Skip to content

core::marker::NoCell in bounds (previously known an Freeze) #3633

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 31 commits into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
Show all changes
31 commits
Select commit Hold shift + click to select a range
af62890
Stabilization RFC for `core::marker::Freeze` in bounds
p-avital May 10, 2024
106bc46
Make this a proper RFC
p-avital May 13, 2024
902b79d
Add line wraps for legibility.
p-avital May 13, 2024
126f8f0
Update text/0000-stabilize-marker-freeze.md
p-avital May 13, 2024
94ef594
Update 0000-stabilize-marker-freeze.md
p-avital May 14, 2024
34b9775
Update text/0000-stabilize-marker-freeze.md
p-avital May 14, 2024
3a104b1
Update text/0000-stabilize-marker-freeze.md
p-avital May 14, 2024
6e15d06
Update text/0000-stabilize-marker-freeze.md
p-avital May 14, 2024
c5b3fe8
Update text/0000-stabilize-marker-freeze.md
p-avital May 14, 2024
2b4f996
Update text/0000-stabilize-marker-freeze.md
p-avital May 14, 2024
33ffcc6
Update text/0000-stabilize-marker-freeze.md
p-avital May 14, 2024
b339b0d
Address a batch of comments with actionnable suggestions
p-avital May 22, 2024
30a03fc
Update remaining questions
p-avital May 22, 2024
c8fa805
Propose Freeze->ShallowImmutable and PhantomNotFreeze
p-avital May 22, 2024
492a594
Update text/0000-stabilize-marker-freeze.md
p-avital May 22, 2024
c01e96c
Update 0000-stabilize-marker-freeze.md
p-avital May 22, 2024
405b322
Add motivation for the trait renaming
p-avital May 25, 2024
14abf77
Update text/0000-stabilize-marker-freeze.md
p-avital May 26, 2024
c1fedd5
Update text/0000-stabilize-marker-freeze.md
p-avital May 31, 2024
04e39d4
Update RFC following the 2024-07-24 design meeting
p-avital Jul 27, 2024
c7eab79
Apply suggestions from code review
p-avital Jul 28, 2024
84c1aad
Update RFC after design meeting 2025-03-19
p-avital Mar 19, 2025
65f1c90
Update summary per 2025-03-19 lang design meeting
traviscross Mar 19, 2025
b5c089b
Clean up whitespace
traviscross Mar 19, 2025
9ac85ff
Update 0000-stabilize-marker-freeze.md
p-avital Mar 19, 2025
7d91686
Remove the open questions
traviscross Mar 19, 2025
ebffacf
Update the RFC metadata and rename the file
traviscross Mar 19, 2025
ad10530
Merge branch 'rust-lang:master' into stabilize-marker-freeze
p-avital Mar 19, 2025
4225d5c
Update 3633-freeze-in-bounds.md
p-avital Mar 19, 2025
a274335
Rename `Freeze` to `NoCell`
p-avital Mar 27, 2025
4172280
Apply suggestions from code review
p-avital Apr 4, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
239 changes: 239 additions & 0 deletions text/3633-freeze-in-bounds.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,239 @@
- Feature Name: `freeze`
- Start Date: 2024-05-10
- RFC PR: [rust-lang/rfcs#3633](https://github.com/rust-lang/rfcs/pull/3633)
- Tracking Issue: [rust-lang/rust#121675](https://github.com/rust-lang/rust/issues/121675)

# Summary
[summary]: #summary

- Stabilize `core::marker::Freeze` in trait bounds, renamed as `core::marker::NoCell` (this RFC will keep using `Freeze` when discussing historical uses of the trait, and use `NoCell` when discussing the newly stabilized trait).
- Provide a `PhantomCell` marker type to opt out of `NoCell`.
- This type implements all auto traits except for `NoCell`.
- Change `PhantomData<T>` to implement `NoCell` only if `T: NoCell`.

# Motivation
[motivation]: #motivation

With 1.78, Rust [changed behavior](https://github.com/rust-lang/rust/issues/121250): previously, `const REF: &T = &expr;` was (accidentally) accepted even when `expr` may contain interior mutability.
Now this requires that the type of `expr` satisfies `T: core::marker::Freeze`, which indicates that `T` doesn't contain any un-indirected `UnsafeCell`, meaning that `T`'s memory cannot be modified through a shared reference.

The purpose of this change was to ensure that interior mutability cannot affect content that may have been static-promoted in read-only memory, which would be a soundness issue.
However, this new requirement also prevents using static-promotion to create constant references to data of generic type. This pattern can be used to approximate "generic `static`s" (with the distinction that static-promotion doesn't guarantee a unique address for the promoted content). An example of this pattern can be found in `stabby` and `equator`'s shared way of constructing v-tables:
```rust
pub trait VTable<'a>: Copy {
const VT: &'a Self;
}
pub struct VtAccumulator<Tail, Head> {
tail: Tail,
head: Head,
}
impl<Tail: VTable<'a>, Head: VTable<'a>> VTable<'a> for VtAccumulator<Tail, Head> {
const VT: &'a Self = &Self {tail: *Tail::VT, head: *Head::VT}; // Doesn't compile since 1.78
}
```

Making `VTable` a subtrait of `core::marker::Freeze` in this example is sufficient to allow this example to compile again, as static-promotion becomes legal again. This is however impossible as of today due to `core::marker::Freeze` being restricted to `nightly`.

Orthogonally to static-promotion, `core::marker::Freeze` can also be used to ensure that transmuting `&T` to a reference to an interior-immutable type (such as `[u8; core::mem::size_of::<T>()]`) is sound (as interior-mutation of a `&T` may lead to UB in code using the transmuted reference, as it expects that reference's pointee to never change). This is notably a safety requirement for `zerocopy` and `bytemuck` which are currently evaluating the use of `core::marker::NoCell` to ensure that requirement; or rolling out their own equivalents (such as zerocopy's `Immutable`) which imposes great maintenance pressure on these crates to ensure they support as many types as possible. They could stand to benefit from `core::marker::Freeze`'s status as an auto-trait, and `zerocopy` intends to replace its bespoke trait with a re-export of `core::marker::Freeze`.

Note that for this latter use-case, `core::marker::Freeze` isn't entirely sufficient, as an additional proof that `T` doesn't contain padding bytes is necessary to allow this transmutation to be safe, as reading one of `T`'s padding bytes as a `u8` would be UB.

# Guide-level explanation
[guide-level-explanation]: #guide-level-explanation

`core::marker::NoCell` is a trait that is implemented for any type whose memory layout doesn't contain any `UnsafeCell`: it indicates that the memory referenced by `&T` is guaranteed not to change while the reference is live.

It is automatically implemented by the compiler for any type that doesn't contain an un-indirected `core::cell::UnsafeCell`.

Notably, a `const` can only store a reference to a value of type `T` if `T: core::marker::NoCell`, in a pattern named "static-promotion".

As `core::marker::NoCell` is an auto-trait, it poses an inherent semver-hazard (which is already exposed through static-promotion). This RFC proposes the simultaneous addition and stabilization of a `core::marker::PhantomCell` type, to provide a stable means for maintainers to reliably opt out of `NoCell`, without forbidding zero-sized types. These types are currently `!NoCell` due to the conservativeness of `NoCell`'s implementation.

# Reference-level explanation
[reference-level-explanation]: #reference-level-explanation

## `core::marker::NoCell`

The following documentation is lifted from `core::marker::Freeze`'s current nightly documentation.
```markdown
Used to determine whether a type contains
any `UnsafeCell` internally, but not through an indirection.
This affects, for example, whether a `static` of that type is
placed in read-only static memory or writable static memory.
This can be used to declare that a constant with a generic type
will not contain interior mutability, and subsequently allow
placing the constant behind references.
# Safety
This trait is a core part of the language, it is just expressed as a trait in libcore for
convenience. Do *not* implement it for other types.
```

From a cursory review, the following documentation improvements may be considered:

```markdown
[`NoCell`] marks all types that do not contain any un-indirected interior mutability.
This means that their byte representation cannot change as long as a reference to them exists.

Note that `T: NoCell` is a shallow property: `T` is still allowed to contain interior mutability,
provided that it is behind an indirection (such as `Box<UnsafeCell<U>>`).
Notable `!NoCell` types are [`UnsafeCell`](core::cell::UnsafeCell) and its safe wrappers
such as the types in the [`cell` module](core::cell), [`Mutex`](std::sync::Mutex), and [atomics](core::sync::atomic).
Any type which contains a non-`NoCell` type without indirection also does not implement `NoCell`.

`T: NoCell` is notably a requirement for static promotion (`const REF: &'a T;`) to be legal.

Note that static promotion doesn't guarantee a single address: if `REF` is assigned to multiple variables,
they may still refer to distinct addresses.

Whether or not `T` implements `NoCell` may also affect whether `static STATIC: T` is placed
in read-only static memory or writeable static memory, or the optimizations that may be performed
in code that holds an immutable reference to `T`.

# Semver hazard
`NoCell` being an auto-trait that encodes a low level property of the types it is implemented for,
you should avoid relying on external types maintaining that property, unless that
contract is explicitly stated out-of-band (through documentation, for example).

Conversely, authors that consider `NoCell` to be part of a type's contract should document this
fact explicitly.

## The ZST caveat
While `UnsafeCell<T>` is currently `!NoCell` regardless of `T`, allowing `UnsafeCell<T>: NoCell` if `T` is
a Zero-Sized-Type is currently under consideration.

Therefore, the advised way to make your types `!NoCell` regardless of their actual contents is to add a
[`PhantomCell`](core::marker::PhantomCell) field to it.

[`PhantomData<T>`](core::marker::PhantomData) only implements `NoCell` if `T` does, making it a good way
to conditionally remove a generic type's `NoCell` auto-impl.

# Safety
This trait is a core part of the language, it is just expressed as a trait in libcore for
convenience. Do *not* implement it for other types.
```

Mention could be added to `UnsafeCell` and atomics that adding one to a previously `NoCell` type without an indirection (such as a `Box`) is a SemVer hazard, as it will revoke its implementation of `NoCell`.

## Fixing `core::marker::PhantomData`'s `NoCell` impl

At time of writing, `core::marker::PhantomData<T>` implements `NoCell` regardless of whether or not `T` does.

This is now considered a bug, with the corrected behaviour being that `core::marker::PhantomData<T>` only implements `NoCell` if `T` does.

While crates that would "observe" this change exist, the current consensus is that it would only break invalid usages of that invariable bound.
Comment on lines +121 to +123
Copy link
Member

@jswrenn jswrenn Mar 27, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could someone provide some more context for why this is considered a "bug"? My only interaction with this trait is through the lense of Project Safe Transmute, and I very well might be unaware of other use-cases where this might be "buggy". But, skimming the Motivation section, I didn't see a motivation for this change.

For zerocopy, the valuable property is that a type's immediate bytes cannot be mutated through a shared reference. PhantomData<T> clears this bar as does Exclusive<T>. Zerocopy adopts these semantics in its Immutable trait, and — at the time of writing — mem::TransmuteFrom internally leverages Freeze recursively to enforce these semantics, too.

The Motivation section says the "zerocopy intends to replace its bespoke trait with a re-export of core::marker::Freeze". This was true, but I'm not sure this new NoCell is quite as expressive as we'd like. On the compiler safe transmute side of things, I'd prefer if the semantics of Freeze were not modified (since we rely on them), but rather that proposed NoCell trait was added in parallel.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, sounds like another reason for opt-in trait. The semantics of current !Freeze is "this type actually physically contains at least one byte in UnsafeCell" and is used by the compiler to perform optimizations wile the new semantics would be "unsafe code can not rely on this type not containing UnsafeCell". As a result, people who defensively use PhantomCell just to have API flexibility would also drop those optimizations jut because they want to be extra careful.

Copy link
Member

@RalfJung RalfJung Mar 27, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From an opsem perspective, there are cases where need to know whether bytes that are outside of the type's size should be considered interior mutable nor not (this occurs in the context of rust-lang/unsafe-code-guidelines#256). I think PhantomData<Cell<T>> or UnsafeCell<()> are a good way to indicate "this type points to interior mutable data but it's not in any of the fields you can see".

I don't know if that concern played any rule in the discussion though, it is pretty niche. But I do find it questionable to consider a type to be "not interior mutable" when the programmer clearly indicated that "this acts as-if there's a T here". If the programmer meant to say "this acts as-if we own a T but it's stored out-of-line", they should have written PhantomData<Box<T>>, which is always Freeze/NoCell.

How does safe transmute rely on the semantics of Freeze/NoCell and what would be the downside of the proposed change in the context of safe transmute?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The semantics of current !Freeze is "this type actually physically contains at least one byte in UnsafeCell" and is used by the compiler to perform optimizations

It is used for more than that, as the RFC explains. If the trait was only relevant for optimizations, @p-avital wouldn't need this RFC to make their crate work the way it did.

Copy link
Member

@jswrenn jswrenn Mar 27, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From an opsem perspective, there are cases where need to know whether bytes that are outside of the type's size should be considered interior mutable nor not (this occurs in the context of rust-lang/unsafe-code-guidelines#256).

That's extremely neat.

But I do find it questionable to consider a type to be "not interior mutable" when the programmer clearly indicated that "this acts as-if there's a T here".

Good point. That's sensible UX for an auto trait. For zerocopy, that hasn't been an issue because we require #[derive(Immutable)].

How does safe transmute rely on the semantics of Freeze/NoCell...

For mem::TransmuteFrom, we emit Freeze bounds for T and U anytime we have to query for a transmutation from a &T to an &U. And since transmutability is evaluated recursively, the surface-level experience of this is something like "a recursive-through-reference-indirection Freeze".

and what would be the downside of the proposed change in the context of safe transmute?

For example &PhantomData<T>: TransmuteFrom<&PhantomData<U>> presently holds; this would no longer hold if we used NoCell instead of Freeze.

For zerocopy, we'd like to implement Immutable for Exclusive<T>, once Exclusive<T> is stabilized. I haven't seen discussion about Exclusive<T> here, but the name NoCell sorta implies that it wouldn't be implemented for Exclusive<Cell<T>>.

Copy link
Contributor

@traviscross traviscross Apr 1, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In my view, it's not exactly a Phantom* thing, because I see the "phantom" in the name there as related to the fact that you can construct a value. It's that value that is the "phantom". Here, you can't construct a ForceNoCell<T> value at all (without wrapping it in PhantomData, like anything else).

The way I see it is that ForceUnpin<T> (and ForceOverwrite<T>) are a bit special in that because of the nature of Unpin (and Overwrite), you actually can construct a value of the trivial wrapper type that always implements the trait. But that's not true for all auto traits. What is true for all auto traits is that you can express a type that always implements the trait.

So I see some value in being consistently able to express a type that always implements the auto trait (and passes though other impls) even if you can't always construct a value of that type, as it depends on the nature of the trait whether that's possible for a trivial wrapper.

(I admit I'm drawing a fine distinction here. It's in the service of wanting to consistently have PhantomNotX (modulo double negatives) and ForceX for all auto traits.)

Copy link
Member

@RalfJung RalfJung Apr 1, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ForceOverwrite<T> and your proposed PhantomNoCell<T> ForceNoCell<T> are completely different types -- one is a T, the other is a !. One is a container, the other only makes sense inside PhantomData. It makes no sense at all to me that they would have a similar name, there's nothing consistent about that.

I'm not opposed to having a family of Force*, but they should all be the same.

This comment was marked as resolved.

Copy link
Contributor

@traviscross traviscross Apr 2, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ForceOverwrite<T> and your proposed PhantomNoCell<T> are completely different types...

You mean ForceOverwrite<T> and ForceNoCell<T> I presume. I'm going to use ForceUnpin<T> below as the comparable, since it's expressible today and as Unpin also has a reversed polarity like NoCell.

...are completely different types -- one is a T, the other is a !.

The types that seem relevant here are ForceUnpin<T> and ForceNoCell<T>, not T or !.

While I expressed the field type for ForceNoCell<T> above as !, I think it'd be fine for it to be T. And actually, maybe it'd be fine even for it to have a value constructor. There just can't be an accessor to that field like there can be for ForceUnpin<T>.

In fact, come to think of it, maybe even an accessor is OK as long as we require an owned value or a mutable reference.

One is a container, the other only makes sense inside PhantomData. It makes no sense at all to me that they would have a similar name, there's nothing consistent about that.

Even setting aside that they both could be containers (as above), they're both at least type constructors. They both can be used within PhantomData due to that. But as it happens, only one of them admits a value constructor with a by-shared-ref accessor to that value. To be entirely consistent, I suppose we could remove the by-shared-ref accessor from ForceUnpin<T> and add a ForceUnpinWithSharedRefAccessor<T> or whatnot that would have it and otherwise be exactly the same, but that would seem unwarranted.

It seems fine to me for the accessors and other such things to vary between these based on what makes sense given the trait and its contract while keeping the same naming scheme. The important similarity is that this set of type constructors all produce types that always implement the trait while passing through other trait impls.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You mean ForceOverwrite and ForceNoCell I presume.

Ah yes I do, sorry. :)

While I expressed the field type for ForceNoCell above as !, I think it'd be fine for it to be T.

I'd object much less to that from a Force* consistency perspective. On the flip side now we get some gnarly aliasing model questions, since so far it is impossible to ever "mask" Freeze and the models we have rely on that.

It seems fine to me for the accessors and other such things to vary between these based on what makes sense given the trait and its contract while keeping the same naming scheme

Agreed.

I still quite like PhantomDataIndirect though since it expresses intent directly, rather than indirectly via "I know this is indirect so I know I can soundly hide all the UnsafeCell in there".

Most crates that would observe this change could replace their usage of `core::marker::PhantomData<T>` by `core::marker::PhantomData<Ptr<T>>` where `Ptr<T>`
is a pointer-type with the relevant caracteristics regarding lifetime, `Send` and `Sync`ness.

The author doesn't have the necessary knowledge to implement this change, which should still be subject to a crater run to ensure no valid use-cases were missed.

This behaviour change shall be introduced at the same time as the stabilization of `NoCell` in bounds.

## `core::marker::PhantomCell`

This ZST is proposed as a means for maintainers to reliably opt out of `NoCell` without constraining currently `!NoCell` ZSTs to remain so.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there any situation where PhantomCell is a necessity, other than to prevent future API breakage beforehand? IIUC it's always required to use UnsafeCell to create internal mutability, thus it's still unsound to add a _marker: PhantomCell and expect to do anything creative with this struct (like mutating other fields behind &), yes?

If so, NoCell's behavior sounds like a diverge from soundness guarantees and optimization invariants (Freeze). People who write PhantomCell would be only to opt-out their structs from const promotions, and they won't expect a surprising de-optimization of all other code using &Struct. Also in this way, user has no reason to override Freeze impl, making it unnecessary to be exposed to users at all.


Leveraging the proposed changes to `core::marker::PhantomData`'s `NoCell` impl, its implementation could be as trivial as a newtype or type alias on `core::marker::PhantomData<core::cell::SyncUnsafeCell<u8>>`,
with the following documentation:

```markdown
[`PhantomCell`] is a type with the following guarantees:
- It is guaranteed not to affect the layout of a type containing it as a field.
- Any type including it in its fields (including nested fields) without indirection is guaranteed to be `!NoCell`.

This latter property is [`PhantomCell`]'s raison-d'être: while other Zero-Sized-Types may currently be `!NoCell`,
[`PhantomCell`] is the only ZST (outside of [`PhantomData<T>`] where `T` isn't `NoCell`) that is guaranteed to stay that way.

Notable types that are currently `!NoCell` but might not remain so in the future are:
- `UnsafeCell<T>` where `core::mem::size_of::<T>() == 0`
- `[T; 0]` where `T: !NoCell`.
```

As this marker exists solely to remove `NoCell` implementations, it shall be `Send`, `Sync` and generally implement all non-`NoCell` traits that `PhantomData<()>` implements, in a similar fashion to `PhantomData<()>`

This new marker type shall be introduced at the same time as the stabilization of `NoCell` in bounds.

## Addressing the naming

A point of contention during the RFC's discussions was whether `NoCell` should be renamed, as `freeze` is already a term used in `llvm` to refer to an intrinsic which allows to safely read from uninitialized memory.
[Another RFC](https://github.com/rust-lang/rfcs/pull/3605) is currently open to expose this intrinsic in Rust.

Debates have landed on the conservation of the `NoCell` name, under the main considerations that:
- No better name was found despite the efforts in trying to find one,
- that the current name was already part of the Rust jargon,
- and that stabilizing this feature is too valuable to hold it back on naming.

# Drawbacks
[drawbacks]: #drawbacks

- Some people have previously argued that this would be akin to exposing compiler internals.
- The RFC author disagrees, viewing `NoCell` in a similar light as `Send` and `Sync`: a trait that allows soundness requirements to be proven at compile time.
- `NoCell` being an auto-trait, it is, like `Send` and `Sync` a sneaky SemVer hazard.
- Note that this SemVer hazard already exists through the existence of static-promotion, as exemplified by the following example:
```rust
// old version of the crate.
mod v1 {
pub struct S(i32);
impl S {
pub const fn new() -> Self { S(42) }
}
}

// new version of the crate, adding interior mutability.
mod v2 {
use std::cell::Cell;
pub struct S(Cell<i32>);
impl S {
pub const fn new() -> Self { S(Cell::new(42)) }
}
}

// Old version: builds
const C1: &v1::S = &v1::S::new();
// New version: does not build
const C2: &v2::S = &v2::S::new();
```
- The provided example is also, in RFC author's estimation, the main way in which `NoCell` is likely to be depended upon: allowing bounds on it will likely not expand the hazard much.

# Rationale and alternatives
[rationale-and-alternatives]: #rationale-and-alternatives

- The benefits of stabilizing `core::mem::NoCell` have been highlighted in [Motivation](#motivation).
- By not stabilizing `core::mem::NoCell` in trait bounds, we are preventing useful and sound code patterns from existing which were previously supported.
- Alternatively, a non-auto sub-trait of `core::mem::NoCell` may be defined:
- While this reduces the SemVer hazard by making its breakage more obvious, this does lose part of the usefulness that `core::mem::NoCell` would provide to projects such as `zerocopy`.
- A "perfect" derive macro should then be introduced to ease the implementation of this trait. A lint may be introduced in `clippy` to inform users of the existence and applicability of this new trait.

# Prior Art
[prior-art]: #prior-art
- This trait has a long history: it existed in ancient times but got [removed](https://github.com/rust-lang/rust/pull/13076) before Rust 1.0.
In 2017 it got [added back](https://github.com/rust-lang/rust/pull/41349) as a way to simplify the implementation of the `interior_unsafe` query, but it was kept private to the standard library.
In 2019, a [request](https://github.com/rust-lang/rust/issues/60715) was filed to publicly expose the trait, but not a lot happened until recently when the issue around static promotion led to it being [exposed unstably](https://github.com/rust-lang/rust/pull/121840).
- The work necessary for this RFC has already been done and merged in [this PR](https://github.com/rust-lang/rust/issues/121675), and a [tracking issue](https://github.com/rust-lang/rust/issues/121675) was opened.
- zerocopy's [`Immutable`](https://docs.rs/zerocopy/0.8.0-alpha.11/zerocopy/trait.Immutable.html) seeks to provide the same guarantees as `core::marker::NoCell`.

# Unresolved questions
[unresolved-questions]: #unresolved-questions

None.

# Future possibilities
[future-possibilities]: #future-possibilities

- During design meetings, the problem of auto-traits as a semver-hazard was considered more broadly, leading to the idea of a new lint.
This lint would result in a warning if code relied on a type implementing an trait that was automatically implemented for it, but that
the authors haven't opted into explicitly:
- Under these considerations, removing the auto-trait implementation of a type would no longer be considered a breaking change.
- `#[derive(NoCell, Send, Sync, Pin)]` was proposed as the way for authors to explicitly opt into these trait, making their removal a breaking change.
- Note that a syntax to express this for `async fn`'s resulting opaque type would need to be established too.
- Such a lint would have the additional benefit of helping authors spot when they accidentally remove one of these properties from their types.

- Complementary to that lint, a lint encouraging explicitly opting in or out of auto-traits that are available for a type would help raise the
awareness around auto-traits and their semver implications.

- Adding a `trait Pure: NoCell` which extends the interior immutability guarantee to indirected data could be valuable:
- This is however likely to be a fool's errand, as indirections could (for example) be hidden behind keys to global collections.
- Providing such a trait could be left to the ecosystem unless we'd want it to be an auto-trait also (unlikely).

- Given that removing a `NoCell` implementation from a type would only be considered a breaking change if its documentation states so, we may want a way for the standard library express which types are stably `NoCell`.
- Maybe we could do this as a blanket statement about primitive types (including function pointers).
- Or we might make the statement individually about "common sense" types such as `IpAddr`, `Box`, `Arc`.