1use std::fmt::Debug;
2use std::hash::Hash;
3use std::marker::PhantomData;
4use std::sync::Arc;
5use std::sync::atomic::{AtomicU32, Ordering};
67use rustc_data_structures::fingerprint::{Fingerprint, PackedFingerprint};
8use rustc_data_structures::fx::{FxHashMap, FxHashSet};
9use rustc_data_structures::profiling::QueryInvocationId;
10use rustc_data_structures::sharded::{self, ShardedHashMap};
11use rustc_data_structures::stable_hasher::{HashStable, StableHasher};
12use rustc_data_structures::sync::{AtomicU64, Lock};
13use rustc_data_structures::unord::UnordMap;
14use rustc_data_structures::{assert_matches, outline};
15use rustc_errors::DiagInner;
16use rustc_index::IndexVec;
17use rustc_macros::{Decodable, Encodable};
18use rustc_serialize::opaque::{FileEncodeResult, FileEncoder};
19use rustc_session::Session;
20use tracing::{debug, instrument};
21#[cfg(debug_assertions)]
22use {super::debug::EdgeFilter, std::env};
2324use super::query::DepGraphQuery;
25use super::serialized::{GraphEncoder, SerializedDepGraph, SerializedDepNodeIndex};
26use super::{DepContext, DepKind, DepNode, Deps, HasDepContext, WorkProductId};
27use crate::dep_graph::edges::EdgesVec;
28use crate::ich::StableHashingContext;
29use crate::query::{QueryContext, QuerySideEffect};
3031pub struct DepGraph<D: Deps> {
32 data: Option<Arc<DepGraphData<D>>>,
3334/// This field is used for assigning DepNodeIndices when running in
35 /// non-incremental mode. Even in non-incremental mode we make sure that
36 /// each task has a `DepNodeIndex` that uniquely identifies it. This unique
37 /// ID is used for self-profiling.
38virtual_dep_node_index: Arc<AtomicU32>,
39}
4041/// Manual clone impl that does not require `D: Clone`.
42impl<D: Deps> Clonefor DepGraph<D> {
43fn clone(&self) -> Self {
44let Self { data, virtual_dep_node_index } = self;
45Self {
46 data: Option::<Arc<_>>::clone(data),
47 virtual_dep_node_index: Arc::clone(virtual_dep_node_index),
48 }
49 }
50}
5152impl ::std::fmt::Debug for DepNodeIndex {
fn fmt(&self, fmt: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
fmt.write_fmt(format_args!("{0}", self.as_u32()))
}
}rustc_index::newtype_index! {
53pub struct DepNodeIndex {}
54}5556// We store a large collection of these in `prev_index_to_index` during
57// non-full incremental builds, and want to ensure that the element size
58// doesn't inadvertently increase.
59const _: [(); 4] = [(); ::std::mem::size_of::<Option<DepNodeIndex>>()];rustc_data_structures::static_assert_size!(Option<DepNodeIndex>, 4);
6061impl DepNodeIndex {
62const SINGLETON_ZERO_DEPS_ANON_NODE: DepNodeIndex = DepNodeIndex::ZERO;
63pub const FOREVER_RED_NODE: DepNodeIndex = DepNodeIndex::from_u32(1);
64}
6566impl From<DepNodeIndex> for QueryInvocationId {
67#[inline(always)]
68fn from(dep_node_index: DepNodeIndex) -> Self {
69QueryInvocationId(dep_node_index.as_u32())
70 }
71}
7273pub struct MarkFrame<'a> {
74 index: SerializedDepNodeIndex,
75 parent: Option<&'a MarkFrame<'a>>,
76}
7778#[derive(#[automatically_derived]
impl ::core::fmt::Debug for DepNodeColor {
#[inline]
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
match self {
DepNodeColor::Green(__self_0) =>
::core::fmt::Formatter::debug_tuple_field1_finish(f, "Green",
&__self_0),
DepNodeColor::Red => ::core::fmt::Formatter::write_str(f, "Red"),
DepNodeColor::Unknown =>
::core::fmt::Formatter::write_str(f, "Unknown"),
}
}
}Debug)]
79pub(super) enum DepNodeColor {
80 Green(DepNodeIndex),
81 Red,
82 Unknown,
83}
8485pub(crate) struct DepGraphData<D: Deps> {
86/// The new encoding of the dependency graph, optimized for red/green
87 /// tracking. The `current` field is the dependency graph of only the
88 /// current compilation session: We don't merge the previous dep-graph into
89 /// current one anymore, but we do reference shared data to save space.
90current: CurrentDepGraph<D>,
9192/// The dep-graph from the previous compilation session. It contains all
93 /// nodes and edges as well as all fingerprints of nodes that have them.
94previous: Arc<SerializedDepGraph>,
9596 colors: DepNodeColorMap,
9798/// When we load, there may be `.o` files, cached MIR, or other such
99 /// things available to us. If we find that they are not dirty, we
100 /// load the path to the file storing those work-products here into
101 /// this map. We can later look for and extract that data.
102previous_work_products: WorkProductMap,
103104 dep_node_debug: Lock<FxHashMap<DepNode, String>>,
105106/// Used by incremental compilation tests to assert that
107 /// a particular query result was decoded from disk
108 /// (not just marked green)
109debug_loaded_from_disk: Lock<FxHashSet<DepNode>>,
110}
111112pub fn hash_result<R>(hcx: &mut StableHashingContext<'_>, result: &R) -> Fingerprint113where
114R: for<'a> HashStable<StableHashingContext<'a>>,
115{
116let mut stable_hasher = StableHasher::new();
117result.hash_stable(hcx, &mut stable_hasher);
118stable_hasher.finish()
119}
120121impl<D: Deps> DepGraph<D> {
122pub fn new(
123 session: &Session,
124 prev_graph: Arc<SerializedDepGraph>,
125 prev_work_products: WorkProductMap,
126 encoder: FileEncoder,
127 ) -> DepGraph<D> {
128let prev_graph_node_count = prev_graph.node_count();
129130let current =
131CurrentDepGraph::new(session, prev_graph_node_count, encoder, Arc::clone(&prev_graph));
132133let colors = DepNodeColorMap::new(prev_graph_node_count);
134135// Instantiate a node with zero dependencies only once for anonymous queries.
136let _green_node_index = current.alloc_new_node(
137DepNode { kind: D::DEP_KIND_ANON_ZERO_DEPS, hash: current.anon_id_seed.into() },
138EdgesVec::new(),
139Fingerprint::ZERO,
140 );
141match (&_green_node_index, &DepNodeIndex::SINGLETON_ZERO_DEPS_ANON_NODE) {
(left_val, right_val) => {
if !(*left_val == *right_val) {
let kind = ::core::panicking::AssertKind::Eq;
::core::panicking::assert_failed(kind, &*left_val, &*right_val,
::core::option::Option::None);
}
}
};assert_eq!(_green_node_index, DepNodeIndex::SINGLETON_ZERO_DEPS_ANON_NODE);
142143// Instantiate a dependy-less red node only once for anonymous queries.
144let red_node_index = current.alloc_new_node(
145DepNode { kind: D::DEP_KIND_RED, hash: Fingerprint::ZERO.into() },
146EdgesVec::new(),
147Fingerprint::ZERO,
148 );
149match (&red_node_index, &DepNodeIndex::FOREVER_RED_NODE) {
(left_val, right_val) => {
if !(*left_val == *right_val) {
let kind = ::core::panicking::AssertKind::Eq;
::core::panicking::assert_failed(kind, &*left_val, &*right_val,
::core::option::Option::None);
}
}
};assert_eq!(red_node_index, DepNodeIndex::FOREVER_RED_NODE);
150if prev_graph_node_count > 0 {
151colors.insert_red(SerializedDepNodeIndex::from_u32(
152DepNodeIndex::FOREVER_RED_NODE.as_u32(),
153 ));
154 }
155156DepGraph {
157 data: Some(Arc::new(DepGraphData {
158 previous_work_products: prev_work_products,
159 dep_node_debug: Default::default(),
160current,
161 previous: prev_graph,
162colors,
163 debug_loaded_from_disk: Default::default(),
164 })),
165 virtual_dep_node_index: Arc::new(AtomicU32::new(0)),
166 }
167 }
168169pub fn new_disabled() -> DepGraph<D> {
170DepGraph { data: None, virtual_dep_node_index: Arc::new(AtomicU32::new(0)) }
171 }
172173#[inline]
174pub(crate) fn data(&self) -> Option<&DepGraphData<D>> {
175self.data.as_deref()
176 }
177178/// Returns `true` if we are actually building the full dep-graph, and `false` otherwise.
179#[inline]
180pub fn is_fully_enabled(&self) -> bool {
181self.data.is_some()
182 }
183184pub fn with_query(&self, f: impl Fn(&DepGraphQuery)) {
185if let Some(data) = &self.data {
186data.current.encoder.with_query(f)
187 }
188 }
189190pub fn assert_ignored(&self) {
191if let Some(..) = self.data {
192 D::read_deps(|task_deps| {
193match task_deps {
TaskDepsRef::Ignore => {}
ref left_val => {
::core::panicking::assert_matches_failed(left_val,
"TaskDepsRef::Ignore",
::core::option::Option::Some(format_args!("expected no task dependency tracking")));
}
};assert_matches!(
194 task_deps,
195 TaskDepsRef::Ignore,
196"expected no task dependency tracking"
197);
198 })
199 }
200 }
201202pub fn with_ignore<OP, R>(&self, op: OP) -> R
203where
204OP: FnOnce() -> R,
205 {
206 D::with_deps(TaskDepsRef::Ignore, op)
207 }
208209/// Used to wrap the deserialization of a query result from disk,
210 /// This method enforces that no new `DepNodes` are created during
211 /// query result deserialization.
212 ///
213 /// Enforcing this makes the query dep graph simpler - all nodes
214 /// must be created during the query execution, and should be
215 /// created from inside the 'body' of a query (the implementation
216 /// provided by a particular compiler crate).
217 ///
218 /// Consider the case of three queries `A`, `B`, and `C`, where
219 /// `A` invokes `B` and `B` invokes `C`:
220 ///
221 /// `A -> B -> C`
222 ///
223 /// Suppose that decoding the result of query `B` required re-computing
224 /// the query `C`. If we did not create a fresh `TaskDeps` when
225 /// decoding `B`, we would still be using the `TaskDeps` for query `A`
226 /// (if we needed to re-execute `A`). This would cause us to create
227 /// a new edge `A -> C`. If this edge did not previously
228 /// exist in the `DepGraph`, then we could end up with a different
229 /// `DepGraph` at the end of compilation, even if there were no
230 /// meaningful changes to the overall program (e.g. a newline was added).
231 /// In addition, this edge might cause a subsequent compilation run
232 /// to try to force `C` before marking other necessary nodes green. If
233 /// `C` did not exist in the new compilation session, then we could
234 /// get an ICE. Normally, we would have tried (and failed) to mark
235 /// some other query green (e.g. `item_children`) which was used
236 /// to obtain `C`, which would prevent us from ever trying to force
237 /// a nonexistent `D`.
238 ///
239 /// It might be possible to enforce that all `DepNode`s read during
240 /// deserialization already exist in the previous `DepGraph`. In
241 /// the above example, we would invoke `D` during the deserialization
242 /// of `B`. Since we correctly create a new `TaskDeps` from the decoding
243 /// of `B`, this would result in an edge `B -> D`. If that edge already
244 /// existed (with the same `DepPathHash`es), then it should be correct
245 /// to allow the invocation of the query to proceed during deserialization
246 /// of a query result. We would merely assert that the dep-graph fragment
247 /// that would have been added by invoking `C` while decoding `B`
248 /// is equivalent to the dep-graph fragment that we already instantiated for B
249 /// (at the point where we successfully marked B as green).
250 ///
251 /// However, this would require additional complexity
252 /// in the query infrastructure, and is not currently needed by the
253 /// decoding of any query results. Should the need arise in the future,
254 /// we should consider extending the query system with this functionality.
255pub fn with_query_deserialization<OP, R>(&self, op: OP) -> R
256where
257OP: FnOnce() -> R,
258 {
259 D::with_deps(TaskDepsRef::Forbid, op)
260 }
261262#[inline(always)]
263pub fn with_task<Ctxt: HasDepContext<Deps = D>, A: Debug, R>(
264&self,
265 key: DepNode,
266 cx: Ctxt,
267 arg: A,
268 task: fn(Ctxt, A) -> R,
269 hash_result: Option<fn(&mut StableHashingContext<'_>, &R) -> Fingerprint>,
270 ) -> (R, DepNodeIndex) {
271match self.data() {
272Some(data) => data.with_task(key, cx, arg, task, hash_result),
273None => (task(cx, arg), self.next_virtual_depnode_index()),
274 }
275 }
276277pub fn with_anon_task<Tcx: DepContext<Deps = D>, OP, R>(
278&self,
279 cx: Tcx,
280 dep_kind: DepKind,
281 op: OP,
282 ) -> (R, DepNodeIndex)
283where
284OP: FnOnce() -> R,
285 {
286match self.data() {
287Some(data) => {
288let (result, index) = data.with_anon_task_inner(cx, dep_kind, op);
289self.read_index(index);
290 (result, index)
291 }
292None => (op(), self.next_virtual_depnode_index()),
293 }
294 }
295}
296297impl<D: Deps> DepGraphData<D> {
298/// Starts a new dep-graph task. Dep-graph tasks are specified
299 /// using a free function (`task`) and **not** a closure -- this
300 /// is intentional because we want to exercise tight control over
301 /// what state they have access to. In particular, we want to
302 /// prevent implicit 'leaks' of tracked state into the task (which
303 /// could then be read without generating correct edges in the
304 /// dep-graph -- see the [rustc dev guide] for more details on
305 /// the dep-graph). To this end, the task function gets exactly two
306 /// pieces of state: the context `cx` and an argument `arg`. Both
307 /// of these bits of state must be of some type that implements
308 /// `DepGraphSafe` and hence does not leak.
309 ///
310 /// The choice of two arguments is not fundamental. One argument
311 /// would work just as well, since multiple values can be
312 /// collected using tuples. However, using two arguments works out
313 /// to be quite convenient, since it is common to need a context
314 /// (`cx`) and some argument (e.g., a `DefId` identifying what
315 /// item to process).
316 ///
317 /// For cases where you need some other number of arguments:
318 ///
319 /// - If you only need one argument, just use `()` for the `arg`
320 /// parameter.
321 /// - If you need 3+ arguments, use a tuple for the
322 /// `arg` parameter.
323 ///
324 /// [rustc dev guide]: https://rustc-dev-guide.rust-lang.org/queries/incremental-compilation.html
325#[inline(always)]
326pub(crate) fn with_task<Ctxt: HasDepContext<Deps = D>, A: Debug, R>(
327&self,
328 key: DepNode,
329 cx: Ctxt,
330 arg: A,
331 task: fn(Ctxt, A) -> R,
332 hash_result: Option<fn(&mut StableHashingContext<'_>, &R) -> Fingerprint>,
333 ) -> (R, DepNodeIndex) {
334// If the following assertion triggers, it can have two reasons:
335 // 1. Something is wrong with DepNode creation, either here or
336 // in `DepGraph::try_mark_green()`.
337 // 2. Two distinct query keys get mapped to the same `DepNode`
338 // (see for example #48923).
339self.assert_dep_node_not_yet_allocated_in_current_session(&key, || {
340::alloc::__export::must_use({
::alloc::fmt::format(format_args!("forcing query with already existing `DepNode`\n- query-key: {0:?}\n- dep-node: {1:?}",
arg, key))
})format!(
341"forcing query with already existing `DepNode`\n\
342 - query-key: {arg:?}\n\
343 - dep-node: {key:?}"
344)345 });
346347let with_deps = |task_deps| D::with_deps(task_deps, || task(cx, arg));
348let (result, edges) = if cx.dep_context().is_eval_always(key.kind) {
349 (with_deps(TaskDepsRef::EvalAlways), EdgesVec::new())
350 } else {
351let task_deps = Lock::new(TaskDeps::new(
352#[cfg(debug_assertions)]
353Some(key),
3540,
355 ));
356 (with_deps(TaskDepsRef::Allow(&task_deps)), task_deps.into_inner().reads)
357 };
358359let dcx = cx.dep_context();
360let dep_node_index = self.hash_result_and_alloc_node(dcx, key, edges, &result, hash_result);
361362 (result, dep_node_index)
363 }
364365/// Executes something within an "anonymous" task, that is, a task the
366 /// `DepNode` of which is determined by the list of inputs it read from.
367 ///
368 /// NOTE: this does not actually count as a read of the DepNode here.
369 /// Using the result of this task without reading the DepNode will result
370 /// in untracked dependencies which may lead to ICEs as nodes are
371 /// incorrectly marked green.
372 ///
373 /// FIXME: This could perhaps return a `WithDepNode` to ensure that the
374 /// user of this function actually performs the read; we'll have to see
375 /// how to make that work with `anon` in `execute_job_incr`, though.
376pub(crate) fn with_anon_task_inner<Tcx: DepContext<Deps = D>, OP, R>(
377&self,
378 cx: Tcx,
379 dep_kind: DepKind,
380 op: OP,
381 ) -> (R, DepNodeIndex)
382where
383OP: FnOnce() -> R,
384 {
385if true {
if !!cx.is_eval_always(dep_kind) {
::core::panicking::panic("assertion failed: !cx.is_eval_always(dep_kind)")
};
};debug_assert!(!cx.is_eval_always(dep_kind));
386387// Large numbers of reads are common enough here that pre-sizing `read_set`
388 // to 128 actually helps perf on some benchmarks.
389let task_deps = Lock::new(TaskDeps::new(
390#[cfg(debug_assertions)]
391None,
392128,
393 ));
394let result = D::with_deps(TaskDepsRef::Allow(&task_deps), op);
395let task_deps = task_deps.into_inner();
396let reads = task_deps.reads;
397398let dep_node_index = match reads.len() {
3990 => {
400// Because the dep-node id of anon nodes is computed from the sets of its
401 // dependencies we already know what the ID of this dependency-less node is
402 // going to be (i.e. equal to the precomputed
403 // `SINGLETON_DEPENDENCYLESS_ANON_NODE`). As a consequence we can skip creating
404 // a `StableHasher` and sending the node through interning.
405DepNodeIndex::SINGLETON_ZERO_DEPS_ANON_NODE406 }
4071 => {
408// When there is only one dependency, don't bother creating a node.
409reads[0]
410 }
411_ => {
412// The dep node indices are hashed here instead of hashing the dep nodes of the
413 // dependencies. These indices may refer to different nodes per session, but this isn't
414 // a problem here because we that ensure the final dep node hash is per session only by
415 // combining it with the per session random number `anon_id_seed`. This hash only need
416 // to map the dependencies to a single value on a per session basis.
417let mut hasher = StableHasher::new();
418reads.hash(&mut hasher);
419420let target_dep_node = DepNode {
421 kind: dep_kind,
422// Fingerprint::combine() is faster than sending Fingerprint
423 // through the StableHasher (at least as long as StableHasher
424 // is so slow).
425hash: self.current.anon_id_seed.combine(hasher.finish()).into(),
426 };
427428// The DepNodes generated by the process above are not unique. 2 queries could
429 // have exactly the same dependencies. However, deserialization does not handle
430 // duplicated nodes, so we do the deduplication here directly.
431 //
432 // As anonymous nodes are a small quantity compared to the full dep-graph, the
433 // memory impact of this `anon_node_to_index` map remains tolerable, and helps
434 // us avoid useless growth of the graph with almost-equivalent nodes.
435self.current.anon_node_to_index.get_or_insert_with(target_dep_node, || {
436self.current.alloc_new_node(target_dep_node, reads, Fingerprint::ZERO)
437 })
438 }
439 };
440441 (result, dep_node_index)
442 }
443444/// Intern the new `DepNode` with the dependencies up-to-now.
445fn hash_result_and_alloc_node<Ctxt: DepContext<Deps = D>, R>(
446&self,
447 cx: &Ctxt,
448 node: DepNode,
449 edges: EdgesVec,
450 result: &R,
451 hash_result: Option<fn(&mut StableHashingContext<'_>, &R) -> Fingerprint>,
452 ) -> DepNodeIndex {
453let hashing_timer = cx.profiler().incr_result_hashing();
454let current_fingerprint = hash_result.map(|hash_result| {
455cx.with_stable_hashing_context(|mut hcx| hash_result(&mut hcx, result))
456 });
457let dep_node_index = self.alloc_and_color_node(node, edges, current_fingerprint);
458hashing_timer.finish_with_query_invocation_id(dep_node_index.into());
459dep_node_index460 }
461}
462463impl<D: Deps> DepGraph<D> {
464#[inline]
465pub fn read_index(&self, dep_node_index: DepNodeIndex) {
466if let Some(ref data) = self.data {
467 D::read_deps(|task_deps| {
468let mut task_deps = match task_deps {
469 TaskDepsRef::Allow(deps) => deps.lock(),
470 TaskDepsRef::EvalAlways => {
471// We don't need to record dependencies of eval_always
472 // queries. They are re-evaluated unconditionally anyway.
473return;
474 }
475 TaskDepsRef::Ignore => return,
476 TaskDepsRef::Forbid => {
477// Reading is forbidden in this context. ICE with a useful error message.
478panic_on_forbidden_read(data, dep_node_index)
479 }
480 };
481let task_deps = &mut *task_deps;
482483if truecfg!(debug_assertions) {
484data.current.total_read_count.fetch_add(1, Ordering::Relaxed);
485 }
486487// Has `dep_node_index` been seen before? Use either a linear scan or a hashset
488 // lookup to determine this. See `TaskDeps::read_set` for details.
489let new_read = if task_deps.reads.len() <= TaskDeps::LINEAR_SCAN_MAX {
490 !task_deps.reads.contains(&dep_node_index)
491 } else {
492task_deps.read_set.insert(dep_node_index)
493 };
494if new_read {
495task_deps.reads.push(dep_node_index);
496if task_deps.reads.len() == TaskDeps::LINEAR_SCAN_MAX + 1 {
497// Fill `read_set` with what we have so far. Future lookups will use it.
498task_deps.read_set.extend(task_deps.reads.iter().copied());
499 }
500501#[cfg(debug_assertions)]
502{
503if let Some(target) = task_deps.node
504 && let Some(ref forbidden_edge) = data.current.forbidden_edge
505 {
506let src = forbidden_edge.index_to_node.lock()[&dep_node_index];
507if forbidden_edge.test(&src, &target) {
508{
::core::panicking::panic_fmt(format_args!("forbidden edge {0:?} -> {1:?} created",
src, target));
}panic!("forbidden edge {:?} -> {:?} created", src, target)509 }
510 }
511 }
512 } else if truecfg!(debug_assertions) {
513data.current.total_duplicate_read_count.fetch_add(1, Ordering::Relaxed);
514 }
515 })
516 }
517 }
518519/// This encodes a diagnostic by creating a node with an unique index and associating
520 /// `diagnostic` with it, for use in the next session.
521#[inline]
522pub fn record_diagnostic<'tcx, Qcx: QueryContext<'tcx>>(
523&self,
524 qcx: Qcx,
525 diagnostic: &DiagInner,
526 ) {
527if let Some(ref data) = self.data {
528 D::read_deps(|task_deps| match task_deps {
529 TaskDepsRef::EvalAlways | TaskDepsRef::Ignore => return,
530 TaskDepsRef::Forbid | TaskDepsRef::Allow(..) => {
531self.read_index(data.encode_diagnostic(qcx, diagnostic));
532 }
533 })
534 }
535 }
536/// This forces a diagnostic node green by running its side effect. `prev_index` would
537 /// refer to a node created used `encode_diagnostic` in the previous session.
538#[inline]
539pub fn force_diagnostic_node<'tcx, Qcx: QueryContext<'tcx>>(
540&self,
541 qcx: Qcx,
542 prev_index: SerializedDepNodeIndex,
543 ) {
544if let Some(ref data) = self.data {
545data.force_diagnostic_node(qcx, prev_index);
546 }
547 }
548549/// Create a node when we force-feed a value into the query cache.
550 /// This is used to remove cycles during type-checking const generic parameters.
551 ///
552 /// As usual in the query system, we consider the current state of the calling query
553 /// only depends on the list of dependencies up to now. As a consequence, the value
554 /// that this query gives us can only depend on those dependencies too. Therefore,
555 /// it is sound to use the current dependency set for the created node.
556 ///
557 /// During replay, the order of the nodes is relevant in the dependency graph.
558 /// So the unchanged replay will mark the caller query before trying to mark this one.
559 /// If there is a change to report, the caller query will be re-executed before this one.
560 ///
561 /// FIXME: If the code is changed enough for this node to be marked before requiring the
562 /// caller's node, we suppose that those changes will be enough to mark this node red and
563 /// force a recomputation using the "normal" way.
564pub fn with_feed_task<Ctxt: DepContext<Deps = D>, R>(
565&self,
566 node: DepNode,
567 cx: Ctxt,
568 result: &R,
569 hash_result: Option<fn(&mut StableHashingContext<'_>, &R) -> Fingerprint>,
570 format_value_fn: fn(&R) -> String,
571 ) -> DepNodeIndex {
572if let Some(data) = self.data.as_ref() {
573// The caller query has more dependencies than the node we are creating. We may
574 // encounter a case where this created node is marked as green, but the caller query is
575 // subsequently marked as red or recomputed. In this case, we will end up feeding a
576 // value to an existing node.
577 //
578 // For sanity, we still check that the loaded stable hash and the new one match.
579if let Some(prev_index) = data.previous.node_to_index_opt(&node) {
580let dep_node_index = data.colors.current(prev_index);
581if let Some(dep_node_index) = dep_node_index {
582crate::query::incremental_verify_ich(
583cx,
584data,
585result,
586prev_index,
587hash_result,
588format_value_fn,
589 );
590591#[cfg(debug_assertions)]
592if hash_result.is_some() {
593data.current.record_edge(
594dep_node_index,
595node,
596data.prev_fingerprint_of(prev_index),
597 );
598 }
599600return dep_node_index;
601 }
602 }
603604let mut edges = EdgesVec::new();
605 D::read_deps(|task_deps| match task_deps {
606 TaskDepsRef::Allow(deps) => edges.extend(deps.lock().reads.iter().copied()),
607 TaskDepsRef::EvalAlways => {
608edges.push(DepNodeIndex::FOREVER_RED_NODE);
609 }
610 TaskDepsRef::Ignore => {}
611 TaskDepsRef::Forbid => {
612{
::core::panicking::panic_fmt(format_args!("Cannot summarize when dependencies are not recorded."));
}panic!("Cannot summarize when dependencies are not recorded.")613 }
614 });
615616data.hash_result_and_alloc_node(&cx, node, edges, result, hash_result)
617 } else {
618// Incremental compilation is turned off. We just execute the task
619 // without tracking. We still provide a dep-node index that uniquely
620 // identifies the task so that we have a cheap way of referring to
621 // the query for self-profiling.
622self.next_virtual_depnode_index()
623 }
624 }
625}
626627impl<D: Deps> DepGraphData<D> {
628fn assert_dep_node_not_yet_allocated_in_current_session<S: std::fmt::Display>(
629&self,
630 dep_node: &DepNode,
631 msg: impl FnOnce() -> S,
632 ) {
633if let Some(prev_index) = self.previous.node_to_index_opt(dep_node) {
634let current = self.colors.get(prev_index);
635match current {
DepNodeColor::Unknown => {}
ref left_val => {
::core::panicking::assert_matches_failed(left_val,
"DepNodeColor::Unknown",
::core::option::Option::Some(format_args!("{0}", msg())));
}
}assert_matches!(current, DepNodeColor::Unknown, "{}", msg())636 } else if let Some(nodes_in_current_session) = &self.current.nodes_in_current_session {
637outline(|| {
638let seen = nodes_in_current_session.lock().contains_key(dep_node);
639if !!seen { { ::core::panicking::panic_display(&msg()); } };assert!(!seen, "{}", msg());
640 });
641 }
642 }
643644fn node_color(&self, dep_node: &DepNode) -> DepNodeColor {
645if let Some(prev_index) = self.previous.node_to_index_opt(dep_node) {
646self.colors.get(prev_index)
647 } else {
648// This is a node that did not exist in the previous compilation session.
649DepNodeColor::Unknown650 }
651 }
652653/// Returns true if the given node has been marked as green during the
654 /// current compilation session. Used in various assertions
655#[inline]
656pub(crate) fn is_index_green(&self, prev_index: SerializedDepNodeIndex) -> bool {
657#[allow(non_exhaustive_omitted_patterns)] match self.colors.get(prev_index) {
DepNodeColor::Green(_) => true,
_ => false,
}matches!(self.colors.get(prev_index), DepNodeColor::Green(_))658 }
659660#[inline]
661pub(crate) fn prev_fingerprint_of(&self, prev_index: SerializedDepNodeIndex) -> Fingerprint {
662self.previous.fingerprint_by_index(prev_index)
663 }
664665#[inline]
666pub(crate) fn prev_node_of(&self, prev_index: SerializedDepNodeIndex) -> &DepNode {
667self.previous.index_to_node(prev_index)
668 }
669670pub(crate) fn mark_debug_loaded_from_disk(&self, dep_node: DepNode) {
671self.debug_loaded_from_disk.lock().insert(dep_node);
672 }
673674/// This encodes a diagnostic by creating a node with an unique index and associating
675 /// `diagnostic` with it, for use in the next session.
676#[inline]
677fn encode_diagnostic<'tcx, Qcx: QueryContext<'tcx>>(
678&self,
679 qcx: Qcx,
680 diagnostic: &DiagInner,
681 ) -> DepNodeIndex {
682// Use `send_new` so we get an unique index, even though the dep node is not.
683let dep_node_index = self.current.encoder.send_new(
684DepNode {
685 kind: D::DEP_KIND_SIDE_EFFECT,
686 hash: PackedFingerprint::from(Fingerprint::ZERO),
687 },
688Fingerprint::ZERO,
689// We want the side effect node to always be red so it will be forced and emit the
690 // diagnostic.
691std::iter::once(DepNodeIndex::FOREVER_RED_NODE).collect(),
692 );
693let side_effect = QuerySideEffect::Diagnostic(diagnostic.clone());
694qcx.store_side_effect(dep_node_index, side_effect);
695dep_node_index696 }
697698/// This forces a diagnostic node green by running its side effect. `prev_index` would
699 /// refer to a node created used `encode_diagnostic` in the previous session.
700#[inline]
701fn force_diagnostic_node<'tcx, Qcx: QueryContext<'tcx>>(
702&self,
703 qcx: Qcx,
704 prev_index: SerializedDepNodeIndex,
705 ) {
706 D::with_deps(TaskDepsRef::Ignore, || {
707let side_effect = qcx.load_side_effect(prev_index).unwrap();
708709match &side_effect {
710 QuerySideEffect::Diagnostic(diagnostic) => {
711qcx.dep_context().sess().dcx().emit_diagnostic(diagnostic.clone());
712 }
713 }
714715// Use `send_and_color` as `promote_node_and_deps_to_current` expects all
716 // green dependencies. `send_and_color` will also prevent multiple nodes
717 // being encoded for concurrent calls.
718let dep_node_index = self.current.encoder.send_and_color(
719prev_index,
720&self.colors,
721DepNode {
722 kind: D::DEP_KIND_SIDE_EFFECT,
723 hash: PackedFingerprint::from(Fingerprint::ZERO),
724 },
725Fingerprint::ZERO,
726 std::iter::once(DepNodeIndex::FOREVER_RED_NODE).collect(),
727true,
728 );
729// This will just overwrite the same value for concurrent calls.
730qcx.store_side_effect(dep_node_index, side_effect);
731 })
732 }
733734fn alloc_and_color_node(
735&self,
736 key: DepNode,
737 edges: EdgesVec,
738 fingerprint: Option<Fingerprint>,
739 ) -> DepNodeIndex {
740if let Some(prev_index) = self.previous.node_to_index_opt(&key) {
741// Determine the color and index of the new `DepNode`.
742let is_green = if let Some(fingerprint) = fingerprint {
743if fingerprint == self.previous.fingerprint_by_index(prev_index) {
744// This is a green node: it existed in the previous compilation,
745 // its query was re-executed, and it has the same result as before.
746true
747} else {
748// This is a red node: it existed in the previous compilation, its query
749 // was re-executed, but it has a different result from before.
750false
751}
752 } else {
753// This is a red node, effectively: it existed in the previous compilation
754 // session, its query was re-executed, but it doesn't compute a result hash
755 // (i.e. it represents a `no_hash` query), so we have no way of determining
756 // whether or not the result was the same as before.
757false
758};
759760let fingerprint = fingerprint.unwrap_or(Fingerprint::ZERO);
761762let dep_node_index = self.current.encoder.send_and_color(
763prev_index,
764&self.colors,
765key,
766fingerprint,
767edges,
768is_green,
769 );
770771self.current.record_node(dep_node_index, key, fingerprint);
772773dep_node_index774 } else {
775self.current.alloc_new_node(key, edges, fingerprint.unwrap_or(Fingerprint::ZERO))
776 }
777 }
778779fn promote_node_and_deps_to_current(&self, prev_index: SerializedDepNodeIndex) -> DepNodeIndex {
780self.current.debug_assert_not_in_new_nodes(&self.previous, prev_index);
781782let dep_node_index = self.current.encoder.send_promoted(prev_index, &self.colors);
783784#[cfg(debug_assertions)]
785self.current.record_edge(
786dep_node_index,
787*self.previous.index_to_node(prev_index),
788self.previous.fingerprint_by_index(prev_index),
789 );
790791dep_node_index792 }
793}
794795impl<D: Deps> DepGraph<D> {
796/// Checks whether a previous work product exists for `v` and, if
797 /// so, return the path that leads to it. Used to skip doing work.
798pub fn previous_work_product(&self, v: &WorkProductId) -> Option<WorkProduct> {
799self.data.as_ref().and_then(|data| data.previous_work_products.get(v).cloned())
800 }
801802/// Access the map of work-products created during the cached run. Only
803 /// used during saving of the dep-graph.
804pub fn previous_work_products(&self) -> &WorkProductMap {
805&self.data.as_ref().unwrap().previous_work_products
806 }
807808pub fn debug_was_loaded_from_disk(&self, dep_node: DepNode) -> bool {
809self.data.as_ref().unwrap().debug_loaded_from_disk.lock().contains(&dep_node)
810 }
811812pub fn debug_dep_kind_was_loaded_from_disk(&self, dep_kind: DepKind) -> bool {
813// We only check if we have a dep node corresponding to the given dep kind.
814#[allow(rustc::potential_query_instability)]
815self.data
816 .as_ref()
817 .unwrap()
818 .debug_loaded_from_disk
819 .lock()
820 .iter()
821 .any(|node| node.kind == dep_kind)
822 }
823824#[cfg(debug_assertions)]
825 #[inline(always)]
826pub(crate) fn register_dep_node_debug_str<F>(&self, dep_node: DepNode, debug_str_gen: F)
827where
828F: FnOnce() -> String,
829 {
830let dep_node_debug = &self.data.as_ref().unwrap().dep_node_debug;
831832if dep_node_debug.borrow().contains_key(&dep_node) {
833return;
834 }
835let debug_str = self.with_ignore(debug_str_gen);
836dep_node_debug.borrow_mut().insert(dep_node, debug_str);
837 }
838839pub fn dep_node_debug_str(&self, dep_node: DepNode) -> Option<String> {
840self.data.as_ref()?.dep_node_debug.borrow().get(&dep_node).cloned()
841 }
842843fn node_color(&self, dep_node: &DepNode) -> DepNodeColor {
844if let Some(ref data) = self.data {
845return data.node_color(dep_node);
846 }
847848 DepNodeColor::Unknown849 }
850851pub fn try_mark_green<'tcx, Qcx: QueryContext<'tcx, Deps = D>>(
852&self,
853 qcx: Qcx,
854 dep_node: &DepNode,
855 ) -> Option<(SerializedDepNodeIndex, DepNodeIndex)> {
856self.data().and_then(|data| data.try_mark_green(qcx, dep_node))
857 }
858}
859860impl<D: Deps> DepGraphData<D> {
861/// Try to mark a node index for the node dep_node.
862 ///
863 /// A node will have an index, when it's already been marked green, or when we can mark it
864 /// green. This function will mark the current task as a reader of the specified node, when
865 /// a node index can be found for that node.
866pub(crate) fn try_mark_green<'tcx, Qcx: QueryContext<'tcx, Deps = D>>(
867&self,
868 qcx: Qcx,
869 dep_node: &DepNode,
870 ) -> Option<(SerializedDepNodeIndex, DepNodeIndex)> {
871if true {
if !!qcx.dep_context().is_eval_always(dep_node.kind) {
::core::panicking::panic("assertion failed: !qcx.dep_context().is_eval_always(dep_node.kind)")
};
};debug_assert!(!qcx.dep_context().is_eval_always(dep_node.kind));
872873// Return None if the dep node didn't exist in the previous session
874let prev_index = self.previous.node_to_index_opt(dep_node)?;
875876if true {
match (&self.previous.index_to_node(prev_index), &dep_node) {
(left_val, right_val) => {
if !(*left_val == *right_val) {
let kind = ::core::panicking::AssertKind::Eq;
::core::panicking::assert_failed(kind, &*left_val,
&*right_val, ::core::option::Option::None);
}
}
};
};debug_assert_eq!(self.previous.index_to_node(prev_index), dep_node);
877878match self.colors.get(prev_index) {
879 DepNodeColor::Green(dep_node_index) => Some((prev_index, dep_node_index)),
880 DepNodeColor::Red => None,
881 DepNodeColor::Unknown => {
882// This DepNode and the corresponding query invocation existed
883 // in the previous compilation session too, so we can try to
884 // mark it as green by recursively marking all of its
885 // dependencies green.
886self.try_mark_previous_green(qcx, prev_index, None)
887 .map(|dep_node_index| (prev_index, dep_node_index))
888 }
889 }
890 }
891892#[allow(clippy :: suspicious_else_formatting)]
{
let __tracing_attr_span;
let __tracing_attr_guard;
if ::tracing::Level::DEBUG <= ::tracing::level_filters::STATIC_MAX_LEVEL
&&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() ||
{ false } {
__tracing_attr_span =
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("try_mark_parent_green",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(892u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&[],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::SPAN)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let mut interest = ::tracing::subscriber::Interest::never();
if ::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{ interest = __CALLSITE.interest(); !interest.is_never() }
&&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest) {
let meta = __CALLSITE.metadata();
::tracing::Span::new(meta,
&{ meta.fields().value_set(&[]) })
} else {
let span =
::tracing::__macro_support::__disabled_span(__CALLSITE.metadata());
{};
span
}
};
__tracing_attr_guard = __tracing_attr_span.enter();
}
#[warn(clippy :: suspicious_else_formatting)]
{
#[allow(unknown_lints, unreachable_code, clippy ::
diverging_sub_expression, clippy :: empty_loop, clippy ::
let_unit_value, clippy :: let_with_type_underscore, clippy ::
needless_return, clippy :: unreachable)]
if false {
let __tracing_attr_fake_return: Option<()> = loop {};
return __tracing_attr_fake_return;
}
{
let get_dep_dep_node =
|| self.previous.index_to_node(parent_dep_node_index);
match self.colors.get(parent_dep_node_index) {
DepNodeColor::Green(_) => {
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_query_system/src/dep_graph/graph.rs:910",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(910u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("dependency {0:?} was immediately green",
get_dep_dep_node()) as &dyn Value))])
});
} else { ; }
};
return Some(());
}
DepNodeColor::Red => {
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_query_system/src/dep_graph/graph.rs:918",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(918u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("dependency {0:?} was immediately red",
get_dep_dep_node()) as &dyn Value))])
});
} else { ; }
};
return None;
}
DepNodeColor::Unknown => {}
}
let dep_dep_node = get_dep_dep_node();
if !qcx.dep_context().is_eval_always(dep_dep_node.kind) {
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_query_system/src/dep_graph/graph.rs:929",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(929u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("state of dependency {0:?} ({1}) is unknown, trying to mark it green",
dep_dep_node, dep_dep_node.hash) as &dyn Value))])
});
} else { ; }
};
let node_index =
self.try_mark_previous_green(qcx, parent_dep_node_index,
Some(frame));
if node_index.is_some() {
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_query_system/src/dep_graph/graph.rs:937",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(937u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("managed to MARK dependency {0:?} as green",
dep_dep_node) as &dyn Value))])
});
} else { ; }
};
return Some(());
}
}
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_query_system/src/dep_graph/graph.rs:943",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(943u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("trying to force dependency {0:?}",
dep_dep_node) as &dyn Value))])
});
} else { ; }
};
if !qcx.dep_context().try_force_from_dep_node(*dep_dep_node,
parent_dep_node_index, frame) {
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_query_system/src/dep_graph/graph.rs:946",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(946u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("dependency {0:?} could not be forced",
dep_dep_node) as &dyn Value))])
});
} else { ; }
};
return None;
}
match self.colors.get(parent_dep_node_index) {
DepNodeColor::Green(_) => {
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_query_system/src/dep_graph/graph.rs:952",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(952u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("managed to FORCE dependency {0:?} to green",
dep_dep_node) as &dyn Value))])
});
} else { ; }
};
return Some(());
}
DepNodeColor::Red => {
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_query_system/src/dep_graph/graph.rs:956",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(956u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("dependency {0:?} was red after forcing",
dep_dep_node) as &dyn Value))])
});
} else { ; }
};
return None;
}
DepNodeColor::Unknown => {}
}
if let None =
qcx.dep_context().sess().dcx().has_errors_or_delayed_bugs()
{
{
::core::panicking::panic_fmt(format_args!("try_mark_previous_green() - Forcing the DepNode should have set its color"));
}
}
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_query_system/src/dep_graph/graph.rs:976",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(976u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("dependency {0:?} resulted in compilation error",
dep_dep_node) as &dyn Value))])
});
} else { ; }
};
return None;
}
}
}#[instrument(skip(self, qcx, parent_dep_node_index, frame), level = "debug")]893fn try_mark_parent_green<'tcx, Qcx: QueryContext<'tcx, Deps = D>>(
894&self,
895 qcx: Qcx,
896 parent_dep_node_index: SerializedDepNodeIndex,
897 frame: &MarkFrame<'_>,
898 ) -> Option<()> {
899let get_dep_dep_node = || self.previous.index_to_node(parent_dep_node_index);
900901match self.colors.get(parent_dep_node_index) {
902 DepNodeColor::Green(_) => {
903// This dependency has been marked as green before, we are
904 // still fine and can continue with checking the other
905 // dependencies.
906 //
907 // This path is extremely hot. We don't want to get the
908 // `dep_dep_node` unless it's necessary. Hence the
909 // `get_dep_dep_node` closure.
910debug!("dependency {:?} was immediately green", get_dep_dep_node());
911return Some(());
912 }
913 DepNodeColor::Red => {
914// We found a dependency the value of which has changed
915 // compared to the previous compilation session. We cannot
916 // mark the DepNode as green and also don't need to bother
917 // with checking any of the other dependencies.
918debug!("dependency {:?} was immediately red", get_dep_dep_node());
919return None;
920 }
921 DepNodeColor::Unknown => {}
922 }
923924let dep_dep_node = get_dep_dep_node();
925926// We don't know the state of this dependency. If it isn't
927 // an eval_always node, let's try to mark it green recursively.
928if !qcx.dep_context().is_eval_always(dep_dep_node.kind) {
929debug!(
930"state of dependency {:?} ({}) is unknown, trying to mark it green",
931 dep_dep_node, dep_dep_node.hash,
932 );
933934let node_index = self.try_mark_previous_green(qcx, parent_dep_node_index, Some(frame));
935936if node_index.is_some() {
937debug!("managed to MARK dependency {dep_dep_node:?} as green");
938return Some(());
939 }
940 }
941942// We failed to mark it green, so we try to force the query.
943debug!("trying to force dependency {dep_dep_node:?}");
944if !qcx.dep_context().try_force_from_dep_node(*dep_dep_node, parent_dep_node_index, frame) {
945// The DepNode could not be forced.
946debug!("dependency {dep_dep_node:?} could not be forced");
947return None;
948 }
949950match self.colors.get(parent_dep_node_index) {
951 DepNodeColor::Green(_) => {
952debug!("managed to FORCE dependency {dep_dep_node:?} to green");
953return Some(());
954 }
955 DepNodeColor::Red => {
956debug!("dependency {dep_dep_node:?} was red after forcing");
957return None;
958 }
959 DepNodeColor::Unknown => {}
960 }
961962if let None = qcx.dep_context().sess().dcx().has_errors_or_delayed_bugs() {
963panic!("try_mark_previous_green() - Forcing the DepNode should have set its color")
964 }
965966// If the query we just forced has resulted in
967 // some kind of compilation error, we cannot rely on
968 // the dep-node color having been properly updated.
969 // This means that the query system has reached an
970 // invalid state. We let the compiler continue (by
971 // returning `None`) so it can emit error messages
972 // and wind down, but rely on the fact that this
973 // invalid state will not be persisted to the
974 // incremental compilation cache because of
975 // compilation errors being present.
976debug!("dependency {dep_dep_node:?} resulted in compilation error");
977return None;
978 }
979980/// Try to mark a dep-node which existed in the previous compilation session as green.
981#[allow(clippy :: suspicious_else_formatting)]
{
let __tracing_attr_span;
let __tracing_attr_guard;
if ::tracing::Level::DEBUG <= ::tracing::level_filters::STATIC_MAX_LEVEL
&&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() ||
{ false } {
__tracing_attr_span =
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("try_mark_previous_green",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(981u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&[],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::SPAN)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let mut interest = ::tracing::subscriber::Interest::never();
if ::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{ interest = __CALLSITE.interest(); !interest.is_never() }
&&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest) {
let meta = __CALLSITE.metadata();
::tracing::Span::new(meta,
&{ meta.fields().value_set(&[]) })
} else {
let span =
::tracing::__macro_support::__disabled_span(__CALLSITE.metadata());
{};
span
}
};
__tracing_attr_guard = __tracing_attr_span.enter();
}
#[warn(clippy :: suspicious_else_formatting)]
{
#[allow(unknown_lints, unreachable_code, clippy ::
diverging_sub_expression, clippy :: empty_loop, clippy ::
let_unit_value, clippy :: let_with_type_underscore, clippy ::
needless_return, clippy :: unreachable)]
if false {
let __tracing_attr_fake_return: Option<DepNodeIndex> = loop {};
return __tracing_attr_fake_return;
}
{
let frame =
MarkFrame { index: prev_dep_node_index, parent: frame };
if true {
if !!qcx.dep_context().is_eval_always(self.previous.index_to_node(prev_dep_node_index).kind)
{
::core::panicking::panic("assertion failed: !qcx.dep_context().is_eval_always(self.previous.index_to_node(prev_dep_node_index).kind)")
};
};
let prev_deps =
self.previous.edge_targets_from(prev_dep_node_index);
for dep_dep_node_index in prev_deps {
self.try_mark_parent_green(qcx, dep_dep_node_index, &frame)?;
}
let dep_node_index =
self.promote_node_and_deps_to_current(prev_dep_node_index);
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_query_system/src/dep_graph/graph.rs:1015",
"rustc_query_system::dep_graph::graph",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_query_system/src/dep_graph/graph.rs"),
::tracing_core::__macro_support::Option::Some(1015u32),
::tracing_core::__macro_support::Option::Some("rustc_query_system::dep_graph::graph"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("successfully marked {0:?} as green",
self.previous.index_to_node(prev_dep_node_index)) as
&dyn Value))])
});
} else { ; }
};
Some(dep_node_index)
}
}
}#[instrument(skip(self, qcx, prev_dep_node_index, frame), level = "debug")]982fn try_mark_previous_green<'tcx, Qcx: QueryContext<'tcx, Deps = D>>(
983&self,
984 qcx: Qcx,
985 prev_dep_node_index: SerializedDepNodeIndex,
986 frame: Option<&MarkFrame<'_>>,
987 ) -> Option<DepNodeIndex> {
988let frame = MarkFrame { index: prev_dep_node_index, parent: frame };
989990// We never try to mark eval_always nodes as green
991debug_assert!(
992 !qcx.dep_context()
993 .is_eval_always(self.previous.index_to_node(prev_dep_node_index).kind)
994 );
995996let prev_deps = self.previous.edge_targets_from(prev_dep_node_index);
997998for dep_dep_node_index in prev_deps {
999self.try_mark_parent_green(qcx, dep_dep_node_index, &frame)?;
1000 }
10011002// If we got here without hitting a `return` that means that all
1003 // dependencies of this DepNode could be marked as green. Therefore we
1004 // can also mark this DepNode as green.
10051006 // There may be multiple threads trying to mark the same dep node green concurrently
10071008 // We allocating an entry for the node in the current dependency graph and
1009 // adding all the appropriate edges imported from the previous graph
1010let dep_node_index = self.promote_node_and_deps_to_current(prev_dep_node_index);
10111012// ... and finally storing a "Green" entry in the color map.
1013 // Multiple threads can all write the same color here
10141015debug!(
1016"successfully marked {:?} as green",
1017self.previous.index_to_node(prev_dep_node_index)
1018 );
1019Some(dep_node_index)
1020 }
1021}
10221023impl<D: Deps> DepGraph<D> {
1024/// Returns true if the given node has been marked as red during the
1025 /// current compilation session. Used in various assertions
1026pub fn is_red(&self, dep_node: &DepNode) -> bool {
1027#[allow(non_exhaustive_omitted_patterns)] match self.node_color(dep_node) {
DepNodeColor::Red => true,
_ => false,
}matches!(self.node_color(dep_node), DepNodeColor::Red)1028 }
10291030/// Returns true if the given node has been marked as green during the
1031 /// current compilation session. Used in various assertions
1032pub fn is_green(&self, dep_node: &DepNode) -> bool {
1033#[allow(non_exhaustive_omitted_patterns)] match self.node_color(dep_node) {
DepNodeColor::Green(_) => true,
_ => false,
}matches!(self.node_color(dep_node), DepNodeColor::Green(_))1034 }
10351036pub fn assert_dep_node_not_yet_allocated_in_current_session<S: std::fmt::Display>(
1037&self,
1038 dep_node: &DepNode,
1039 msg: impl FnOnce() -> S,
1040 ) {
1041if let Some(data) = &self.data {
1042data.assert_dep_node_not_yet_allocated_in_current_session(dep_node, msg)
1043 }
1044 }
10451046/// This method loads all on-disk cacheable query results into memory, so
1047 /// they can be written out to the new cache file again. Most query results
1048 /// will already be in memory but in the case where we marked something as
1049 /// green but then did not need the value, that value will never have been
1050 /// loaded from disk.
1051 ///
1052 /// This method will only load queries that will end up in the disk cache.
1053 /// Other queries will not be executed.
1054pub fn exec_cache_promotions<Tcx: DepContext>(&self, tcx: Tcx) {
1055let _prof_timer = tcx.profiler().generic_activity("incr_comp_query_cache_promotion");
10561057let data = self.data.as_ref().unwrap();
1058for prev_index in data.colors.values.indices() {
1059match data.colors.get(prev_index) {
1060 DepNodeColor::Green(_) => {
1061let dep_node = data.previous.index_to_node(prev_index);
1062 tcx.try_load_from_on_disk_cache(dep_node);
1063 }
1064 DepNodeColor::Unknown | DepNodeColor::Red => {
1065// We can skip red nodes because a node can only be marked
1066 // as red if the query result was recomputed and thus is
1067 // already in memory.
1068}
1069 }
1070 }
1071 }
10721073pub fn finish_encoding(&self) -> FileEncodeResult {
1074if let Some(data) = &self.data { data.current.encoder.finish(&data.current) } else { Ok(0) }
1075 }
10761077pub(crate) fn next_virtual_depnode_index(&self) -> DepNodeIndex {
1078if true {
if !self.data.is_none() {
::core::panicking::panic("assertion failed: self.data.is_none()")
};
};debug_assert!(self.data.is_none());
1079let index = self.virtual_dep_node_index.fetch_add(1, Ordering::Relaxed);
1080DepNodeIndex::from_u32(index)
1081 }
1082}
10831084/// A "work product" is an intermediate result that we save into the
1085/// incremental directory for later re-use. The primary example are
1086/// the object files that we save for each partition at code
1087/// generation time.
1088///
1089/// Each work product is associated with a dep-node, representing the
1090/// process that produced the work-product. If that dep-node is found
1091/// to be dirty when we load up, then we will delete the work-product
1092/// at load time. If the work-product is found to be clean, then we
1093/// will keep a record in the `previous_work_products` list.
1094///
1095/// In addition, work products have an associated hash. This hash is
1096/// an extra hash that can be used to decide if the work-product from
1097/// a previous compilation can be re-used (in addition to the dirty
1098/// edges check).
1099///
1100/// As the primary example, consider the object files we generate for
1101/// each partition. In the first run, we create partitions based on
1102/// the symbols that need to be compiled. For each partition P, we
1103/// hash the symbols in P and create a `WorkProduct` record associated
1104/// with `DepNode::CodegenUnit(P)`; the hash is the set of symbols
1105/// in P.
1106///
1107/// The next time we compile, if the `DepNode::CodegenUnit(P)` is
1108/// judged to be clean (which means none of the things we read to
1109/// generate the partition were found to be dirty), it will be loaded
1110/// into previous work products. We will then regenerate the set of
1111/// symbols in the partition P and hash them (note that new symbols
1112/// may be added -- for example, new monomorphizations -- even if
1113/// nothing in P changed!). We will compare that hash against the
1114/// previous hash. If it matches up, we can reuse the object file.
1115#[derive(#[automatically_derived]
impl ::core::clone::Clone for WorkProduct {
#[inline]
fn clone(&self) -> WorkProduct {
WorkProduct {
cgu_name: ::core::clone::Clone::clone(&self.cgu_name),
saved_files: ::core::clone::Clone::clone(&self.saved_files),
}
}
}Clone, #[automatically_derived]
impl ::core::fmt::Debug for WorkProduct {
#[inline]
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
::core::fmt::Formatter::debug_struct_field2_finish(f, "WorkProduct",
"cgu_name", &self.cgu_name, "saved_files", &&self.saved_files)
}
}Debug, const _: () =
{
impl<__E: ::rustc_span::SpanEncoder> ::rustc_serialize::Encodable<__E>
for WorkProduct {
fn encode(&self, __encoder: &mut __E) {
match *self {
WorkProduct {
cgu_name: ref __binding_0, saved_files: ref __binding_1 } =>
{
::rustc_serialize::Encodable::<__E>::encode(__binding_0,
__encoder);
::rustc_serialize::Encodable::<__E>::encode(__binding_1,
__encoder);
}
}
}
}
};Encodable, const _: () =
{
impl<__D: ::rustc_span::SpanDecoder> ::rustc_serialize::Decodable<__D>
for WorkProduct {
fn decode(__decoder: &mut __D) -> Self {
WorkProduct {
cgu_name: ::rustc_serialize::Decodable::decode(__decoder),
saved_files: ::rustc_serialize::Decodable::decode(__decoder),
}
}
}
};Decodable)]
1116pub struct WorkProduct {
1117pub cgu_name: String,
1118/// Saved files associated with this CGU. In each key/value pair, the value is the path to the
1119 /// saved file and the key is some identifier for the type of file being saved.
1120 ///
1121 /// By convention, file extensions are currently used as identifiers, i.e. the key "o" maps to
1122 /// the object file's path, and "dwo" to the dwarf object file's path.
1123pub saved_files: UnordMap<String, String>,
1124}
11251126pub type WorkProductMap = UnordMap<WorkProductId, WorkProduct>;
11271128// Index type for `DepNodeData`'s edges.
1129impl ::std::fmt::Debug for EdgeIndex {
fn fmt(&self, fmt: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
fmt.write_fmt(format_args!("{0}", self.as_u32()))
}
}rustc_index::newtype_index! {
1130struct EdgeIndex {}
1131}11321133/// `CurrentDepGraph` stores the dependency graph for the current session. It
1134/// will be populated as we run queries or tasks. We never remove nodes from the
1135/// graph: they are only added.
1136///
1137/// The nodes in it are identified by a `DepNodeIndex`. We avoid keeping the nodes
1138/// in memory. This is important, because these graph structures are some of the
1139/// largest in the compiler.
1140///
1141/// For this reason, we avoid storing `DepNode`s more than once as map
1142/// keys. The `anon_node_to_index` map only contains nodes of anonymous queries not in the previous
1143/// graph, and we map nodes in the previous graph to indices via a two-step
1144/// mapping. `SerializedDepGraph` maps from `DepNode` to `SerializedDepNodeIndex`,
1145/// and the `prev_index_to_index` vector (which is more compact and faster than
1146/// using a map) maps from `SerializedDepNodeIndex` to `DepNodeIndex`.
1147///
1148/// This struct uses three locks internally. The `data`, `anon_node_to_index`,
1149/// and `prev_index_to_index` fields are locked separately. Operations that take
1150/// a `DepNodeIndex` typically just access the `data` field.
1151///
1152/// We only need to manipulate at most two locks simultaneously:
1153/// `anon_node_to_index` and `data`, or `prev_index_to_index` and `data`. When
1154/// manipulating both, we acquire `anon_node_to_index` or `prev_index_to_index`
1155/// first, and `data` second.
1156pub(super) struct CurrentDepGraph<D: Deps> {
1157 encoder: GraphEncoder<D>,
1158 anon_node_to_index: ShardedHashMap<DepNode, DepNodeIndex>,
11591160/// This is used to verify that fingerprints do not change between the creation of a node
1161 /// and its recomputation.
1162#[cfg(debug_assertions)]
1163fingerprints: Lock<IndexVec<DepNodeIndex, Option<Fingerprint>>>,
11641165/// Used to trap when a specific edge is added to the graph.
1166 /// This is used for debug purposes and is only active with `debug_assertions`.
1167#[cfg(debug_assertions)]
1168forbidden_edge: Option<EdgeFilter>,
11691170/// Used to verify the absence of hash collisions among DepNodes.
1171 /// This field is only `Some` if the `-Z incremental_verify_ich` option is present
1172 /// or if `debug_assertions` are enabled.
1173 ///
1174 /// The map contains all DepNodes that have been allocated in the current session so far.
1175nodes_in_current_session: Option<Lock<FxHashMap<DepNode, DepNodeIndex>>>,
11761177/// Anonymous `DepNode`s are nodes whose IDs we compute from the list of
1178 /// their edges. This has the beneficial side-effect that multiple anonymous
1179 /// nodes can be coalesced into one without changing the semantics of the
1180 /// dependency graph. However, the merging of nodes can lead to a subtle
1181 /// problem during red-green marking: The color of an anonymous node from
1182 /// the current session might "shadow" the color of the node with the same
1183 /// ID from the previous session. In order to side-step this problem, we make
1184 /// sure that anonymous `NodeId`s allocated in different sessions don't overlap.
1185 /// This is implemented by mixing a session-key into the ID fingerprint of
1186 /// each anon node. The session-key is a hash of the number of previous sessions.
1187anon_id_seed: Fingerprint,
11881189/// These are simple counters that are for profiling and
1190 /// debugging and only active with `debug_assertions`.
1191pub(super) total_read_count: AtomicU64,
1192pub(super) total_duplicate_read_count: AtomicU64,
1193}
11941195impl<D: Deps> CurrentDepGraph<D> {
1196fn new(
1197 session: &Session,
1198 prev_graph_node_count: usize,
1199 encoder: FileEncoder,
1200 previous: Arc<SerializedDepGraph>,
1201 ) -> Self {
1202let mut stable_hasher = StableHasher::new();
1203previous.session_count().hash(&mut stable_hasher);
1204let anon_id_seed = stable_hasher.finish();
12051206#[cfg(debug_assertions)]
1207let forbidden_edge = match env::var("RUST_FORBID_DEP_GRAPH_EDGE") {
1208Ok(s) => match EdgeFilter::new(&s) {
1209Ok(f) => Some(f),
1210Err(err) => {
::core::panicking::panic_fmt(format_args!("RUST_FORBID_DEP_GRAPH_EDGE invalid: {0}",
err));
}panic!("RUST_FORBID_DEP_GRAPH_EDGE invalid: {}", err),
1211 },
1212Err(_) => None,
1213 };
12141215let new_node_count_estimate = 102 * prev_graph_node_count / 100 + 200;
12161217let new_node_dbg =
1218session.opts.unstable_opts.incremental_verify_ich || truecfg!(debug_assertions);
12191220CurrentDepGraph {
1221 encoder: GraphEncoder::new(session, encoder, prev_graph_node_count, previous),
1222 anon_node_to_index: ShardedHashMap::with_capacity(
1223// FIXME: The count estimate is off as anon nodes are only a portion of the nodes.
1224new_node_count_estimate / sharded::shards(),
1225 ),
1226anon_id_seed,
1227#[cfg(debug_assertions)]
1228forbidden_edge,
1229#[cfg(debug_assertions)]
1230fingerprints: Lock::new(IndexVec::from_elem_n(None, new_node_count_estimate)),
1231 nodes_in_current_session: new_node_dbg.then(|| {
1232Lock::new(FxHashMap::with_capacity_and_hasher(
1233new_node_count_estimate,
1234 Default::default(),
1235 ))
1236 }),
1237 total_read_count: AtomicU64::new(0),
1238 total_duplicate_read_count: AtomicU64::new(0),
1239 }
1240 }
12411242#[cfg(debug_assertions)]
1243fn record_edge(&self, dep_node_index: DepNodeIndex, key: DepNode, fingerprint: Fingerprint) {
1244if let Some(forbidden_edge) = &self.forbidden_edge {
1245forbidden_edge.index_to_node.lock().insert(dep_node_index, key);
1246 }
1247let previous = *self.fingerprints.lock().get_or_insert_with(dep_node_index, || fingerprint);
1248match (&previous, &fingerprint) {
(left_val, right_val) => {
if !(*left_val == *right_val) {
let kind = ::core::panicking::AssertKind::Eq;
::core::panicking::assert_failed(kind, &*left_val, &*right_val,
::core::option::Option::Some(format_args!("Unstable fingerprints for {0:?}",
key)));
}
}
};assert_eq!(previous, fingerprint, "Unstable fingerprints for {:?}", key);
1249 }
12501251#[inline(always)]
1252fn record_node(
1253&self,
1254 dep_node_index: DepNodeIndex,
1255 key: DepNode,
1256 _current_fingerprint: Fingerprint,
1257 ) {
1258#[cfg(debug_assertions)]
1259self.record_edge(dep_node_index, key, _current_fingerprint);
12601261if let Some(ref nodes_in_current_session) = self.nodes_in_current_session {
1262outline(|| {
1263if nodes_in_current_session.lock().insert(key, dep_node_index).is_some() {
1264{
::core::panicking::panic_fmt(format_args!("Found duplicate dep-node {0:?}",
key));
};panic!("Found duplicate dep-node {key:?}");
1265 }
1266 });
1267 }
1268 }
12691270/// Writes the node to the current dep-graph and allocates a `DepNodeIndex` for it.
1271 /// Assumes that this is a node that has no equivalent in the previous dep-graph.
1272#[inline(always)]
1273fn alloc_new_node(
1274&self,
1275 key: DepNode,
1276 edges: EdgesVec,
1277 current_fingerprint: Fingerprint,
1278 ) -> DepNodeIndex {
1279let dep_node_index = self.encoder.send_new(key, current_fingerprint, edges);
12801281self.record_node(dep_node_index, key, current_fingerprint);
12821283dep_node_index1284 }
12851286#[inline]
1287fn debug_assert_not_in_new_nodes(
1288&self,
1289 prev_graph: &SerializedDepGraph,
1290 prev_index: SerializedDepNodeIndex,
1291 ) {
1292if let Some(ref nodes_in_current_session) = self.nodes_in_current_session {
1293if true {
if !!nodes_in_current_session.lock().contains_key(&prev_graph.index_to_node(prev_index))
{
{
::core::panicking::panic_fmt(format_args!("node from previous graph present in new node collection"));
}
};
};debug_assert!(
1294 !nodes_in_current_session
1295 .lock()
1296 .contains_key(&prev_graph.index_to_node(prev_index)),
1297"node from previous graph present in new node collection"
1298);
1299 }
1300 }
1301}
13021303#[derive(#[automatically_derived]
impl<'a> ::core::fmt::Debug for TaskDepsRef<'a> {
#[inline]
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
match self {
TaskDepsRef::Allow(__self_0) =>
::core::fmt::Formatter::debug_tuple_field1_finish(f, "Allow",
&__self_0),
TaskDepsRef::EvalAlways =>
::core::fmt::Formatter::write_str(f, "EvalAlways"),
TaskDepsRef::Ignore =>
::core::fmt::Formatter::write_str(f, "Ignore"),
TaskDepsRef::Forbid =>
::core::fmt::Formatter::write_str(f, "Forbid"),
}
}
}Debug, #[automatically_derived]
impl<'a> ::core::clone::Clone for TaskDepsRef<'a> {
#[inline]
fn clone(&self) -> TaskDepsRef<'a> {
let _: ::core::clone::AssertParamIsClone<&'a Lock<TaskDeps>>;
*self
}
}Clone, #[automatically_derived]
impl<'a> ::core::marker::Copy for TaskDepsRef<'a> { }Copy)]
1304pub enum TaskDepsRef<'a> {
1305/// New dependencies can be added to the
1306 /// `TaskDeps`. This is used when executing a 'normal' query
1307 /// (no `eval_always` modifier)
1308Allow(&'a Lock<TaskDeps>),
1309/// This is used when executing an `eval_always` query. We don't
1310 /// need to track dependencies for a query that's always
1311 /// re-executed -- but we need to know that this is an `eval_always`
1312 /// query in order to emit dependencies to `DepNodeIndex::FOREVER_RED_NODE`
1313 /// when directly feeding other queries.
1314EvalAlways,
1315/// New dependencies are ignored. This is also used for `dep_graph.with_ignore`.
1316Ignore,
1317/// Any attempt to add new dependencies will cause a panic.
1318 /// This is used when decoding a query result from disk,
1319 /// to ensure that the decoding process doesn't itself
1320 /// require the execution of any queries.
1321Forbid,
1322}
13231324#[derive(#[automatically_derived]
impl ::core::fmt::Debug for TaskDeps {
#[inline]
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
::core::fmt::Formatter::debug_struct_field4_finish(f, "TaskDeps",
"node", &self.node, "reads", &self.reads, "read_set",
&self.read_set, "phantom_data", &&self.phantom_data)
}
}Debug)]
1325pub struct TaskDeps {
1326#[cfg(debug_assertions)]
1327node: Option<DepNode>,
13281329/// A vector of `DepNodeIndex`, basically.
1330reads: EdgesVec,
13311332/// When adding new edges to `reads` in `DepGraph::read_index` we need to determine if the edge
1333 /// has been seen before. If the number of elements in `reads` is small, we just do a linear
1334 /// scan. If the number is higher, a hashset has better perf. This field is that hashset. It's
1335 /// only used if the number of elements in `reads` exceeds `LINEAR_SCAN_MAX`.
1336read_set: FxHashSet<DepNodeIndex>,
13371338 phantom_data: PhantomData<DepNode>,
1339}
13401341impl TaskDeps {
1342/// See `TaskDeps::read_set` above.
1343const LINEAR_SCAN_MAX: usize = 16;
13441345#[inline]
1346fn new(#[cfg(debug_assertions)] node: Option<DepNode>, read_set_capacity: usize) -> Self {
1347TaskDeps {
1348#[cfg(debug_assertions)]
1349node,
1350 reads: EdgesVec::new(),
1351 read_set: FxHashSet::with_capacity_and_hasher(read_set_capacity, Default::default()),
1352 phantom_data: PhantomData,
1353 }
1354 }
1355}
13561357// A data structure that stores Option<DepNodeColor> values as a contiguous
1358// array, using one u32 per entry.
1359pub(super) struct DepNodeColorMap {
1360 values: IndexVec<SerializedDepNodeIndex, AtomicU32>,
1361}
13621363// All values below `COMPRESSED_RED` are green.
1364const COMPRESSED_RED: u32 = u32::MAX - 1;
1365const COMPRESSED_UNKNOWN: u32 = u32::MAX;
13661367impl DepNodeColorMap {
1368fn new(size: usize) -> DepNodeColorMap {
1369if true {
if !(COMPRESSED_RED > DepNodeIndex::MAX_AS_U32) {
::core::panicking::panic("assertion failed: COMPRESSED_RED > DepNodeIndex::MAX_AS_U32")
};
};debug_assert!(COMPRESSED_RED > DepNodeIndex::MAX_AS_U32);
1370DepNodeColorMap { values: (0..size).map(|_| AtomicU32::new(COMPRESSED_UNKNOWN)).collect() }
1371 }
13721373#[inline]
1374pub(super) fn current(&self, index: SerializedDepNodeIndex) -> Option<DepNodeIndex> {
1375let value = self.values[index].load(Ordering::Relaxed);
1376if value <= DepNodeIndex::MAX_AS_U32 { Some(DepNodeIndex::from_u32(value)) } else { None }
1377 }
13781379/// This tries to atomically mark a node green and assign `index` as the new
1380 /// index. This returns `Ok` if `index` gets assigned, otherwise it returns
1381 /// the already allocated index in `Err`.
1382#[inline]
1383pub(super) fn try_mark_green(
1384&self,
1385 prev_index: SerializedDepNodeIndex,
1386 index: DepNodeIndex,
1387 ) -> Result<(), DepNodeIndex> {
1388let value = &self.values[prev_index];
1389match value.compare_exchange(
1390COMPRESSED_UNKNOWN,
1391index.as_u32(),
1392 Ordering::Relaxed,
1393 Ordering::Relaxed,
1394 ) {
1395Ok(_) => Ok(()),
1396Err(v) => Err({
1397match (&(v), &(COMPRESSED_RED)) {
(left_val, right_val) => {
if *left_val == *right_val {
let kind = ::core::panicking::AssertKind::Ne;
::core::panicking::assert_failed(kind, &*left_val, &*right_val,
::core::option::Option::Some(format_args!("tried to mark a red node as green")));
}
}
};assert_ne!(v, COMPRESSED_RED, "tried to mark a red node as green");
1398DepNodeIndex::from_u32(v)
1399 }),
1400 }
1401 }
14021403#[inline]
1404pub(super) fn get(&self, index: SerializedDepNodeIndex) -> DepNodeColor {
1405let value = self.values[index].load(Ordering::Acquire);
1406// Green is by far the most common case. Check for that first so we can succeed with a
1407 // single comparison.
1408if value < COMPRESSED_RED {
1409 DepNodeColor::Green(DepNodeIndex::from_u32(value))
1410 } else if value == COMPRESSED_RED {
1411 DepNodeColor::Red1412 } else {
1413if true {
match (&value, &COMPRESSED_UNKNOWN) {
(left_val, right_val) => {
if !(*left_val == *right_val) {
let kind = ::core::panicking::AssertKind::Eq;
::core::panicking::assert_failed(kind, &*left_val,
&*right_val, ::core::option::Option::None);
}
}
};
};debug_assert_eq!(value, COMPRESSED_UNKNOWN);
1414 DepNodeColor::Unknown1415 }
1416 }
14171418#[inline]
1419pub(super) fn insert_red(&self, index: SerializedDepNodeIndex) {
1420let value = self.values[index].swap(COMPRESSED_RED, Ordering::Release);
1421// Sanity check for duplicate nodes
1422match (&value, &COMPRESSED_UNKNOWN) {
(left_val, right_val) => {
if !(*left_val == *right_val) {
let kind = ::core::panicking::AssertKind::Eq;
::core::panicking::assert_failed(kind, &*left_val, &*right_val,
::core::option::Option::Some(format_args!("trying to encode a dep node twice")));
}
}
};assert_eq!(value, COMPRESSED_UNKNOWN, "trying to encode a dep node twice");
1423 }
1424}
14251426#[inline(never)]
1427#[cold]
1428pub(crate) fn print_markframe_trace<D: Deps>(graph: &DepGraph<D>, frame: &MarkFrame<'_>) {
1429let data = graph.data.as_ref().unwrap();
14301431{
::std::io::_eprint(format_args!("there was a panic while trying to force a dep node\n"));
};eprintln!("there was a panic while trying to force a dep node");
1432{ ::std::io::_eprint(format_args!("try_mark_green dep node stack:\n")); };eprintln!("try_mark_green dep node stack:");
14331434let mut i = 0;
1435let mut current = Some(frame);
1436while let Some(frame) = current {
1437let node = data.previous.index_to_node(frame.index);
1438{ ::std::io::_eprint(format_args!("#{0} {1:?}\n", i, node)); };eprintln!("#{i} {node:?}");
1439 current = frame.parent;
1440 i += 1;
1441 }
14421443{
::std::io::_eprint(format_args!("end of try_mark_green dep node stack\n"));
};eprintln!("end of try_mark_green dep node stack");
1444}
14451446#[cold]
1447#[inline(never)]
1448fn panic_on_forbidden_read<D: Deps>(data: &DepGraphData<D>, dep_node_index: DepNodeIndex) -> ! {
1449// We have to do an expensive reverse-lookup of the DepNode that
1450 // corresponds to `dep_node_index`, but that's OK since we are about
1451 // to ICE anyway.
1452let mut dep_node = None;
14531454// First try to find the dep node among those that already existed in the
1455 // previous session and has been marked green
1456for prev_index in data.colors.values.indices() {
1457if data.colors.current(prev_index) == Some(dep_node_index) {
1458 dep_node = Some(*data.previous.index_to_node(prev_index));
1459break;
1460 }
1461 }
14621463if dep_node.is_none()
1464 && let Some(nodes) = &data.current.nodes_in_current_session
1465 {
1466// Try to find it among the nodes allocated so far in this session
1467 // This is OK, there's only ever one node result possible so this is deterministic.
1468#[allow(rustc::potential_query_instability)]
1469if let Some((node, _)) = nodes.lock().iter().find(|&(_, index)| *index == dep_node_index) {
1470dep_node = Some(*node);
1471 }
1472 }
14731474let dep_node = dep_node.map_or_else(
1475 || ::alloc::__export::must_use({
::alloc::fmt::format(format_args!("with index {0:?}", dep_node_index))
})format!("with index {:?}", dep_node_index),
1476 |dep_node| ::alloc::__export::must_use({
::alloc::fmt::format(format_args!("`{0:?}`", dep_node))
})format!("`{:?}`", dep_node),
1477 );
14781479{
::core::panicking::panic_fmt(format_args!("Error: trying to record dependency on DepNode {0} in a context that does not allow it (e.g. during query deserialization). The most common case of recording a dependency on a DepNode `foo` is when the corresponding query `foo` is invoked. Invoking queries is not allowed as part of loading something from the incremental on-disk cache. See <https://github.com/rust-lang/rust/pull/91919>.",
dep_node));
}panic!(
1480"Error: trying to record dependency on DepNode {dep_node} in a \
1481 context that does not allow it (e.g. during query deserialization). \
1482 The most common case of recording a dependency on a DepNode `foo` is \
1483 when the corresponding query `foo` is invoked. Invoking queries is not \
1484 allowed as part of loading something from the incremental on-disk cache. \
1485 See <https://github.com/rust-lang/rust/pull/91919>."
1486)1487}