Skip to content

Commit e6eb451

Browse files
committed
Auto merge of #130979 - matthiaskrgr:rollup-u7ylca5, r=matthiaskrgr
Rollup of 5 pull requests Successful merges: - #128778 (atomics: allow atomic and non-atomic reads to race) - #130918 (simplify LLVM submodule handling) - #130960 (Only add an automatic SONAME for Rust dylibs) - #130973 (compiletest: rename "runtest/crash.rs" to "runtest/crashes.rs" to be in line with the test directory) - #130976 (remove couple redundant clones) r? `@ghost` `@rustbot` modify labels: rollup
2 parents 612796c + 2fca8e5 commit e6eb451

31 files changed

+420
-345
lines changed

compiler/rustc_builtin_macros/src/deriving/smart_ptr.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -310,7 +310,7 @@ pub(crate) fn expand_deriving_smart_ptr(
310310
// Add the impl blocks for `DispatchFromDyn` and `CoerceUnsized`.
311311
let gen_args = vec![GenericArg::Type(alt_self_type.clone())];
312312
add_impl_block(impl_generics.clone(), sym::DispatchFromDyn, gen_args.clone());
313-
add_impl_block(impl_generics.clone(), sym::CoerceUnsized, gen_args.clone());
313+
add_impl_block(impl_generics.clone(), sym::CoerceUnsized, gen_args);
314314
}
315315

316316
fn contains_maybe_sized_bound_on_pointee(predicates: &[WherePredicate], pointee: Symbol) -> bool {

compiler/rustc_codegen_ssa/src/back/link.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -2490,7 +2490,7 @@ fn add_order_independent_options(
24902490
}
24912491
}
24922492

2493-
cmd.set_output_kind(link_output_kind, out_filename);
2493+
cmd.set_output_kind(link_output_kind, crate_type, out_filename);
24942494

24952495
add_relro_args(cmd, sess);
24962496

compiler/rustc_codegen_ssa/src/back/linker.rs

+69-14
Original file line numberDiff line numberDiff line change
@@ -275,7 +275,12 @@ pub(crate) trait Linker {
275275
fn is_cc(&self) -> bool {
276276
false
277277
}
278-
fn set_output_kind(&mut self, output_kind: LinkOutputKind, out_filename: &Path);
278+
fn set_output_kind(
279+
&mut self,
280+
output_kind: LinkOutputKind,
281+
crate_type: CrateType,
282+
out_filename: &Path,
283+
);
279284
fn link_dylib_by_name(&mut self, _name: &str, _verbatim: bool, _as_needed: bool) {
280285
bug!("dylib linked with unsupported linker")
281286
}
@@ -396,7 +401,7 @@ impl<'a> GccLinker<'a> {
396401
]);
397402
}
398403

399-
fn build_dylib(&mut self, out_filename: &Path) {
404+
fn build_dylib(&mut self, crate_type: CrateType, out_filename: &Path) {
400405
// On mac we need to tell the linker to let this library be rpathed
401406
if self.sess.target.is_like_osx {
402407
if !self.is_ld {
@@ -427,7 +432,7 @@ impl<'a> GccLinker<'a> {
427432
let mut out_implib = OsString::from("--out-implib=");
428433
out_implib.push(out_filename.with_file_name(implib_name));
429434
self.link_arg(out_implib);
430-
} else {
435+
} else if crate_type == CrateType::Dylib {
431436
// When dylibs are linked by a full path this value will get into `DT_NEEDED`
432437
// instead of the full path, so the library can be later found in some other
433438
// location than that specific path.
@@ -474,7 +479,12 @@ impl<'a> Linker for GccLinker<'a> {
474479
!self.is_ld
475480
}
476481

477-
fn set_output_kind(&mut self, output_kind: LinkOutputKind, out_filename: &Path) {
482+
fn set_output_kind(
483+
&mut self,
484+
output_kind: LinkOutputKind,
485+
crate_type: CrateType,
486+
out_filename: &Path,
487+
) {
478488
match output_kind {
479489
LinkOutputKind::DynamicNoPicExe => {
480490
if !self.is_ld && self.is_gnu {
@@ -509,10 +519,10 @@ impl<'a> Linker for GccLinker<'a> {
509519
self.link_args(&["-static", "-pie", "--no-dynamic-linker", "-z", "text"]);
510520
}
511521
}
512-
LinkOutputKind::DynamicDylib => self.build_dylib(out_filename),
522+
LinkOutputKind::DynamicDylib => self.build_dylib(crate_type, out_filename),
513523
LinkOutputKind::StaticDylib => {
514524
self.link_or_cc_arg("-static");
515-
self.build_dylib(out_filename);
525+
self.build_dylib(crate_type, out_filename);
516526
}
517527
LinkOutputKind::WasiReactorExe => {
518528
self.link_args(&["--entry", "_initialize"]);
@@ -866,7 +876,12 @@ impl<'a> Linker for MsvcLinker<'a> {
866876
&mut self.cmd
867877
}
868878

869-
fn set_output_kind(&mut self, output_kind: LinkOutputKind, out_filename: &Path) {
879+
fn set_output_kind(
880+
&mut self,
881+
output_kind: LinkOutputKind,
882+
_crate_type: CrateType,
883+
out_filename: &Path,
884+
) {
870885
match output_kind {
871886
LinkOutputKind::DynamicNoPicExe
872887
| LinkOutputKind::DynamicPicExe
@@ -1124,7 +1139,13 @@ impl<'a> Linker for EmLinker<'a> {
11241139
true
11251140
}
11261141

1127-
fn set_output_kind(&mut self, _output_kind: LinkOutputKind, _out_filename: &Path) {}
1142+
fn set_output_kind(
1143+
&mut self,
1144+
_output_kind: LinkOutputKind,
1145+
_crate_type: CrateType,
1146+
_out_filename: &Path,
1147+
) {
1148+
}
11281149

11291150
fn link_dylib_by_name(&mut self, name: &str, _verbatim: bool, _as_needed: bool) {
11301151
// Emscripten always links statically
@@ -1273,7 +1294,12 @@ impl<'a> Linker for WasmLd<'a> {
12731294
&mut self.cmd
12741295
}
12751296

1276-
fn set_output_kind(&mut self, output_kind: LinkOutputKind, _out_filename: &Path) {
1297+
fn set_output_kind(
1298+
&mut self,
1299+
output_kind: LinkOutputKind,
1300+
_crate_type: CrateType,
1301+
_out_filename: &Path,
1302+
) {
12771303
match output_kind {
12781304
LinkOutputKind::DynamicNoPicExe
12791305
| LinkOutputKind::DynamicPicExe
@@ -1422,7 +1448,13 @@ impl<'a> Linker for L4Bender<'a> {
14221448
&mut self.cmd
14231449
}
14241450

1425-
fn set_output_kind(&mut self, _output_kind: LinkOutputKind, _out_filename: &Path) {}
1451+
fn set_output_kind(
1452+
&mut self,
1453+
_output_kind: LinkOutputKind,
1454+
_crate_type: CrateType,
1455+
_out_filename: &Path,
1456+
) {
1457+
}
14261458

14271459
fn link_staticlib_by_name(&mut self, name: &str, _verbatim: bool, whole_archive: bool) {
14281460
self.hint_static();
@@ -1568,7 +1600,12 @@ impl<'a> Linker for AixLinker<'a> {
15681600
&mut self.cmd
15691601
}
15701602

1571-
fn set_output_kind(&mut self, output_kind: LinkOutputKind, out_filename: &Path) {
1603+
fn set_output_kind(
1604+
&mut self,
1605+
output_kind: LinkOutputKind,
1606+
_crate_type: CrateType,
1607+
out_filename: &Path,
1608+
) {
15721609
match output_kind {
15731610
LinkOutputKind::DynamicDylib => {
15741611
self.hint_dynamic();
@@ -1775,7 +1812,13 @@ impl<'a> Linker for PtxLinker<'a> {
17751812
&mut self.cmd
17761813
}
17771814

1778-
fn set_output_kind(&mut self, _output_kind: LinkOutputKind, _out_filename: &Path) {}
1815+
fn set_output_kind(
1816+
&mut self,
1817+
_output_kind: LinkOutputKind,
1818+
_crate_type: CrateType,
1819+
_out_filename: &Path,
1820+
) {
1821+
}
17791822

17801823
fn link_staticlib_by_name(&mut self, _name: &str, _verbatim: bool, _whole_archive: bool) {
17811824
panic!("staticlibs not supported")
@@ -1841,7 +1884,13 @@ impl<'a> Linker for LlbcLinker<'a> {
18411884
&mut self.cmd
18421885
}
18431886

1844-
fn set_output_kind(&mut self, _output_kind: LinkOutputKind, _out_filename: &Path) {}
1887+
fn set_output_kind(
1888+
&mut self,
1889+
_output_kind: LinkOutputKind,
1890+
_crate_type: CrateType,
1891+
_out_filename: &Path,
1892+
) {
1893+
}
18451894

18461895
fn link_staticlib_by_name(&mut self, _name: &str, _verbatim: bool, _whole_archive: bool) {
18471896
panic!("staticlibs not supported")
@@ -1912,7 +1961,13 @@ impl<'a> Linker for BpfLinker<'a> {
19121961
&mut self.cmd
19131962
}
19141963

1915-
fn set_output_kind(&mut self, _output_kind: LinkOutputKind, _out_filename: &Path) {}
1964+
fn set_output_kind(
1965+
&mut self,
1966+
_output_kind: LinkOutputKind,
1967+
_crate_type: CrateType,
1968+
_out_filename: &Path,
1969+
) {
1970+
}
19161971

19171972
fn link_staticlib_by_name(&mut self, _name: &str, _verbatim: bool, _whole_archive: bool) {
19181973
panic!("staticlibs not supported")

compiler/rustc_pattern_analysis/src/rustc.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -1027,7 +1027,7 @@ impl<'p, 'tcx: 'p> PatCx for RustcPatCtxt<'p, 'tcx> {
10271027
// Point at this range.
10281028
first_range: thir_pat.span,
10291029
// That's the gap that isn't covered.
1030-
max: gap_as_pat.to_string(),
1030+
max: gap_as_pat,
10311031
// Suggest `lo..=max` instead.
10321032
suggestion: suggested_range,
10331033
},

library/core/src/cell.rs

+6-4
Original file line numberDiff line numberDiff line change
@@ -1895,11 +1895,17 @@ impl<T: ?Sized + fmt::Display> fmt::Display for RefMut<'_, T> {
18951895
/// uniqueness guarantee for mutable references is unaffected. There is *no* legal way to obtain
18961896
/// aliasing `&mut`, not even with `UnsafeCell<T>`.
18971897
///
1898+
/// `UnsafeCell` does nothing to avoid data races; they are still undefined behavior. If multiple
1899+
/// threads have access to the same `UnsafeCell`, they must follow the usual rules of the
1900+
/// [concurrent memory model]: conflicting non-synchronized accesses must be done via the APIs in
1901+
/// [`core::sync::atomic`].
1902+
///
18981903
/// The `UnsafeCell` API itself is technically very simple: [`.get()`] gives you a raw pointer
18991904
/// `*mut T` to its contents. It is up to _you_ as the abstraction designer to use that raw pointer
19001905
/// correctly.
19011906
///
19021907
/// [`.get()`]: `UnsafeCell::get`
1908+
/// [concurrent memory model]: ../sync/atomic/index.html#memory-model-for-atomic-accesses
19031909
///
19041910
/// The precise Rust aliasing rules are somewhat in flux, but the main points are not contentious:
19051911
///
@@ -1922,10 +1928,6 @@ impl<T: ?Sized + fmt::Display> fmt::Display for RefMut<'_, T> {
19221928
/// live memory and the compiler is allowed to insert spurious reads if it can prove that this
19231929
/// memory has not yet been deallocated.
19241930
///
1925-
/// - At all times, you must avoid data races. If multiple threads have access to
1926-
/// the same `UnsafeCell`, then any writes must have a proper happens-before relation to all other
1927-
/// accesses (or use atomics).
1928-
///
19291931
/// To assist with proper design, the following scenarios are explicitly declared legal
19301932
/// for single-threaded code:
19311933
///

library/core/src/sync/atomic.rs

+50-31
Original file line numberDiff line numberDiff line change
@@ -24,25 +24,42 @@
2424
//!
2525
//! ## Memory model for atomic accesses
2626
//!
27-
//! Rust atomics currently follow the same rules as [C++20 atomics][cpp], specifically `atomic_ref`.
28-
//! Basically, creating a *shared reference* to one of the Rust atomic types corresponds to creating
29-
//! an `atomic_ref` in C++; the `atomic_ref` is destroyed when the lifetime of the shared reference
30-
//! ends. A Rust atomic type that is exclusively owned or behind a mutable reference does *not*
31-
//! correspond to an “atomic object” in C++, since the underlying primitive can be mutably accessed,
32-
//! for example with `get_mut`, to perform non-atomic operations.
27+
//! Rust atomics currently follow the same rules as [C++20 atomics][cpp], specifically the rules
28+
//! from the [`intro.races`][cpp-intro.races] section, without the "consume" memory ordering. Since
29+
//! C++ uses an object-based memory model whereas Rust is access-based, a bit of translation work
30+
//! has to be done to apply the C++ rules to Rust: whenever C++ talks about "the value of an
31+
//! object", we understand that to mean the resulting bytes obtained when doing a read. When the C++
32+
//! standard talks about "the value of an atomic object", this refers to the result of doing an
33+
//! atomic load (via the operations provided in this module). A "modification of an atomic object"
34+
//! refers to an atomic store.
3335
//!
34-
//! [cpp]: https://en.cppreference.com/w/cpp/atomic
36+
//! The end result is *almost* equivalent to saying that creating a *shared reference* to one of the
37+
//! Rust atomic types corresponds to creating an `atomic_ref` in C++, with the `atomic_ref` being
38+
//! destroyed when the lifetime of the shared reference ends. The main difference is that Rust
39+
//! permits concurrent atomic and non-atomic reads to the same memory as those cause no issue in the
40+
//! C++ memory model, they are just forbidden in C++ because memory is partitioned into "atomic
41+
//! objects" and "non-atomic objects" (with `atomic_ref` temporarily converting a non-atomic object
42+
//! into an atomic object).
43+
//!
44+
//! The most important aspect of this model is that *data races* are undefined behavior. A data race
45+
//! is defined as conflicting non-synchronized accesses where at least one of the accesses is
46+
//! non-atomic. Here, accesses are *conflicting* if they affect overlapping regions of memory and at
47+
//! least one of them is a write. They are *non-synchronized* if neither of them *happens-before*
48+
//! the other, according to the happens-before order of the memory model.
3549
//!
36-
//! Each method takes an [`Ordering`] which represents the strength of
37-
//! the memory barrier for that operation. These orderings are the
38-
//! same as the [C++20 atomic orderings][1]. For more information see the [nomicon][2].
50+
//! The other possible cause of undefined behavior in the memory model are mixed-size accesses: Rust
51+
//! inherits the C++ limitation that non-synchronized conflicting atomic accesses may not partially
52+
//! overlap. In other words, every pair of non-synchronized atomic accesses must be either disjoint,
53+
//! access the exact same memory (including using the same access size), or both be reads.
3954
//!
40-
//! [1]: https://en.cppreference.com/w/cpp/atomic/memory_order
41-
//! [2]: ../../../nomicon/atomics.html
55+
//! Each atomic access takes an [`Ordering`] which defines how the operation interacts with the
56+
//! happens-before order. These orderings behave the same as the corresponding [C++20 atomic
57+
//! orderings][cpp_memory_order]. For more information, see the [nomicon].
4258
//!
43-
//! Since C++ does not support mixing atomic and non-atomic accesses, or non-synchronized
44-
//! different-sized accesses to the same data, Rust does not support those operations either.
45-
//! Note that both of those restrictions only apply if the accesses are non-synchronized.
59+
//! [cpp]: https://en.cppreference.com/w/cpp/atomic
60+
//! [cpp-intro.races]: https://timsong-cpp.github.io/cppwp/n4868/intro.multithread#intro.races
61+
//! [cpp_memory_order]: https://en.cppreference.com/w/cpp/atomic/memory_order
62+
//! [nomicon]: ../../../nomicon/atomics.html
4663
//!
4764
//! ```rust,no_run undefined_behavior
4865
//! use std::sync::atomic::{AtomicU16, AtomicU8, Ordering};
@@ -52,27 +69,29 @@
5269
//! let atomic = AtomicU16::new(0);
5370
//!
5471
//! thread::scope(|s| {
55-
//! // This is UB: mixing atomic and non-atomic accesses
56-
//! s.spawn(|| atomic.store(1, Ordering::Relaxed));
57-
//! s.spawn(|| unsafe { atomic.as_ptr().write(2) });
72+
//! // This is UB: conflicting non-synchronized accesses, at least one of which is non-atomic.
73+
//! s.spawn(|| atomic.store(1, Ordering::Relaxed)); // atomic store
74+
//! s.spawn(|| unsafe { atomic.as_ptr().write(2) }); // non-atomic write
5875
//! });
5976
//!
6077
//! thread::scope(|s| {
61-
//! // This is UB: even reads are not allowed to be mixed
62-
//! s.spawn(|| atomic.load(Ordering::Relaxed));
63-
//! s.spawn(|| unsafe { atomic.as_ptr().read() });
78+
//! // This is fine: the accesses do not conflict (as none of them performs any modification).
79+
//! // In C++ this would be disallowed since creating an `atomic_ref` precludes
80+
//! // further non-atomic accesses, but Rust does not have that limitation.
81+
//! s.spawn(|| atomic.load(Ordering::Relaxed)); // atomic load
82+
//! s.spawn(|| unsafe { atomic.as_ptr().read() }); // non-atomic read
6483
//! });
6584
//!
6685
//! thread::scope(|s| {
67-
//! // This is fine, `join` synchronizes the code in a way such that atomic
68-
//! // and non-atomic accesses can't happen "at the same time"
69-
//! let handle = s.spawn(|| atomic.store(1, Ordering::Relaxed));
70-
//! handle.join().unwrap();
71-
//! s.spawn(|| unsafe { atomic.as_ptr().write(2) });
86+
//! // This is fine: `join` synchronizes the code in a way such that the atomic
87+
//! // store happens-before the non-atomic write.
88+
//! let handle = s.spawn(|| atomic.store(1, Ordering::Relaxed)); // atomic store
89+
//! handle.join().unwrap(); // synchronize
90+
//! s.spawn(|| unsafe { atomic.as_ptr().write(2) }); // non-atomic write
7291
//! });
7392
//!
7493
//! thread::scope(|s| {
75-
//! // This is UB: using different-sized atomic accesses to the same data
94+
//! // This is UB: non-synchronized conflicting differently-sized atomic accesses.
7695
//! s.spawn(|| atomic.store(1, Ordering::Relaxed));
7796
//! s.spawn(|| unsafe {
7897
//! let differently_sized = transmute::<&AtomicU16, &AtomicU8>(&atomic);
@@ -81,8 +100,8 @@
81100
//! });
82101
//!
83102
//! thread::scope(|s| {
84-
//! // This is fine, `join` synchronizes the code in a way such that
85-
//! // differently-sized accesses can't happen "at the same time"
103+
//! // This is fine: `join` synchronizes the code in a way such that
104+
//! // the 1-byte store happens-before the 2-byte store.
86105
//! let handle = s.spawn(|| atomic.store(1, Ordering::Relaxed));
87106
//! handle.join().unwrap();
88107
//! s.spawn(|| unsafe {
@@ -137,7 +156,7 @@
137156
//!
138157
//! # Atomic accesses to read-only memory
139158
//!
140-
//! In general, *all* atomic accesses on read-only memory are Undefined Behavior. For instance, attempting
159+
//! In general, *all* atomic accesses on read-only memory are undefined behavior. For instance, attempting
141160
//! to do a `compare_exchange` that will definitely fail (making it conceptually a read-only
142161
//! operation) can still cause a segmentation fault if the underlying memory page is mapped read-only. Since
143162
//! atomic `load`s might be implemented using compare-exchange operations, even a `load` can fault
@@ -153,7 +172,7 @@
153172
//!
154173
//! As an exception from the general rule stated above, "sufficiently small" atomic loads with
155174
//! `Ordering::Relaxed` are implemented in a way that works on read-only memory, and are hence not
156-
//! Undefined Behavior. The exact size limit for what makes a load "sufficiently small" varies
175+
//! undefined behavior. The exact size limit for what makes a load "sufficiently small" varies
157176
//! depending on the target:
158177
//!
159178
//! | `target_arch` | Size limit |

src/bootstrap/src/core/build_steps/compile.rs

+2-1
Original file line numberDiff line numberDiff line change
@@ -1205,7 +1205,8 @@ pub fn rustc_cargo_env(
12051205
// busting caches (e.g. like #71152).
12061206
if builder.config.llvm_enabled(target) {
12071207
let building_is_expensive =
1208-
crate::core::build_steps::llvm::prebuilt_llvm_config(builder, target).should_build();
1208+
crate::core::build_steps::llvm::prebuilt_llvm_config(builder, target, false)
1209+
.should_build();
12091210
// `top_stage == stage` might be false for `check --stage 1`, if we are building the stage 1 compiler
12101211
let can_skip_build = builder.kind == Kind::Check && builder.top_stage == stage;
12111212
let should_skip_build = building_is_expensive && can_skip_build;

src/bootstrap/src/core/build_steps/dist.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -2036,7 +2036,7 @@ fn maybe_install_llvm(
20362036
}
20372037
!builder.config.dry_run()
20382038
} else if let llvm::LlvmBuildStatus::AlreadyBuilt(llvm::LlvmResult { llvm_config, .. }) =
2039-
llvm::prebuilt_llvm_config(builder, target)
2039+
llvm::prebuilt_llvm_config(builder, target, true)
20402040
{
20412041
let mut cmd = command(llvm_config);
20422042
cmd.arg("--libfiles");

0 commit comments

Comments
 (0)