unwind safety fixes#140
Conversation
235fcfb to
45e29c0
Compare
7ad7985 to
225f13b
Compare
e45f41e to
e3b2cb6
Compare
| let val = unsafe { Pin::new_unchecked(val) }; | ||
| // SAFETY: `slot` was initialized above. | ||
| (self.1)(val).inspect_err(|_| unsafe { core::ptr::drop_in_place(slot) }) | ||
| (self.1)(val)?; |
There was a problem hiding this comment.
The whole implementation here can probably be simplified to something like
(self.1)(unsafe { Slot::new(slot) }.init(self.0).let_binding()) or something similar if #143 lands.
There was a problem hiding this comment.
I could rebase this branch to dev/accessor-rework if you'd like? Otherwise I don't mind waiting for #143 to land.
e3b2cb6 to
e5f75a9
Compare
|
I cannot review diff of diffs. Please always squash your changes to individually meaningful commits. |
e5f75a9 to
5c83836
Compare
|
I see, everything has been squashed to the original three commits. When reviewing, I prefer having diffs that do exactly what each of the comments suggests and squashing after the review. I will squash future fixups immediately. |
|
For GitHub-centric workflow that's indeed convenient, but for this project as the commits are synced to the kernel I need to review each commit individually so it's up to kernel's quality requirement. Honestly the actual issue is that GitHub does not provide a good way to visualize the diff, despite that it has all the needed information to render as such. The "Compare" button sometimes does the job, but it breaks when you rebase and fixup commits in a single push. Longer term, either we can wait until GitHub implements it (which is quite unlikely given the slop), or we can adopt what the Rust Project's triagebot does by automatically generates a range diff like this. |
|
I understand and fully agree. Unfortunately, looking at recent trends at GitHub, I don't expect much in terms of improvements to the platform. Thank you for taking the time to explain your reasoning. :) |
5c83836 to
eebe948
Compare
eebe948 to
8b46ef9
Compare
nbdd0121
left a comment
There was a problem hiding this comment.
Thanks for working on this. Some further feedbacks.
Also, could you move the ArrayInit to lib.rs just before init_array_from_fn? The __internal module is supposed to only host items that need to be public due to the use of generated code from pin-init-internal (yes, we have a few pub(crate) there, but that's for historical reasons and I'm working on moving them).
| // INVARIANT: `self.ptr` is non-null once initialization starts. | ||
| self.ptr = slot.cast::<T>(); | ||
| for i in 0..N { | ||
| self.num_init = i; |
There was a problem hiding this comment.
Thanks for adding the invariant comments! You probably want to add a line here as well because num_init is also involved in the invariant (i.e. you need to assert that [..num_init] has been initialized already).
There was a problem hiding this comment.
Thanks for adding the invariant comments!
You're welcome!
You probably want to add a line here as well...
Thanks to your other comment explaining the logic behind INVARIANT comments, this is very clear. I've added them both here and in __pin_init.
| for i in 0..N { | ||
| self.num_init = i; | ||
| let init = (self.make_init)(i); | ||
| // SAFETY: Since `0 <= i < N`, `self.ptr.add(i)` is in array bounds and |
There was a problem hiding this comment.
The comparison chain is not valid Rust. I think you can probably just remove this part. Valid for write is also not a requirement of add.
| // SAFETY: Since `0 <= i < N`, `self.ptr.add(i)` is in array bounds and | |
| // SAFETY: `self.ptr.add(i)` is in bounds. |
| impl<T, F> Drop for ArrayInit<T, F> { | ||
| fn drop(&mut self) { | ||
| if self.ptr.is_null() { | ||
| // INVARIANT: Since `self.ptr` is null - either no initialization has |
There was a problem hiding this comment.
INVARIANT comment is needed when the fields involved in the invariant is changed. Simply relying on the invariant does not need special annotation (it's actually confusing to have them).
There was a problem hiding this comment.
That makes a lot of sense, thank you.
| // INVARIANT: Since `self.ptr` is not null - the initialization has failed | ||
| // partway and we need to drop elements initialized thus far to uphold the | ||
| // pinning requirement. | ||
| // | ||
| // SAFETY: Invariants of `ArrayInit` guarantee that, when `self.ptr` isn't | ||
| // null, elements `self.ptr[0..self.num_init]` are initialized and contain | ||
| // valid `T` values, so dropping them is safe. |
There was a problem hiding this comment.
Same here
| // INVARIANT: Since `self.ptr` is not null - the initialization has failed | |
| // partway and we need to drop elements initialized thus far to uphold the | |
| // pinning requirement. | |
| // | |
| // SAFETY: Invariants of `ArrayInit` guarantee that, when `self.ptr` isn't | |
| // null, elements `self.ptr[0..self.num_init]` are initialized and contain | |
| // valid `T` values, so dropping them is safe. | |
| // SAFETY: Since `self.ptr` is not null - the initialization has failed | |
| // partway. Drop `self.ptr[0..self.num_init]` which are initialized per type invariant. |
| // null, elements `self.ptr[0..self.num_init]` are initialized and contain | ||
| // valid `T` values, so dropping them is safe. | ||
| unsafe { | ||
| let slice = core::ptr::slice_from_raw_parts_mut(self.ptr, self.num_init); |
There was a problem hiding this comment.
This should either be lifted out of the unsafe block, or just inlined into the drop_in_place (I actually prefer the latter).
There was a problem hiding this comment.
Fixed (by inlining into drop_in_place ).
When arguments are produced by function-calls, I tend to bind them to variables - I find it easier to read that way (at the risk of being more verbose). But it absolutely shouldn't have been inside an unrelated unsafe block. Thank you for pointing it out.
Adds a guard type that safely initializes an array by running an initializer on each element, keeping track of the number of initialized elements. In the case of a panic or error in the per-element initializer, the guard drops the already-initialized portion of the array; nothing is dropped on success. The previous code only ran cleanup on the explicit error path. If the per- element initializer panicked partway through, the elements already written into the array would be leaked: their `Drop` impls would never run. Link: Rust-for-Linux#136 Reported-by: Gary Guo <gary@garyguo.net> Suggested-by: Gary Guo <gary@garyguo.net> Signed-off-by: Mirko Adzic <adzicmirko97@gmail.com>
Adds a drop guard before the call to the chained closure so that the value initialized by the first stage is dropped if the closure errors or panics; `mem::forget` the guard on success. The previous code only ran cleanup on the explicit error path, leaking the first-stage value if the chained closure panicked. Link: Rust-for-Linux#136 Reported-by: Gary Guo <gary@garyguo.net> Suggested-by: Gary Guo <gary@garyguo.net> Signed-off-by: Mirko Adzic <adzicmirko97@gmail.com>
Cover both fixes added in the series: - `[pin_]init_array_from_fn`: a panic or error from element `i`'s initializer drops the previously initialized elements `0..i`. - `[pin_]chain`: a panic or error from the chained closure drops the value initialized by the first stage. Also assert no double-drop on the success paths. Signed-off-by: Mirko Adzic <adzicmirko97@gmail.com>
8b46ef9 to
59950ff
Compare
|
Apologies for the delay.
Thank you! I really appreciate the level of detail in your review/feedback. It is rare to come by these days and I'm really glad to work with people that care this much about the code they maintain.
Done. Also thank you for the clarification on what should go where, I tried to guess based on types like I will respond to individual comments for the rest of your feedback. |
Adds unwind-safety fixes to in-place initialization helpers so partially initialized values are dropped on both errors and panics. Changes:
__internal::ArrayInitguard type that safely initializes an array by running an initializer on each element, keeping track of the number of initialized elements. When dropped, if the initialization was partially successful, the guard drops the initialized portion of the array. Use the guard in[pin_]init_array_from_fn.__internal::DropGuardin[pin_]chainso a panic/error in the chained closure drops the value initialized in the first stage;mem::forgetthe guard on success.Closes: #136
The approach taken here was suggested in the issue itself, thus I added a
Suggested-bytag. I hope that is okay.Edits:
v1 -> v2:
ArrayInitGuardtoArrayInit[Pin]InitforArrayInitinstead of wrapping it in[pin_]init_from_closurev2 -> v3:
mem::forgettheArrayInitguard on success; state that the guard will only drop initialized elements on partial success