Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Attribute request: called_from. #2815

Closed
aristarh2704 opened this issue Nov 13, 2019 · 18 comments
Closed

Attribute request: called_from. #2815

aristarh2704 opened this issue Nov 13, 2019 · 18 comments
Labels
A-attributes Proposals relating to attributes A-unsafe Unsafe related proposals & ideas T-lang Relevant to the language team, which will review and decide on the RFC.

Comments

@aristarh2704
Copy link

Please, add attribute "called_from", for strongly checking caller fn. For example, it's needed when all unsafe fn's moved to one module, and each such fn must be called only from relevant fn in another module.

@Ixrec
Copy link
Contributor

Ixrec commented Nov 14, 2019

What sort of use case leads to a pub function in one module needing a hard guarantee that only one other specific place in a separate module calls it? That seems like a sign that the module boundaries are simply in the wrong place.

@alilleybrinker
Copy link

For unsafe functions specifically, unsafe and safe functions should generally be in a module together which exposes a safe boundary. Having a public unsafe function which should only be called from one place in another module does indeed feel like a mistake in design.

@anp
Copy link
Member

anp commented Nov 16, 2019

Agreed with the above. Also worth noting that #[track_caller] was approved about a year ago and is currently tracked in rust-lang/rust#47809.

@aristarh2704
Copy link
Author

But I need this project design, since the attribute #![forbid(unsafe_code)] will be used for the remaining modules

@aristarh2704
Copy link
Author

It is not advisable for me to use track_caller, because the verification will have to be done at runtime. But I need a compile time check.

@Pauan
Copy link

Pauan commented Nov 16, 2019

It's possible to use pub(in crate::foo) to make the function only accessible to that specific module. But this only works for parent modules. Maybe that could be extended to work with sibling modules.

@aristarh2704
Copy link
Author

aristarh2704 commented Nov 16, 2019

It's possible to use pub(in crate::foo) to make the function only accessible to that specific module. But this only works for parent modules. Maybe that could be extended to work with sibling modules.

It's not solution for me. And I need set visibility on specific function, not module.

@Lokathor
Copy link
Contributor

Can you give an example of your setup so that we can better understand the situation?

@aristarh2704
Copy link
Author

aristarh2704 commented Nov 16, 2019

Can you give an example of your setup so that we can better understand the situation?

For example:

#[forbid(unsafe_code)]
mod a{
    pub fn foo(){
        bar();
    }
}
mod unsafe_fns{
    //#[called_from(crate::a::foo)]
    pub fn bar(){
        unsafe{
            //do_something, for example, writing to io port;
        }
    }
}

@Lokathor
Copy link
Contributor

fundamentally, safe code that is only safe if called from a specific other function isn't safe code.

either make bar actually always be safe or remove the forbid(unsafe_code) from foo and make it use an unsafe block.

@aristarh2704
Copy link
Author

It's possible to create proc_macro lib for adding this attribute?

@Lokathor
Copy link
Contributor

a proc-macro gets tokens as input and had tokens as output. However, using just the tokens of a function as input you cannot read where else in the program that function is called from.

Is there a reason you cannot change how you use this unsafe code? Your proposed design seems very easy to misuse on accident.

@jonas-schievink jonas-schievink added A-attributes Proposals relating to attributes A-unsafe Unsafe related proposals & ideas T-lang Relevant to the language team, which will review and decide on the RFC. labels Nov 17, 2019
@aristarh2704
Copy link
Author

aristarh2704 commented Nov 17, 2019

Reason: increased security requirements.
All unsafe sections of code can be easily checked when they are in the same module

@Lokathor
Copy link
Contributor

That doesn't increase security though.

@aristarh2704
Copy link
Author

It may look like paranoia, but it is necessary

@aristarh2704 aristarh2704 reopened this Nov 17, 2019
@Lokathor
Copy link
Contributor

For code to be marked safe it has to be legal to call from anywhere. If your code can't be called from anywhere don't mark it safe.

Moving it into a module marked safe where all the unsafe blocks go, but that you can't actually be called from everywhere, is just giving yourself more problems.

You should attempt to engineer the code differently. For example you could require the functions take a reference to initialization token to prove that an API has been started properly.

@aristarh2704
Copy link
Author

If I will use initialization token, how I can deny moving it to other modules?

@Lokathor
Copy link
Contributor

the module location doesn't matter.

but also, you could use normal item visibility if you really have to.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
A-attributes Proposals relating to attributes A-unsafe Unsafe related proposals & ideas T-lang Relevant to the language team, which will review and decide on the RFC.
Projects
None yet
Development

No branches or pull requests

7 participants