Auto merge of #28861 - pnkfelix:fsk-nonparam-dropck-issue28498, r=arielb1
implement RFC 1238: nonparametric dropck. cc #28498 cc @nikomatsakis
This commit is contained in:
commit
87cd2c0827
29 changed files with 769 additions and 102 deletions
|
|
@ -115,13 +115,162 @@ section:
|
|||
**For a generic type to soundly implement drop, its generics arguments must
|
||||
strictly outlive it.**
|
||||
|
||||
This rule is sufficient but not necessary to satisfy the drop checker. That is,
|
||||
if your type obeys this rule then it's definitely sound to drop. However
|
||||
there are special cases where you can fail to satisfy this, but still
|
||||
successfully pass the borrow checker. These are the precise rules that are
|
||||
currently up in the air.
|
||||
Obeying this rule is (usually) necessary to satisfy the borrow
|
||||
checker; obeying it is sufficient but not necessary to be
|
||||
sound. That is, if your type obeys this rule then it's definitely
|
||||
sound to drop.
|
||||
|
||||
The reason that it is not always necessary to satisfy the above rule
|
||||
is that some Drop implementations will not access borrowed data even
|
||||
though their type gives them the capability for such access.
|
||||
|
||||
For example, this variant of the above `Inspector` example will never
|
||||
accessed borrowed data:
|
||||
|
||||
```rust,ignore
|
||||
struct Inspector<'a>(&'a u8, &'static str);
|
||||
|
||||
impl<'a> Drop for Inspector<'a> {
|
||||
fn drop(&mut self) {
|
||||
println!("Inspector(_, {}) knows when *not* to inspect.", self.1);
|
||||
}
|
||||
}
|
||||
|
||||
fn main() {
|
||||
let (inspector, days);
|
||||
days = Box::new(1);
|
||||
inspector = Inspector(&days, "gadget");
|
||||
// Let's say `days` happens to get dropped first.
|
||||
// Even when Inspector is dropped, its destructor will not access the
|
||||
// borrowed `days`.
|
||||
}
|
||||
```
|
||||
|
||||
Likewise, this variant will also never access borrowed data:
|
||||
|
||||
```rust,ignore
|
||||
use std::fmt;
|
||||
|
||||
struct Inspector<T: fmt::Display>(T, &'static str);
|
||||
|
||||
impl<T: fmt::Display> Drop for Inspector<T> {
|
||||
fn drop(&mut self) {
|
||||
println!("Inspector(_, {}) knows when *not* to inspect.", self.1);
|
||||
}
|
||||
}
|
||||
|
||||
fn main() {
|
||||
let (inspector, days): (Inspector<&u8>, Box<u8>);
|
||||
days = Box::new(1);
|
||||
inspector = Inspector(&days, "gadget");
|
||||
// Let's say `days` happens to get dropped first.
|
||||
// Even when Inspector is dropped, its destructor will not access the
|
||||
// borrowed `days`.
|
||||
}
|
||||
```
|
||||
|
||||
However, *both* of the above variants are rejected by the borrow
|
||||
checker during the analysis of `fn main`, saying that `days` does not
|
||||
live long enough.
|
||||
|
||||
The reason is that the borrow checking analysis of `main` does not
|
||||
know about the internals of each Inspector's Drop implementation. As
|
||||
far as the borrow checker knows while it is analyzing `main`, the body
|
||||
of an inspector's destructor might access that borrowed data.
|
||||
|
||||
Therefore, the drop checker forces all borrowed data in a value to
|
||||
strictly outlive that value.
|
||||
|
||||
# An Escape Hatch
|
||||
|
||||
The precise rules that govern drop checking may be less restrictive in
|
||||
the future.
|
||||
|
||||
The current analysis is deliberately conservative and trivial; it forces all
|
||||
borrowed data in a value to outlive that value, which is certainly sound.
|
||||
|
||||
Future versions of the language may make the analysis more precise, to
|
||||
reduce the number of cases where sound code is rejected as unsafe.
|
||||
This would help address cases such as the two Inspectors above that
|
||||
know not to inspect during destruction.
|
||||
|
||||
In the meantime, there is an unstable attribute that one can use to
|
||||
assert (unsafely) that a generic type's destructor is *guaranteed* to
|
||||
not access any expired data, even if its type gives it the capability
|
||||
to do so.
|
||||
|
||||
That attribute is called `unsafe_destructor_blind_to_params`.
|
||||
To deploy it on the Inspector example from above, we would write:
|
||||
|
||||
```rust,ignore
|
||||
struct Inspector<'a>(&'a u8, &'static str);
|
||||
|
||||
impl<'a> Drop for Inspector<'a> {
|
||||
#[unsafe_destructor_blind_to_params]
|
||||
fn drop(&mut self) {
|
||||
println!("Inspector(_, {}) knows when *not* to inspect.", self.1);
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
This attribute has the word `unsafe` in it because the compiler is not
|
||||
checking the implicit assertion that no potentially expired data
|
||||
(e.g. `self.0` above) is accessed.
|
||||
|
||||
It is sometimes obvious that no such access can occur, like the case above.
|
||||
However, when dealing with a generic type parameter, such access can
|
||||
occur indirectly. Examples of such indirect access are:
|
||||
* invoking a callback,
|
||||
* via a trait method call.
|
||||
|
||||
(Future changes to the language, such as impl specialization, may add
|
||||
other avenues for such indirect access.)
|
||||
|
||||
Here is an example of invoking a callback:
|
||||
|
||||
```rust,ignore
|
||||
struct Inspector<T>(T, &'static str, Box<for <'r> fn(&'r T) -> String>);
|
||||
|
||||
impl<T> Drop for Inspector<T> {
|
||||
fn drop(&mut self) {
|
||||
// The `self.2` call could access a borrow e.g. if `T` is `&'a _`.
|
||||
println!("Inspector({}, {}) unwittingly inspects expired data.",
|
||||
(self.2)(&self.0), self.1);
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
Here is an example of a trait method call:
|
||||
|
||||
```rust,ignore
|
||||
use std::fmt;
|
||||
|
||||
struct Inspector<T: fmt::Display>(T, &'static str);
|
||||
|
||||
impl<T: fmt::Display> Drop for Inspector<T> {
|
||||
fn drop(&mut self) {
|
||||
// There is a hidden call to `<T as Display>::fmt` below, which
|
||||
// could access a borrow e.g. if `T` is `&'a _`
|
||||
println!("Inspector({}, {}) unwittingly inspects expired data.",
|
||||
self.0, self.1);
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
And of course, all of these accesses could be further hidden within
|
||||
some other method invoked by the destructor, rather than being written
|
||||
directly within it.
|
||||
|
||||
In all of the above cases where the `&'a u8` is accessed in the
|
||||
destructor, adding the `#[unsafe_destructor_blind_to_params]`
|
||||
attribute makes the type vulnerable to misuse that the borrower
|
||||
checker will not catch, inviting havoc. It is better to avoid adding
|
||||
the attribute.
|
||||
|
||||
# Is that all about drop checker?
|
||||
|
||||
It turns out that when writing unsafe code, we generally don't need to
|
||||
worry at all about doing the right thing for the drop checker. However there
|
||||
is one special case that you need to worry about, which we will look at in
|
||||
the next section.
|
||||
|
||||
|
|
|
|||
|
|
@ -1929,6 +1929,20 @@ macro scope.
|
|||
- `simd` - on certain tuple structs, derive the arithmetic operators, which
|
||||
lower to the target's SIMD instructions, if any; the `simd` feature gate
|
||||
is necessary to use this attribute.
|
||||
- `unsafe_destructor_blind_to_params` - on `Drop::drop` method, asserts that the
|
||||
destructor code (and all potential specializations of that code) will
|
||||
never attempt to read from nor write to any references with lifetimes
|
||||
that come in via generic parameters. This is a constraint we cannot
|
||||
currently express via the type system, and therefore we rely on the
|
||||
programmer to assert that it holds. Adding this to a Drop impl causes
|
||||
the associated destructor to be considered "uninteresting" by the
|
||||
Drop-Check rule, and thus it can help sidestep data ordering
|
||||
constraints that would otherwise be introduced by the Drop-Check
|
||||
rule. Such sidestepping of the constraints, if done incorrectly, can
|
||||
lead to undefined behavior (in the form of reading or writing to data
|
||||
outside of its dynamic extent), and thus this attribute has the word
|
||||
"unsafe" in its name. To use this, the
|
||||
`unsafe_destructor_blind_to_params` feature gate must be enabled.
|
||||
- `unsafe_no_drop_flag` - on structs, remove the flag that prevents
|
||||
destructors from being run twice. Destructors might be run multiple times on
|
||||
the same object with this attribute. To use this, the `unsafe_no_drop_flag` feature
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue