Skip to content

Commit a34a5ff

Browse files
committed
Auto merge of rust-lang#134424 - 1c3t3a:null-checks, r=<try>
Insert null checks for pointer dereferences when debug assertions are enabled Similar to how the alignment is already checked, this adds a check for null pointer dereferences in debug mode. It is implemented similarly to the alignment check as a `MirPass`. This inserts checks in the same places as the `CheckAlignment` pass and additionally also inserts checks for `Borrows`, so code like ```rust let ptr: *const u32 = std::ptr::null(); let val: &u32 = unsafe { &*ptr }; ``` will have a check inserted on dereference. This is done because null references are UB. The alignment check doesn't cover these places, because in `&(*ptr).field`, the exact requirement is that the final reference must be aligned. This is something to consider further enhancements of the alignment check. For now this is implemented as a separate `MirPass`, to make it easy to disable this check if necessary. This is related to a 2025H1 project goal for better UB checks in debug mode: rust-lang/rust-project-goals#177. r? `@saethlin`
2 parents cd805f0 + c5a6817 commit a34a5ff

File tree

33 files changed

+548
-166
lines changed

33 files changed

+548
-166
lines changed

compiler/rustc_codegen_cranelift/src/base.rs

+10
Original file line numberDiff line numberDiff line change
@@ -417,6 +417,16 @@ fn codegen_fn_body(fx: &mut FunctionCx<'_, '_, '_>, start_block: Block) {
417417
Some(source_info.span),
418418
);
419419
}
420+
AssertKind::NullPointerDereference => {
421+
let location = fx.get_caller_location(source_info).load_scalar(fx);
422+
423+
codegen_panic_inner(
424+
fx,
425+
rustc_hir::LangItem::PanicNullPointerDereference,
426+
&[location],
427+
Some(source_info.span),
428+
)
429+
}
420430
_ => {
421431
let location = fx.get_caller_location(source_info).load_scalar(fx);
422432

compiler/rustc_codegen_ssa/src/mir/block.rs

+5
Original file line numberDiff line numberDiff line change
@@ -713,6 +713,11 @@ impl<'a, 'tcx, Bx: BuilderMethods<'a, 'tcx>> FunctionCx<'a, 'tcx, Bx> {
713713
// and `#[track_caller]` adds an implicit third argument.
714714
(LangItem::PanicMisalignedPointerDereference, vec![required, found, location])
715715
}
716+
AssertKind::NullPointerDereference => {
717+
// It's `fn panic_null_pointer_dereference()`, and
718+
// `#[track_caller]` adds an implicit third argument.
719+
(LangItem::PanicNullPointerDereference, vec![location])
720+
}
716721
_ => {
717722
// It's `pub fn panic_...()` and `#[track_caller]` adds an implicit argument.
718723
(msg.panic_function(), vec![location])

compiler/rustc_const_eval/src/const_eval/machine.rs

+1
Original file line numberDiff line numberDiff line change
@@ -506,6 +506,7 @@ impl<'tcx> interpret::Machine<'tcx> for CompileTimeMachine<'tcx> {
506506
found: eval_to_int(found)?,
507507
}
508508
}
509+
NullPointerDereference => NullPointerDereference,
509510
};
510511
Err(ConstEvalErrKind::AssertFailure(err)).into()
511512
}

compiler/rustc_hir/src/lang_items.rs

+1
Original file line numberDiff line numberDiff line change
@@ -316,6 +316,7 @@ language_item_table! {
316316
PanicAsyncFnResumedPanic, sym::panic_const_async_fn_resumed_panic, panic_const_async_fn_resumed_panic, Target::Fn, GenericRequirement::None;
317317
PanicAsyncGenFnResumedPanic, sym::panic_const_async_gen_fn_resumed_panic, panic_const_async_gen_fn_resumed_panic, Target::Fn, GenericRequirement::None;
318318
PanicGenFnNonePanic, sym::panic_const_gen_fn_none_panic, panic_const_gen_fn_none_panic, Target::Fn, GenericRequirement::None;
319+
PanicNullPointerDereference, sym::panic_null_pointer_dereference, panic_null_pointer_dereference, Target::Fn, GenericRequirement::None;
319320
/// libstd panic entry point. Necessary for const eval to be able to catch it
320321
BeginPanic, sym::begin_panic, begin_panic_fn, Target::Fn, GenericRequirement::None;
321322

compiler/rustc_middle/messages.ftl

+3
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,9 @@ middle_assert_gen_resume_after_panic = `gen` fn or block cannot be further itera
1717
middle_assert_misaligned_ptr_deref =
1818
misaligned pointer dereference: address must be a multiple of {$required} but is {$found}
1919
20+
middle_assert_null_ptr_deref =
21+
null pointer dereference occurred
22+
2023
middle_assert_op_overflow =
2124
attempt to compute `{$left} {$op} {$right}`, which would overflow
2225

compiler/rustc_middle/src/mir/syntax.rs

+1
Original file line numberDiff line numberDiff line change
@@ -1016,6 +1016,7 @@ pub enum AssertKind<O> {
10161016
ResumedAfterReturn(CoroutineKind),
10171017
ResumedAfterPanic(CoroutineKind),
10181018
MisalignedPointerDereference { required: O, found: O },
1019+
NullPointerDereference,
10191020
}
10201021

10211022
#[derive(Clone, Debug, PartialEq, TyEncodable, TyDecodable, Hash, HashStable)]

compiler/rustc_middle/src/mir/terminator.rs

+4-2
Original file line numberDiff line numberDiff line change
@@ -206,6 +206,7 @@ impl<O> AssertKind<O> {
206206
ResumedAfterPanic(CoroutineKind::Desugared(CoroutineDesugaring::Gen, _)) => {
207207
LangItem::PanicGenFnNonePanic
208208
}
209+
NullPointerDereference => LangItem::PanicNullPointerDereference,
209210

210211
BoundsCheck { .. } | MisalignedPointerDereference { .. } => {
211212
bug!("Unexpected AssertKind")
@@ -271,6 +272,7 @@ impl<O> AssertKind<O> {
271272
"\"misaligned pointer dereference: address must be a multiple of {{}} but is {{}}\", {required:?}, {found:?}"
272273
)
273274
}
275+
NullPointerDereference => write!(f, "\"null pointer dereference occured\""),
274276
ResumedAfterReturn(CoroutineKind::Coroutine(_)) => {
275277
write!(f, "\"coroutine resumed after completion\"")
276278
}
@@ -341,7 +343,7 @@ impl<O> AssertKind<O> {
341343
ResumedAfterPanic(CoroutineKind::Coroutine(_)) => {
342344
middle_assert_coroutine_resume_after_panic
343345
}
344-
346+
NullPointerDereference => middle_assert_null_ptr_deref,
345347
MisalignedPointerDereference { .. } => middle_assert_misaligned_ptr_deref,
346348
}
347349
}
@@ -374,7 +376,7 @@ impl<O> AssertKind<O> {
374376
add!("left", format!("{left:#?}"));
375377
add!("right", format!("{right:#?}"));
376378
}
377-
ResumedAfterReturn(_) | ResumedAfterPanic(_) => {}
379+
ResumedAfterReturn(_) | ResumedAfterPanic(_) | NullPointerDereference => {}
378380
MisalignedPointerDereference { required, found } => {
379381
add!("required", format!("{required:#?}"));
380382
add!("found", format!("{found:#?}"));

compiler/rustc_middle/src/mir/visit.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -636,7 +636,7 @@ macro_rules! make_mir_visitor {
636636
OverflowNeg(op) | DivisionByZero(op) | RemainderByZero(op) => {
637637
self.visit_operand(op, location);
638638
}
639-
ResumedAfterReturn(_) | ResumedAfterPanic(_) => {
639+
ResumedAfterReturn(_) | ResumedAfterPanic(_) | NullPointerDereference => {
640640
// Nothing to visit
641641
}
642642
MisalignedPointerDereference { required, found } => {
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
1-
use rustc_hir::lang_items::LangItem;
21
use rustc_index::IndexVec;
32
use rustc_middle::mir::interpret::Scalar;
4-
use rustc_middle::mir::visit::{MutatingUseContext, NonMutatingUseContext, PlaceContext, Visitor};
53
use rustc_middle::mir::*;
6-
use rustc_middle::ty::{self, Ty, TyCtxt};
4+
use rustc_middle::ty::{Ty, TyCtxt};
75
use rustc_session::Session;
8-
use tracing::{debug, trace};
6+
7+
use crate::check_pointers::{BorrowCheckMode, PointerCheck, check_pointers};
98

109
pub(super) struct CheckAlignment;
1110

@@ -19,162 +18,49 @@ impl<'tcx> crate::MirPass<'tcx> for CheckAlignment {
1918
}
2019

2120
fn run_pass(&self, tcx: TyCtxt<'tcx>, body: &mut Body<'tcx>) {
22-
// This pass emits new panics. If for whatever reason we do not have a panic
23-
// implementation, running this pass may cause otherwise-valid code to not compile.
24-
if tcx.lang_items().get(LangItem::PanicImpl).is_none() {
25-
return;
26-
}
27-
28-
let typing_env = body.typing_env(tcx);
29-
let basic_blocks = body.basic_blocks.as_mut();
30-
let local_decls = &mut body.local_decls;
31-
32-
// This pass inserts new blocks. Each insertion changes the Location for all
33-
// statements/blocks after. Iterating or visiting the MIR in order would require updating
34-
// our current location after every insertion. By iterating backwards, we dodge this issue:
35-
// The only Locations that an insertion changes have already been handled.
36-
for block in (0..basic_blocks.len()).rev() {
37-
let block = block.into();
38-
for statement_index in (0..basic_blocks[block].statements.len()).rev() {
39-
let location = Location { block, statement_index };
40-
let statement = &basic_blocks[block].statements[statement_index];
41-
let source_info = statement.source_info;
42-
43-
let mut finder =
44-
PointerFinder { tcx, local_decls, typing_env, pointers: Vec::new() };
45-
finder.visit_statement(statement, location);
46-
47-
for (local, ty) in finder.pointers {
48-
debug!("Inserting alignment check for {:?}", ty);
49-
let new_block = split_block(basic_blocks, location);
50-
insert_alignment_check(
51-
tcx,
52-
local_decls,
53-
&mut basic_blocks[block],
54-
local,
55-
ty,
56-
source_info,
57-
new_block,
58-
);
59-
}
60-
}
61-
}
62-
}
63-
}
64-
65-
struct PointerFinder<'a, 'tcx> {
66-
tcx: TyCtxt<'tcx>,
67-
local_decls: &'a mut LocalDecls<'tcx>,
68-
typing_env: ty::TypingEnv<'tcx>,
69-
pointers: Vec<(Place<'tcx>, Ty<'tcx>)>,
70-
}
71-
72-
impl<'a, 'tcx> Visitor<'tcx> for PointerFinder<'a, 'tcx> {
73-
fn visit_place(&mut self, place: &Place<'tcx>, context: PlaceContext, location: Location) {
74-
// We want to only check reads and writes to Places, so we specifically exclude
75-
// Borrow and RawBorrow.
76-
match context {
77-
PlaceContext::MutatingUse(
78-
MutatingUseContext::Store
79-
| MutatingUseContext::AsmOutput
80-
| MutatingUseContext::Call
81-
| MutatingUseContext::Yield
82-
| MutatingUseContext::Drop,
83-
) => {}
84-
PlaceContext::NonMutatingUse(
85-
NonMutatingUseContext::Copy | NonMutatingUseContext::Move,
86-
) => {}
87-
_ => {
88-
return;
89-
}
90-
}
91-
92-
if !place.is_indirect() {
93-
return;
94-
}
95-
96-
// Since Deref projections must come first and only once, the pointer for an indirect place
97-
// is the Local that the Place is based on.
98-
let pointer = Place::from(place.local);
99-
let pointer_ty = self.local_decls[place.local].ty;
100-
101-
// We only want to check places based on unsafe pointers
102-
if !pointer_ty.is_unsafe_ptr() {
103-
trace!("Indirect, but not based on an unsafe ptr, not checking {:?}", place);
104-
return;
105-
}
106-
107-
let pointee_ty =
108-
pointer_ty.builtin_deref(true).expect("no builtin_deref for an unsafe pointer");
109-
// Ideally we'd support this in the future, but for now we are limited to sized types.
110-
if !pointee_ty.is_sized(self.tcx, self.typing_env) {
111-
debug!("Unsafe pointer, but pointee is not known to be sized: {:?}", pointer_ty);
112-
return;
113-
}
114-
115-
// Try to detect types we are sure have an alignment of 1 and skip the check
116-
// We don't need to look for str and slices, we already rejected unsized types above
117-
let element_ty = match pointee_ty.kind() {
118-
ty::Array(ty, _) => *ty,
119-
_ => pointee_ty,
120-
};
121-
if [self.tcx.types.bool, self.tcx.types.i8, self.tcx.types.u8].contains(&element_ty) {
122-
debug!("Trivially aligned place type: {:?}", pointee_ty);
123-
return;
124-
}
125-
126-
// Ensure that this place is based on an aligned pointer.
127-
self.pointers.push((pointer, pointee_ty));
128-
129-
self.super_place(place, context, location);
21+
// Skip trivially aligned place types.
22+
let excluded_pointees = [tcx.types.bool, tcx.types.i8, tcx.types.u8];
23+
24+
// We have to exclude borrows here: in `&x.field`, the exact
25+
// requirement is that the final reference must be aligned, but
26+
// `check_pointers` would check that `x` is aligned, which would be wrong.
27+
check_pointers(
28+
tcx,
29+
body,
30+
&excluded_pointees,
31+
insert_alignment_check,
32+
BorrowCheckMode::ExcludeBorrows,
33+
);
13034
}
13135
}
13236

133-
fn split_block(
134-
basic_blocks: &mut IndexVec<BasicBlock, BasicBlockData<'_>>,
135-
location: Location,
136-
) -> BasicBlock {
137-
let block_data = &mut basic_blocks[location.block];
138-
139-
// Drain every statement after this one and move the current terminator to a new basic block
140-
let new_block = BasicBlockData {
141-
statements: block_data.statements.split_off(location.statement_index),
142-
terminator: block_data.terminator.take(),
143-
is_cleanup: block_data.is_cleanup,
144-
};
145-
146-
basic_blocks.push(new_block)
147-
}
148-
37+
/// Inserts the actual alignment check's logic. Returns a
38+
/// [AssertKind::MisalignedPointerDereference] on failure.
14939
fn insert_alignment_check<'tcx>(
15040
tcx: TyCtxt<'tcx>,
151-
local_decls: &mut IndexVec<Local, LocalDecl<'tcx>>,
152-
block_data: &mut BasicBlockData<'tcx>,
15341
pointer: Place<'tcx>,
15442
pointee_ty: Ty<'tcx>,
43+
local_decls: &mut IndexVec<Local, LocalDecl<'tcx>>,
44+
stmts: &mut Vec<Statement<'tcx>>,
15545
source_info: SourceInfo,
156-
new_block: BasicBlock,
157-
) {
158-
// Cast the pointer to a *const ()
46+
) -> PointerCheck<'tcx> {
47+
// Cast the pointer to a *const ().
15948
let const_raw_ptr = Ty::new_imm_ptr(tcx, tcx.types.unit);
16049
let rvalue = Rvalue::Cast(CastKind::PtrToPtr, Operand::Copy(pointer), const_raw_ptr);
16150
let thin_ptr = local_decls.push(LocalDecl::with_source_info(const_raw_ptr, source_info)).into();
162-
block_data
163-
.statements
51+
stmts
16452
.push(Statement { source_info, kind: StatementKind::Assign(Box::new((thin_ptr, rvalue))) });
16553

166-
// Transmute the pointer to a usize (equivalent to `ptr.addr()`)
54+
// Transmute the pointer to a usize (equivalent to `ptr.addr()`).
16755
let rvalue = Rvalue::Cast(CastKind::Transmute, Operand::Copy(thin_ptr), tcx.types.usize);
16856
let addr = local_decls.push(LocalDecl::with_source_info(tcx.types.usize, source_info)).into();
169-
block_data
170-
.statements
171-
.push(Statement { source_info, kind: StatementKind::Assign(Box::new((addr, rvalue))) });
57+
stmts.push(Statement { source_info, kind: StatementKind::Assign(Box::new((addr, rvalue))) });
17258

17359
// Get the alignment of the pointee
17460
let alignment =
17561
local_decls.push(LocalDecl::with_source_info(tcx.types.usize, source_info)).into();
17662
let rvalue = Rvalue::NullaryOp(NullOp::AlignOf, pointee_ty);
177-
block_data.statements.push(Statement {
63+
stmts.push(Statement {
17864
source_info,
17965
kind: StatementKind::Assign(Box::new((alignment, rvalue))),
18066
});
@@ -187,7 +73,7 @@ fn insert_alignment_check<'tcx>(
18773
user_ty: None,
18874
const_: Const::Val(ConstValue::Scalar(Scalar::from_target_usize(1, &tcx)), tcx.types.usize),
18975
}));
190-
block_data.statements.push(Statement {
76+
stmts.push(Statement {
19177
source_info,
19278
kind: StatementKind::Assign(Box::new((
19379
alignment_mask,
@@ -198,7 +84,7 @@ fn insert_alignment_check<'tcx>(
19884
// BitAnd the alignment mask with the pointer
19985
let alignment_bits =
20086
local_decls.push(LocalDecl::with_source_info(tcx.types.usize, source_info)).into();
201-
block_data.statements.push(Statement {
87+
stmts.push(Statement {
20288
source_info,
20389
kind: StatementKind::Assign(Box::new((
20490
alignment_bits,
@@ -216,29 +102,21 @@ fn insert_alignment_check<'tcx>(
216102
user_ty: None,
217103
const_: Const::Val(ConstValue::Scalar(Scalar::from_target_usize(0, &tcx)), tcx.types.usize),
218104
}));
219-
block_data.statements.push(Statement {
105+
stmts.push(Statement {
220106
source_info,
221107
kind: StatementKind::Assign(Box::new((
222108
is_ok,
223109
Rvalue::BinaryOp(BinOp::Eq, Box::new((Operand::Copy(alignment_bits), zero.clone()))),
224110
))),
225111
});
226112

227-
// Set this block's terminator to our assert, continuing to new_block if we pass
228-
block_data.terminator = Some(Terminator {
229-
source_info,
230-
kind: TerminatorKind::Assert {
231-
cond: Operand::Copy(is_ok),
232-
expected: true,
233-
target: new_block,
234-
msg: Box::new(AssertKind::MisalignedPointerDereference {
235-
required: Operand::Copy(alignment),
236-
found: Operand::Copy(addr),
237-
}),
238-
// This calls panic_misaligned_pointer_dereference, which is #[rustc_nounwind].
239-
// We never want to insert an unwind into unsafe code, because unwinding could
240-
// make a failing UB check turn into much worse UB when we start unwinding.
241-
unwind: UnwindAction::Unreachable,
242-
},
243-
});
113+
// Emit a check that asserts on the alignment and otherwise triggers a
114+
// AssertKind::MisalignedPointerDereference.
115+
PointerCheck {
116+
cond: Operand::Copy(is_ok),
117+
assert_kind: Box::new(AssertKind::MisalignedPointerDereference {
118+
required: Operand::Copy(alignment),
119+
found: Operand::Copy(addr),
120+
}),
121+
}
244122
}

0 commit comments

Comments
 (0)