Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

UB-check for alignment of ptr to Box::from_raw{,_in} #137325

Draft
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

hkBst
Copy link
Member

@hkBst hkBst commented Feb 20, 2025

This adds a missing UB-check for proper alignment of pointers to Box::from_raw{,_in}. See #69283 (comment) for some background.

@rustbot
Copy link
Collaborator

rustbot commented Feb 20, 2025

r? @joboet

rustbot has assigned @joboet.
They will have a look at your PR within the next two weeks and either review your PR or reassign to another reviewer.

Use r? to explicitly pick a reviewer

@rustbot rustbot added S-waiting-on-review Status: Awaiting review from the assignee but also interested parties. T-libs Relevant to the library team, which will review and decide on the PR/issue. labels Feb 20, 2025
@rust-log-analyzer

This comment has been minimized.

Comment on lines 1172 to 1199
"Box::from_raw_in requires that the pointer is properly aligned",
(ptr: *mut () = ptr as *mut (), align: usize = align_of::<T>()) => ptr.is_aligned_to(align)
);
Box(unsafe { Unique::new_unchecked(ptr) }, alloc)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just in terms of UX, it's better that all preconditions of an unsafe fn be asserted in it directly, instead of falling through to callees.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So this should also check for non-null-ness? What about Box::from_raw (which calls Box::from_raw_in)? Should it get its own checks as well?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So this should also check for non-null-ness?

Yes

What about Box::from_raw (which calls Box::from_raw_in)? Should it get its own checks as well?

These checks sometimes impose small but widespread compile time overhead. What I'd like is for the diagnostic to be clear and actionable, and reporting the name of the function that the user called seems like a pretty basic first step. So yes I would prefer for Box::from_raw to also have basically a copy+paste of this check, but we may have to balance that against compile-time overhead. I can kick off a perf run to measure once you and I think this PR is in good order and it passes CI.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds like a plan :D

@saethlin
Copy link
Member

Can you add a test to tests/ui/precondition-checks/ that covers this? You should be able to crib from https://github.com/rust-lang/rust/blob/28b83ee59698ae069f5355b8e03f976406f410f5/tests/ui/precondition-checks/slice-from-raw-parts.rs for example. These test should at least validate that when any one of the preconditions of an unsafe fn is violated that we detect it and mention the right function.

@hkBst
Copy link
Member Author

hkBst commented Feb 20, 2025

Can you add a test to tests/ui/precondition-checks/ that covers this? You should be able to crib from https://github.com/rust-lang/rust/blob/28b83ee59698ae069f5355b8e03f976406f410f5/tests/ui/precondition-checks/slice-from-raw-parts.rs for example. These test should at least validate that when any one of the preconditions of an unsafe fn is violated that we detect it and mention the right function.

Yes can do, and thanks for the pointer.

@rust-log-analyzer

This comment has been minimized.

@rust-log-analyzer

This comment has been minimized.

@rust-log-analyzer

This comment has been minimized.

@rust-log-analyzer

This comment has been minimized.

@rust-log-analyzer

This comment has been minimized.

@rust-log-analyzer

This comment has been minimized.

@rust-log-analyzer

This comment has been minimized.

@rustbot
Copy link
Collaborator

rustbot commented Feb 23, 2025

Some changes occurred to the intrinsics. Make sure the CTFE / Miri interpreter
gets adapted for the changes, if necessary.

cc @rust-lang/miri, @rust-lang/wg-const-eval

@rust-log-analyzer

This comment has been minimized.

@rust-log-analyzer

This comment has been minimized.

@rust-log-analyzer

This comment has been minimized.

Comment on lines +1067 to +1073
@capture { ptr: *const (), align: usize } -> bool:
if const {
!ptr.is_null()
} else {
ptr.is_aligned_to(align) && !ptr.is_null()
}
)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have maybe_is_aligned_and_not_null as a helper for this, why not use that?

Copy link
Member Author

@hkBst hkBst Feb 23, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I can't use that, because impl<T: ?Sized> Box<T> means that I cannot use T::IS_ZST, which means I don't know how to call maybe_is_aligned_and_not_null.

@RalfJung
Copy link
Member

Oh, seems you are still experimenting. Please make this a draft so rustbot doesn't ping people.

@hkBst hkBst marked this pull request as draft February 23, 2025 15:11
@hkBst
Copy link
Member Author

hkBst commented Feb 23, 2025

Oh, seems you are still experimenting. Please make this a draft so rustbot doesn't ping people.

Sorry about that; I'm still finding my way around, but this is now a draft again.

@rust-log-analyzer

This comment has been minimized.

@rust-log-analyzer
Copy link
Collaborator

The job x86_64-gnu-llvm-18 failed! Check out the build log: (web) (plain)

Click to see the possible cause of the failure (guessed by this bot)
#21 exporting to docker image format
#21 sending tarball 28.2s done
#21 DONE 40.7s
##[endgroup]
Setting extra environment values for docker:  --env ENABLE_GCC_CODEGEN=1 --env GCC_EXEC_PREFIX=/usr/lib/gcc/
[CI_JOB_NAME=x86_64-gnu-llvm-18]
debug: `DISABLE_CI_RUSTC_IF_INCOMPATIBLE` configured.
---
sccache: Listening on address 127.0.0.1:4226
##[group]Configure the build
configure: processing command line
configure: 
configure: build.configure-args := ['--build=x86_64-unknown-linux-gnu', '--llvm-root=/usr/lib/llvm-18', '--enable-llvm-link-shared', '--set', 'rust.randomize-layout=true', '--set', 'rust.thin-lto-import-instr-limit=10', '--enable-verbose-configure', '--enable-sccache', '--disable-manage-submodules', '--enable-locked-deps', '--enable-cargo-native-static', '--set', 'rust.codegen-units-std=1', '--set', 'dist.compression-profile=balanced', '--dist-compression-formats=xz', '--set', 'rust.lld=false', '--disable-dist-src', '--release-channel=nightly', '--enable-debug-assertions', '--enable-overflow-checks', '--enable-llvm-assertions', '--set', 'rust.verify-llvm-ir', '--set', 'rust.codegen-backends=llvm,cranelift,gcc', '--set', 'llvm.static-libstdcpp', '--enable-new-symbol-mangling']
configure: target.x86_64-unknown-linux-gnu.llvm-config := /usr/lib/llvm-18/bin/llvm-config
configure: llvm.link-shared     := True
configure: rust.randomize-layout := True
configure: rust.thin-lto-import-instr-limit := 10
---
   Compiling unwind v0.0.0 (/checkout/library/unwind)
error[E0658]: use of unstable library feature `pointer_is_aligned_to`
    --> library/alloc/src/boxed.rs:1061:25
     |
1061 |                     ptr.is_aligned_to(align) && !ptr.is_null()
     |
     = note: see issue #96284 <https://github.com/rust-lang/rust/issues/96284> for more information
     = note: see issue #96284 <https://github.com/rust-lang/rust/issues/96284> for more information
     = help: add `#![feature(pointer_is_aligned_to)]` to the crate attributes to enable


error: const function that might be (indirectly) exposed to stable cannot use `#[feature(const_eval_select)]`
     |
3835 |   pub macro const_eval_select {
     |   ---------------------------
     |   |
     |   |
     |   in this expansion of `core::intrinsics::const_eval_select!` (#1)
     |   in this expansion of `$crate::intrinsics::const_eval_select!` (#2)
     |   in this expansion of `$crate::intrinsics::const_eval_select!` (#3)
...
3844 | /         $crate::intrinsics::const_eval_select!(
3845 | |             @capture$([$($binders)*])? { $($arg : $ty = $val),* } $(-> $ret)? :
3846 | |             #[noinline]
3847 | |             if const
3854 | |                 $runtime
3855 | |         )
     | |_________- in this macro invocation (#3)
...
...
3879 |           const_eval_select(($($val,)*), compiletime, runtime)
...
3890 | /         $crate::intrinsics::const_eval_select!(
3890 | /         $crate::intrinsics::const_eval_select!(
3891 | |             @capture$([$($binders)*])? { $($arg : $ty = $arg),* } $(-> $ret)? :
3892 | |             if const
3893 | |                 $(#[$compiletime_attr])* $compiletime
3894 | |             else
3895 | |                 $(#[$runtime_attr])* $runtime
     | |_________- in this macro invocation (#2)
     |
    ::: library/alloc/src/boxed.rs:1056:18
     |
     |
1056 |               ) => core::intrinsics::const_eval_select!(
     |  __________________-
1057 | |                 @capture { ptr: *const (), align: usize } -> bool:
1058 | |                 if const {
1059 | |                     !ptr.is_null()
1063 | |             )
     | |_____________- in this macro invocation (#1)
     |
     |
help: if the function is not (yet) meant to be exposed to stable, add `#[rustc_const_unstable]` (this is what you probably want to do)
    -->  /checkout/library/core/src/ub_checks.rs:66:13
66   +             #[rustc_const_unstable(feature = "...", issue = "...")]
66   +             #[rustc_const_unstable(feature = "...", issue = "...")]
67   |             const fn precondition_check($($name:$ty),*) {
     |
help: otherwise, as a last resort `#[rustc_allow_const_fn_unstable]` can be used to bypass stability checks (this requires team approval)
    -->  /checkout/library/core/src/ub_checks.rs:66:13
66   +             #[rustc_allow_const_fn_unstable(const_eval_select)]
66   +             #[rustc_allow_const_fn_unstable(const_eval_select)]
67   |             const fn precondition_check($($name:$ty),*) {

For more information about this error, try `rustc --explain E0658`.
error: could not compile `alloc` (lib) due to 2 previous errors
warning: build failed, waiting for other jobs to finish...

@bors
Copy link
Collaborator

bors commented Feb 25, 2025

☔ The latest upstream changes (presumably #137573) made this pull request unmergeable. Please resolve the merge conflicts.

@joboet joboet added S-waiting-on-author Status: This is awaiting some action (such as code changes or more information) from the author. and removed S-waiting-on-review Status: Awaiting review from the assignee but also interested parties. labels Mar 6, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
S-waiting-on-author Status: This is awaiting some action (such as code changes or more information) from the author. T-libs Relevant to the library team, which will review and decide on the PR/issue.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants