Skip to content

Commit 19c5719

Browse files
authoredJun 5, 2017
Merge pull request #44 from mrhota/int_overflow
Add details about integer overflow
2 parents 876582e + 1fc5924 commit 19c5719

File tree

2 files changed

+36
-15
lines changed

2 files changed

+36
-15
lines changed
 

‎src/behavior-not-considered-unsafe.md

+36-13
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,38 @@
1-
## Behavior not considered unsafe
2-
3-
This is a list of behavior not considered *unsafe* in Rust terms, but that may
4-
be undesired.
5-
6-
* Deadlocks
7-
* Leaks of memory and other resources
8-
* Exiting without calling destructors
9-
* Integer overflow
10-
- Overflow is considered "unexpected" behavior and is always user-error,
11-
unless the `wrapping` primitives are used. In non-optimized builds, the compiler
12-
will insert debug checks that panic on overflow, but in optimized builds overflow
13-
instead results in wrapped values. See [RFC 560] for the rationale and more details.
1+
## Behavior not considered `unsafe`
2+
3+
The Rust compiler does not consider the following behaviors _unsafe_,
4+
though a programmer may (should) find them undesirable, unexpected,
5+
or erroneous.
6+
7+
##### Deadlocks
8+
##### Leaks of memory and other resources
9+
##### Exiting without calling destructors
10+
##### Integer overflow
11+
12+
If a program contains arithmetic overflow, the programmer has made an
13+
error. In the following discussion, we maintain a distinction between
14+
arithmetic overflow and wrapping arithmetic. The first is erroneous,
15+
while the second is intentional.
16+
17+
When the programmer has enabled `debug_assert!` assertions (for
18+
example, by enabling a non-optimized build), implementations must
19+
insert dynamic checks that `panic` on overflow. Other kinds of builds
20+
may result in `panics` or silently wrapped values on overflow, at the
21+
implementation's discretion.
22+
23+
In the case of implicitly-wrapped overflow, implementations must
24+
provide well-defined (even if still considered erroneous) results by
25+
using two's complement overflow conventions.
26+
27+
The integral types provide inherent methods to allow programmers
28+
explicitly to perform wrapping arithmetic. For example,
29+
`i32::wrapping_add` provides two's complement, wrapping addition.
30+
31+
The standard library also provides a `Wrapping<T>` newtype which
32+
ensures all standard arithmetic operations for `T` have wrapping
33+
semantics.
34+
35+
See [RFC 560] for error conditions, rationale, and more details about
36+
integer overflow.
1437

1538
[RFC 560]: https://github.com/rust-lang/rfcs/blob/master/text/0560-integer-overflow.md

‎src/undocumented.md

-2
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,6 @@ to shrink!
1515
- [Flexible target specification] - Some---but not all---flags are documented
1616
in [Conditional compilation]
1717
- [Require parentheses for chained comparisons]
18-
- [Integer overflow not `unsafe`] - documented with a reference to the RFC, but
19-
requires further details
2018
- [`dllimport`] - one element mentioned but not explained at [FFI attributes]
2119
- [define `crt_link`]
2220
- [define `unaligned_access`]

0 commit comments

Comments
 (0)
Please sign in to comment.