-
Notifications
You must be signed in to change notification settings - Fork 10.6k
[AllocBoxToStack] Don't destroy in dead-ends. #83907
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
d6b4908
to
611a380
Compare
eeckstein
reviewed
Aug 26, 2025
SwiftCompilerSources/Sources/Optimizer/FunctionPasses/AllocBoxToStack.swift
Outdated
Show resolved
Hide resolved
55ea383
to
981073c
Compare
The rewrite was missing the intentional omission of `dealloc_stack`s corresponding to `[dead_end]` `dealloc_box`es. Add the necessary bridging to get to parity with the original. Without this check, `dealloc_box [dead_end]`s are promoted to `dealloc_stack`s but the memory projected out of such `alloc_box`s need not be valid. rdar://159271158
It will be used by both AllocBoxToStack in addition to StackPromotion and for the same reason.
It is valid to leak a value on paths into dead-end regions. Specifically, it is valid to leak an `alloc_box`. Thus, "final releases" in dead-end regions may not destroy the box and consequently may not release its contents. Therefore it's invalid to lower such final releases to `dealloc_stack`s, let alone `destroy_addr`s. The in-general invalidity of that transformation results in miscompiling whenever a box is leaked and its projected address is used after such final releases. Fix this by not treating final releases as boundary markers of the `alloc_box` and not lowering them to `destroy_addr`s and `dealloc_stack`s. rdar://158149082
981073c
to
1eafced
Compare
@swift-ci please test |
@swift-ci please test source compatibility |
@swift-ci please apple silicon benchmark |
@swift-ci please test macos platform |
1 similar comment
@swift-ci please test macos platform |
eeckstein
approved these changes
Aug 28, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm!
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
It is valid to leak a value on paths into dead-end regions. Specifically, it is valid to leak an
alloc_box
. Thus, "final releases" in dead-end regions may not destroy the box and consequently may not release its contents. Therefore it's invalid to lower such final releases todealloc_stack
s, let alonedestroy_addr
s. The in-general invalidity of that transformation results in miscompiling whenever a box is leaked and its projected address is used after such final releases.Fix this by not treating final releases as boundary markers of the
alloc_box
and not lowering them todestroy_addr
s anddealloc_stack
s.rdar://158149082