Skip to content

Commit 3471d41

Browse files
committed
Coerce safe-to-call target_feature functions to fn pointers.
1 parent 341f603 commit 3471d41

File tree

7 files changed

+117
-24
lines changed

7 files changed

+117
-24
lines changed

compiler/rustc_borrowck/src/type_check/mod.rs

+26-1
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ use rustc_infer::infer::{
1919
BoundRegion, BoundRegionConversionTime, InferCtxt, NllRegionVariableOrigin,
2020
};
2121
use rustc_infer::traits::PredicateObligations;
22+
use rustc_middle::middle::codegen_fn_attrs::is_target_feature_call_safe;
2223
use rustc_middle::mir::tcx::PlaceTy;
2324
use rustc_middle::mir::visit::{NonMutatingUseContext, PlaceContext, Visitor};
2425
use rustc_middle::mir::*;
@@ -1654,7 +1655,31 @@ impl<'a, 'tcx> TypeChecker<'a, 'tcx> {
16541655
match *cast_kind {
16551656
CastKind::PointerCoercion(PointerCoercion::ReifyFnPointer, coercion_source) => {
16561657
let is_implicit_coercion = coercion_source == CoercionSource::Implicit;
1657-
let src_sig = op.ty(body, tcx).fn_sig(tcx);
1658+
let src_ty = op.ty(body, tcx);
1659+
let mut src_sig = src_ty.fn_sig(tcx);
1660+
if let ty::FnDef(def_id, _) = src_ty.kind() {
1661+
// If we are casting a safe target feature function to a safe fn
1662+
// pointer, we need to mark the function as safe explicitly.
1663+
if tcx.codegen_fn_attrs(def_id).safe_target_features
1664+
&& let ty::FnPtr(_, target_hdr) = *ty.kind()
1665+
&& target_hdr.safety.is_safe()
1666+
{
1667+
let coercee_features =
1668+
&tcx.codegen_fn_attrs(def_id).target_features;
1669+
let body_features =
1670+
&tcx.codegen_fn_attrs(body.source.def_id()).target_features;
1671+
if is_target_feature_call_safe(
1672+
tcx,
1673+
&coercee_features,
1674+
&body_features,
1675+
) {
1676+
src_sig = src_sig.map_bound(|sig| ty::FnSig {
1677+
safety: hir::Safety::Safe,
1678+
..sig
1679+
})
1680+
}
1681+
}
1682+
}
16581683

16591684
// HACK: This shouldn't be necessary... We can remove this when we actually
16601685
// get binders with where clauses, then elaborate implied bounds into that

compiler/rustc_hir_typeck/src/coercion.rs

+16-11
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,7 @@ use rustc_infer::traits::{
5151
PredicateObligations,
5252
};
5353
use rustc_middle::lint::in_external_macro;
54+
use rustc_middle::middle::codegen_fn_attrs::is_target_feature_call_safe;
5455
use rustc_middle::span_bug;
5556
use rustc_middle::traits::BuiltinImplSource;
5657
use rustc_middle::ty::adjustment::{
@@ -920,7 +921,7 @@ impl<'f, 'tcx> Coerce<'f, 'tcx> {
920921

921922
match b.kind() {
922923
ty::FnPtr(_, b_hdr) => {
923-
let a_sig = a.fn_sig(self.tcx);
924+
let mut a_sig = a.fn_sig(self.tcx);
924925
if let ty::FnDef(def_id, _) = *a.kind() {
925926
// Intrinsics are not coercible to function pointers
926927
if self.tcx.intrinsic(def_id).is_some() {
@@ -932,19 +933,23 @@ impl<'f, 'tcx> Coerce<'f, 'tcx> {
932933
return Err(TypeError::ForceInlineCast);
933934
}
934935

935-
let fn_attrs = self.tcx.codegen_fn_attrs(def_id);
936-
if matches!(fn_attrs.inline, InlineAttr::Force { .. }) {
937-
return Err(TypeError::ForceInlineCast);
938-
}
939-
940-
// FIXME(target_feature): Safe `#[target_feature]` functions could be cast to safe fn pointers (RFC 2396),
941-
// as you can already write that "cast" in user code by wrapping a target_feature fn call in a closure,
942-
// which is safe. This is sound because you already need to be executing code that is satisfying the target
943-
// feature constraints..
944936
if b_hdr.safety.is_safe()
945937
&& self.tcx.codegen_fn_attrs(def_id).safe_target_features
946938
{
947-
return Err(TypeError::TargetFeatureCast(def_id));
939+
// Allow the coercion if the current function has all the features that would be
940+
// needed to call the coercee safely.
941+
let coercee_features = &self.tcx.codegen_fn_attrs(def_id).target_features;
942+
let body_features =
943+
&self.tcx.codegen_fn_attrs(self.fcx.body_id).target_features;
944+
if !is_target_feature_call_safe(self.tcx, &coercee_features, &body_features)
945+
{
946+
return Err(TypeError::TargetFeatureCast(def_id));
947+
} else {
948+
// The coercee behaves like a safe function, since it is a target_feature
949+
// function that would be callable safely in this context.
950+
a_sig = a_sig
951+
.map_bound(|sig| ty::FnSig { safety: hir::Safety::Safe, ..sig })
952+
}
948953
}
949954
}
950955

compiler/rustc_middle/src/middle/codegen_fn_attrs.rs

+16
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ use rustc_span::Symbol;
55
use rustc_target::spec::SanitizerSet;
66

77
use crate::mir::mono::Linkage;
8+
use crate::ty::TyCtxt;
89

910
#[derive(Clone, TyEncodable, TyDecodable, HashStable, Debug)]
1011
pub struct CodegenFnAttrs {
@@ -179,3 +180,18 @@ impl CodegenFnAttrs {
179180
}
180181
}
181182
}
183+
184+
pub fn is_target_feature_call_safe(
185+
tcx: TyCtxt<'_>,
186+
callee_features: &[TargetFeature],
187+
body_features: &[TargetFeature],
188+
) -> bool {
189+
// If the called function has target features the calling function hasn't,
190+
// the call requires `unsafe`. Don't check this on wasm
191+
// targets, though. For more information on wasm see the
192+
// is_like_wasm check in hir_analysis/src/collect.rs
193+
tcx.sess.target.options.is_like_wasm
194+
|| callee_features
195+
.iter()
196+
.all(|feature| body_features.iter().any(|f| f.name == feature.name))
197+
}

compiler/rustc_mir_build/src/check_unsafety.rs

+6-10
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ use std::ops::Bound;
55
use rustc_errors::DiagArgValue;
66
use rustc_hir::def::DefKind;
77
use rustc_hir::{self as hir, BindingMode, ByRef, HirId, Mutability};
8-
use rustc_middle::middle::codegen_fn_attrs::TargetFeature;
8+
use rustc_middle::middle::codegen_fn_attrs::{TargetFeature, is_target_feature_call_safe};
99
use rustc_middle::mir::BorrowKind;
1010
use rustc_middle::span_bug;
1111
use rustc_middle::thir::visit::Visitor;
@@ -495,15 +495,11 @@ impl<'a, 'tcx> Visitor<'a, 'tcx> for UnsafetyVisitor<'a, 'tcx> {
495495
};
496496
self.requires_unsafe(expr.span, CallToUnsafeFunction(func_id));
497497
} else if let &ty::FnDef(func_did, _) = fn_ty.kind() {
498-
// If the called function has target features the calling function hasn't,
499-
// the call requires `unsafe`. Don't check this on wasm
500-
// targets, though. For more information on wasm see the
501-
// is_like_wasm check in hir_analysis/src/collect.rs
502-
if !self.tcx.sess.target.options.is_like_wasm
503-
&& !callee_features.iter().all(|feature| {
504-
self.body_target_features.iter().any(|f| f.name == feature.name)
505-
})
506-
{
498+
if !is_target_feature_call_safe(
499+
self.tcx,
500+
callee_features,
501+
self.body_target_features,
502+
) {
507503
let missing: Vec<_> = callee_features
508504
.iter()
509505
.copied()

tests/ui/rfcs/rfc-2396-target_feature-11/fn-ptr.rs

+14
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,23 @@
22

33
#![feature(target_feature_11)]
44

5+
#[target_feature(enable = "avx")]
6+
fn foo_avx() {}
7+
58
#[target_feature(enable = "sse2")]
69
fn foo() {}
710

11+
#[target_feature(enable = "sse2")]
12+
fn bar() {
13+
let foo: fn() = foo; // this is OK, as we have the necessary target features.
14+
let foo: fn() = foo_avx; //~ ERROR mismatched types
15+
}
16+
817
fn main() {
18+
if std::is_x86_feature_detected!("sse2") {
19+
unsafe {
20+
bar();
21+
}
22+
}
923
let foo: fn() = foo; //~ ERROR mismatched types
1024
}

tests/ui/rfcs/rfc-2396-target_feature-11/fn-ptr.stderr

+17-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,20 @@
11
error[E0308]: mismatched types
2-
--> $DIR/fn-ptr.rs:9:21
2+
--> $DIR/fn-ptr.rs:14:21
3+
|
4+
LL | #[target_feature(enable = "avx")]
5+
| --------------------------------- `#[target_feature]` added here
6+
...
7+
LL | let foo: fn() = foo_avx;
8+
| ---- ^^^^^^^ cannot coerce functions with `#[target_feature]` to safe function pointers
9+
| |
10+
| expected due to this
11+
|
12+
= note: expected fn pointer `fn()`
13+
found fn item `#[target_features] fn() {foo_avx}`
14+
= note: functions with `#[target_feature]` can only be coerced to `unsafe` function pointers
15+
16+
error[E0308]: mismatched types
17+
--> $DIR/fn-ptr.rs:23:21
318
|
419
LL | #[target_feature(enable = "sse2")]
520
| ---------------------------------- `#[target_feature]` added here
@@ -13,6 +28,6 @@ LL | let foo: fn() = foo;
1328
found fn item `#[target_features] fn() {foo}`
1429
= note: functions with `#[target_feature]` can only be coerced to `unsafe` function pointers
1530

16-
error: aborting due to 1 previous error
31+
error: aborting due to 2 previous errors
1732

1833
For more information about this error, try `rustc --explain E0308`.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
//@ only-x86_64
2+
//@ run-pass
3+
4+
#![feature(target_feature_11)]
5+
6+
#[target_feature(enable = "sse2")]
7+
fn foo() -> bool {
8+
true
9+
}
10+
11+
#[target_feature(enable = "sse2")]
12+
fn bar() -> fn() -> bool {
13+
foo
14+
}
15+
16+
fn main() {
17+
if !std::is_x86_feature_detected!("sse2") {
18+
return;
19+
}
20+
let f = unsafe { bar() };
21+
assert!(f());
22+
}

0 commit comments

Comments
 (0)