-
Notifications
You must be signed in to change notification settings - Fork 171
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove object lifetime cast #564
Conversation
@BoxyUwU Hi there~ Reading through the issue you linked (thanks for that!), I believe I grok the underlying problem, which appears to be that that raw pointer casts trivially allow extending the lifetime of trait object types behind a pointer, and in particular that this allows violating where clauses in specific cases. Looking at the change in this PR, my two questions are:
Specific to the second question, I was caught up on your initial mention of casting |
In your case this breakage would indeed be more "preventative" than due to an actual soundness issue in your crate. Technically speaking your trait methods do already have lifetime bounds involving The risk with casting lifetimes of dyn types only really comes into play when raw pointers (directly or indirectly) can be used as the receiver of an object safe trait. For example if
The Rust Reference has a page on lifetime elision for dyn types, it might have some of the information you're looking for. I can work through all the elided/unspecified lifetimes involved in your current implementation of
I realise in my updated version of your code I left some of the lifetimes elided still, it could alternatively be written like so (I can update the PR to be written like this instead if you'd prefer): let recorder_ptr = unsafe {
std::mem::transmute::<*const (dyn Recorder + 'a), *mut (dyn Recorder + 'static)>(
recorder as &'a (dyn Recorder + 'a),
)
}; Hopefully all of this helps you understand exactly what's going on with all of the elided lifetimes in your current code? Please let me know if you have questions :-) Footnotes
|
Thank you so much for the explanation! That roughly fits with my existing understanding, but it was helpful to see it confirmed with your step-by-step example. I'll give this another pass, since I think we'll want to tweak the placeholder |
Meant to write in the review message that you can feel free to desugar the lifetimes on the reference we pass to I'm also curious if you agree with my suggested explanation of the safety comment above the |
I've updated to specify a safety comment and explicitly write out the lifetimes 👍 When looking over the safety comment I did realise something which is that I believe #[test]
fn unsoundness() {
struct Foo<'a>(&'a str);
impl<'a> Recorder for Foo<'a> {
fn describe_counter(
&self,
key: crate::KeyName,
unit: Option<crate::Unit>,
description: crate::SharedString,
) {
dbg!(self.0);
}
/* snip... */
}
let s = "foo".to_string();
let recorder = Foo(&s);
let guard = set_default_local_recorder(&recorder);
std::mem::forget(guard);
drop(s);
with_recorder(|rec| rec.describe_counter(KeyName::from_const_str(""), None, "".into()));
} Running this under MIRI results in the following output:
It seems that Unfortunately I don't have enough context about how This should probably be broken out into its own issue as it's orthogonal to this PR 🤔 I do believe your safety comment is correct and the fault lies in // SAFETY: If we have a local recorder, we know that it is valid because it can only be set during the
// duration of a closure that is passed to `with_local_recorder`, which is the only time this method can be
// called and have a local recorder set. This ensures that the lifetime of the recorder is valid for the
// duration of this method call. Which makes no note of |
I also wanted to check if There's been some discussion on the lang side about whether to try and keep this code working in older editions and only break it over an edition so that people depending on older versions of metrics aren't broken. The motivation for this would likely be a lot less strong if these crates can just run a trivial |
Thank you. 🙏🏻
Ah, yeah.. I know my personal feelings here don't change the objective nature of that qualifying as a soundness hole, although if someone is explicitly forgetting the guard, I'd say they've dug their own UB grave. 😅 Overall, though, I agree: a real, albeit orthogonal, issue that warrants its own issue. I'll open an issue in the next day or two once I can think through it a little more.
We could definitely do this, yes. I opened #570 to track this. |
Hi there o/
I'm a member of the Rust Language Types Team; as part of stabilizing the
arbitrary_self_types
andderive_coerce_pointee
features we may need to change what raw pointer casts are legal (rust-lang/rust#136702). Specifically, casting*const dyn Trait + 'a
to*const dyn Trait + 'b
where it is not able to be proven that'a
outlives'b
may become an error.Without going into too much detail, the justification for this change be that casting trait object's lifetime bound to a lifetime that lives for a longer time could invalidate the VTable of the trait object, allowing for dispatching to methods that should not be callable. See this example from the linked issue:
Unfortunately, going through the usual "future compatibility warning" process may turn out to not be possible as checking lifetime constraints without emitting an error is prohibitively difficult to do in the implementation of the borrow checker. This means that you may wind up never receiving a FCW and its associated grace period to update your code to be compatible with the new rules.
I have attempted to update your codebase to the new rules for you so that it will still compile if we make this change. I hope this potential breakage won't cause you too much trouble and that you might even find the post-migration code to be better than how it was previously :-)
Finally, it has not been decided yet whether we are to go through with this breaking change. If you feel that your code should continue to work as-is then please let me know and we'll try to take that into account when evaluating whether to go through with this breakage. Additionally if you have any questions about why this change is required please let me know and I'll do my best to further explain the justification.