From bb399b15b9d0c944008f1677a31167931931c407 Mon Sep 17 00:00:00 2001 From: joboet Date: Sat, 17 Feb 2024 21:27:11 +0100 Subject: [PATCH] generate `getelementptr` instead of `inttoptr` for `ptr::invalid` --- library/core/src/ptr/mod.rs | 28 ++++++++++++++++------------ tests/codegen/strict-provenance.rs | 15 +++++++++++++++ 2 files changed, 31 insertions(+), 12 deletions(-) create mode 100644 tests/codegen/strict-provenance.rs diff --git a/library/core/src/ptr/mod.rs b/library/core/src/ptr/mod.rs index 2bd14f357d80c..a38c4ddfef6cd 100644 --- a/library/core/src/ptr/mod.rs +++ b/library/core/src/ptr/mod.rs @@ -537,7 +537,10 @@ pub unsafe fn drop_in_place(to_drop: *mut T) { #[rustc_allow_const_fn_unstable(ptr_metadata)] #[rustc_diagnostic_item = "ptr_null"] pub const fn null() -> *const T { - from_raw_parts(invalid(0), ()) + // Use transmute instead of casting so that Miri knows that the pointer is invalid. + // SAFETY: on all current platforms, usize and pointers have the same layout, + // and the validity invariant of pointers is the same as that of integers + unsafe { mem::transmute(0usize) } } /// Creates a null mutable raw pointer. @@ -563,7 +566,10 @@ pub const fn null() -> *const T { #[rustc_allow_const_fn_unstable(ptr_metadata)] #[rustc_diagnostic_item = "ptr_null_mut"] pub const fn null_mut() -> *mut T { - from_raw_parts_mut(invalid_mut(0), ()) + // Use transmute instead of casting so that Miri knows that the pointer is invalid. + // SAFETY: on all current platforms, usize and pointers have the same layout, + // and the validity invariant of pointers is the same as that of integers + unsafe { mem::transmute(0usize) } } /// Creates an invalid pointer with the given address. @@ -590,11 +596,10 @@ pub const fn null_mut() -> *mut T { #[unstable(feature = "strict_provenance", issue = "95228")] pub const fn invalid(addr: usize) -> *const T { // FIXME(strict_provenance_magic): I am magic and should be a compiler intrinsic. - // We use transmute rather than a cast so tools like Miri can tell that this - // is *not* the same as from_exposed_addr. - // SAFETY: every valid integer is also a valid pointer (as long as you don't dereference that - // pointer). - unsafe { mem::transmute(addr) } + // We offset the null pointer instead of using a cast so that LLVM doesn't + // use inttoptr and so tools like Miri can tell that it is *not* the same + // as from_exposed_addr. + null::().wrapping_byte_add(addr) } /// Creates an invalid mutable pointer with the given address. @@ -621,11 +626,10 @@ pub const fn invalid(addr: usize) -> *const T { #[unstable(feature = "strict_provenance", issue = "95228")] pub const fn invalid_mut(addr: usize) -> *mut T { // FIXME(strict_provenance_magic): I am magic and should be a compiler intrinsic. - // We use transmute rather than a cast so tools like Miri can tell that this - // is *not* the same as from_exposed_addr. - // SAFETY: every valid integer is also a valid pointer (as long as you don't dereference that - // pointer). - unsafe { mem::transmute(addr) } + // We offset the null pointer instead of using a cast so that LLVM doesn't + // use inttoptr and so tools like Miri can tell that it is *not* the same + // as from_exposed_addr. + null_mut::().wrapping_byte_add(addr) } /// Convert an address back to a pointer, picking up a previously 'exposed' provenance. diff --git a/tests/codegen/strict-provenance.rs b/tests/codegen/strict-provenance.rs new file mode 100644 index 0000000000000..b7054206807b3 --- /dev/null +++ b/tests/codegen/strict-provenance.rs @@ -0,0 +1,15 @@ +// compile-flags: -O + +#![crate_type = "lib"] +#![feature(strict_provenance)] + +use std::ptr; + +// CHECK-LABEL: @invalid +#[no_mangle] +fn invalid(addr: usize) -> *const () { + // CHECK: start + // CHECK-NEXT: %0 = getelementptr i8, ptr null, i64 %addr + // CHECK-NEXT: ret ptr %0 + ptr::invalid(addr) +}