Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Detect simultaneous borrow and drop of UnsafeCell #351

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

e00E
Copy link

@e00E e00E commented Apr 24, 2024

Dropping an UnsafeCell or calling into_inner can be seen as mutable access, which is not allowed to happen while another borrow exists.

The downside of this change is the added Drop implementation of UnsafeCell. This restricts some uses of UnsafeCell that were previously allowed related to drop check.

I removed one of the tests because it stops working with this change due to double panic. Fixing it is awkward.

I went with an approach using unsafe. It is possible to implement this safely but it has too much overhead. We would have to wrap the data field with Option to allow safely taking. This is fine but we would also need to Box it because the type parameter T is ?Sized, which cannot be put into Option.

fixes #349

tests/unsafe_cell.rs Outdated Show resolved Hide resolved
@Darksonn Darksonn requested a review from hawkw April 25, 2024 07:04
Dropping an UnsafeCell or calling into_inner can be seen as mutable
access, which is not allowed to happen while another borrow exists.

The downside of this change is the added Drop implementation of
UnsafeCell. This restricts some uses of UnsafeCell that were previously
allowed related to drop check.

I went with an approach using unsafe. It is possible to implement this
safely but it has too much overhead. We would have to wrap the data
field with Option to allow safely taking. This is fine but we would also
need to Box it because the type parameter T is ?Sized, which cannot be
put into Option.

fixes tokio-rs#349
Comment on lines +232 to +233
// Observe that we have mutable access.
self.get_mut();
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should std::mem::needs_drop() be used to solve this issue:

You restrict the type's use relative to std's UnsafeCell. When Drop is implemented, drop check applies, making some uses that worked before no longer work.

Suggested change
// Observe that we have mutable access.
self.get_mut();
// Observe that we have mutable access if the inner type needs to be dropped.
if std::mem::needs_drop::<T>() {
self.get_mut();
}

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't agree with this.

  1. Even if the inner type doesn't need to be dropped and thus its drop implementation does nothing, dropping the cell while a reference to the inner type exists is still wrong.

  2. The documentation for needs_drop says that "this is purely an optimization hint". But we're changing observable behavior here. Using it would lead to safety assertions changing whether they get triggered based on the return value of needs_drop, which can change.

Copy link

@wyfo wyfo Jul 14, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Even if the inner type doesn't need to be dropped and thus its drop implementation does nothing, dropping the cell while a reference to the inner type exists is still wrong.

Actually, this is isn't wrong to me. If an object is dropped, it means that all references pointing to it have reach the end of their lifetime, otherwise, the code wouldn't even compile.
In fact, after thinking a second time about this sentence, it means that #349 is not an issue after all, and doesn't need to be "fixed".

My bad, the abstraction around UnsafeCell makes me forget that it was about pointers and not references.

Copy link

@wyfo wyfo Jul 14, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The documentation for needs_drop says that "this is purely an optimization hint". But we're changing observable behavior here.

This is an optimization hint, but the documentation still states "However if this function actually returns false, then you can be certain dropping T has no side effect". So needs_drop result is still guaranteed to have no false-negative, and can be relied on.
Of course, as written in the documentation, it could lead to false-positives, but a few false positive may be still better than a too much conservative behavior leading to more false-positives. And if the result of needs_drop is changing with compiler versions, it's still guaranteed to not introduce false-negative.

Copy link

@wyfo wyfo Jul 14, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Anyway, see my comment in the issue, I don't think loom is doing things right here. Dropping a cell should not be counted a mutable access but as a cell invalidation, for further ConstPtr/MutPtr dereference.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Loom does not consider dropping UnsafeCell to be a write
3 participants