Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Supporting unsafe as a keyword? #116

Open
k-sareen opened this issue Dec 18, 2022 · 2 comments
Open

Supporting unsafe as a keyword? #116

k-sareen opened this issue Dec 18, 2022 · 2 comments

Comments

@k-sareen
Copy link
Contributor

k-sareen commented Dec 18, 2022

Another one of my favourite Rust-isms is the clear boundary between "safe" and "unsafe" with the use of the unsafe keyword. I think it's quite nice to be able to work with mainly "safe" code throughout the codebase and then, if required, open the escape hatch with an unsafe { } and then dealing with mucky stuff there. If mmtk and JikesRVM have proven anything, it is that you don't always need to be in "unsafe"-land in order to make good, performant systems.

Currently Virgil code sparingly uses unsafe code, with most of the unsafe code being relegated to the runtime such as pointer arithmetic for GC [1], system calls and other things interfacing with the kernel [2], etc. I think this is largely a good thing, that is, most of the unsafe stuff is already separated, but I think it's semantically nice to go: oh I need to do pointer arithmetic here, I should reason about why I think this is "safe" even though it is an inherently "unsafe" operation.

As an aside, is there a reason why Virgil code for handling files uses file descriptors etc. instead of having a nicer file API -- other than lack of time, I guess.

[1]: https://github.com/titzer/virgil/blob/master/rt/gc/SemiSpace.v3#L83-L86
[2]: https://github.com/titzer/virgil/blob/master/rt/x86-64-linux/System.v3#L75-L84

@titzer
Copy link
Owner

titzer commented Dec 18, 2022

I'm open to designing such a mechanism. One question is what to do with functions/APIs that take Pointer. Technically, the unsafe things being done (like Pointer.atContents, etc) happen in one place, and then an unsafe value is passed through an API. That might imply that functions need an annotation. I'm not sure how to do that with type parameters.

Another way might be to do it file-by-file, either as an annotation at the top, or by forcing the user to specify additional options at the command line. For example, a big bundle of unsafe code is the runtime itself, which is already normally passed in -rt.files=. That would unlock the use of platform-specific features.

@k-sareen
Copy link
Contributor Author

I'm open to designing such a mechanism. One question is what to do with functions/APIs that take Pointer. Technically, the unsafe things being done (like Pointer.atContents, etc) happen in one place, and then an unsafe value is passed through an API. That might imply that functions need an annotation. I'm not sure how to do that with type parameters.

Rust accomplishes this in two ways: a function can be annotated as unsafe, so in this case Pointer.atContents will be marked as unsafe; and then if I use Pointer.atContents anywhere in a function I have to use an unsafe-block in order to make the compiler happy, so in this case it'll be unsafe { Pointer.atContents(ptr) }; And while not semantically forced by the compiler or linter, a comment is written above the unsafe-block to explain why the programmer believes the "unsafe" operation is "safe", while for an unsafe function, a /// # Safety rustdoc comment is written to explain when the function should be "safe" to use.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants