内容简介:I recently came across an interesting FFI situation, which I wanted to understand a bit better. Now I’d like to share what I found in the hopes of making everyone a better programmer.This post is about undefined behavior, or UB. Specifically UB in Rust at
I recently came across an interesting FFI situation, which I wanted to understand a bit better. Now I’d like to share what I found in the hopes of making everyone a better programmer.
This post is about undefined behavior, or UB. Specifically UB in Rust at the language level. This basically means we’re going to do something that the compiler is free to assume we never did. That sounds bad, right? How can the compiler just assume we didn’t write the code that we wrote? Well, it is as bad as it sounds, even if it doesn’t always cause bad things to happen.
There are many things that constitute UB in Rust. None of these things can be done without writing some unsafe
code. But we as programmers want to get the most out of our language, and sometimes that means writing some unsafe
code. As great a language as Rust is, it does not make writing bad code impossible. Let’s take a look at one such bit of code.
fn ptsname_r(fd: &PtyMaster) -> nix::Result<String> { use std::ffi::CStr; use std::os::unix::io::AsRawFd; use nix::libc::{ioctl, TIOCPTYGNAME}; // the buffer size on OSX is 128, defined by sys/ttycom.h let buf: [i8; 128] = [0; 128]; unsafe { match ioctl(fd.as_raw_fd(), TIOCPTYGNAME as u64, &buf) { 0 => { let res = CStr::from_ptr(buf.as_ptr()).to_string_lossy().into_owned(); Ok(res) } _ => Err(nix::Error::last()), } } }
This is an implementation of the ptsname_r
function for Mac OSX. Can you spot the UB?
The problem here is that we create an immutable buffer, but then mutate it in the call to ioctl
. At this point, I’m pretty sure I’ve spotted UB, but my curiosity demands I look closer.
Before looking any closer though, I do want to point out the fix. It is simple enough, just make buf
mutable, and in our call to ioctl
, pass &mut buf
instead of &buf
. Problem solved. And even if this isn’t technically
UB, you can see that this is the safest approach regardless.
Now let’s dig in and do some testing. First, I was curious why the compiler didn’t pick up on this issue. After all, even raw pointers require a const
or mut
keyword, and ioctl
comes from a third-party library (libc, to be specific), so maybe it is defined incorrectly? A quick check of docs.rs
reveals the function signature.
pub unsafe extern "C" fn ioctl(fd: c_int, request: c_ulong, ...) -> c_int
Well that answers my first question. The compiler didn’t pick up on this issue because ioctl
only defines its first two arguments explicitely. Any other arguments do not have a defined type, so Rust can’t type-check them.
My next question is then, was the original code really undefined behavior? It seems likely, but I’d be happier if I knew rather than assumed . How can we test that? I came up with one way, which admittedly involves a bit of cheating. The only reason the above code wouldn’t be UB is because the mutation crosses an FFI boundry, so our test must simulate that.
The test code:
unsafe extern "C" fn put_one(x: *mut u64) { *x = 1 } fn main() { let x = 2u64; let x_ptr = &x as *const u64 as usize; unsafe { put_one(x_ptr as _) } println!("x: {}", x); }
( playground )
So here is the “cheat”: our FFI call isn’t actually calling C code, it’s just an FFI wrapper around Rust. The benefit is that we can analyze this code with Miri, a Rust tool that helps detect undefined behavior. Miri works by compiling the original code into an intermediate language (MIR) and interpreting it. Generating MIR is part of the normal compilation process, which is important because it means the compiler could perform optimizations on the generated MIR before compiling it down to machine code. On top of that, the compiler may use some assumptions when optimizing code. Any code that fails to maintain these assumptions could be “optimized” and end up doing just about anything. In other words, such code constitutes undefined behavior.
A quick note: Miri is an excellent tool, however it cannot detect all kinds of UB. See the project README for more details.
The line let x_ptr = ...
exists primarily to try and “trick” the compiler. Normally, type-checking would prevent us from creating a mutable pointer to x, however we want to get around that for this test. In addition, it would be great (for this test) if the compiler would just “forget” that x_ptr is in any way related to x, so we cast it to a usize
temporarily. At this point, the “pointer” is actually just some integer value.
If you run this code in the Rust playground, at least as of the time of writing, you’ll see the code works as you might naively expect. That is to say, the value of x
as printed is 1. However if you run Miri (Tools -> Miri), you’ll see there is a problem. Miri detects no item granting write access to tag <untagged> found in borrow stack
. What this really means is that we are writing to a memory location that the compiler assumes we won’t write to. That seems fair since x
wasn’t declared with mut
, and it does support the idea that the original code is UB.
But we can dig deeper. My next question is, precisely what does it take to make Miri happy? The first change is to make x
mutable: let mut x = 2u64;
. Miri still doesn’t like it, which tells us it isn’t just
about whether x
is mutable, it’s also about how x is borrowed. In fact, if you look at the Miri error again, you’ll see the phrase “in borrow stack”, indicating it is tracking the borrows. If we think about it, even though x is declared as mutable, we only borrow it immutably, so the compiler could still assume its value is never changed. That would be bad.
So let’s tell the compiler we are borrowing mutable. let x_ptr = &mut x as *const u64 as usize;
. Now x is mutable and
we borrow it mutably. Miri, however, is still unhappy with this code and for the same reason as before. We’ll try let x_ptr = &mut x as *mut u64 as usize;
now. And finally, Miri is happy! That tells us that even though we borrow x mutably, the act of converting the mutable borrow into an immutable pointer and back is enough to cause UB. Good to know.
Now that Miri is happy, we’re done here, right? Well, no. There is still one thing I’d like to look at: UnsafeCell
. Up until now, we’ve had UB because we wrote code in a way that allowed the compiler to make bad assumptions about our intentions. Every time the compiler assumes we won’t change a value and we do, Miri gets mad and tells us about it. UnsafeCell
allows us to tell the compiler to stop making assumptions about the contained value. Let’s take a look at some code:
use std::cell::UnsafeCell; unsafe extern "C" fn put_one(x: *mut u64) { *x = 1 } fn main() { let x = UnsafeCell::new(2u64); let x_ptr = &x as *const UnsafeCell<u64> as usize; unsafe { put_one(x_ptr as _) } println!("x: {}", x.into_inner()); }
( playground )
Here, we again take an immutable borrow of x, and mutate the value behind it. As with the original test, x is not even declared mutable. And yet, Miri has no issue with this code. Per documentation
, “UnsafeCell
UnsafeCell
does not disable all
of the compilers assumptions around borrows and mutability, however. Miri is unhappy with this code, for instance:
use std::cell::UnsafeCell; unsafe extern "C" fn put_one(x: *mut u64) { *x = 1 } fn main() { let x = UnsafeCell::new(2u64); let x_ptr = &x as *const UnsafeCell<u64> as usize; let x_mut_ref1: &mut u64 = unsafe { &mut *(x_ptr as *mut u64) }; let x_mut_ref2: &mut u64 = unsafe { &mut *(x_ptr as *mut u64) }; unsafe { put_one(x_mut_ref2) } println!("x: {}", x_mut_ref1); }
( playground )
Here, we break a different rule in Rust: no two mutable borrows may reference the same memory. UnsafeCell
does not change this assumption, and so even when using UnsafeCell
, we still need to be wary of creating mutable references to it.
So to summarize what we’ve seen: if you intend to mutate something, even across FFI boundaries, always delcare it mutable, always take a mutable reference, and never convert said reference to an immutable reference or pointer. The only exception being if you use UnsafeCell
to disable Rust’s normal assumptions.
Following Up
It’s come to my attention that in some instances it might be okay to convert a *const
to a *mut
and mutate it, however it’s not clear to me yet when it is and isn’t okay to do this. I may play around some more and make a follow up post in the future. For now, suffice to say that Rust’s own NonNull
type uses *const
internally but does allow converting to a *mut
or &mut
.
Additionally, many of these concepts are related to an aliasing model called Stacked Borrows , which is the model Miri is based on. Rust, however, does not yet have an official aliasing model, so precisely what constitutes UB is subject to change. A detailed paper on the model can be found here . I won’t claim to fully understand this model, however as I explore and test the ideas of this model, I may make additional posts.
以上就是本文的全部内容,希望本文的内容对大家的学习或者工作能带来一定的帮助,也希望大家多多支持 码农网
猜你喜欢:本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们。
Web Design for ROI
Lance Loveday、Sandra Niehaus / New Riders Press / 2007-10-27 / USD 39.99
Your web site is a business--design it like one. Billions of dollars in spending decisions are influenced by web sites. So why aren't businesses laser-focused on designing their sites to maximize thei......一起来看看 《Web Design for ROI》 这本书的介绍吧!