forked from rust-lang/rust
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Rollup merge of rust-lang#133777 - the8472:document-randomize-layout,…
… r=jieyouxu document -Zrandomize-layout in the unstable book tracking issue: rust-lang#106764 fixes rust-lang#130462
- Loading branch information
Showing
1 changed file
with
23 additions
and
0 deletions.
There are no files selected for viewing
23 changes: 23 additions & 0 deletions
23
src/doc/unstable-book/src/compiler-flags/randomize-layout.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
# `randomize-layout` | ||
|
||
The tracking issue for this feature is: [#106764](https://github.com/rust-lang/rust/issues/106764). | ||
|
||
------------------------ | ||
|
||
The `-Zrandomize-layout` flag changes the layout algorithm for `repr(Rust)` types defined in the current crate from its normal | ||
optimization goals to pseudorandomly rearranging fields within the degrees of freedom provided by the largely unspecified | ||
default representation. This also affects type sizes and padding. | ||
Downstream intantiations of generic types defined in a crate with randomization enabled will also be randomized. | ||
|
||
It can be used to find unsafe code that accidentally relies on unspecified behavior. | ||
|
||
Randomization is not guaranteed to use a different permutation for each compilation session. | ||
`-Zlayout-seed=<u64>` can be used to supply additional entropy. | ||
|
||
Randomization only approximates the intended freedom of repr(Rust). Sometimes two distinct types may still consistently | ||
result in the same layout due to limitations of the current implementation. Randomization may become | ||
more aggressive over time as our coverage of the available degrees of freedoms improves. | ||
Corollary: Randomization is not a safety oracle. Two struct layouts being observably the same under different layout seeds | ||
on the current compiler version does not guarantee that future compiler versions won't give them distinct layouts. | ||
|
||
Randomization may also become less aggressive in the future if additional guarantees get added to the default layout. |