-
Notifications
You must be signed in to change notification settings - Fork 385
TB: Track permissions on the byte-level #4314
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
So, how does adding a new node work (and why do we need to call
For Stacked Borrows, there are no per-block operations: each stack at each offset its own stack and completely independent from the other ones at different offsets in the same allocation. So there, more (basically everything) can be moved into the per-offset function. So what do we do for Tree Borrows? One answer is to combine parent reading, permission setting and data race notifying together. This would be somewhat ugly, because you're constructing a node, while also accessing the tree, and this would only be fine because you're careful to not actually add the node into the Should we do this? |
Ignoring the SIFA thingy since I already forgot how it works, what I think would make sense is to do a single
Does that makes sense or is it too ugly as well? |
That would work. It has to construct an extra |
I'm not sure, but that's at least plausible. I also prefer it conceptually. |
Previously, the assert would cause an error if the `RangeMap` was empty.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks! This is a lot better.
I don't fully understand the logic around the new perms_map
though. It seems like the map is created to cover all the bytes from the beginning of the allocation to the end of the retagged place, which is odd -- it should be either the entire allocation, or just the place. And given that we do not want to actually put anything into the perms
map outside the place, I think it should be just the place.
// SIFA of the frozen part must be weaker than SIFA of the non-frozen part, otherwise | ||
// `self.update_last_accessed_after_retag` will break the SIFA invariant (see `foreign_access_skipping.rs`). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't understand why this assertion must hold. foreign_access_skipping
doesn't explain it either, it does not mention frozen vs non-frozen parts at all.
I have pushed a commit with various minor cleanups -- please take a look, I hope they make sense. :) However, in doing so I stumbled upon a question I could not answer. |
e705a08
to
d518dcf
Compare
This makes the tracking of permissions on the byte-level, like in Stacked Borrows, which makes the tracking of interior mutable data more fine-grained.
cc @RalfJung @JoJoDeveloping