On Tuesday, 25 July 2017 at 14:32:18 UTC, Shachar Shemesh wrote:
On 25/07/17 17:11, ag0aep6g wrote:
On 07/25/2017 03:50 PM, Shachar Shemesh wrote:
The title really does says it all. I keep copying OS function
declarations into my code, just so I can add those attributes
to them. Otherwise I simply cannot call "signalfd" and
"sigemptyset" (to name a couple from my most recent history)
from @safe code.
Not all OS functions can be `@trusted`.
I don't about `signalfd` and `sigemptyset`, but `read` [1]
can't be `@trusted`, for example. It takes pointer and length
separately, and the pointer is a `void*`. That's not safe at
all.
And, indeed, the code calling "read" shouldn't be able to do
that as @safe. Read itself, however, is trusted
No, it is not, because it does not fulfill the definition of
@trusted (callable from *any* @safe context without allowing
memory corruption).
(because, let's face it, if you cannot trust the kernel, you're
screwed anyways).
This has nothing to do with trusting the kernel:
---
char[1] buf;
int dontCorruptMePlease;
read(fd, &buf[0], 10);
---
The read implementation can't verify the buffer size, it must
assume it to be correct. If it's too large for the actual buffer
-> memory corruption.
No function taking pointer+size of pointed to (that accesses
them) can be @trusted.
Having said that, I have no objection to excluding the
"pointer+length" system calls from the above rule. They are, by
far, the minority of system calls.
And also happen to be the most used ones.
But I digress, the point is *every single functionust be verified
for every single Attribute* (other than nothrow).
PRs are welcome :)