Skip to content

Commit 4ea5cac

Browse files
add MaybeDangling to core
Co-authored-by: Ralf Jung <post@ralfj.de>
1 parent 83e49b7 commit 4ea5cac

File tree

2 files changed

+117
-0
lines changed

2 files changed

+117
-0
lines changed
Lines changed: 113 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,113 @@
1+
#![unstable(feature = "maybe_dangling", issue = "118166")]
2+
3+
use crate::{mem, ptr};
4+
5+
/// Allows wrapped [references] and [boxes] to dangle.
6+
///
7+
/// <section class="warning">
8+
/// This type is not properly implemented yet, and the documentation below is thus not accurate.
9+
/// </section>
10+
///
11+
/// That is, if a reference (or a `Box`) is wrapped in `MaybeDangling` (including when in a
12+
/// (nested) field of a compound type wrapped in `MaybeDangling`), it does not have to follow
13+
/// pointer aliasing rules or be dereferenceable.
14+
///
15+
/// This can be useful when the value can become dangling while the function holding it is still
16+
/// executing (particularly in concurrent code). As a somewhat absurd example, consider this code:
17+
///
18+
/// ```rust,no_run
19+
/// #![feature(box_as_ptr)]
20+
/// # use std::alloc::{dealloc, Layout};
21+
/// # use std::mem;
22+
///
23+
/// let mut boxed = Box::new(0_u32);
24+
/// let ptr = Box::as_mut_ptr(&mut boxed);
25+
///
26+
/// // Safety: the pointer comes from a box and thus was allocated before; `box` is not used afterwards
27+
/// unsafe { dealloc(ptr.cast(), Layout::new::<u32>()) };
28+
///
29+
/// mem::forget(boxed); // <-- this is UB!
30+
/// ```
31+
///
32+
/// Even though the `Box`e's destructor is not run (and thus we don't have a double free bug), this
33+
/// code is still UB. This is because when moving `boxed` into `forget`, its validity invariants
34+
/// are asserted, causing UB since the `Box` is dangling. The safety comment is as such wrong, as
35+
/// moving the `boxed` variable as part of the `forget` call *is* a use.
36+
///
37+
/// To fix this we could use `MaybeDangling`:
38+
///
39+
/// ```rust
40+
/// #![feature(maybe_dangling, box_as_ptr)]
41+
/// # use std::alloc::{dealloc, Layout};
42+
/// # use std::mem::{self, MaybeDangling};
43+
///
44+
/// let mut boxed = MaybeDangling::new(Box::new(0_u32));
45+
/// let ptr = Box::as_mut_ptr(boxed.as_mut());
46+
///
47+
/// // Safety: the pointer comes from a box and thus was allocated before; `box` is not used afterwards
48+
/// unsafe { dealloc(ptr.cast(), Layout::new::<u32>()) };
49+
///
50+
/// mem::forget(boxed); // <-- this is OK!
51+
/// ```
52+
///
53+
/// Note that the bit pattern must still be valid for the wrapped type. That is, [references]
54+
/// (and [boxes]) still must be aligned and non-null.
55+
///
56+
/// Additionally note that safe code can still assume that the inner value in a `MaybeDangling` is
57+
/// **not** dangling -- functions like [`as_ref`] and [`into_inner`] are safe. It is not sound to
58+
/// return a dangling reference in a `MaybeDangling` to safe code. However, it *is* sound
59+
/// to hold such values internally inside your code -- and there's no way to do that without
60+
/// this type. Note that other types can use this type and thus get the same effect; in particular,
61+
/// [`ManuallyDrop`] will use `MaybeDangling`.
62+
///
63+
/// Note that `MaybeDangling` doesn't prevent drops from being run, which can lead to UB if the
64+
/// drop observes a dangling value. If you need to prevent drops from being run use [`ManuallyDrop`]
65+
/// instead.
66+
///
67+
/// [references]: prim@reference
68+
/// [boxes]: ../../std/boxed/struct.Box.html
69+
/// [`into_inner`]: MaybeDangling::into_inner
70+
/// [`as_ref`]: MaybeDangling::as_ref
71+
/// [`ManuallyDrop`]: crate::mem::ManuallyDrop
72+
#[repr(transparent)]
73+
#[rustc_pub_transparent]
74+
#[derive(Debug, Copy, Clone, Default)]
75+
pub struct MaybeDangling<P: ?Sized>(P);
76+
77+
impl<P: ?Sized> MaybeDangling<P> {
78+
/// Wraps a value in a `MaybeDangling`, allowing it to dangle.
79+
pub const fn new(x: P) -> Self
80+
where
81+
P: Sized,
82+
{
83+
MaybeDangling(x)
84+
}
85+
86+
/// Returns a reference to the inner value.
87+
///
88+
/// Note that this is UB if the inner value is currently dangling.
89+
pub const fn as_ref(&self) -> &P {
90+
&self.0
91+
}
92+
93+
/// Returns a mutable reference to the inner value.
94+
///
95+
/// Note that this is UB if the inner value is currently dangling.
96+
pub const fn as_mut(&mut self) -> &mut P {
97+
&mut self.0
98+
}
99+
100+
/// Extracts the value from the `MaybeDangling` container.
101+
///
102+
/// Note that this is UB if the inner value is currently dangling.
103+
pub const fn into_inner(self) -> P
104+
where
105+
P: Sized,
106+
{
107+
// FIXME: replace this with `self.0` when const checker can figure out that `self` isn't actually dropped
108+
// SAFETY: this is equivalent to `self.0`
109+
let x = unsafe { ptr::read(&self.0) };
110+
mem::forget(self);
111+
x
112+
}
113+
}

library/core/src/mem/mod.rs

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,10 @@ mod maybe_uninit;
1919
#[stable(feature = "maybe_uninit", since = "1.36.0")]
2020
pub use maybe_uninit::MaybeUninit;
2121

22+
mod maybe_dangling;
23+
#[unstable(feature = "maybe_dangling", issue = "118166")]
24+
pub use maybe_dangling::MaybeDangling;
25+
2226
mod transmutability;
2327
#[unstable(feature = "transmutability", issue = "99571")]
2428
pub use transmutability::{Assume, TransmuteFrom};

0 commit comments

Comments
 (0)