Document unsafety checking (#1847)
Co-authored-by: Yuki Okushi <jtitor@2k36.org>
This commit is contained in:
parent
7650a97c11
commit
93aeba6e75
|
|
@ -142,6 +142,7 @@
|
||||||
- [Return Position Impl Trait In Trait](./return-position-impl-trait-in-trait.md)
|
- [Return Position Impl Trait In Trait](./return-position-impl-trait-in-trait.md)
|
||||||
- [Effect checking](./effects.md)
|
- [Effect checking](./effects.md)
|
||||||
- [Pattern and Exhaustiveness Checking](./pat-exhaustive-checking.md)
|
- [Pattern and Exhaustiveness Checking](./pat-exhaustive-checking.md)
|
||||||
|
- [Unsafety Checking](./unsafety-checking.md)
|
||||||
- [MIR dataflow](./mir/dataflow.md)
|
- [MIR dataflow](./mir/dataflow.md)
|
||||||
- [Drop elaboration](./mir/drop-elaboration.md)
|
- [Drop elaboration](./mir/drop-elaboration.md)
|
||||||
- [The borrow checker](./borrow_check.md)
|
- [The borrow checker](./borrow_check.md)
|
||||||
|
|
|
||||||
|
|
@ -4,16 +4,13 @@
|
||||||
|
|
||||||
The THIR ("Typed High-Level Intermediate Representation"), previously called HAIR for
|
The THIR ("Typed High-Level Intermediate Representation"), previously called HAIR for
|
||||||
"High-Level Abstract IR", is another IR used by rustc that is generated after
|
"High-Level Abstract IR", is another IR used by rustc that is generated after
|
||||||
[type checking]. It is (as of <!-- date-check --> April 2022) only used for
|
[type checking]. It is (as of <!-- date-check --> January 2024) used for
|
||||||
[MIR construction] and [exhaustiveness checking]. There is also
|
[MIR construction], [exhaustiveness checking], and [unsafety checking].
|
||||||
[an experimental unsafety checker][thir-unsafeck] that operates on the THIR as a replacement for
|
|
||||||
the current MIR unsafety checker, and can be used instead of the MIR unsafety checker by passing
|
|
||||||
the `-Z thir-unsafeck` flag to `rustc`.
|
|
||||||
|
|
||||||
[type checking]: ./type-checking.md
|
[type checking]: ./type-checking.md
|
||||||
[MIR construction]: ./mir/construction.md
|
[MIR construction]: ./mir/construction.md
|
||||||
[exhaustiveness checking]: ./pat-exhaustive-checking.md
|
[exhaustiveness checking]: ./pat-exhaustive-checking.md
|
||||||
[thir-unsafeck]: https://github.com/rust-lang/compiler-team/issues/402
|
[unsafety checking]: ./unsafety-checking.md
|
||||||
|
|
||||||
As the name might suggest, the THIR is a lowered version of the [HIR] where all
|
As the name might suggest, the THIR is a lowered version of the [HIR] where all
|
||||||
the types have been filled in, which is possible after type checking has completed.
|
the types have been filled in, which is possible after type checking has completed.
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,79 @@
|
||||||
|
# Unsafety Checking
|
||||||
|
|
||||||
|
Certain expressions in Rust can violate memory safety and as such need to be
|
||||||
|
inside an `unsafe` block or function. The compiler will also warn if an unsafe
|
||||||
|
block is used without any corresponding unsafe operations.
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
The unsafety check is located in the [`check_unsafety`] module. It performs a
|
||||||
|
walk over the [THIR] of a function and all of its closures and inline constants.
|
||||||
|
It keeps track of the unsafe context: whether it has entered an `unsafe` block.
|
||||||
|
If an unsafe operation is used outside of an `unsafe` block, then an error is
|
||||||
|
reported. If an unsafe operation is used in an unsafe block then that block is
|
||||||
|
marked as used for [the unused_unsafe lint](#the-unused_unsafe-lint).
|
||||||
|
|
||||||
|
The unsafety check needs type information so could potentially be done on the
|
||||||
|
HIR, making use of typeck results, THIR or MIR. THIR is chosen because there are
|
||||||
|
fewer cases to consider than in HIR, for example unsafe function calls and
|
||||||
|
unsafe method calls have the same representation in THIR. The check is not done
|
||||||
|
on MIR because safety checks do not depend on control flow so MIR is not
|
||||||
|
necessary to use and MIR doesn't have as precise spans for some expressions.
|
||||||
|
|
||||||
|
Most unsafe operations can be identified by checking the `ExprKind` in THIR and
|
||||||
|
checking the type of the argument. For example, dereferences of a raw pointer
|
||||||
|
correspond to `ExprKind::Deref`s with an argument that has a raw pointer type.
|
||||||
|
|
||||||
|
Looking for unsafe Union field accesses is a bit more complex because writing to
|
||||||
|
a field of a union is safe. The checker tracks when it's visiting the left-hand
|
||||||
|
side of an assignment expression and allows union fields to directly appear
|
||||||
|
there, while erroring in all other cases. Union field accesses can also occur
|
||||||
|
in patterns, so those have to be walked as well.
|
||||||
|
|
||||||
|
The other complicated safety check is for writes to fields of layout constrained
|
||||||
|
structs (such as [`NonNull`]). These are found by looking for the borrow or
|
||||||
|
assignment expression and then visiting the subexpression being borrowed or
|
||||||
|
assigned with a separate visitor.
|
||||||
|
|
||||||
|
[THIR]: ./thir.md
|
||||||
|
[`check_unsafety`]: https://doc.rust-lang.org/nightly/nightly-rustc/rustc_mir_build/check_unsafety/index.html
|
||||||
|
[`NonNull`]: https://doc.rust-lang.org/std/ptr/struct.NonNull.html
|
||||||
|
|
||||||
|
## The unused_unsafe lint
|
||||||
|
|
||||||
|
The unused_unsafe lint reports `unsafe` blocks that can be removed. The unsafety
|
||||||
|
checker records whenever it finds an operation that requires unsafe. The lint is
|
||||||
|
then reported if either:
|
||||||
|
|
||||||
|
- An `unsafe` block contains no unsafe operations
|
||||||
|
- An `unsafe` block is within another unsafe block, and the outer block
|
||||||
|
isn't considered unused
|
||||||
|
|
||||||
|
```rust
|
||||||
|
#![deny(unused_unsafe)]
|
||||||
|
let y = 0;
|
||||||
|
let x: *const u8 = core::ptr::addr_of!(y);
|
||||||
|
unsafe { // lint reported for this block
|
||||||
|
unsafe {
|
||||||
|
let z = *x;
|
||||||
|
}
|
||||||
|
let safe_expr = 123;
|
||||||
|
}
|
||||||
|
unsafe {
|
||||||
|
unsafe { // lint reported for this block
|
||||||
|
let z = *x;
|
||||||
|
}
|
||||||
|
let unsafe_expr = *x;
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Other checks involving `unsafe`
|
||||||
|
|
||||||
|
[Unsafe traits] require an `unsafe impl` to be implemented, the check for this
|
||||||
|
is done as part of [coherence]. The `unsafe_code` lint is run as a lint pass on
|
||||||
|
the ast that searches for unsafe blocks, functions and implementations, as well
|
||||||
|
as certain unsafe attributes.
|
||||||
|
|
||||||
|
[Unsafe traits]: https://doc.rust-lang.org/reference/items/traits.html#unsafe-traits
|
||||||
|
[coherence]: /home/matthew/rust/compiler/rustc_hir_analysis/src/coherence/unsafety.rs
|
||||||
|
|
||||||
Loading…
Reference in New Issue