQHpIEa6PYkdun00BCDVyJ HBIiFxew/UeIrVy/oz18meRbAeqWa3SsjWc82mkv3MyltAp0b6/nwcFeiZAyNLZ0bZJz 1/E2pvc1B0csjgoNZFvq5vIwQkUle5n5eJxTmgoWk6KTkesBoeYvRU7nlDwvTAdqTXYq 08Owg31nKbfJYN/abXYXROj5YYnpvDYMA8nAAHSUBGriDofKsb852Jm1UfpKd4fU9Uy+ YxJ/wNdQWxAI8l+eMAtRZAlkwQywIil7MeU6S1FtHiWZVOu9Tan2IvU1Awx6gcesEzH/ 6+0A== X-Gm-Message-State: AC+VfDyjNs6oAzdAKQH1lzAJHySWMqvP7zrp4TNxJWksHIFOcm1m6TAo IuaIKbooQex8rIXmuUuXWvYOqdlG9+gyk0I= X-Received: from aliceryhl.c.googlers.com ([fda3:e722:ac3:cc00:31:98fb:c0a8:6c8]) (user=aliceryhl job=sendgmr) by 2002:a50:cdc1:0:b0:504:fcf5:63ee with SMTP id h1-20020a50cdc1000000b00504fcf563eemr1835699edj.0.1685542071584; Wed, 31 May 2023 07:07:51 -0700 (PDT) Date: Wed, 31 May 2023 14:07:49 +0000 In-Reply-To: <87bki29jsc.fsf@metaspace.dk> Mime-Version: 1.0 References: <87bki29jsc.fsf@metaspace.dk> X-Mailer: git-send-email 2.41.0.rc0.172.g3f132b7071-goog Message-ID: <20230531140749.3708572-1-aliceryhl@google.com> Subject: Re: [PATCH v1 6/7] rust: workqueue: add safe API to workqueue From: Alice Ryhl To: nmi@metaspace.dk Cc: alex.gaynor@gmail.com, aliceryhl@google.com, benno.lossin@proton.me, bjorn3_gh@protonmail.com, boqun.feng@gmail.com, gary@garyguo.net, jiangshanlai@gmail.com, linux-kernel@vger.kernel.org, ojeda@kernel.org, patches@lists.linux.dev, rust-for-linux@vger.kernel.org, tj@kernel.org, wedsonaf@gmail.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Andreas Hindborg writes: > Alice Ryhl writes: >> +unsafe impl WorkItem for Arc >> +where >> + T: ArcWorkItem + HasWork + ?Sized, >> +{ >> + type EnqueueOutput = Result<(), Self>; >> + >> + unsafe fn __enqueue(self, queue_work_on: F) -> Self::EnqueueOutput >> + where >> + F: FnOnce(*mut bindings::work_struct) -> bool, >> + { >> + let ptr = Arc::into_raw(self); >> + >> + // Using `get_work_offset` here for object-safety. >> + // >> + // SAFETY: The pointer is valid since we just got it from `into_raw`. >> + let off = unsafe { (&*ptr).get_work_offset() }; >> + >> + // SAFETY: The `HasWork` impl promises that this offset gives us a field of type >> + // `Work` in the same allocation. >> + let work_ptr = unsafe { (ptr as *const u8).add(off) as *const Work }; > > We have this functionality in the default impl of > `HasWork::raw_get_work() where Self: Sized`. I am uncertain about the > `Sized` bound. If it is sound to do the offset calculation here where > `T: ?Sized`, it should also be sound in the default implementation of > `HasWork`. Should we not be able to change the bound on > `HasWork::raw_get_work()` to `Self: ?Sized` and call into that from > here? > > let work_ptr = unsafe { >::raw_get_work(ptr as _) }; > > Same for Box. > > BR Andreas I looked into this, and it seems like we can remove `Self: Sized` bound from `raw_get_work`, so I am able to simplify this code somewhat. However, it cannot be removed from `container_of`. Thanks, Alice