diff --git a/text/3016-const-ub.md b/text/3016-const-ub.md new file mode 100644 index 00000000000..19b6c716009 --- /dev/null +++ b/text/3016-const-ub.md @@ -0,0 +1,111 @@ +- Feature Name: `const_ub` +- Start Date: 2020-10-10 +- RFC PR: [rust-lang/rfcs#3016](https://github.com/rust-lang/rfcs/pull/3016) + +# Summary +[summary]: #summary + +Define UB during const evaluation to lead to an unspecified result or hard error for the affected CTFE query, but not otherwise infect the compilation process. + +# Motivation +[motivation]: #motivation + +So far, nothing is specified about what happens when `unsafe` code leads to UB during CTFE. +This is a major blocker for stabilizing `unsafe` operations in const-contexts. + +# Guide-level explanation +[guide-level-explanation]: #guide-level-explanation + +There are some values that Rust needs to compute at compile-time. +This includes the initial value of a `const`/`static`, and array lengths (and more general, const generics). +Computing these initial values is called compile-time function evaluation (CTFE). +CTFE in Rust is very powerful and permits running almost arbitrary Rust code. +This raises the question, what happens when there is `unsafe` code and it causes [Undefined Behavior (UB)][UB]? + +The answer is that in this case, the final value that is currently being executed is arbitrary. +For example, when UB arises while computing an array length, then the final array length can be any `usize`, or it can be (partially) uninitialized. +No guarantees are made about this final value, and it can be different depending on host and target architecture, compiler flags, and more. +However, UB will not otherwise adversely affect the currently running compiler; type-checking and lints and everything else will work correctly given whatever the result of the CTFE computation is. +In particular, when the same constant is used in two different crates, those crates will still definitely see the same value for that constant -- everything else would break the type system. + +Note, however, that this means compile-time UB can later cause runtime UB when the program is actually executed: +for example, if there is UB while computing the initial value of a `Vec`, the result might be a completely invalid vector that causes UB at runtime when used in the program. + +Sometimes, the compiler might be able to detect such problems and show an error or warning about CTFE computation having gone wrong (for example, the compiler might detect when the array length ends up being uninitialized). +But other times, this might not be the case -- there is no guarantee that UB is reliably detected during CTFE. +This can change from compiler version to compiler version: CTFE code that causes UB could build fine with one compiler and fail to build with another. +(This is in accordance with the general policy that unsound code is not subject to stability guarantees.) +Implementations are encouraged to perform as many UB checks as they feasibly can, and they are encouraged to document which UB is and is not detected during CTFE and what the consequences of undetected UB can be, but none of this is required. + +## CTFE UB-checking in `rustc` + +For `rustc` specifically at the time the RFC is written, a lot of UB will actually be detected reliably: +* Dereferencing dangling pointers. +* Using an invalid value in an arithmetic, logical or control-flow operation (e.g. using `3` transmuted to a `bool` value in an `if`, or using an uninitialized integer in `+` or `|`). +* Violating the precondition of an intrinsic (e.g., reaching an `unreachable` or violating the assumptions of `exact_div`). + +If any of these errors arise during CTFE, they will currently be reliably detected and a CTFE error will be raised. + +Other kinds of UB are ignored, and evaluation continues as if there was no error. +* Dereferencing unaligned pointers: memory is accessed at the given address even if it is insufficiently aligned. +* Violating Rust's aliasing rules: memory is read/written even if that violates aliasing guarantees. +* Producing an invalid value (but not using it in one of the ways defined above): evaluation continues despite the fact that an invalid value was produced. + +`rustc` also currently makes no attempt at detecting library UB. + +No UB-exploiting MIR optimizations are currently being performed for CTFE, so a CTFE execution currently will never go wrong in arbitrary ways: UB is either detected, or evaluation continues in a well-defined manner as described above. + +However, this is just a snapshot of what `rustc` currently does. +None of this is *guaranteed*, and `rustc` may relax or otherwise change its UB checking any time. + +[UB]: https://doc.rust-lang.org/reference/behavior-considered-undefined.html + +# Reference-level explanation +[reference-level-explanation]: #reference-level-explanation + +When UB arises as part of CTFE, the result of this evaluation is an unspecified constant, i.e., it is arbitrary, and might not even be valid for the expected return type of this evaluation. +The compiler might be able to detect that UB occurred and raise an error or a warning, but this is not mandated, and absence of lints does not imply absence of UB. +However, the rest of the compiler will continue to function properly, and compilation *itself* will not raise UB. + +# Drawbacks +[drawbacks]: #drawbacks + +This means UB during CTFE can silently "corrupt" the build in a way that the final program has UB when being executed +(but not more so than if the CTFE code would instead have been run at runtime). + +# Rationale and alternatives +[rationale-and-alternatives]: #rationale-and-alternatives + +The most obvious alternative is to say that UB during CTFE will definitely be detected. +However, that is expensive and might even be impossible. +Even Miri does not currently detect all UB, and Miri is already performing many additional checks that would significantly slow down CTFE. +Furthermore, since optimizations can "hide" UB (an optimization can turn a program with UB into one without), this means we have to keep running CTFE on unoptimized MIR. +And finally, implementing these checks requires a more precise understanding of UB than we currently have; basically, this would block having any potentially-UB operations at const-time on having a spec for Rust that precisely describes their UB in a checkable way. +In particular, this would mean we need to decide on an aliasing model before permitting raw pointers in CTFE. + +Another extreme alternative would be to say that UB during CTFE may have arbitrary effects in the host compiler, including host-level UB. +Basically this would mean that CTFE would be allowed to "leave its sandbox". +This would allow JIT'ing CTFE and running the resulting code unchecked. +While compiling untrusted code should only be done with care (including additional sandboxing), this seems like an unnecessary extra footgun. + +A possible middle-ground is to guarantee to detect *some UB*. +However, what is cheap and/or easy to detect might change over time as the implementation of CTFE evolves, so to avoid drawing Rust into a corner, this RFC avoids making any such guarantees. + +# Prior art +[prior-art]: #prior-art + +C++ requires compilers to detect UB in `constexpr`. +However, the fragment of C++ that is available to `constexpr` excludes pointer casts, pointer arithmetic (beyond array bounds), and union-based type punning, which makes such checks not very complicated and avoids most of the poorly specified parts of UB. + +# Unresolved questions +[unresolved-questions]: #unresolved-questions + +Currently none. + +# Future possibilities +[future-possibilities]: #future-possibilities + +This RFC provides an easy way forward for "unconst" operations, i.e., operations that are safe at run-time but not at compile-time. +Primary examples of such operations are anything involving the integer representation of pointers, which cannot be known at compile-time. +If this RFC were accepted, we could declare such operations UB during CTFE (and thus naturally they would only be permitted in an `unsafe` block). +This still leaves the door open for providing better guarantees in the future.