-
Notifications
You must be signed in to change notification settings - Fork 105
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Restrict support for #[derive(IntoBytes)]
on unions, work to guarantee forwards-compatible soundness
#1792
Comments
Summarizing a discussion with @jswrenn See also: #260 The situation may be more permissive than I originally thought. In particular, while it might be the case at some point in the future that any union with all uninitialized bytes is considered bit-valid (ie, it is sound to produce such a union value), it is currently the case that creating such a value requires It is already the case that zerocopy's traits imply both bit validity and safety requirements. For example, In order for this to continue to be sound, we need the following forwards-compatibility guarantees from Rust:
|
#[derive(IntoBytes)]
on unions?#[derive(IntoBytes)]
on unions, work to guarantee forwards-compatible soundness
Makes progress on #1792
Makes progress on #1792
Permit it to be passed either when compiling zerocopy-derive or when compiling the user's crate. This makes the --cfg play more nicely with different build systems. Makes progress on #1792
Permit it to be passed either when compiling zerocopy-derive or when compiling the user's crate. This makes the --cfg play more nicely with different build systems. Makes progress on #1792
Do you need
IntoBytes
support on unions? Let us know at #1802.Progress
#[derive(IntoBytes)]
on unions behind a--cfg
IntoBytes
docs to mention Do you need `IntoBytes` support on unions? Let us know! #1802unsafe
codeFromBytes
andIntoBytes
to be clear about what safety invariants are addedDetails
Support for
#[derive(IntoBytes)]
on unions was added in 9c19cbe (reviewed at fxrev.dev/639087). This support is sound on the assumption that if every field of a union isIntoBytes
and there is no extra padding before or after any field, then no bit-valid instance of that union can have uninitialized bytes.However, this assumes too much. It is currently up in the air whether this actually holds. It's not clear from reading the history why we were okay adding this implementation in the first place, but it now seems like it may have been premature.
It may eventually become the case that this assumption is guaranteed by Rust, so this may eventually become a non-issue. However, for the time being, it's a violation of our soundness policy, which promises to be sound on all future Rust compilers.
Short-term mitigation
Unfortunately, existing users rely on
#[derive(IntoBytes)]
support on unions, so removing this support will break users. This is likely not a problem on today's Rust, so forcing users to migrate to something else might be too drastic of a solution. Instead, I propose that we discourage further use by gating#[derive(IntoBytes)]
on unions behind a--cfg
. The reason for a--cfg
instead of a Cargo feature is that Cargo features are footguns in cases like this - it's easy for crate A to enable the feature and then for crate B, which depends on A, to accidentally rely on that feature despite not enabling that feature itself. For something with soundness and stability implications, that's risky. By contrast, a--cfg
requires the top-level crate to enable it for all downstream crates.Long-term mitigation
There are two options for long-term mitigations.
Union validity
We can try to get Rust to promise what we need in order for
#[derive(IntoBytes)]
on unions to be guaranteed sound on all future compilers. In particular, this entails restricting union bit validity so that, if the byte at a given offset is initialized in every valid value of every field, then it must be initialized in the union as well.Union safety
Alternatively, we can take a weaker approach that only requires a safety rather than bit validity constraint: #1792 (comment)
The text was updated successfully, but these errors were encountered: