-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Initial impl of raw_assign_to_drop
#13866
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
c268183
to
35b8439
Compare
35b8439
to
62da020
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks fine to me beyond the suggestion nit
clippy_lints/src/operators/mod.rs
Outdated
/// Use `std::ptr::write()` to overwrite a value without executing the destructor. | ||
/// | ||
/// Use `std::ptr::drop_in_place()` to conditionally execute the destructor if you are | ||
/// sure that the place contains an initialized value. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Right now, this text does not clearly acknowledge that “the value is always initialized (and so the code is correct)” is a possible case. I worry that people will take it as “plain assignments are always bad style”, and possibly rewrite correct code into code that forgets instead of dropping (or add needless oldvalue_is_initialized
flags, or just take away “sheesh, Rust has things that are broken by default”). I think it would be significantly better if the text and examples gives a concrete recommendation for the case where the pointer is initialized.
The obvious concrete recommendation to make is “allow/expect the lint”, but in some cases, converting back to safe &mut
could be better, allowing the unsafe to be more narrowly scoped — I’m particularly thinking of cases where raw pointers are being used to perform borrow splitting that can’t be checked by the borrow checker, where it makes sense to convert to &mut
as soon as the splitting is done, but before the actual writes happen.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
My initial impression when I read through this and #4294 was that the recommended way to resolve this is to simply always use ptr::write()
(+ ptr::drop_in_place
if what the user wrote is really what they want - the user can then addditonally justify that dropping is indeed the correct thing to do by writing a safety comment which can be enforced by other lints, and is then no longer hidden behind the =
operator). So if the value is initialized, write ptr.drop_in_place(); ptr.write(value);
.
This is also how I understood the help messages:
= help: use `std::ptr::write()` to overwrite a (possibly uninitialized) place
= help: use `std::ptr::drop_in_place()` to drop the previous value if such value exists
I feel like recommending to allow the lint in the case that the code is correct goes against what the help messages are saying?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have two thoughts on this, which are:
-
Verbosity is not necessarily clarity. Splitting a single assignment into separate
drop_in_place()
andwrite()
calls:- Creates a hazard, in that if they end up with some other code inserted in between them, that code is executing with a sort of broken invariant that might be overlooked:
ptr::drop_in_place(self.ptr); ptr::write(self.ptr, self.compute_new_value()); // compute_new_value could see a deinited *self.ptr!
- Makes it look like something more esoteric than an ordinary Rust assignment to an initialized place in safe code.
I could get behind “you should convert the pointer to
&mut
before assigning”, which makes it clear that the invariants of&mut
(initialization, exclusive access) apply, but “implement the two parts of assignment yourself just so you’re being explicit” feels like imposing a lot of mental cost for the sake of “code that is doing something else than what this code is doing might be doing something wrong”. - Creates a hazard, in that if they end up with some other code inserted in between them, that code is executing with a sort of broken invariant that might be overlooked:
-
If this lint is proposing never assigning through a raw pointer, that feels rather like it is saying “don't use this part of the language at all!” recommendation, which — if Clippy is doing something like that outside of
restriction
lints, then it feels like something has gone wrong at the language-design level. Rust shouldn’t have (non-deprecated) features that are always wrong to use.And perhaps this feature should be deprecated, but in that case, it's time to talk to T-lang, not just add a lint.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reworked the description to possibly address the points made here.
The example now no longer uses "2-phase replace", and the description hopefully provides better insights into when to use what.
The lint no longer fires when assigning to raw pointers derived from UnsafeCell::get()
directly, which we assume to be safely handled; lintcheck
went from +10 to +4 due to that.
How about
|
Based off of the new points in the FCP, I believe my main thoughts are unfortunately that this lint shouldn't be added. I think this comment by llogiq humorously sums it up. I won't close this yet, and I do believe the problem it's solving is important!, but I don't think a The longer this thread goes on, the less confident I am in my ability to write sound code... |
☔ The latest upstream changes (possibly d28d234) made this pull request unmergeable. Please resolve the merge conflicts. |
Fixes #4294
The lint simply checks all assignments via unsafe pointers where to dereferenced-type has drop-glue.
I'm somewhat unsure about what to call this thing - is it
assign_raw_ptr_using_drop
,raw_assign_drop
,dropped_assign_raw
, ... ?Although some of the tests involveThe general assumption is that if we have a raw pointer at at all, and assign to the place behind the pointer, then all safety bets are off anyway (otherwise, one could have assigned via&mut as *mut
, the lint does not make efforts to filter out situations where the raw pointer is derived from a known-safe source.&mut
to begin with).changelog: [
raw_assign_to_drop
]: Initial impl