unwind safety fixes#140
Conversation
235fcfb to
45e29c0
Compare
7ad7985 to
225f13b
Compare
e45f41e to
e3b2cb6
Compare
| let val = unsafe { Pin::new_unchecked(val) }; | ||
| // SAFETY: `slot` was initialized above. | ||
| (self.1)(val).inspect_err(|_| unsafe { core::ptr::drop_in_place(slot) }) | ||
| (self.1)(val)?; |
There was a problem hiding this comment.
The whole implementation here can probably be simplified to something like
(self.1)(unsafe { Slot::new(slot) }.init(self.0).let_binding()) or something similar if #143 lands.
There was a problem hiding this comment.
I could rebase this branch to dev/accessor-rework if you'd like? Otherwise I don't mind waiting for #143 to land.
e3b2cb6 to
e5f75a9
Compare
|
I cannot review diff of diffs. Please always squash your changes to individually meaningful commits. |
e5f75a9 to
5c83836
Compare
|
I see, everything has been squashed to the original three commits. When reviewing, I prefer having diffs that do exactly what each of the comments suggests and squashing after the review. I will squash future fixups immediately. |
|
For GitHub-centric workflow that's indeed convenient, but for this project as the commits are synced to the kernel I need to review each commit individually so it's up to kernel's quality requirement. Honestly the actual issue is that GitHub does not provide a good way to visualize the diff, despite that it has all the needed information to render as such. The "Compare" button sometimes does the job, but it breaks when you rebase and fixup commits in a single push. Longer term, either we can wait until GitHub implements it (which is quite unlikely given the slop), or we can adopt what the Rust Project's triagebot does by automatically generates a range diff like this. |
|
I understand and fully agree. Unfortunately, looking at recent trends at GitHub, I don't expect much in terms of improvements to the platform. Thank you for taking the time to explain your reasoning. :) |
5c83836 to
eebe948
Compare
| /// - `ptr` is null: | ||
| /// - before `__init` or `__pinned_init` is called | ||
| /// - after the array is successfully initialized | ||
| /// - `ptr[0..num_init]` contains initialized elements of type `T` | ||
| /// - `ptr[num_init..N]` (where N is the size of the array) contains uninitialized memory |
There was a problem hiding this comment.
| /// - `ptr` is null: | |
| /// - before `__init` or `__pinned_init` is called | |
| /// - after the array is successfully initialized | |
| /// - `ptr[0..num_init]` contains initialized elements of type `T` | |
| /// - `ptr[num_init..N]` (where N is the size of the array) contains uninitialized memory | |
| /// If `ptr` is not null: | |
| /// - `ptr[0..num_init]` contains initialized elements of type `T` | |
| /// - `ptr[num_init..N]` (where N is the size of the array) contains uninitialized memory |
| // SAFETY: Since `0 <= i < N`, `self.ptr.add(i)` is in bounds and | ||
| // valid for writes by the safety contract of `__init`. |
There was a problem hiding this comment.
This is not calling __init yet. So just mention about inbounds.
|
|
||
| impl<T, F> ArrayInit<T, F> { | ||
| pub(crate) fn new(make_init: F) -> Self { | ||
| Self { |
There was a problem hiding this comment.
I've added an // INVARIANT comment here. I've also added them wherever else the ArrayInit invariants are realized/relied on, which is:
- When
ptris being set to a non-null value before the initialization loop. I've also added adebug_assert!()there to make sure the pointer really is not null. Let me know if the assertion is overkill. - When
ptris being set to null again, after the initialization loop. - In the two code paths of
ArrayInit::drop, to justify dropping (or not dropping) the elements of the array.
| // SAFETY: The pointer is derived from `slot` and thus satisfies the | ||
| // `__init` requirements. | ||
| unsafe { init.__init(ptr) }?; | ||
| self.num_init += 1; |
There was a problem hiding this comment.
I'd actually either put self.num_init = i; at the beginning of the loop, or explicitly specify self.num_init = 0 at the beginning of the function.
| // valid for writes by the safety contract of `__init`. | ||
| let ptr = unsafe { self.ptr.add(i) }; | ||
| // SAFETY: The pointer is derived from `slot` and thus satisfies the | ||
| // `__init` requirements. |
There was a problem hiding this comment.
This needs to be more explicit and refers to the safety requirements of Init::__init.
There was a problem hiding this comment.
Reworded this so it doesn't refer to Init::__init for safety justification.
| F: FnMut(usize) -> I, | ||
| I: PinInit<T, E>, | ||
| { | ||
| unsafe fn __pinned_init(mut self, slot: *mut [T; N]) -> Result<(), E> { |
| // SAFETY: Invariants of `ArrayInit` guarantee that elements | ||
| // `self.ptr[0..self.num_init]` are initialized and contain valid `T` | ||
| // values, so dropping them is safe. |
There was a problem hiding this comment.
Perhaps also mention before the safety comment that "In this code path, the initialization has failed partway and we need to drop elements initialized thus far to uphold the pinning requirement."
There was a problem hiding this comment.
Added the comment you suggested.
| static DROPS: AtomicUsize = AtomicUsize::new(0); | ||
| /// Serialize tests so the shared [DROPS] counter stays meaningful even | ||
| /// when cargo runs tests in parallel. | ||
| static LOCK: Mutex<()> = Mutex::new(()); |
There was a problem hiding this comment.
Could you make Counted something like:
struct Counted<'a>(&'a AtomicUsize);to avoid things like this?
|
|
||
| impl Drop for Counted { | ||
| fn drop(&mut self) { | ||
| DROPS.fetch_add(1, Ordering::SeqCst); |
Adds a guard type that safely initializes an array by running an initializer on each element, keeping track of the number of initialized elements. In the case of a panic or error in the per-element initializer, the guard drops the already-initialized portion of the array; nothing is dropped on success. The previous code only ran cleanup on the explicit error path. If the per- element initializer panicked partway through, the elements already written into the array would be leaked: their `Drop` impls would never run. Link: Rust-for-Linux#136 Reported-by: Gary Guo <gary@garyguo.net> Suggested-by: Gary Guo <gary@garyguo.net> Signed-off-by: Mirko Adzic <adzicmirko97@gmail.com>
Adds a drop guard before the call to the chained closure so that the value initialized by the first stage is dropped if the closure errors or panics; `mem::forget` the guard on success. The previous code only ran cleanup on the explicit error path, leaking the first-stage value if the chained closure panicked. Link: Rust-for-Linux#136 Reported-by: Gary Guo <gary@garyguo.net> Suggested-by: Gary Guo <gary@garyguo.net> Signed-off-by: Mirko Adzic <adzicmirko97@gmail.com>
Cover both fixes added in the series: - `[pin_]init_array_from_fn`: a panic or error from element `i`'s initializer drops the previously initialized elements `0..i`. - `[pin_]chain`: a panic or error from the chained closure drops the value initialized by the first stage. Also assert no double-drop on the success paths. Signed-off-by: Mirko Adzic <adzicmirko97@gmail.com>
eebe948 to
8b46ef9
Compare
nbdd0121
left a comment
There was a problem hiding this comment.
Thanks for working on this. Some further feedbacks.
Also, could you move the ArrayInit to lib.rs just before init_array_from_fn? The __internal module is supposed to only host items that need to be public due to the use of generated code from pin-init-internal (yes, we have a few pub(crate) there, but that's for historical reasons and I'm working on moving them).
| // INVARIANT: `self.ptr` is non-null once initialization starts. | ||
| self.ptr = slot.cast::<T>(); | ||
| for i in 0..N { | ||
| self.num_init = i; |
There was a problem hiding this comment.
Thanks for adding the invariant comments! You probably want to add a line here as well because num_init is also involved in the invariant (i.e. you need to assert that [..num_init] has been initialized already).
| for i in 0..N { | ||
| self.num_init = i; | ||
| let init = (self.make_init)(i); | ||
| // SAFETY: Since `0 <= i < N`, `self.ptr.add(i)` is in array bounds and |
There was a problem hiding this comment.
The comparison chain is not valid Rust. I think you can probably just remove this part. Valid for write is also not a requirement of add.
| // SAFETY: Since `0 <= i < N`, `self.ptr.add(i)` is in array bounds and | |
| // SAFETY: `self.ptr.add(i)` is in bounds. |
| impl<T, F> Drop for ArrayInit<T, F> { | ||
| fn drop(&mut self) { | ||
| if self.ptr.is_null() { | ||
| // INVARIANT: Since `self.ptr` is null - either no initialization has |
There was a problem hiding this comment.
INVARIANT comment is needed when the fields involved in the invariant is changed. Simply relying on the invariant does not need special annotation (it's actually confusing to have them).
| // INVARIANT: Since `self.ptr` is not null - the initialization has failed | ||
| // partway and we need to drop elements initialized thus far to uphold the | ||
| // pinning requirement. | ||
| // | ||
| // SAFETY: Invariants of `ArrayInit` guarantee that, when `self.ptr` isn't | ||
| // null, elements `self.ptr[0..self.num_init]` are initialized and contain | ||
| // valid `T` values, so dropping them is safe. |
There was a problem hiding this comment.
Same here
| // INVARIANT: Since `self.ptr` is not null - the initialization has failed | |
| // partway and we need to drop elements initialized thus far to uphold the | |
| // pinning requirement. | |
| // | |
| // SAFETY: Invariants of `ArrayInit` guarantee that, when `self.ptr` isn't | |
| // null, elements `self.ptr[0..self.num_init]` are initialized and contain | |
| // valid `T` values, so dropping them is safe. | |
| // SAFETY: Since `self.ptr` is not null - the initialization has failed | |
| // partway. Drop `self.ptr[0..self.num_init]` which are initialized per type invariant. |
| // null, elements `self.ptr[0..self.num_init]` are initialized and contain | ||
| // valid `T` values, so dropping them is safe. | ||
| unsafe { | ||
| let slice = core::ptr::slice_from_raw_parts_mut(self.ptr, self.num_init); |
There was a problem hiding this comment.
This should either be lifted out of the unsafe block, or just inlined into the drop_in_place (I actually prefer the latter).
Adds unwind-safety fixes to in-place initialization helpers so partially initialized values are dropped on both errors and panics. Changes:
__internal::ArrayInitguard type that safely initializes an array by running an initializer on each element, keeping track of the number of initialized elements. When dropped, if the initialization was partially successful, the guard drops the initialized portion of the array. Use the guard in[pin_]init_array_from_fn.__internal::DropGuardin[pin_]chainso a panic/error in the chained closure drops the value initialized in the first stage;mem::forgetthe guard on success.Closes: #136
The approach taken here was suggested in the issue itself, thus I added a
Suggested-bytag. I hope that is okay.Edits:
v1 -> v2:
ArrayInitGuardtoArrayInit[Pin]InitforArrayInitinstead of wrapping it in[pin_]init_from_closurev2 -> v3:
mem::forgettheArrayInitguard on success; state that the guard will only drop initialized elements on partial success