|
|
@ -115,13 +115,160 @@ section:
|
|
|
|
**For a generic type to soundly implement drop, its generics arguments must
|
|
|
|
**For a generic type to soundly implement drop, its generics arguments must
|
|
|
|
strictly outlive it.**
|
|
|
|
strictly outlive it.**
|
|
|
|
|
|
|
|
|
|
|
|
This rule is sufficient but not necessary to satisfy the drop checker. That is,
|
|
|
|
Obeying this rule is (usually) necessary to satisfy the borrow
|
|
|
|
if your type obeys this rule then it's definitely sound to drop. However
|
|
|
|
checker; obeying it is sufficient but not necessary to be
|
|
|
|
there are special cases where you can fail to satisfy this, but still
|
|
|
|
sound. That is, if your type obeys this rule then it's definitely
|
|
|
|
successfully pass the borrow checker. These are the precise rules that are
|
|
|
|
sound to drop.
|
|
|
|
currently up in the air.
|
|
|
|
|
|
|
|
|
|
|
|
The reason that it is not always necessary to satisfy the above rule
|
|
|
|
|
|
|
|
is that some Drop implementations will not access borrowed data even
|
|
|
|
|
|
|
|
though their type gives them the capability for such access.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For example, this variant of the above `Inspector` example will never
|
|
|
|
|
|
|
|
accessed borrowed data:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```rust,ignore
|
|
|
|
|
|
|
|
struct Inspector<'a>(&'a u8, &'static str);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
impl<'a> Drop for Inspector<'a> {
|
|
|
|
|
|
|
|
fn drop(&mut self) {
|
|
|
|
|
|
|
|
println!("Inspector(_, {}) knows when *not* to inspect.", self.1);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fn main() {
|
|
|
|
|
|
|
|
let (inspector, days);
|
|
|
|
|
|
|
|
days = Box::new(1);
|
|
|
|
|
|
|
|
inspector = Inspector(&days, "gadget");
|
|
|
|
|
|
|
|
// Let's say `days` happens to get dropped first.
|
|
|
|
|
|
|
|
// Even when Inspector is dropped, its destructor will not access the
|
|
|
|
|
|
|
|
// borrowed `days`.
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Likewise, this variant will also never access borrowed data:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```rust,ignore
|
|
|
|
|
|
|
|
use std::fmt;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
struct Inspector<T: fmt::Display>(T, &'static str);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
impl<T: fmt::Display> Drop for Inspector<T> {
|
|
|
|
|
|
|
|
fn drop(&mut self) {
|
|
|
|
|
|
|
|
println!("Inspector(_, {}) knows when *not* to inspect.", self.1);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fn main() {
|
|
|
|
|
|
|
|
let (inspector, days): (Inspector<&u8>, Box<u8>);
|
|
|
|
|
|
|
|
days = Box::new(1);
|
|
|
|
|
|
|
|
inspector = Inspector(&days, "gadget");
|
|
|
|
|
|
|
|
// Let's say `days` happens to get dropped first.
|
|
|
|
|
|
|
|
// Even when Inspector is dropped, its destructor will not access the
|
|
|
|
|
|
|
|
// borrowed `days`.
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
However, *both* of the above variants are rejected by the borrow
|
|
|
|
|
|
|
|
checker during the analysis of `fn main`, saying that `days` does not
|
|
|
|
|
|
|
|
live long enough.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The reason is that the borrow checking analysis of `main` does not
|
|
|
|
|
|
|
|
know about the internals of each Inspector's Drop implementation. As
|
|
|
|
|
|
|
|
far as the borrow checker knows while it is analyzing `main`, the body
|
|
|
|
|
|
|
|
of an inspector's destructor might access that borrowed data.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Therefore, the drop checker forces all borrowed data in a value to
|
|
|
|
|
|
|
|
strictly outlive that value.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# An Escape Hatch
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The precise rules that govern drop checking may be less restrictive in
|
|
|
|
|
|
|
|
the future.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The current analysis is deliberately conservative; forcing all
|
|
|
|
|
|
|
|
borrowed data in a value to outlive that value is certainly sound.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Future versions of the language may improve its precision (i.e. to
|
|
|
|
|
|
|
|
reduce the number of cases where sound code is rejected as unsafe).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
In the meantime, there is an unstable attribute that one can use to
|
|
|
|
|
|
|
|
assert (unsafely) that a generic type's destructor is *guaranteed* to
|
|
|
|
|
|
|
|
not access any expired data, even if its type gives it the capability
|
|
|
|
|
|
|
|
to do so.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
That attribute is called `unsafe_destructor_blind_to_params`.
|
|
|
|
|
|
|
|
To deploy it on the Inspector example from above, we would write:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```rust,ignore
|
|
|
|
|
|
|
|
struct Inspector<'a>(&'a u8, &'static str);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
impl<'a> Drop for Inspector<'a> {
|
|
|
|
|
|
|
|
#[unsafe_destructor_blind_to_params]
|
|
|
|
|
|
|
|
fn drop(&mut self) {
|
|
|
|
|
|
|
|
println!("Inspector(_, {}) knows when *not* to inspect.", self.1);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This attribute has the word `unsafe` in it because the compiler is not
|
|
|
|
|
|
|
|
checking the implicit assertion that no potentially expired data
|
|
|
|
|
|
|
|
(e.g. `self.0` above) is accessed.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
It is sometimes obvious that no such access can occur, like the case above.
|
|
|
|
|
|
|
|
However, when dealing with a generic type parameter, such access can
|
|
|
|
|
|
|
|
occur indirectly. Examples of such indirect access are:
|
|
|
|
|
|
|
|
* invoking a callback,
|
|
|
|
|
|
|
|
* via a trait method call.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
(Future changes to the language, such as impl specialization, may add
|
|
|
|
|
|
|
|
other avenues for such indirect access.)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Here is an example of invoking a callback:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```rust,ignore
|
|
|
|
|
|
|
|
struct Inspector<T>(T, &'static str, Box<for <'r> fn(&'r T) -> String>);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
impl<T> Drop for Inspector<T> {
|
|
|
|
|
|
|
|
fn drop(&mut self) {
|
|
|
|
|
|
|
|
// The `self.2` call could access a borrow e.g. if `T` is `&'a _`.
|
|
|
|
|
|
|
|
println!("Inspector({}, {}) unwittingly inspects expired data.",
|
|
|
|
|
|
|
|
(self.2)(&self.0), self.1);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Here is an example of a trait method call:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```rust,ignore
|
|
|
|
|
|
|
|
use std::fmt;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
struct Inspector<T: fmt::Display>(T, &'static str);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
impl<T: fmt::Display> Drop for Inspector<T> {
|
|
|
|
|
|
|
|
fn drop(&mut self) {
|
|
|
|
|
|
|
|
// There is a hidden call to `<T as Display>::fmt` below, which
|
|
|
|
|
|
|
|
// could access a borrow e.g. if `T` is `&'a _`
|
|
|
|
|
|
|
|
println!("Inspector({}, {}) unwittingly inspects expired data.",
|
|
|
|
|
|
|
|
self.0, self.1);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
And of course, all of these accesses could be further hidden within
|
|
|
|
|
|
|
|
some other method invoked by the destructor, rather than being written
|
|
|
|
|
|
|
|
directly within it.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
In all of the above cases where the `&'a u8` is accessed in the
|
|
|
|
|
|
|
|
destructor, adding the `#[unsafe_destructor_blind_to_params]`
|
|
|
|
|
|
|
|
attribute makes the type vulnerable to misuse that the borrower
|
|
|
|
|
|
|
|
checker will not catch, inviting havoc. It is better to avoid adding
|
|
|
|
|
|
|
|
the attribute.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# Is that all about drop checker?
|
|
|
|
|
|
|
|
|
|
|
|
It turns out that when writing unsafe code, we generally don't need to
|
|
|
|
It turns out that when writing unsafe code, we generally don't need to
|
|
|
|
worry at all about doing the right thing for the drop checker. However there
|
|
|
|
worry at all about doing the right thing for the drop checker. However there
|
|
|
|
is one special case that you need to worry about, which we will look at in
|
|
|
|
is one special case that you need to worry about, which we will look at in
|
|
|
|
the next section.
|
|
|
|
the next section.
|
|
|
|
|
|
|
|
|
|
|
|