Skip to content

Commit 7ed483c

Browse files
committed
Ensure swap_nonoverlapping is really always untyped
1 parent a18bd8a commit 7ed483c

File tree

7 files changed

+265
-88
lines changed

7 files changed

+265
-88
lines changed

library/core/src/ptr/mod.rs

+83-42
Original file line numberDiff line numberDiff line change
@@ -398,6 +398,7 @@ use crate::cmp::Ordering;
398398
use crate::intrinsics::const_eval_select;
399399
use crate::marker::FnPtr;
400400
use crate::mem::{self, MaybeUninit, SizedTypeProperties};
401+
use crate::num::NonZero;
401402
use crate::{fmt, hash, intrinsics, ub_checks};
402403

403404
mod alignment;
@@ -1094,49 +1095,26 @@ pub const unsafe fn swap_nonoverlapping<T>(x: *mut T, y: *mut T, count: usize) {
10941095
// are pointers inside `T` we will copy them in one go rather than trying to copy a part
10951096
// of a pointer (which would not work).
10961097
// SAFETY: Same preconditions as this function
1097-
unsafe { swap_nonoverlapping_simple_untyped(x, y, count) }
1098+
unsafe { swap_nonoverlapping_const(x, y, count) }
10981099
} else {
1099-
macro_rules! attempt_swap_as_chunks {
1100-
($ChunkTy:ty) => {
1101-
if mem::align_of::<T>() >= mem::align_of::<$ChunkTy>()
1102-
&& mem::size_of::<T>() % mem::size_of::<$ChunkTy>() == 0
1103-
{
1104-
let x: *mut $ChunkTy = x.cast();
1105-
let y: *mut $ChunkTy = y.cast();
1106-
let count = count * (mem::size_of::<T>() / mem::size_of::<$ChunkTy>());
1107-
// SAFETY: these are the same bytes that the caller promised were
1108-
// ok, just typed as `MaybeUninit<ChunkTy>`s instead of as `T`s.
1109-
// The `if` condition above ensures that we're not violating
1110-
// alignment requirements, and that the division is exact so
1111-
// that we don't lose any bytes off the end.
1112-
return unsafe { swap_nonoverlapping_simple_untyped(x, y, count) };
1113-
}
1114-
};
1100+
// Going though a slice here helps codegen know the size fits in `isize`
1101+
let slice = slice_from_raw_parts_mut(x, count);
1102+
// SAFETY: We have two non-overlapping ranges in memory and they're both
1103+
// readable so don't include the null address, thus they're at most
1104+
// `(usize::MAX - 1)/2 = isize::MAX` bytes long.
1105+
let bytes = unsafe { mem::size_of_val_raw::<[T]>(slice) };
1106+
if let Some(bytes) = NonZero::new(bytes) {
1107+
// SAFETY: These are the same ranges, just expressed in a different
1108+
// type, so they're still non-overlapping.
1109+
unsafe { swap_nonoverlapping_bytes(x.cast(), y.cast(), bytes) };
11151110
}
1116-
1117-
// Split up the slice into small power-of-two-sized chunks that LLVM is able
1118-
// to vectorize (unless it's a special type with more-than-pointer alignment,
1119-
// because we don't want to pessimize things like slices of SIMD vectors.)
1120-
if mem::align_of::<T>() <= mem::size_of::<usize>()
1121-
&& (!mem::size_of::<T>().is_power_of_two()
1122-
|| mem::size_of::<T>() > mem::size_of::<usize>() * 2)
1123-
{
1124-
attempt_swap_as_chunks!(usize);
1125-
attempt_swap_as_chunks!(u8);
1126-
}
1127-
1128-
// SAFETY: Same preconditions as this function
1129-
unsafe { swap_nonoverlapping_simple_untyped(x, y, count) }
11301111
}
11311112
)
11321113
}
11331114

11341115
/// Same behavior and safety conditions as [`swap_nonoverlapping`]
1135-
///
1136-
/// LLVM can vectorize this (at least it can for the power-of-two-sized types
1137-
/// `swap_nonoverlapping` tries to use) so no need to manually SIMD it.
11381116
#[inline]
1139-
const unsafe fn swap_nonoverlapping_simple_untyped<T>(x: *mut T, y: *mut T, count: usize) {
1117+
const unsafe fn swap_nonoverlapping_const<T>(x: *mut T, y: *mut T, count: usize) {
11401118
let x = x.cast::<MaybeUninit<T>>();
11411119
let y = y.cast::<MaybeUninit<T>>();
11421120
let mut i = 0;
@@ -1147,13 +1125,6 @@ const unsafe fn swap_nonoverlapping_simple_untyped<T>(x: *mut T, y: *mut T, coun
11471125
// and it's distinct from `x` since the ranges are non-overlapping
11481126
let y = unsafe { y.add(i) };
11491127

1150-
// If we end up here, it's because we're using a simple type -- like
1151-
// a small power-of-two-sized thing -- or a special type with particularly
1152-
// large alignment, particularly SIMD types.
1153-
// Thus, we're fine just reading-and-writing it, as either it's small
1154-
// and that works well anyway or it's special and the type's author
1155-
// presumably wanted things to be done in the larger chunk.
1156-
11571128
// SAFETY: we're only ever given pointers that are valid to read/write,
11581129
// including being aligned, and nothing here panics so it's drop-safe.
11591130
unsafe {
@@ -1167,6 +1138,76 @@ const unsafe fn swap_nonoverlapping_simple_untyped<T>(x: *mut T, y: *mut T, coun
11671138
}
11681139
}
11691140

1141+
// Don't let MIR inline this, because we really want it to keep its noalias metadata
1142+
#[rustc_no_mir_inline]
1143+
#[inline]
1144+
fn swap_chunk<const N: usize>(x: &mut MaybeUninit<[u8; N]>, y: &mut MaybeUninit<[u8; N]>) {
1145+
let a = *x;
1146+
let b = *y;
1147+
*x = b;
1148+
*y = a;
1149+
}
1150+
1151+
#[inline]
1152+
unsafe fn swap_nonoverlapping_bytes(x: *mut u8, y: *mut u8, bytes: NonZero<usize>) {
1153+
// Same as `swap_nonoverlapping::<[u8; N]>`.
1154+
unsafe fn swap_nonoverlapping_chunks<const N: usize>(
1155+
x: *mut MaybeUninit<[u8; N]>,
1156+
y: *mut MaybeUninit<[u8; N]>,
1157+
chunks: NonZero<usize>,
1158+
) {
1159+
let chunks = chunks.get();
1160+
for i in 0..chunks {
1161+
// SAFETY: i is in [0, chunks) so the adds and dereferences are in-bounds.
1162+
unsafe { swap_chunk(&mut *x.add(i), &mut *y.add(i)) };
1163+
}
1164+
}
1165+
1166+
// Same as `swap_nonoverlapping_bytes`, but accepts at most 1+2+4=7 bytes
1167+
#[inline]
1168+
unsafe fn swap_nonoverlapping_short(x: *mut u8, y: *mut u8, bytes: NonZero<usize>) {
1169+
// Tail handling for auto-vectorized code sometimes has element-at-a-time behaviour,
1170+
// see <https://github.com/rust-lang/rust/issues/134946>.
1171+
// By swapping as different sizes, rather than as a loop over bytes,
1172+
// we make sure not to end up with, say, seven byte-at-a-time copies.
1173+
1174+
let bytes = bytes.get();
1175+
let mut i = 0;
1176+
macro_rules! swap_prefix {
1177+
($($n:literal)+) => {$(
1178+
if (bytes & $n) != 0 {
1179+
// SAFETY: `i` can only have the same bits set as those in bytes,
1180+
// so these `add`s are in-bounds of `bytes`. But the bit for
1181+
// `$n` hasn't been set yet, so the `$n` bytes that `swap_chunk`
1182+
// will read and write are within the usable range.
1183+
unsafe { swap_chunk::<$n>(&mut*x.add(i).cast(), &mut*y.add(i).cast()) };
1184+
i |= $n;
1185+
}
1186+
)+};
1187+
}
1188+
swap_prefix!(4 2 1);
1189+
debug_assert_eq!(i, bytes);
1190+
}
1191+
1192+
const CHUNK_SIZE: usize = size_of::<*const ()>();
1193+
let bytes = bytes.get();
1194+
1195+
let chunks = bytes / CHUNK_SIZE;
1196+
let tail = bytes % CHUNK_SIZE;
1197+
if let Some(chunks) = NonZero::new(chunks) {
1198+
// SAFETY: this is bytes/CHUNK_SIZE*CHUNK_SIZE bytes, which is <= bytes,
1199+
// so it's within the range of our non-overlapping bytes.
1200+
unsafe { swap_nonoverlapping_chunks::<CHUNK_SIZE>(x.cast(), y.cast(), chunks) };
1201+
}
1202+
if let Some(tail) = NonZero::new(tail) {
1203+
const { assert!(CHUNK_SIZE <= 8) };
1204+
let delta = chunks * CHUNK_SIZE;
1205+
// SAFETY: the tail length is below CHUNK SIZE because of the remainder,
1206+
// and CHUNK_SIZE is at most 8 by the const assert, so tail <= 7
1207+
unsafe { swap_nonoverlapping_short(x.add(delta), y.add(delta), tail) };
1208+
}
1209+
}
1210+
11701211
/// Moves `src` into the pointed `dst`, returning the previous `dst` value.
11711212
///
11721213
/// Neither value is dropped.

library/coretests/tests/ptr.rs

+36
Original file line numberDiff line numberDiff line change
@@ -992,3 +992,39 @@ fn test_ptr_metadata_in_const() {
992992
assert_eq!(SLICE_META, 3);
993993
assert_eq!(DYN_META.size_of(), 42);
994994
}
995+
996+
// See <https://github.com/rust-lang/rust/issues/134713>
997+
const fn ptr_swap_nonoverlapping_is_untyped_inner() {
998+
#[repr(C)]
999+
struct HasPadding(usize, u8);
1000+
1001+
let buf1: [usize; 2] = [1000, 2000];
1002+
let buf2: [usize; 2] = [3000, 4000];
1003+
1004+
// HasPadding and [usize; 2] have the same size and alignment,
1005+
// so swap_nonoverlapping should treat them the same
1006+
assert!(size_of::<HasPadding>() == size_of::<[usize; 2]>());
1007+
assert!(align_of::<HasPadding>() == align_of::<[usize; 2]>());
1008+
1009+
let mut b1 = buf1;
1010+
let mut b2 = buf2;
1011+
// Safety: b1 and b2 are distinct local variables,
1012+
// with the same size and alignment as HasPadding.
1013+
unsafe {
1014+
std::ptr::swap_nonoverlapping(
1015+
b1.as_mut_ptr().cast::<HasPadding>(),
1016+
b2.as_mut_ptr().cast::<HasPadding>(),
1017+
1,
1018+
);
1019+
}
1020+
assert!(b1[0] == buf2[0]);
1021+
assert!(b1[1] == buf2[1]);
1022+
assert!(b2[0] == buf1[0]);
1023+
assert!(b2[1] == buf1[1]);
1024+
}
1025+
1026+
#[test]
1027+
fn test_ptr_swap_nonoverlapping_is_untyped() {
1028+
ptr_swap_nonoverlapping_is_untyped_inner();
1029+
const { ptr_swap_nonoverlapping_is_untyped_inner() };
1030+
}

tests/assembly/x86_64-typed-swap.rs

+28
Original file line numberDiff line numberDiff line change
@@ -51,3 +51,31 @@ pub fn swap_simd(x: &mut __m128, y: &mut __m128) {
5151
// CHECK-NEXT: retq
5252
swap(x, y)
5353
}
54+
55+
// CHECK-LABEL: swap_string:
56+
#[no_mangle]
57+
pub fn swap_string(x: &mut String, y: &mut String) {
58+
// CHECK-NOT: mov
59+
// CHECK-COUNT-4: movups
60+
// CHECK-NOT: mov
61+
// CHECK-COUNT-4: movq
62+
// CHECK-NOT: mov
63+
swap(x, y)
64+
}
65+
66+
// CHECK-LABEL: swap_44_bytes:
67+
#[no_mangle]
68+
pub fn swap_44_bytes(x: &mut [u8; 44], y: &mut [u8; 44]) {
69+
// Ensure we do better than a long run of byte copies,
70+
// see <https://github.com/rust-lang/rust/issues/134946>
71+
72+
// CHECK-NOT: movb
73+
// CHECK-COUNT-8: movups{{.+}}xmm
74+
// CHECK-NOT: movb
75+
// CHECK-COUNT-4: movq
76+
// CHECK-NOT: movb
77+
// CHECK-COUNT-4: movl
78+
// CHECK-NOT: movb
79+
// CHECK: retq
80+
swap(x, y)
81+
}

tests/codegen/simd/swap-simd-types.rs

+4-4
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ pub fn swap_single_m256(x: &mut __m256, y: &mut __m256) {
2323
#[no_mangle]
2424
pub fn swap_m256_slice(x: &mut [__m256], y: &mut [__m256]) {
2525
// CHECK-NOT: alloca
26-
// CHECK: load <8 x float>{{.+}}align 32
27-
// CHECK: store <8 x float>{{.+}}align 32
26+
// CHECK-COUNT-2: load <4 x i64>{{.+}}align 32
27+
// CHECK-COUNT-2: store <4 x i64>{{.+}}align 32
2828
if x.len() == y.len() {
2929
x.swap_with_slice(y);
3030
}
@@ -34,7 +34,7 @@ pub fn swap_m256_slice(x: &mut [__m256], y: &mut [__m256]) {
3434
#[no_mangle]
3535
pub fn swap_bytes32(x: &mut [u8; 32], y: &mut [u8; 32]) {
3636
// CHECK-NOT: alloca
37-
// CHECK: load <32 x i8>{{.+}}align 1
38-
// CHECK: store <32 x i8>{{.+}}align 1
37+
// CHECK-COUNT-2: load <4 x i64>{{.+}}align 1
38+
// CHECK-COUNT-2: store <4 x i64>{{.+}}align 1
3939
swap(x, y)
4040
}

tests/codegen/swap-large-types.rs

+51-25
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,16 @@ type KeccakBuffer = [[u64; 5]; 5];
1212
// to stack for large types, which is completely unnecessary as the lack of
1313
// overlap means we can just do whatever fits in registers at a time.
1414

15+
// The tests here (after the first one showing that the problem still exists)
16+
// are less about testing *exactly* what the codegen is, and more about testing
17+
// 1) That things are swapped directly from one argument to the other,
18+
// never going through stack along the way, and
19+
// 2) That we're doing the swapping for big things using large vector types,
20+
// rather then `i64` or `<8 x i8>` (or, even worse, `i8`) at a time.
21+
//
22+
// (There are separate tests for intrinsics::typed_swap_nonoverlapping that
23+
// check that it, as an intrinsic, are emitting exactly what it should.)
24+
1525
// CHECK-LABEL: @swap_basic
1626
#[no_mangle]
1727
pub fn swap_basic(x: &mut KeccakBuffer, y: &mut KeccakBuffer) {
@@ -26,65 +36,81 @@ pub fn swap_basic(x: &mut KeccakBuffer, y: &mut KeccakBuffer) {
2636
}
2737
}
2838

29-
// This test verifies that the library does something smarter, and thus
30-
// doesn't need any scratch space on the stack.
31-
3239
// CHECK-LABEL: @swap_std
3340
#[no_mangle]
3441
pub fn swap_std(x: &mut KeccakBuffer, y: &mut KeccakBuffer) {
3542
// CHECK-NOT: alloca
36-
// CHECK: load <{{[0-9]+}} x i64>
37-
// CHECK: store <{{[0-9]+}} x i64>
43+
// CHECK: load <{{2|4}} x i64>
44+
// CHECK: store <{{2|4}} x i64>
3845
swap(x, y)
3946
}
4047

41-
// Verify that types with usize alignment are swapped via vectored usizes,
42-
// not falling back to byte-level code.
43-
4448
// CHECK-LABEL: @swap_slice
4549
#[no_mangle]
4650
pub fn swap_slice(x: &mut [KeccakBuffer], y: &mut [KeccakBuffer]) {
4751
// CHECK-NOT: alloca
48-
// CHECK: load <{{[0-9]+}} x i64>
49-
// CHECK: store <{{[0-9]+}} x i64>
52+
// CHECK: load <{{2|4}} x i64>
53+
// CHECK: store <{{2|4}} x i64>
5054
if x.len() == y.len() {
5155
x.swap_with_slice(y);
5256
}
5357
}
5458

55-
// But for a large align-1 type, vectorized byte copying is what we want.
56-
5759
type OneKilobyteBuffer = [u8; 1024];
5860

5961
// CHECK-LABEL: @swap_1kb_slices
6062
#[no_mangle]
6163
pub fn swap_1kb_slices(x: &mut [OneKilobyteBuffer], y: &mut [OneKilobyteBuffer]) {
6264
// CHECK-NOT: alloca
63-
// CHECK: load <{{[0-9]+}} x i8>
64-
// CHECK: store <{{[0-9]+}} x i8>
65+
66+
// CHECK-NOT: load i32
67+
// CHECK-NOT: store i32
68+
// CHECK-NOT: load i16
69+
// CHECK-NOT: store i16
70+
// CHECK-NOT: load i8
71+
// CHECK-NOT: store i8
72+
73+
// CHECK: load <{{2|4}} x i64>{{.+}}align 1,
74+
// CHECK: store <{{2|4}} x i64>{{.+}}align 1,
75+
76+
// CHECK-NOT: load i32
77+
// CHECK-NOT: store i32
78+
// CHECK-NOT: load i16
79+
// CHECK-NOT: store i16
80+
// CHECK-NOT: load i8
81+
// CHECK-NOT: store i8
82+
6583
if x.len() == y.len() {
6684
x.swap_with_slice(y);
6785
}
6886
}
6987

70-
// This verifies that the 2×read + 2×write optimizes to just 3 memcpys
71-
// for an unusual type like this. It's not clear whether we should do anything
72-
// smarter in Rust for these, so for now it's fine to leave these up to the backend.
73-
// That's not as bad as it might seem, as for example, LLVM will lower the
74-
// memcpys below to VMOVAPS on YMMs if one enables the AVX target feature.
75-
// Eventually we'll be able to pass `align_of::<T>` to a const generic and
76-
// thus pick a smarter chunk size ourselves without huge code duplication.
77-
7888
#[repr(align(64))]
7989
pub struct BigButHighlyAligned([u8; 64 * 3]);
8090

8191
// CHECK-LABEL: @swap_big_aligned
8292
#[no_mangle]
8393
pub fn swap_big_aligned(x: &mut BigButHighlyAligned, y: &mut BigButHighlyAligned) {
8494
// CHECK-NOT: call void @llvm.memcpy
85-
// CHECK: call void @llvm.memcpy.{{.+}}(ptr noundef nonnull align 64 dereferenceable(192)
86-
// CHECK: call void @llvm.memcpy.{{.+}}(ptr noundef nonnull align 64 dereferenceable(192)
87-
// CHECK: call void @llvm.memcpy.{{.+}}(ptr noundef nonnull align 64 dereferenceable(192)
95+
// CHECK-NOT: load i32
96+
// CHECK-NOT: store i32
97+
// CHECK-NOT: load i16
98+
// CHECK-NOT: store i16
99+
// CHECK-NOT: load i8
100+
// CHECK-NOT: store i8
101+
102+
// CHECK-COUNT-2: load <{{2|4}} x i64>{{.+}}align 64,
103+
// CHECK-COUNT-2: store <{{2|4}} x i64>{{.+}}align 64,
104+
105+
// CHECK-COUNT-2: load <{{2|4}} x i64>{{.+}}align 32,
106+
// CHECK-COUNT-2: store <{{2|4}} x i64>{{.+}}align 32,
107+
108+
// CHECK-NOT: load i32
109+
// CHECK-NOT: store i32
110+
// CHECK-NOT: load i16
111+
// CHECK-NOT: store i16
112+
// CHECK-NOT: load i8
113+
// CHECK-NOT: store i8
88114
// CHECK-NOT: call void @llvm.memcpy
89115
swap(x, y)
90116
}

0 commit comments

Comments
 (0)