Skip to content

Commit f41927f

Browse files
committed
Auto merge of #108820 - cjgillot:ensure-on-disk, r=oli-obk
Ensure value is on the on-disk cache before returning from `ensure()`. The current logic for `ensure()` a query just checks that the node is green in the dependency graph. However, a lot of places use `ensure()` to prevent the query from being called later. This is the case before stealing a query result. If the query is actually green but the value is not available in the on-disk cache, `ensure` would return, but a subsequent call to the full query would run the code, and attempt to read from a stolen value. This PR conforms the query system to the usage by checking whether the queried value is loadable from disk before returning. Sadly, I can't manage to craft a proper test... Should fix all instances of "attempted to read from stolen value".
2 parents 24c0b81 + e955ec0 commit f41927f

File tree

10 files changed

+116
-30
lines changed

10 files changed

+116
-30
lines changed

compiler/rustc_ast_lowering/src/lib.rs

+3-2
Original file line numberDiff line numberDiff line change
@@ -435,8 +435,9 @@ fn compute_hir_hash(
435435

436436
pub fn lower_to_hir(tcx: TyCtxt<'_>, (): ()) -> hir::Crate<'_> {
437437
let sess = tcx.sess;
438-
tcx.ensure().output_filenames(());
439-
let _ = tcx.early_lint_checks(()); // Borrows `resolver_for_lowering`.
438+
// Queries that borrow `resolver_for_lowering`.
439+
tcx.ensure_with_value().output_filenames(());
440+
tcx.ensure_with_value().early_lint_checks(());
440441
let (mut resolver, krate) = tcx.resolver_for_lowering(()).steal();
441442

442443
let ast_index = index_crate(&resolver.node_id_to_def_id, &krate);

compiler/rustc_metadata/src/rmeta/encoder.rs

+3-3
Original file line numberDiff line numberDiff line change
@@ -2050,13 +2050,13 @@ fn prefetch_mir(tcx: TyCtxt<'_>) {
20502050
let (encode_const, encode_opt) = should_encode_mir(tcx, def_id);
20512051

20522052
if encode_const {
2053-
tcx.ensure().mir_for_ctfe(def_id);
2053+
tcx.ensure_with_value().mir_for_ctfe(def_id);
20542054
}
20552055
if encode_opt {
2056-
tcx.ensure().optimized_mir(def_id);
2056+
tcx.ensure_with_value().optimized_mir(def_id);
20572057
}
20582058
if encode_opt || encode_const {
2059-
tcx.ensure().promoted_mir(def_id);
2059+
tcx.ensure_with_value().promoted_mir(def_id);
20602060
}
20612061
})
20622062
}

compiler/rustc_middle/src/ty/query.rs

+39-1
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,11 @@ pub struct TyCtxtEnsure<'tcx> {
9999
pub tcx: TyCtxt<'tcx>,
100100
}
101101

102+
#[derive(Copy, Clone)]
103+
pub struct TyCtxtEnsureWithValue<'tcx> {
104+
pub tcx: TyCtxt<'tcx>,
105+
}
106+
102107
impl<'tcx> TyCtxt<'tcx> {
103108
/// Returns a transparent wrapper for `TyCtxt`, which ensures queries
104109
/// are executed instead of just returning their results.
@@ -107,6 +112,15 @@ impl<'tcx> TyCtxt<'tcx> {
107112
TyCtxtEnsure { tcx: self }
108113
}
109114

115+
/// Returns a transparent wrapper for `TyCtxt`, which ensures queries
116+
/// are executed instead of just returning their results.
117+
///
118+
/// This version verifies that the computed result exists in the cache before returning.
119+
#[inline(always)]
120+
pub fn ensure_with_value(self) -> TyCtxtEnsureWithValue<'tcx> {
121+
TyCtxtEnsureWithValue { tcx: self }
122+
}
123+
110124
/// Returns a transparent wrapper for `TyCtxt` which uses
111125
/// `span` as the location of queries performed through it.
112126
#[inline(always)]
@@ -314,7 +328,31 @@ macro_rules! define_callbacks {
314328

315329
match try_get_cached(self.tcx, &self.tcx.query_system.caches.$name, &key) {
316330
Some(_) => return,
317-
None => self.tcx.queries.$name(self.tcx, DUMMY_SP, key, QueryMode::Ensure),
331+
None => self.tcx.queries.$name(
332+
self.tcx,
333+
DUMMY_SP,
334+
key,
335+
QueryMode::Ensure { check_cache: false },
336+
),
337+
};
338+
})*
339+
}
340+
341+
impl<'tcx> TyCtxtEnsureWithValue<'tcx> {
342+
$($(#[$attr])*
343+
#[inline(always)]
344+
pub fn $name(self, key: query_helper_param_ty!($($K)*)) {
345+
let key = key.into_query_param();
346+
opt_remap_env_constness!([$($modifiers)*][key]);
347+
348+
match try_get_cached(self.tcx, &self.tcx.query_system.caches.$name, &key) {
349+
Some(_) => return,
350+
None => self.tcx.queries.$name(
351+
self.tcx,
352+
DUMMY_SP,
353+
key,
354+
QueryMode::Ensure { check_cache: true },
355+
),
318356
};
319357
})*
320358
}

compiler/rustc_mir_build/src/build/mod.rs

+4-7
Original file line numberDiff line numberDiff line change
@@ -48,17 +48,14 @@ pub(crate) fn mir_built(
4848
/// Construct the MIR for a given `DefId`.
4949
fn mir_build(tcx: TyCtxt<'_>, def: ty::WithOptConstParam<LocalDefId>) -> Body<'_> {
5050
// Ensure unsafeck and abstract const building is ran before we steal the THIR.
51-
// We can't use `ensure()` for `thir_abstract_const` as it doesn't compute the query
52-
// if inputs are green. This can cause ICEs when calling `thir_abstract_const` after
53-
// THIR has been stolen if we haven't computed this query yet.
5451
match def {
5552
ty::WithOptConstParam { did, const_param_did: Some(const_param_did) } => {
56-
tcx.ensure().thir_check_unsafety_for_const_arg((did, const_param_did));
57-
drop(tcx.thir_abstract_const_of_const_arg((did, const_param_did)));
53+
tcx.ensure_with_value().thir_check_unsafety_for_const_arg((did, const_param_did));
54+
tcx.ensure_with_value().thir_abstract_const_of_const_arg((did, const_param_did));
5855
}
5956
ty::WithOptConstParam { did, const_param_did: None } => {
60-
tcx.ensure().thir_check_unsafety(did);
61-
drop(tcx.thir_abstract_const(did));
57+
tcx.ensure_with_value().thir_check_unsafety(did);
58+
tcx.ensure_with_value().thir_abstract_const(did);
6259
}
6360
}
6461

compiler/rustc_mir_transform/src/lib.rs

+6-6
Original file line numberDiff line numberDiff line change
@@ -278,14 +278,14 @@ fn mir_const(tcx: TyCtxt<'_>, def: ty::WithOptConstParam<LocalDefId>) -> &Steal<
278278
// Unsafety check uses the raw mir, so make sure it is run.
279279
if !tcx.sess.opts.unstable_opts.thir_unsafeck {
280280
if let Some(param_did) = def.const_param_did {
281-
tcx.ensure().unsafety_check_result_for_const_arg((def.did, param_did));
281+
tcx.ensure_with_value().unsafety_check_result_for_const_arg((def.did, param_did));
282282
} else {
283-
tcx.ensure().unsafety_check_result(def.did);
283+
tcx.ensure_with_value().unsafety_check_result(def.did);
284284
}
285285
}
286286

287287
// has_ffi_unwind_calls query uses the raw mir, so make sure it is run.
288-
tcx.ensure().has_ffi_unwind_calls(def.did);
288+
tcx.ensure_with_value().has_ffi_unwind_calls(def.did);
289289

290290
let mut body = tcx.mir_built(def).steal();
291291

@@ -433,7 +433,7 @@ fn mir_drops_elaborated_and_const_checked(
433433
if tcx.sess.opts.unstable_opts.drop_tracking_mir
434434
&& let DefKind::Generator = tcx.def_kind(def.did)
435435
{
436-
tcx.ensure().mir_generator_witnesses(def.did);
436+
tcx.ensure_with_value().mir_generator_witnesses(def.did);
437437
}
438438
let mir_borrowck = tcx.mir_borrowck_opt_const_arg(def);
439439

@@ -444,7 +444,7 @@ fn mir_drops_elaborated_and_const_checked(
444444

445445
// Do not compute the mir call graph without said call graph actually being used.
446446
if inline::Inline.is_enabled(&tcx.sess) {
447-
let _ = tcx.mir_inliner_callees(ty::InstanceDef::Item(def));
447+
tcx.ensure_with_value().mir_inliner_callees(ty::InstanceDef::Item(def));
448448
}
449449
}
450450

@@ -613,7 +613,7 @@ fn inner_optimized_mir(tcx: TyCtxt<'_>, did: LocalDefId) -> Body<'_> {
613613
// Run the `mir_for_ctfe` query, which depends on `mir_drops_elaborated_and_const_checked`
614614
// which we are going to steal below. Thus we need to run `mir_for_ctfe` first, so it
615615
// computes and caches its result.
616-
Some(hir::ConstContext::ConstFn) => tcx.ensure().mir_for_ctfe(did),
616+
Some(hir::ConstContext::ConstFn) => tcx.ensure_with_value().mir_for_ctfe(did),
617617
None => {}
618618
Some(other) => panic!("do not use `optimized_mir` for constants: {:?}", other),
619619
}

compiler/rustc_query_impl/src/lib.rs

+1
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ use rustc_span::Span;
3131
#[macro_use]
3232
mod plumbing;
3333
pub use plumbing::QueryCtxt;
34+
use rustc_query_system::dep_graph::SerializedDepNodeIndex;
3435
use rustc_query_system::query::*;
3536
#[cfg(parallel_compiler)]
3637
pub use rustc_query_system::query::{deadlock, QueryContext};

compiler/rustc_query_impl/src/on_disk_cache.rs

+11-3
Original file line numberDiff line numberDiff line change
@@ -388,6 +388,12 @@ impl<'sess> OnDiskCache<'sess> {
388388
debug_assert!(prev.is_none());
389389
}
390390

391+
/// Return whether the cached query result can be decoded.
392+
pub fn loadable_from_disk(&self, dep_node_index: SerializedDepNodeIndex) -> bool {
393+
self.query_result_index.contains_key(&dep_node_index)
394+
// with_decoder is infallible, so we can stop here
395+
}
396+
391397
/// Returns the cached query result if there is something in the cache for
392398
/// the given `SerializedDepNodeIndex`; otherwise returns `None`.
393399
pub fn try_load_query_result<'tcx, T>(
@@ -398,7 +404,9 @@ impl<'sess> OnDiskCache<'sess> {
398404
where
399405
T: for<'a> Decodable<CacheDecoder<'a, 'tcx>>,
400406
{
401-
self.load_indexed(tcx, dep_node_index, &self.query_result_index)
407+
let opt_value = self.load_indexed(tcx, dep_node_index, &self.query_result_index);
408+
debug_assert_eq!(opt_value.is_some(), self.loadable_from_disk(dep_node_index));
409+
opt_value
402410
}
403411

404412
/// Stores side effect emitted during computation of an anonymous query.
@@ -428,8 +436,8 @@ impl<'sess> OnDiskCache<'sess> {
428436
T: for<'a> Decodable<CacheDecoder<'a, 'tcx>>,
429437
{
430438
let pos = index.get(&dep_node_index).cloned()?;
431-
432-
self.with_decoder(tcx, pos, |decoder| Some(decode_tagged(decoder, dep_node_index)))
439+
let value = self.with_decoder(tcx, pos, |decoder| decode_tagged(decoder, dep_node_index));
440+
Some(value)
433441
}
434442

435443
fn with_decoder<'a, 'tcx, T, F: for<'s> FnOnce(&mut CacheDecoder<'s, 'tcx>) -> T>(

compiler/rustc_query_impl/src/plumbing.rs

+23
Original file line numberDiff line numberDiff line change
@@ -364,6 +364,14 @@ where
364364
}
365365
}
366366

367+
pub(crate) fn loadable_from_disk<'tcx>(tcx: QueryCtxt<'tcx>, id: SerializedDepNodeIndex) -> bool {
368+
if let Some(cache) = tcx.on_disk_cache().as_ref() {
369+
cache.loadable_from_disk(id)
370+
} else {
371+
false
372+
}
373+
}
374+
367375
pub(crate) fn try_load_from_disk<'tcx, V>(
368376
tcx: QueryCtxt<'tcx>,
369377
id: SerializedDepNodeIndex,
@@ -535,6 +543,21 @@ macro_rules! define_queries {
535543
})
536544
}
537545

546+
#[inline]
547+
fn loadable_from_disk(
548+
self,
549+
_qcx: QueryCtxt<'tcx>,
550+
_key: &Self::Key,
551+
_index: SerializedDepNodeIndex,
552+
) -> bool {
553+
should_ever_cache_on_disk!([$($modifiers)*] {
554+
self.cache_on_disk(_qcx.tcx, _key) &&
555+
$crate::plumbing::loadable_from_disk(_qcx, _index)
556+
} {
557+
false
558+
})
559+
}
560+
538561
#[inline(always)]
539562
fn anon(self) -> bool {
540563
is_anon!([$($modifiers)*])

compiler/rustc_query_system/src/query/config.rs

+2
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@ pub trait QueryConfig<Qcx: QueryContext>: Copy {
4343

4444
fn try_load_from_disk(self, qcx: Qcx, idx: &Self::Key) -> TryLoadFromDisk<Qcx, Self::Value>;
4545

46+
fn loadable_from_disk(self, qcx: Qcx, key: &Self::Key, idx: SerializedDepNodeIndex) -> bool;
47+
4648
fn anon(self) -> bool;
4749
fn eval_always(self) -> bool;
4850
fn depth_limit(self) -> bool;

compiler/rustc_query_system/src/query/plumbing.rs

+24-8
Original file line numberDiff line numberDiff line change
@@ -564,10 +564,17 @@ where
564564
// can be forced from `DepNode`.
565565
debug_assert!(
566566
!qcx.dep_context().fingerprint_style(dep_node.kind).reconstructible(),
567-
"missing on-disk cache entry for {dep_node:?}"
567+
"missing on-disk cache entry for reconstructible {dep_node:?}"
568568
);
569569
}
570570

571+
// Sanity check for the logic in `ensure`: if the node is green and the result loadable,
572+
// we should actually be able to load it.
573+
debug_assert!(
574+
!query.loadable_from_disk(qcx, &key, prev_dep_node_index),
575+
"missing on-disk cache entry for loadable {dep_node:?}"
576+
);
577+
571578
// We could not load a result from the on-disk cache, so
572579
// recompute.
573580
let prof_timer = qcx.dep_context().profiler().query_provider();
@@ -718,6 +725,7 @@ fn ensure_must_run<Q, Qcx>(
718725
query: Q,
719726
qcx: Qcx,
720727
key: &Q::Key,
728+
check_cache: bool,
721729
) -> (bool, Option<DepNode<Qcx::DepKind>>)
722730
where
723731
Q: QueryConfig<Qcx>,
@@ -733,28 +741,36 @@ where
733741
let dep_node = query.construct_dep_node(*qcx.dep_context(), key);
734742

735743
let dep_graph = qcx.dep_context().dep_graph();
736-
match dep_graph.try_mark_green(qcx, &dep_node) {
744+
let serialized_dep_node_index = match dep_graph.try_mark_green(qcx, &dep_node) {
737745
None => {
738746
// A None return from `try_mark_green` means that this is either
739747
// a new dep node or that the dep node has already been marked red.
740748
// Either way, we can't call `dep_graph.read()` as we don't have the
741749
// DepNodeIndex. We must invoke the query itself. The performance cost
742750
// this introduces should be negligible as we'll immediately hit the
743751
// in-memory cache, or another query down the line will.
744-
(true, Some(dep_node))
752+
return (true, Some(dep_node));
745753
}
746-
Some((_, dep_node_index)) => {
754+
Some((serialized_dep_node_index, dep_node_index)) => {
747755
dep_graph.read_index(dep_node_index);
748756
qcx.dep_context().profiler().query_cache_hit(dep_node_index.into());
749-
(false, None)
757+
serialized_dep_node_index
750758
}
759+
};
760+
761+
// We do not need the value at all, so do not check the cache.
762+
if !check_cache {
763+
return (false, None);
751764
}
765+
766+
let loadable = query.loadable_from_disk(qcx, key, serialized_dep_node_index);
767+
(!loadable, Some(dep_node))
752768
}
753769

754770
#[derive(Debug)]
755771
pub enum QueryMode {
756772
Get,
757-
Ensure,
773+
Ensure { check_cache: bool },
758774
}
759775

760776
#[inline(always)]
@@ -769,8 +785,8 @@ where
769785
Q: QueryConfig<Qcx>,
770786
Qcx: QueryContext,
771787
{
772-
let dep_node = if let QueryMode::Ensure = mode {
773-
let (must_run, dep_node) = ensure_must_run(query, qcx, &key);
788+
let dep_node = if let QueryMode::Ensure { check_cache } = mode {
789+
let (must_run, dep_node) = ensure_must_run(query, qcx, &key, check_cache);
774790
if !must_run {
775791
return None;
776792
}

0 commit comments

Comments
 (0)