started ch20.1
All checks were successful
Test Gitea Actions / first (push) Successful in 32s
Test Gitea Actions / check-code (push) Successful in 15s
Test Gitea Actions / test (push) Successful in 15s
Test Gitea Actions / documentation-check (push) Successful in 15s

This commit is contained in:
darkicewolf50 2025-04-14 17:18:50 -06:00
parent 848e5c4e33
commit 6aa4deab15

View File

@ -1 +1,452 @@
# Unsafe Rust
So far the code we have discussed has had Rust's memory safety guarantees enforced at compile time.
Rust has a second language hidden inside it that doesn't enforce memory safety guarantees.
This is called *unsafety Rust*, which works just like regular Rust but it gives extra superpowers.
Unsafe Rusts exists because static analysis is conservative.
When the compiler tries to determine whether or not code upholds the guarantees, it is better for it to reject some valid programs than to accept some invalid programs.
Even if the code *may* be ok, if the compiler doesn't have enough information to be confident and therefore reject the code.
In these cases you can use unsafe code to tell the compiler, "Trust me, I know what I'm doing."
Be warned that you use unsafe Rust at your own risk.
If you use unsafe code incorrectly, problems can occur due to memory unsafety, such as null pointer dereferencing.
Rust has an unsafe alter ego is that the underlying computer hardware is inherently unsafe.
If Rust didn't allow us to do unsafe operations, you couldn't do certain tasks.
Rust needs to allow you to do low-level systems programming, such as directly interacting with the operating system or even writing your own operating system.
Working with low-level systems programming is one of the goals of the language.
## Unsafe Superpowers
To switch to unsafe Rust, you need to use the `unsafe` keyword and then start a new block that holds the unsafe code.
You can do five additional actions in unsafe Rust that you can't do in safe Rust, which we call *unsafe superpowers*.
These superpowers are:
- Dereference a raw pointer
- Call an unsafe function or method
- Access or modify a mutable static variable
- Implement an unsafe trait
- Access fields of a `union`
Note: `unsafe` does not turn off the borrow checker or disable any other of Rust's safety checks.
If you use a reference in unsafe code, it will still be checked.
The `unsafe` keyword only gives access to these five features that are then not checked by the compiler for memory safety.
You will still get some degree of safety inside of an unsafe block.
Additionally `unsafe` does not mean the code inside the block is necessarily dangerous or that it will definitely have memory safety problems.
The intent as the programmer, you will ensure the code inside an `unsafe` block will access memory in a valid way.
People are fallible, and mistakes will happen, but by requiring these five unsafe operations to be inside blocks annotated with `unsafe` you will know that any errors related to memory safety must be within an `unsafe` block.
Keep `unsafe` blocks small: you will be thankful later when you investigate memory bugs.
To isolate unsafe code as much as possible, it is best to enclose unsafe code within a safe abstraction and provide a safe API (This will be covered when we examine unsafe functions and methods).
Parts of the std library are implemented as safe abstractions over unsafe code that has been audited.
Wrapping unsafe code in a safe abstraction prevents uses of `unsafe` from leaking out into all the places that you want to use the functionality implemented with `unsafe` code, because using aa safe abstraction is safe.
Now we will look into each of the five unsafe superpowers.
We will also look at some abstractions that provide a safe interface to unsafe code.
## Deferencing a Raw Pointer
We mentioned before that the compiler ensures references are always valid.
Unsafe Rust has two new types called *raw pointers* that are similar to references
Raw pointers can be immutable or mutable, just like with references, are written as `*const T` and `*mut T`, respectively.
The asterisk isn't the dereference operator, it is part of the type name.
In the context of raw pointers, *immutable* means that the pointer can't be directly assigned to after being dereferenced.
Different from references and smart pointers, raw pointers:
- Are allowed to ignore the borrowing rules by having both immutable and mutable pointers or multiple mutable pointers to the same location
- Aren't guaranteed to point to valid memory
- Are allowed to be null
- Don't implement nay automatic cleanup
By opting out of Rust's enforced guarantees, you can give up safety in exchange for greater performance or the ability to interface with another language or hardware where Rust's guarantees don't apply.
Here is an example of how to create an immutable and a mutable raw pointer.
```rust
let mut num = 5;
let r1 = &raw const num;
let r2 = &raw mut num;
```
Note that we don't include the `unsafe` keyword here.
We can create raw pointers in safe code; we just can't dereference raw pointers outside an unsafe block (We will see this later).
We have created raw pointers by using the raw borrow operators.
`&raw const num` creates a `*const i32` immutable raw pointer.
`&raw mut num` creates a `*mut i32` mutable raw pointer.
Because we created them directly form a local variable, we know these particular raw pointers are valid, but we can't make that assumption about just any raw pointer.
In order to demonstrate this, we will create a raw pointer whose validity we can't be so certain of, using `as` to cast a value instead of using the raw reference operators.
This shows how to create a raw pointer to an arbitrary location in memory.
Trying to use arbitrary memory is undefined: there might be data at that address or there might not, the compiler might optimize the code so there is no memory access, or the program might error with a segmentation fault.
Usually there is no good reason to write code like this, especially in cases where you can use a raw borrow operator instead, but it is possible.
```rust
let address = 0x012345usize;
let r = address as *const i32;
```
Remember that we can create raw pointers in safe code, but we can't *dereference* raw pointers and read the data being pointed to.
Here we use the dereference operator `*` on a raw pointer that requires an `unsafe` block.
```rust
let mut num = 5;
let r1 = &raw const num;
let r2 = &raw mut num;
unsafe {
println!("r1 is: {}", *r1);
println!("r2 is: {}", *r2);
}
```
Creating a pointer does no hard. It is only when we attempt to access the value that it points at that we might end up dealing with an invalid value.
Note in the first and third example, we created `*const i32` and `*mut i32` raw pointers that both pointed to the same memory location where we `num` is stored.
If we instead tried to create an immutable and a mutable reference to `num`, the code would not have compiled because Rust's ownership rules don't allow a mutable reference at the same time as any immutable references.
With raw pointers, we can create a mutable pointer and an immutable pointer to the same location and change data through the mutable pointer, potentially create a data race.
With all of the dangers, why ever use raw pointers?
Once major use case is when interfacing with C code, as you will see in the next section ["Calling an Unsafe Function or Method"]().
Another case is when building up safe abstractions that the borrow checker doesn't understand.
We will introduce unsafe function and then look at an example of a safe abstraction that uses unsafe code.
## Calling an Unsafe Function or Method
The second type of superpower that you can perform in an unsafe block is calling unsafe functions.
Unsafe functions and methods look exactly like regular functions and methods, but they have an extra `unsafe` before the rest of the definitions.
The `unsafe` keyword indicates the function has requirements we need to uphold when we call this function, because Rust can't guarantee we have met these requirements.
By calling an unsafe function within an `unsafe` block, we are saying that we have read this function's documentation and take responsibility for upholding the function's contracts.
This code is an unsafe function named `dangerous` that doesn't do anything in its body
```rust
unsafe fn dangerous() {}
unsafe {
dangerous();
}
```
We must call the `dangerous` function within a separate `unsafe` block.
If we attempted to call `dangerous` without the `unsafe` block, we would get this error
```
$ cargo run
Compiling unsafe-example v0.1.0 (file:///projects/unsafe-example)
error[E0133]: call to unsafe function `dangerous` is unsafe and requires unsafe function or block
--> src/main.rs:4:5
|
4 | dangerous();
| ^^^^^^^^^^^ call to unsafe function
|
= note: consult the function's documentation for information on how to avoid undefined behavior
For more information about this error, try `rustc --explain E0133`.
error: could not compile `unsafe-example` (bin "unsafe-example") due to 1 previous error
```
With the `unsafe` block, we are asserting to Rust that we have read this function's documentation, we understand how to use it properly, and we have verified that we are fulfilling the contract of the function.
To perform unsafe operations in the body of an unsafe function you still need to use an `unsafe` block just as within a regular function, and the compiler will warn you if you forget.
This helps to keep `unsafe` blocks as small as possible, as unsafe operations may not be needed across the whole function body.
### Creating a Safe Abstraction over Unsafe Code
Just because a function contains unsafe code, this does mean we need to mark the entire function as unsafe.
In fact wrapping unsafe is a common abstraction.
For example, let's take a look at the `split_at_mut` function from the std library, which requires some unsafe code.
We will also explore how we might implement it.
This safe method is defined on mutable slices: it takes once slice and makes it two by splitting the slice at the index given as an argument.
Here is how to use `split_at_mut`
```rust
let mut v = vec![1, 2, 3, 4, 5, 6];
let r = &mut v[..];
let (a, b) = r.split_at_mut(3);
assert_eq!(a, &mut [1, 2, 3]);
assert_eq!(b, &mut [4, 5, 6]);
```
We can't implement this function using only safe Rust.
An attempt might look something like this, which will not compile.
For simplicity we will implement `split_at_mut` as a function rather than a method and only for slices of `i32` values rather than for a generic type `T`.
```rust
fn split_at_mut(values: &mut [i32], mid: usize) -> (&mut [i32], &mut [i32]) {
let len = values.len();
assert!(mid <= len);
(&mut values[..mid], &mut values[mid..])
}
```
This function first gets the total length of the slice.
Then it asserts that the index given as a parameter is within the slice by checking whether it is less than or equal to the length.
This assertion means that if we pass an index that is greater than the length to split the slice at, the function will panic before it attempts to use that index.
Next we return two mutable slices in a tuple, one form the start of the original slice to the `mid` index and another from `mid` to the end of the slice.
We get this compilation error
```
$ cargo run
Compiling unsafe-example v0.1.0 (file:///projects/unsafe-example)
error[E0499]: cannot borrow `*values` as mutable more than once at a time
--> src/main.rs:6:31
|
1 | fn split_at_mut(values: &mut [i32], mid: usize) -> (&mut [i32], &mut [i32]) {
| - let's call the lifetime of this reference `'1`
...
6 | (&mut values[..mid], &mut values[mid..])
| --------------------------^^^^^^--------
| | | |
| | | second mutable borrow occurs here
| | first mutable borrow occurs here
| returning this value requires that `*values` is borrowed for `'1`
|
= help: use `.split_at_mut(position)` to obtain two mutable non-overlapping sub-slices
For more information about this error, try `rustc --explain E0499`.
error: could not compile `unsafe-example` (bin "unsafe-example") due to 1 previous error
```
Rust's borrow checker can't understand that we are borrowing different parts of the slice.
It only knows that we are borrowing from the same slice twice.
Borrowing different parts of a slice fundamentally ok because the two slices aren't overlapping, but Rust isn't smart enough to know this.
When we know code is ok, but Rust doesn't, it is time to reach for unsafe code.
Below shows how to use an `unsafe` block, a raw pointer, and some calls to unsafe functions to make the implementation of `split_at_work`.
```rust
use std::slice;
fn split_at_mut(values: &mut [i32], mid: usize) -> (&mut [i32], &mut [i32]) {
let len = values.len();
let ptr = values.as_mut_ptr();
assert!(mid <= len);
unsafe {
(
slice::from_raw_parts_mut(ptr, mid),
slice::from_raw_parts_mut(ptr.add(mid), len - mid),
)
}
}
```
Remember from ["The Slice Type"](), from Ch4 that slices are a pointer to some data and the length of the slice.
We can use the `len` method to get the length of a slice and the `as_mut_ptr` method to access the raw pointer of a slice.
In this case because we have a mutable slice to `i32` values, `as_mut_ptr` returns a raw pointer with the type `*mut i32`, which we have stored in the variable `ptr`.
We keep the assertion that the `mid` index is within the slice.
Next we get to the unsafe code: the `slice::from_raw_parts_mut` function takes a raw pointer and a length, and it creates a slice.
We use this function to create a slice that starts from `ptr` and is `mid` items long.
Next we call the `add` method on `ptr` with `mid` as an argument to get a raw pointer that starts at `mid`, and we create a slice using that pointer and the remaining number of items after `mid` as the length.
The function `slice::from_raw_parts_mut` is unsafe because it takes a raw pointer and must trust that this pointer is valid.
The `add` method on raw pointers is also unsafe, because it must trust that the offset location is also a valid pointer.
We have to put this in an `unsafe` block around our calls to `slice::from_raw_parts_mut` and `add` so we could call them.
By looking at the code and by adding the assertion that `mid` must be less than or equal to `len`.
We can tell that all the raw pointers used within the `unsafe` block will be valid pointers to data within the slice.
This is an acceptable and appropriate use of `unsafe`.
Notice that we don't need to mark the resulting `split_at_mut` function as `unsafe`.
We can call this function form safe Rust.
We have created a safe abstraction to the unsafe code with an implementation of the function that uses `unsafe` code in a safe way, because it creates only valid pointers from the data this function has access to.
By contrast, the use of `slice::from_raw_parts_mut` here would likely crash when the slice is used.
This code takes an arbitrary memory location and creates a slice 10,000 items long.
```rust
use std::slice;
let address = 0x01234usize;
let r = address as *mut i32;
let values: &[i32] = unsafe { slice::from_raw_parts_mut(r, 10000) };
```
We don't own the memory at this arbitrary location and there is no guarantee that the slice this code creates contains valid `i32` values.
Attempting to use `values` as though it's aa valid slice results in undefined behavior.
## Using `extern` Functions to Call External Code
Sometimes, your Rust code might need to interact with code written in another language.
To enable this, Rust has the keyword `extern` that facilitates the creation and use of a *Foreign Function Interface (FFI)*.
An FFI is a way for a programming language to defined functions and enable a different (foreign) programming language to call those functions.
This code demonstrates how to set up an integration with the `abs` function form the C std library.
Functions declared within `extern` blocks are usually unsafe to call from Rust code, so they must also be marked `unsafe`.
The reason is that other languages don't enforce Rust's rules and guarantees, and Rust can't check them, so the responsibility falls on the programmer to ensure safety.
```rust
unsafe extern "C" {
fn abs(input: i32) -> i32;
}
fn main() {
unsafe {
println!("Absolute value of -3 according to C: {}", abs(-3));
}
}
```
Within the `unsafe extern "C"` block, we list the names and signatures of external functions from another language we want to call.
The `"C"` part defines which *application binary interface (ABI)* the external function uses: the ABI defines how to call the function at the assembly level.
The `"C"` ABI is the most common and follows the C programming language's ABI.
This particular function does not have any memory safety considerations.
In fact, we know that any call to `aabs` will always be safe for any `i32`, so we can use the `safe` keyword to say that this specific function is safe to call even though it is in an `unsafe extern` block.
Once we make this change, calling it no longer requires an `unsafe` block.
Here is the updated code
```rust
unsafe extern "C" {
safe fn abs(input: i32) -> i32;
}
fn main() {
println!("Absolute value of -3 according to C: {}", abs(-3));
}
```
Marking a function as `safe` does not inherently make it safe.
Instead, it is like a promise you are making to Rust that it *is* safe.
It is still your responsibility to make sure that the promise is kept.
### Calling Rust Functions form Other Languages
You can also use `extern` to create an interface that allows other languages to call Rust functions.
Instead of creating a whole `extern` block, we add the `extern` keyword and specify the ABI to use before the `fn` keyword for the relevant function.
Additionally we need to add a `#[unsafe(no_mangle)]` annotation to tell the Rust compiler not to mange the name of this function.
*Mangling* is when a compiler changes the name we have given a function to a different name that contains more information for other parts of the compilation process to consume but is less human readable.
Every programming language compiler mangles names slightly differently, so for a Rust function to be nameable by other languages, we must disable the Rust compiler's name mangling.
This is unsafe because there might be name collisions across libraries with the built-in mangling, so it is our responsibility to make sure the name we have exported is safe to export without mangling.
Here we make the `call_from_c` function accessible from C code, after it is compiled to a shared library and linked from C
```rust
#[unsafe(no_mangle)]
pub extern "C" fn call_from_c() {
println!("Just called a Rust function from C!");
}
```
This usage of `extern` does not require `unsafe`
## Accessing or Modifying a Mutable Static Variable
So far we have not talked about `global variables`, which Rust does support but can be problematic with Rust's ownership rules.
If two threads are accessing the same mutable global variable, it can cause a data race.
In Rust, global variables are called *static* variables.
Here shows an example declaration and use of a static variable with a string slice as a value.
```rust
static HELLO_WORLD: &str = "Hello, world!";
fn main() {
println!("name is: {HELLO_WORLD}");
}
```
Static variables are similar to constants, which we discussed in the ["Constants"]() section in Ch3.
The names of static variables are in `SCREAMING_SNAKE_CASE` by convention.
Static variables can only store references with the `'static` lifetime.
This means the Rust compiler can figure out the lifetime and we aren't required to annotate it explicitly.
Accessing an immutable static variable is safe.
A subtle difference between constants and immutable static variables is that values in a static variable have a fixed address in memory.
Using the value will always access the same data.
Constants, on the other hand are allowed to duplicate their data whenever they are used.
Another difference is that static variables can by mutable.
Accessing and modifying mutable static variables is *unsafe*.
Here shows how to declare, access and modify a mutable static variable named `COUNTER`.
```rust
static mut COUNTER: u32 = 0;
/// SAFETY: Calling this from more than a single thread at a time is undefined
/// behavior, so you *must* guarantee you only call it from a single thread at
/// a time.
unsafe fn add_to_count(inc: u32) {
unsafe {
COUNTER += inc;
}
}
fn main() {
unsafe {
// SAFETY: This is only called from a single thread in `main`.
add_to_count(3);
println!("COUNTER: {}", *(&raw const COUNTER));
}
}
```