nix-community / crate2nix

rebuild only changed crates in CI with crate2nix and nix
https://nix-community.github.io/crate2nix/
Apache License 2.0
354 stars 83 forks source link

Stack overflow killing build with SGX crates #209

Closed sphw closed 10 months ago

sphw commented 3 years ago

I have a similar issue to the one described in https://github.com/kolloch/crate2nix/issues/42, but I suspect the root cause is somewhat different. I am attempting to build a Rust project that makes extensive use of Intel SGX and the Rust SGX SDK. To use the Rust SGX SDK you have to use patched versions of common crates. These patched versions replace std with the special SGX std version. When using some of these crates with crate2nix I get stack-overflows.

I can reproduce the issue in a few different ways, but I have put up the easiest minimal reproduction here: https://github.com/sphw/crate2nix-sgx-test/blob/main/Cargo.nix

When I run nix-instantiate Cargo.nix -A rootCrate.build -vvvvvv --show-trace I get the following output:

➜  sgx-nix-test git:(main) ✗ nix-instantiate Cargo.nix -A rootCrate.build -vvvvvv --show-trace                                                                
evaluating file '/nix/store/9dliwin402wwlgn1bgpgxb0p6lwffnj2-nix-2.3.14/share/nix/corepkgs/derivation.nix'
resolved search path element '/home/sphw/.nix-defexpr/channels' to '/home/sphw/.nix-defexpr/channels'
resolved search path element '/nix/var/nix/profiles/per-user/root/channels/nixpkgs' to '/nix/var/nix/profiles/per-user/root/channels/nixpkgs'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/default.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/minver.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/top-level/impure.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/top-level/default.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/stdenv/booter.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/default.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/fixed-points.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/lists.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/stdenv/default.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/systems/default.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/attrsets.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/systems/inspect.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/systems/architectures.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/systems/parse.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/strings.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/types.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/trivial.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/systems/platforms.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/modules.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/top-level/config.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/options.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/stdenv/linux/default.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/top-level/stage.nix'
resolved search path element '/nix/var/nix/profiles/per-user/root/channels' to '/nix/var/nix/profiles/per-user/root/channels'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/stdenv/adapters.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/build-support/trivial-builders.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/top-level/splice.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/top-level/all-packages.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/top-level/aliases.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/stdenv/generic/default.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/customisation.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/tools/text/gawk/default.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/servers/x11/xorg/default.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/servers/x11/xorg/overrides.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/stdenv/generic/make-derivation.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/build-support/rust/default-crate-overrides.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/build-support/rust/build-rust-crate/default.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/stdenv/generic/check-meta.nix'
evaluating file '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/lib/systems/doubles.nix'
processing attribute 'args'
locking this thread to CPU 15
acquiring global GC lock '/nix/var/nix/gc.lock'
acquiring read lock on '/nix/var/nix/temproots/169351'
acquiring write lock on '/nix/var/nix/temproots/169351'
downgrading to read lock on '/nix/var/nix/temproots/169351'
copied source '/nix/store/yzs6r04j9q3kwrkj4553gxc0r6sb9bvr-nixpkgs-21.11pre301506.b2c82b443ef/nixpkgs/pkgs/stdenv/generic/default-builder.sh' -> '/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh'
processing attribute 'build'
processing attribute 'buildDependencies'
error: stack overflow (possible infinite recursion)

I'm not sure the root-cause of this issue. I have run the build with ulimit -s unlimited, which causes the process to use all the remaining system memory.

pandaman64 commented 2 years ago

Another reproduction: using aws-config causes stack overflow: https://github.com/pandaman64/crate2nix-aws-infinite-recursion/blob/main/Cargo.toml

andir commented 2 years ago

Whats the nix Version you are using? It might be worth checking against the latest master branch of Nix as that had some changes that enabled the compiler to do tail-call-optimization in a couple of places.

pandaman64 commented 2 years ago

I'm using nix (Nix) 2.4pre20211006_53e4794. Let me try newer version later.

pandaman64 commented 2 years ago

I updated nix command to nix (Nix) 2.5pre20211007_844dd90, but it still fails. I have not updated the system nix yet (user-space command only), so this might explain the failure.

pandaman64 commented 2 years ago

@andir I was unable to successfully run Nix against my repository for the following versions:

So this issue is not fixed, I guess.

Fuuzetsu commented 10 months ago

I have ran into this in the wild today. I made a reproducer.

https://github.com/Fuuzetsu/crate2nix-stack-overflow-repro/tree/fb5913fd7d56ad870fa763e2b9b47f3beeb25e32

In the reproducer you I bundle a patched nix which allows us to further figure out what's happening. We can see that it gets stuck running in circles in the expandFeatures function in Cargo.nix. I attach a (compressed) trace.

trace.gz

You can debug what's going on like so:

diff --git a/nix/Cargo.nix b/nix/Cargo.nix
index 0edef57..ff00f34 100644
--- a/nix/Cargo.nix
+++ b/nix/Cargo.nix
@@ -5044,6 +5044,7 @@ rec {
   mergePackageFeatures =
     { crateConfigs ? crates
     , packageId
+    , depth ? 0
     , rootPackageId ? packageId
     , features ? rootFeatures
     , dependencyPath ? [ crates.${packageId}.crateName ]
@@ -5063,8 +5064,12 @@ rec {
       assert (builtins.isBool runTests);
       let
         crateConfig = crateConfigs."${packageId}" or (builtins.throw "Package not found: ${packageId}");
-        expandedFeatures = expandFeatures (crateConfig.features or { }) features;
-        enabledFeatures = enableFeatures (crateConfig.dependencies or [ ]) expandedFeatures;
+        dbgStr = d: s: if d == 0 then s else " ${dbgStr (d - 1) s}";
+        dbg = s: lib.debug.traceSeq (dbgStr depth s);
+        expandedFeatures_ = expandFeatures depth (crateConfig.features or { }) (dbg "Expanding for ${packageId} (${builtins.toString features})" features);
+        expandedFeatures = dbg "Expanded for ${packageId} (${builtins.toString (builtins.length expandedFeatures_)})" expandedFeatures_;
+        enabledFeatures_ = enableFeatures (crateConfig.dependencies or [ ]) (dbg "Enabling for ${packageId} (${builtins.toString (builtins.length expandedFeatures)})" expandedFeatures);
+        enabledFeatures = dbg "Enabled for ${packageId} (${builtins.toString (builtins.length enabledFeatures_)})" enabledFeatures_;
         depWithResolvedFeatures = dependency:
           let
             packageId = dependency.packageId;
@@ -5093,6 +5098,7 @@ rec {
                 then cache
                 else
                   mergePackageFeatures {
+                    depth = depth + 1;
                     features = combinedFeatures;
                     featuresByPackageId = cache;
                     inherit crateConfigs packageId target runTests rootPackageId;
@@ -5157,16 +5163,21 @@ rec {
     featureMap is an attribute set which maps feature names to lists of further
     feature names to enable in case this feature is selected.
   */
-  expandFeatures = featureMap: inputFeatures:
+  expandFeatures = depth: featureMap: inputFeatures:
     assert (builtins.isAttrs featureMap);
     assert (builtins.isList inputFeatures);
     let
+      dbgStr = d: s: if d == 0 then s else " ${dbgStr (d - 1) s}";
+      dbg = s: lib.debug.traceSeq (dbgStr depth s);
       expandFeature = feature:
         assert (builtins.isString feature);
-        [ feature ] ++ (expandFeatures featureMap (featureMap."${feature}" or [ ]));
+        let 
+          enables = featureMap."${feature}" or [ ];
+        in 
+        (dbg "${feature} --> ${builtins.toString enables}") [ feature ] ++ (expandFeatures (depth + 1) featureMap enables);
       outFeatures = lib.concatMap expandFeature inputFeatures;
     in
-    sortedUnique outFeatures;
+    /*dbg "Expanding ${builtins.toString inputFeatures} with ${builtins.toString (builtins.attrNames featureMap)}"*/ (sortedUnique outFeatures);

   /* This function adds optional dependencies as features if they are enabled
     indirectly by dependency features. This function mimics Cargo's behavior

If you do this (being careful about nix laziness), you can spot a cycle like this:

Fuuzetsu commented 10 months ago

The below patch should work I think. I'm able to apply this to our rather large tree and it fetches from the binary cache which implies that usual behaviour is completely unchanged. I'll try to cook up a patch.

diff --git a/nix/Cargo.nix b/nix/Cargo.nix
index c89bae956..44f8c5a19 100644
--- a/nix/Cargo.nix
+++ b/nix/Cargo.nix
@@ -36514,12 +36514,19 @@ rec {
     assert (builtins.isAttrs featureMap);
     assert (builtins.isList inputFeatures);
     let
-      expandFeature = feature:
-        assert (builtins.isString feature);
-        [ feature ] ++ (expandFeatures featureMap (featureMap."${feature}" or [ ]));
-      outFeatures = lib.concatMap expandFeature inputFeatures;
-    in
-    sortedUnique outFeatures;
+      expandFeaturesNoCycle = oldSeen: inputFeatures:
+        if inputFeatures != []
+        then
+          let
+            feature = builtins.head inputFeatures;
+            tail = builtins.tail inputFeatures;
+            seen = oldSeen // { ${feature} = 1; };
+            enables = builtins.filter (f: !(seen ? "${f}")) (featureMap."${feature}" or []);
+          in [ feature ] ++ (expandFeaturesNoCycle seen (tail ++ enables))
+        # We're done.
+        else [];
+      outFeatures = expandFeaturesNoCycle { } inputFeatures;
+    in sortedUnique outFeatures;

   /* This function adds optional dependencies as features if they are enabled
     indirectly by dependency features. This function mimics Cargo's behavior