2022-01-08 18:22:06 -05:00
|
|
|
use std::assert_matches::assert_matches;
|
2019-06-13 23:14:44 +02:00
|
|
|
use std::collections::hash_map::Entry;
|
2020-11-02 23:09:03 +01:00
|
|
|
use std::fmt::Debug;
|
2017-08-21 16:44:05 +02:00
|
|
|
use std::hash::Hash;
|
2020-03-22 20:47:30 +01:00
|
|
|
use std::marker::PhantomData;
|
2023-09-24 01:34:45 +02:00
|
|
|
use std::sync::Arc;
|
2024-01-02 22:36:01 +03:00
|
|
|
use std::sync::atomic::Ordering;
|
2024-07-29 08:13:50 +10:00
|
|
|
|
2020-11-18 15:10:43 -08:00
|
|
|
use rustc_data_structures::fingerprint::Fingerprint;
|
2023-08-13 16:07:41 +00:00
|
|
|
use rustc_data_structures::fx::{FxHashMap, FxHashSet};
|
2024-03-06 04:31:56 +01:00
|
|
|
use rustc_data_structures::profiling::{QueryInvocationId, SelfProfilerRef};
|
2019-06-13 23:14:44 +02:00
|
|
|
use rustc_data_structures::sharded::{self, Sharded};
|
2017-12-03 14:21:23 +01:00
|
|
|
use rustc_data_structures::stable_hasher::{HashStable, StableHasher};
|
2024-01-02 22:36:01 +03:00
|
|
|
use rustc_data_structures::sync::{AtomicU32, AtomicU64, Lock, Lrc};
|
2023-05-07 21:08:47 -04:00
|
|
|
use rustc_data_structures::unord::UnordMap;
|
2023-04-19 10:57:17 +00:00
|
|
|
use rustc_index::IndexVec;
|
2024-04-29 08:53:45 +10:00
|
|
|
use rustc_macros::{Decodable, Encodable};
|
2021-03-02 22:38:49 +01:00
|
|
|
use rustc_serialize::opaque::{FileEncodeResult, FileEncoder};
|
2024-04-29 16:24:06 +10:00
|
|
|
use tracing::{debug, instrument};
|
2021-03-02 22:38:49 +01:00
|
|
|
#[cfg(debug_assertions)]
|
|
|
|
use {super::debug::EdgeFilter, std::env};
|
2016-03-28 17:37:34 -04:00
|
|
|
|
|
|
|
use super::query::DepGraphQuery;
|
2021-05-22 11:46:54 +02:00
|
|
|
use super::serialized::{GraphEncoder, SerializedDepGraph, SerializedDepNodeIndex};
|
2023-09-15 15:39:11 +02:00
|
|
|
use super::{DepContext, DepKind, DepNode, Deps, HasDepContext, WorkProductId};
|
2023-11-15 16:15:38 +11:00
|
|
|
use crate::dep_graph::edges::EdgesVec;
|
2021-09-26 01:40:17 +02:00
|
|
|
use crate::ich::StableHashingContext;
|
2021-07-23 16:40:26 -05:00
|
|
|
use crate::query::{QueryContext, QuerySideEffects};
|
2016-03-28 17:37:34 -04:00
|
|
|
|
|
|
|
#[derive(Clone)]
|
2023-09-15 15:39:11 +02:00
|
|
|
pub struct DepGraph<D: Deps> {
|
|
|
|
data: Option<Lrc<DepGraphData<D>>>,
|
2019-12-13 14:44:08 +01:00
|
|
|
|
|
|
|
/// This field is used for assigning DepNodeIndices when running in
|
|
|
|
/// non-incremental mode. Even in non-incremental mode we make sure that
|
2019-12-17 14:44:07 +01:00
|
|
|
/// each task has a `DepNodeIndex` that uniquely identifies it. This unique
|
2019-12-13 14:44:08 +01:00
|
|
|
/// ID is used for self-profiling.
|
|
|
|
virtual_dep_node_index: Lrc<AtomicU32>,
|
2016-07-21 12:33:23 -04:00
|
|
|
}
|
|
|
|
|
2019-09-26 05:38:33 +00:00
|
|
|
rustc_index::newtype_index! {
|
2022-12-18 21:47:28 +01:00
|
|
|
pub struct DepNodeIndex {}
|
2018-07-25 13:41:32 +03:00
|
|
|
}
|
2017-08-21 16:44:05 +02:00
|
|
|
|
2024-04-29 15:35:31 +10:00
|
|
|
// We store a large collection of these in `prev_index_to_index` during
|
|
|
|
// non-full incremental builds, and want to ensure that the element size
|
|
|
|
// doesn't inadvertently increase.
|
|
|
|
rustc_data_structures::static_assert_size!(Option<DepNodeIndex>, 4);
|
|
|
|
|
2017-08-21 16:44:05 +02:00
|
|
|
impl DepNodeIndex {
|
2024-04-03 17:49:59 +03:00
|
|
|
const SINGLETON_DEPENDENCYLESS_ANON_NODE: DepNodeIndex = DepNodeIndex::ZERO;
|
2022-04-27 19:18:26 +02:00
|
|
|
pub const FOREVER_RED_NODE: DepNodeIndex = DepNodeIndex::from_u32(1);
|
2017-08-21 16:44:05 +02:00
|
|
|
}
|
|
|
|
|
2022-08-09 02:14:43 +02:00
|
|
|
impl From<DepNodeIndex> for QueryInvocationId {
|
2023-02-01 04:49:09 +01:00
|
|
|
#[inline(always)]
|
2019-12-13 14:44:08 +01:00
|
|
|
fn from(dep_node_index: DepNodeIndex) -> Self {
|
2020-01-03 11:49:14 +01:00
|
|
|
QueryInvocationId(dep_node_index.as_u32())
|
2019-12-13 14:44:08 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-02-02 22:45:25 +00:00
|
|
|
pub struct MarkFrame<'a> {
|
2023-02-27 05:56:48 +01:00
|
|
|
index: SerializedDepNodeIndex,
|
|
|
|
parent: Option<&'a MarkFrame<'a>>,
|
|
|
|
}
|
|
|
|
|
2023-11-15 16:15:38 +11:00
|
|
|
enum DepNodeColor {
|
2017-09-25 12:25:41 +02:00
|
|
|
Red,
|
2017-09-25 13:51:49 +02:00
|
|
|
Green(DepNodeIndex),
|
2017-09-25 12:25:41 +02:00
|
|
|
}
|
|
|
|
|
2017-09-28 11:58:45 +02:00
|
|
|
impl DepNodeColor {
|
2022-07-07 00:00:00 +00:00
|
|
|
#[inline]
|
2023-11-15 16:15:38 +11:00
|
|
|
fn is_green(self) -> bool {
|
2017-09-28 11:58:45 +02:00
|
|
|
match self {
|
|
|
|
DepNodeColor::Red => false,
|
|
|
|
DepNodeColor::Green(_) => true,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-11-15 16:15:38 +11:00
|
|
|
pub(crate) struct DepGraphData<D: Deps> {
|
2017-08-21 16:44:05 +02:00
|
|
|
/// The new encoding of the dependency graph, optimized for red/green
|
|
|
|
/// tracking. The `current` field is the dependency graph of only the
|
|
|
|
/// current compilation session: We don't merge the previous dep-graph into
|
2020-11-26 01:10:43 -08:00
|
|
|
/// current one anymore, but we do reference shared data to save space.
|
2023-09-15 15:39:11 +02:00
|
|
|
current: CurrentDepGraph<D>,
|
2017-08-21 16:44:05 +02:00
|
|
|
|
2017-09-22 13:00:42 +02:00
|
|
|
/// The dep-graph from the previous compilation session. It contains all
|
|
|
|
/// nodes and edges as well as all fingerprints of nodes that have them.
|
2023-09-24 01:34:45 +02:00
|
|
|
previous: Arc<SerializedDepGraph>,
|
2017-09-22 13:00:42 +02:00
|
|
|
|
2018-12-22 18:03:40 +01:00
|
|
|
colors: DepNodeColorMap,
|
2017-09-25 12:25:41 +02:00
|
|
|
|
2023-08-03 16:54:16 +03:00
|
|
|
processed_side_effects: Lock<FxHashSet<DepNodeIndex>>,
|
2018-12-22 18:59:03 +01:00
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// When we load, there may be `.o` files, cached MIR, or other such
|
2016-07-21 12:33:23 -04:00
|
|
|
/// things available to us. If we find that they are not dirty, we
|
|
|
|
/// load the path to the file storing those work-products here into
|
|
|
|
/// this map. We can later look for and extract that data.
|
2023-08-13 16:07:41 +00:00
|
|
|
previous_work_products: WorkProductMap,
|
2016-07-21 12:33:23 -04:00
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
dep_node_debug: Lock<FxHashMap<DepNode, String>>,
|
2021-12-21 16:31:35 -05:00
|
|
|
|
|
|
|
/// Used by incremental compilation tests to assert that
|
|
|
|
/// a particular query result was decoded from disk
|
|
|
|
/// (not just marked green)
|
2023-09-15 15:39:11 +02:00
|
|
|
debug_loaded_from_disk: Lock<FxHashSet<DepNode>>,
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2021-10-16 22:31:48 +02:00
|
|
|
pub fn hash_result<R>(hcx: &mut StableHashingContext<'_>, result: &R) -> Fingerprint
|
2019-01-20 05:44:02 +01:00
|
|
|
where
|
2021-09-26 01:40:17 +02:00
|
|
|
R: for<'a> HashStable<StableHashingContext<'a>>,
|
2019-01-20 05:44:02 +01:00
|
|
|
{
|
|
|
|
let mut stable_hasher = StableHasher::new();
|
|
|
|
result.hash_stable(hcx, &mut stable_hasher);
|
2021-10-16 22:31:48 +02:00
|
|
|
stable_hasher.finish()
|
2019-01-20 05:44:02 +01:00
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
impl<D: Deps> DepGraph<D> {
|
2018-05-07 22:30:44 -04:00
|
|
|
pub fn new(
|
2021-05-15 17:23:16 +02:00
|
|
|
profiler: &SelfProfilerRef,
|
2023-09-24 01:34:45 +02:00
|
|
|
prev_graph: Arc<SerializedDepGraph>,
|
2023-08-13 16:07:41 +00:00
|
|
|
prev_work_products: WorkProductMap,
|
2021-03-02 22:38:49 +01:00
|
|
|
encoder: FileEncoder,
|
|
|
|
record_graph: bool,
|
|
|
|
record_stats: bool,
|
2023-09-15 15:39:11 +02:00
|
|
|
) -> DepGraph<D> {
|
2018-02-13 17:40:46 +01:00
|
|
|
let prev_graph_node_count = prev_graph.node_count();
|
|
|
|
|
2021-10-07 19:20:41 +02:00
|
|
|
let current = CurrentDepGraph::new(
|
|
|
|
profiler,
|
|
|
|
prev_graph_node_count,
|
|
|
|
encoder,
|
|
|
|
record_graph,
|
|
|
|
record_stats,
|
2024-10-07 22:22:51 +03:00
|
|
|
Arc::clone(&prev_graph),
|
2021-10-07 19:20:41 +02:00
|
|
|
);
|
2021-05-15 17:23:16 +02:00
|
|
|
|
2022-04-27 19:18:26 +02:00
|
|
|
let colors = DepNodeColorMap::new(prev_graph_node_count);
|
|
|
|
|
2021-06-01 21:46:30 +02:00
|
|
|
// Instantiate a dependy-less node only once for anonymous queries.
|
2021-05-15 17:23:16 +02:00
|
|
|
let _green_node_index = current.intern_new_node(
|
2023-09-15 15:39:11 +02:00
|
|
|
DepNode { kind: D::DEP_KIND_NULL, hash: current.anon_id_seed.into() },
|
2023-04-29 21:51:32 -04:00
|
|
|
EdgesVec::new(),
|
2021-05-15 17:23:16 +02:00
|
|
|
Fingerprint::ZERO,
|
|
|
|
);
|
2022-05-03 22:04:49 +02:00
|
|
|
assert_eq!(_green_node_index, DepNodeIndex::SINGLETON_DEPENDENCYLESS_ANON_NODE);
|
2021-05-15 17:23:16 +02:00
|
|
|
|
2022-04-27 19:18:26 +02:00
|
|
|
// Instantiate a dependy-less red node only once for anonymous queries.
|
2023-04-04 14:38:46 +02:00
|
|
|
let (red_node_index, red_node_prev_index_and_color) = current.intern_node(
|
2022-04-27 19:18:26 +02:00
|
|
|
&prev_graph,
|
2023-09-15 15:39:11 +02:00
|
|
|
DepNode { kind: D::DEP_KIND_RED, hash: Fingerprint::ZERO.into() },
|
2023-04-29 21:51:32 -04:00
|
|
|
EdgesVec::new(),
|
2022-04-27 19:18:26 +02:00
|
|
|
None,
|
|
|
|
);
|
2023-04-04 14:38:46 +02:00
|
|
|
assert_eq!(red_node_index, DepNodeIndex::FOREVER_RED_NODE);
|
|
|
|
match red_node_prev_index_and_color {
|
|
|
|
None => {
|
|
|
|
// This is expected when we have no previous compilation session.
|
|
|
|
assert!(prev_graph_node_count == 0);
|
|
|
|
}
|
|
|
|
Some((prev_red_node_index, DepNodeColor::Red)) => {
|
|
|
|
assert_eq!(prev_red_node_index.as_usize(), red_node_index.as_usize());
|
|
|
|
colors.insert(prev_red_node_index, DepNodeColor::Red);
|
|
|
|
}
|
|
|
|
Some((_, DepNodeColor::Green(_))) => {
|
|
|
|
// There must be a logic error somewhere if we hit this branch.
|
|
|
|
panic!("DepNodeIndex::FOREVER_RED_NODE evaluated to DepNodeColor::Green")
|
|
|
|
}
|
|
|
|
}
|
2021-05-15 17:23:16 +02:00
|
|
|
|
2016-03-28 17:37:34 -04:00
|
|
|
DepGraph {
|
2018-02-27 17:11:14 +01:00
|
|
|
data: Some(Lrc::new(DepGraphData {
|
2018-05-07 22:30:44 -04:00
|
|
|
previous_work_products: prev_work_products,
|
2018-07-25 15:44:06 +03:00
|
|
|
dep_node_debug: Default::default(),
|
2021-05-15 17:23:16 +02:00
|
|
|
current,
|
2021-07-23 16:40:26 -05:00
|
|
|
processed_side_effects: Default::default(),
|
2017-09-22 13:00:42 +02:00
|
|
|
previous: prev_graph,
|
2022-04-27 19:18:26 +02:00
|
|
|
colors,
|
2021-12-21 16:31:35 -05:00
|
|
|
debug_loaded_from_disk: Default::default(),
|
2017-09-22 13:00:42 +02:00
|
|
|
})),
|
2019-12-13 14:44:08 +01:00
|
|
|
virtual_dep_node_index: Lrc::new(AtomicU32::new(0)),
|
2017-09-22 13:00:42 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn new_disabled() -> DepGraph<D> {
|
2021-10-07 19:20:41 +02:00
|
|
|
DepGraph { data: None, virtual_dep_node_index: Lrc::new(AtomicU32::new(0)) }
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2023-02-24 00:48:50 +01:00
|
|
|
#[inline]
|
2023-11-15 16:15:38 +11:00
|
|
|
pub(crate) fn data(&self) -> Option<&DepGraphData<D>> {
|
2023-02-24 00:48:50 +01:00
|
|
|
self.data.as_deref()
|
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Returns `true` if we are actually building the full dep-graph, and `false` otherwise.
|
2016-12-20 22:46:11 +02:00
|
|
|
#[inline]
|
|
|
|
pub fn is_fully_enabled(&self) -> bool {
|
2017-07-04 15:06:57 +02:00
|
|
|
self.data.is_some()
|
2016-12-20 22:46:11 +02:00
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn with_query(&self, f: impl Fn(&DepGraphQuery)) {
|
2021-03-02 22:38:49 +01:00
|
|
|
if let Some(data) = &self.data {
|
2024-03-06 04:40:39 +01:00
|
|
|
data.current.encoder.with_query(f)
|
2017-09-28 13:26:15 +02:00
|
|
|
}
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2017-12-28 06:05:45 +01:00
|
|
|
pub fn assert_ignored(&self) {
|
2018-04-06 14:52:36 +02:00
|
|
|
if let Some(..) = self.data {
|
2023-09-15 15:39:11 +02:00
|
|
|
D::read_deps(|task_deps| {
|
2022-01-08 18:22:06 -05:00
|
|
|
assert_matches!(
|
|
|
|
task_deps,
|
|
|
|
TaskDepsRef::Ignore,
|
|
|
|
"expected no task dependency tracking"
|
|
|
|
);
|
2020-03-21 00:27:09 +01:00
|
|
|
})
|
2017-12-28 06:05:45 +01:00
|
|
|
}
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn with_ignore<OP, R>(&self, op: OP) -> R
|
|
|
|
where
|
|
|
|
OP: FnOnce() -> R,
|
|
|
|
{
|
2023-09-15 15:39:11 +02:00
|
|
|
D::with_deps(TaskDepsRef::Ignore, op)
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2021-12-20 21:46:55 -05:00
|
|
|
/// Used to wrap the deserialization of a query result from disk,
|
|
|
|
/// This method enforces that no new `DepNodes` are created during
|
|
|
|
/// query result deserialization.
|
|
|
|
///
|
|
|
|
/// Enforcing this makes the query dep graph simpler - all nodes
|
|
|
|
/// must be created during the query execution, and should be
|
|
|
|
/// created from inside the 'body' of a query (the implementation
|
|
|
|
/// provided by a particular compiler crate).
|
|
|
|
///
|
|
|
|
/// Consider the case of three queries `A`, `B`, and `C`, where
|
|
|
|
/// `A` invokes `B` and `B` invokes `C`:
|
|
|
|
///
|
|
|
|
/// `A -> B -> C`
|
|
|
|
///
|
2021-12-23 13:44:04 -05:00
|
|
|
/// Suppose that decoding the result of query `B` required re-computing
|
|
|
|
/// the query `C`. If we did not create a fresh `TaskDeps` when
|
|
|
|
/// decoding `B`, we would still be using the `TaskDeps` for query `A`
|
2021-12-20 21:46:55 -05:00
|
|
|
/// (if we needed to re-execute `A`). This would cause us to create
|
2021-12-23 13:44:04 -05:00
|
|
|
/// a new edge `A -> C`. If this edge did not previously
|
2021-12-20 21:46:55 -05:00
|
|
|
/// exist in the `DepGraph`, then we could end up with a different
|
|
|
|
/// `DepGraph` at the end of compilation, even if there were no
|
|
|
|
/// meaningful changes to the overall program (e.g. a newline was added).
|
|
|
|
/// In addition, this edge might cause a subsequent compilation run
|
2021-12-23 13:44:04 -05:00
|
|
|
/// to try to force `C` before marking other necessary nodes green. If
|
|
|
|
/// `C` did not exist in the new compilation session, then we could
|
2021-12-20 21:46:55 -05:00
|
|
|
/// get an ICE. Normally, we would have tried (and failed) to mark
|
|
|
|
/// some other query green (e.g. `item_children`) which was used
|
2021-12-23 13:44:04 -05:00
|
|
|
/// to obtain `C`, which would prevent us from ever trying to force
|
2023-04-09 17:35:02 -04:00
|
|
|
/// a nonexistent `D`.
|
2021-12-20 21:46:55 -05:00
|
|
|
///
|
|
|
|
/// It might be possible to enforce that all `DepNode`s read during
|
|
|
|
/// deserialization already exist in the previous `DepGraph`. In
|
|
|
|
/// the above example, we would invoke `D` during the deserialization
|
|
|
|
/// of `B`. Since we correctly create a new `TaskDeps` from the decoding
|
|
|
|
/// of `B`, this would result in an edge `B -> D`. If that edge already
|
|
|
|
/// existed (with the same `DepPathHash`es), then it should be correct
|
|
|
|
/// to allow the invocation of the query to proceed during deserialization
|
2021-12-23 13:44:04 -05:00
|
|
|
/// of a query result. We would merely assert that the dep-graph fragment
|
|
|
|
/// that would have been added by invoking `C` while decoding `B`
|
|
|
|
/// is equivalent to the dep-graph fragment that we already instantiated for B
|
|
|
|
/// (at the point where we successfully marked B as green).
|
|
|
|
///
|
|
|
|
/// However, this would require additional complexity
|
2021-12-20 21:46:55 -05:00
|
|
|
/// in the query infrastructure, and is not currently needed by the
|
|
|
|
/// decoding of any query results. Should the need arise in the future,
|
|
|
|
/// we should consider extending the query system with this functionality.
|
2023-03-09 07:30:15 +01:00
|
|
|
pub fn with_query_deserialization<OP, R>(&self, op: OP) -> R
|
2021-12-20 21:46:55 -05:00
|
|
|
where
|
|
|
|
OP: FnOnce() -> R,
|
|
|
|
{
|
2023-09-15 15:39:11 +02:00
|
|
|
D::with_deps(TaskDepsRef::Forbid, op)
|
2021-12-20 21:46:55 -05:00
|
|
|
}
|
|
|
|
|
2023-02-24 00:48:50 +01:00
|
|
|
#[inline(always)]
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn with_task<Ctxt: HasDepContext<Deps = D>, A: Debug, R>(
|
2023-02-24 00:48:50 +01:00
|
|
|
&self,
|
2023-09-15 15:39:11 +02:00
|
|
|
key: DepNode,
|
2023-02-24 00:48:50 +01:00
|
|
|
cx: Ctxt,
|
|
|
|
arg: A,
|
|
|
|
task: fn(Ctxt, A) -> R,
|
|
|
|
hash_result: Option<fn(&mut StableHashingContext<'_>, &R) -> Fingerprint>,
|
|
|
|
) -> (R, DepNodeIndex) {
|
|
|
|
match self.data() {
|
|
|
|
Some(data) => data.with_task(key, cx, arg, task, hash_result),
|
|
|
|
None => (task(cx, arg), self.next_virtual_depnode_index()),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn with_anon_task<Tcx: DepContext<Deps = D>, OP, R>(
|
2023-02-24 00:48:50 +01:00
|
|
|
&self,
|
|
|
|
cx: Tcx,
|
2023-09-15 15:39:11 +02:00
|
|
|
dep_kind: DepKind,
|
2023-02-24 00:48:50 +01:00
|
|
|
op: OP,
|
|
|
|
) -> (R, DepNodeIndex)
|
|
|
|
where
|
|
|
|
OP: FnOnce() -> R,
|
|
|
|
{
|
|
|
|
match self.data() {
|
|
|
|
Some(data) => data.with_anon_task(cx, dep_kind, op),
|
|
|
|
None => (op(), self.next_virtual_depnode_index()),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
impl<D: Deps> DepGraphData<D> {
|
2017-03-08 09:14:27 -05:00
|
|
|
/// Starts a new dep-graph task. Dep-graph tasks are specified
|
|
|
|
/// using a free function (`task`) and **not** a closure -- this
|
|
|
|
/// is intentional because we want to exercise tight control over
|
|
|
|
/// what state they have access to. In particular, we want to
|
|
|
|
/// prevent implicit 'leaks' of tracked state into the task (which
|
|
|
|
/// could then be read without generating correct edges in the
|
2020-03-05 18:07:42 -03:00
|
|
|
/// dep-graph -- see the [rustc dev guide] for more details on
|
2017-12-31 17:08:04 +01:00
|
|
|
/// the dep-graph). To this end, the task function gets exactly two
|
2017-03-08 09:14:27 -05:00
|
|
|
/// pieces of state: the context `cx` and an argument `arg`. Both
|
|
|
|
/// of these bits of state must be of some type that implements
|
|
|
|
/// `DepGraphSafe` and hence does not leak.
|
|
|
|
///
|
|
|
|
/// The choice of two arguments is not fundamental. One argument
|
|
|
|
/// would work just as well, since multiple values can be
|
|
|
|
/// collected using tuples. However, using two arguments works out
|
|
|
|
/// to be quite convenient, since it is common to need a context
|
|
|
|
/// (`cx`) and some argument (e.g., a `DefId` identifying what
|
|
|
|
/// item to process).
|
|
|
|
///
|
|
|
|
/// For cases where you need some other number of arguments:
|
|
|
|
///
|
|
|
|
/// - If you only need one argument, just use `()` for the `arg`
|
|
|
|
/// parameter.
|
|
|
|
/// - If you need 3+ arguments, use a tuple for the
|
|
|
|
/// `arg` parameter.
|
|
|
|
///
|
2023-10-22 07:20:36 -07:00
|
|
|
/// [rustc dev guide]: https://rustc-dev-guide.rust-lang.org/queries/incremental-compilation.html
|
2023-02-23 01:14:48 +01:00
|
|
|
#[inline(always)]
|
2023-11-15 16:15:38 +11:00
|
|
|
pub(crate) fn with_task<Ctxt: HasDepContext<Deps = D>, A: Debug, R>(
|
2019-01-20 05:44:02 +01:00
|
|
|
&self,
|
2023-09-15 15:39:11 +02:00
|
|
|
key: DepNode,
|
2020-03-24 20:09:06 +01:00
|
|
|
cx: Ctxt,
|
2019-01-20 05:44:02 +01:00
|
|
|
arg: A,
|
2020-03-24 20:09:06 +01:00
|
|
|
task: fn(Ctxt, A) -> R,
|
2021-10-16 22:31:48 +02:00
|
|
|
hash_result: Option<fn(&mut StableHashingContext<'_>, &R) -> Fingerprint>,
|
2020-03-24 20:09:06 +01:00
|
|
|
) -> (R, DepNodeIndex) {
|
2021-01-06 19:06:34 +01:00
|
|
|
// If the following assertion triggers, it can have two reasons:
|
|
|
|
// 1. Something is wrong with DepNode creation, either here or
|
|
|
|
// in `DepGraph::try_mark_green()`.
|
|
|
|
// 2. Two distinct query keys get mapped to the same `DepNode`
|
|
|
|
// (see for example #48923).
|
|
|
|
assert!(
|
|
|
|
!self.dep_node_exists(&key),
|
|
|
|
"forcing query with already existing `DepNode`\n\
|
2022-12-19 10:31:55 +01:00
|
|
|
- query-key: {arg:?}\n\
|
|
|
|
- dep-node: {key:?}"
|
2021-01-06 19:06:34 +01:00
|
|
|
);
|
2020-11-02 23:09:03 +01:00
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
let with_deps = |task_deps| D::with_deps(task_deps, || task(cx, arg));
|
2023-04-27 15:04:18 +10:00
|
|
|
let (result, edges) = if cx.dep_context().is_eval_always(key.kind) {
|
2023-04-29 21:51:32 -04:00
|
|
|
(with_deps(TaskDepsRef::EvalAlways), EdgesVec::new())
|
2021-01-06 19:06:34 +01:00
|
|
|
} else {
|
2023-04-27 15:04:18 +10:00
|
|
|
let task_deps = Lock::new(TaskDeps {
|
2021-01-06 19:06:34 +01:00
|
|
|
#[cfg(debug_assertions)]
|
|
|
|
node: Some(key),
|
2023-04-29 21:51:32 -04:00
|
|
|
reads: EdgesVec::new(),
|
2021-01-06 19:06:34 +01:00
|
|
|
read_set: Default::default(),
|
|
|
|
phantom_data: PhantomData,
|
2023-04-27 15:04:18 +10:00
|
|
|
});
|
|
|
|
(with_deps(TaskDepsRef::Allow(&task_deps)), task_deps.into_inner().reads)
|
2021-01-06 19:06:34 +01:00
|
|
|
};
|
2022-01-08 18:22:06 -05:00
|
|
|
|
2021-01-06 19:06:34 +01:00
|
|
|
let dcx = cx.dep_context();
|
|
|
|
let hashing_timer = dcx.profiler().incr_result_hashing();
|
2021-07-12 22:19:25 +02:00
|
|
|
let current_fingerprint =
|
|
|
|
hash_result.map(|f| dcx.with_stable_hashing_context(|mut hcx| f(&mut hcx, &result)));
|
2021-01-06 19:06:34 +01:00
|
|
|
|
|
|
|
// Intern the new `DepNode`.
|
2024-03-06 04:31:56 +01:00
|
|
|
let (dep_node_index, prev_and_color) =
|
|
|
|
self.current.intern_node(&self.previous, key, edges, current_fingerprint);
|
2021-06-25 13:17:52 +02:00
|
|
|
|
2021-01-06 19:06:34 +01:00
|
|
|
hashing_timer.finish_with_query_invocation_id(dep_node_index.into());
|
2017-09-25 12:25:41 +02:00
|
|
|
|
2021-01-06 19:06:34 +01:00
|
|
|
if let Some((prev_index, color)) = prev_and_color {
|
|
|
|
debug_assert!(
|
2023-02-24 00:48:50 +01:00
|
|
|
self.colors.get(prev_index).is_none(),
|
2021-01-06 19:06:34 +01:00
|
|
|
"DepGraph::with_task() - Duplicate DepNodeColor \
|
2022-12-19 10:31:55 +01:00
|
|
|
insertion for {key:?}"
|
2021-01-06 19:06:34 +01:00
|
|
|
);
|
2017-09-25 12:25:41 +02:00
|
|
|
|
2023-02-24 00:48:50 +01:00
|
|
|
self.colors.insert(prev_index, color);
|
2017-07-04 17:33:43 +02:00
|
|
|
}
|
2021-01-06 19:06:34 +01:00
|
|
|
|
|
|
|
(result, dep_node_index)
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Executes something within an "anonymous" task, that is, a task the
|
|
|
|
/// `DepNode` of which is determined by the list of inputs it read from.
|
2023-11-15 16:15:38 +11:00
|
|
|
pub(crate) fn with_anon_task<Tcx: DepContext<Deps = D>, OP, R>(
|
2021-03-18 19:38:50 +01:00
|
|
|
&self,
|
2022-11-05 21:04:19 +01:00
|
|
|
cx: Tcx,
|
2023-09-15 15:39:11 +02:00
|
|
|
dep_kind: DepKind,
|
2021-03-18 19:38:50 +01:00
|
|
|
op: OP,
|
|
|
|
) -> (R, DepNodeIndex)
|
2017-06-23 16:37:12 +02:00
|
|
|
where
|
|
|
|
OP: FnOnce() -> R,
|
|
|
|
{
|
2021-10-16 20:10:23 +02:00
|
|
|
debug_assert!(!cx.is_eval_always(dep_kind));
|
2020-11-26 01:10:43 -08:00
|
|
|
|
2023-02-24 00:48:50 +01:00
|
|
|
let task_deps = Lock::new(TaskDeps::default());
|
2023-09-15 15:39:11 +02:00
|
|
|
let result = D::with_deps(TaskDepsRef::Allow(&task_deps), op);
|
2023-02-24 00:48:50 +01:00
|
|
|
let task_deps = task_deps.into_inner();
|
|
|
|
let task_deps = task_deps.reads;
|
|
|
|
|
|
|
|
let dep_node_index = match task_deps.len() {
|
|
|
|
0 => {
|
|
|
|
// Because the dep-node id of anon nodes is computed from the sets of its
|
|
|
|
// dependencies we already know what the ID of this dependency-less node is
|
|
|
|
// going to be (i.e. equal to the precomputed
|
|
|
|
// `SINGLETON_DEPENDENCYLESS_ANON_NODE`). As a consequence we can skip creating
|
|
|
|
// a `StableHasher` and sending the node through interning.
|
|
|
|
DepNodeIndex::SINGLETON_DEPENDENCYLESS_ANON_NODE
|
|
|
|
}
|
|
|
|
1 => {
|
|
|
|
// When there is only one dependency, don't bother creating a node.
|
|
|
|
task_deps[0]
|
|
|
|
}
|
|
|
|
_ => {
|
|
|
|
// The dep node indices are hashed here instead of hashing the dep nodes of the
|
|
|
|
// dependencies. These indices may refer to different nodes per session, but this isn't
|
|
|
|
// a problem here because we that ensure the final dep node hash is per session only by
|
|
|
|
// combining it with the per session random number `anon_id_seed`. This hash only need
|
|
|
|
// to map the dependencies to a single value on a per session basis.
|
|
|
|
let mut hasher = StableHasher::new();
|
|
|
|
task_deps.hash(&mut hasher);
|
|
|
|
|
|
|
|
let target_dep_node = DepNode {
|
|
|
|
kind: dep_kind,
|
|
|
|
// Fingerprint::combine() is faster than sending Fingerprint
|
|
|
|
// through the StableHasher (at least as long as StableHasher
|
|
|
|
// is so slow).
|
|
|
|
hash: self.current.anon_id_seed.combine(hasher.finish()).into(),
|
|
|
|
};
|
2020-11-26 01:10:43 -08:00
|
|
|
|
2024-03-06 04:17:17 +01:00
|
|
|
self.current.intern_new_node(target_dep_node, task_deps, Fingerprint::ZERO)
|
2023-02-24 00:48:50 +01:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
(result, dep_node_index)
|
2017-06-23 16:37:12 +02:00
|
|
|
}
|
2023-02-24 00:48:50 +01:00
|
|
|
}
|
2017-06-23 16:37:12 +02:00
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
impl<D: Deps> DepGraph<D> {
|
2017-07-04 15:06:57 +02:00
|
|
|
#[inline]
|
2020-11-26 01:10:43 -08:00
|
|
|
pub fn read_index(&self, dep_node_index: DepNodeIndex) {
|
2017-07-04 15:06:57 +02:00
|
|
|
if let Some(ref data) = self.data {
|
2023-09-15 15:39:11 +02:00
|
|
|
D::read_deps(|task_deps| {
|
2022-01-08 18:22:06 -05:00
|
|
|
let mut task_deps = match task_deps {
|
|
|
|
TaskDepsRef::Allow(deps) => deps.lock(),
|
2023-04-04 14:38:46 +02:00
|
|
|
TaskDepsRef::EvalAlways => {
|
|
|
|
// We don't need to record dependencies of eval_always
|
|
|
|
// queries. They are re-evaluated unconditionally anyway.
|
|
|
|
return;
|
|
|
|
}
|
2022-01-08 18:22:06 -05:00
|
|
|
TaskDepsRef::Ignore => return,
|
|
|
|
TaskDepsRef::Forbid => {
|
2024-04-22 12:11:07 +02:00
|
|
|
// Reading is forbidden in this context. ICE with a useful error message.
|
|
|
|
panic_on_forbidden_read(data, dep_node_index)
|
2021-12-13 20:56:30 -06:00
|
|
|
}
|
2022-01-08 18:22:06 -05:00
|
|
|
};
|
|
|
|
let task_deps = &mut *task_deps;
|
2021-12-13 20:56:30 -06:00
|
|
|
|
2022-01-08 18:22:06 -05:00
|
|
|
if cfg!(debug_assertions) {
|
2024-01-02 22:36:01 +03:00
|
|
|
data.current.total_read_count.fetch_add(1, Ordering::Relaxed);
|
2022-01-08 18:22:06 -05:00
|
|
|
}
|
2020-11-26 01:10:43 -08:00
|
|
|
|
2022-01-08 18:22:06 -05:00
|
|
|
// As long as we only have a low number of reads we can avoid doing a hash
|
|
|
|
// insert and potentially allocating/reallocating the hashmap
|
2023-04-29 21:51:32 -04:00
|
|
|
let new_read = if task_deps.reads.len() < EdgesVec::INLINE_CAPACITY {
|
2022-01-08 18:22:06 -05:00
|
|
|
task_deps.reads.iter().all(|other| *other != dep_node_index)
|
|
|
|
} else {
|
|
|
|
task_deps.read_set.insert(dep_node_index)
|
|
|
|
};
|
|
|
|
if new_read {
|
|
|
|
task_deps.reads.push(dep_node_index);
|
2023-04-29 21:51:32 -04:00
|
|
|
if task_deps.reads.len() == EdgesVec::INLINE_CAPACITY {
|
2022-01-08 18:22:06 -05:00
|
|
|
// Fill `read_set` with what we have so far so we can use the hashset
|
|
|
|
// next time
|
|
|
|
task_deps.read_set.extend(task_deps.reads.iter().copied());
|
|
|
|
}
|
2020-11-26 01:10:43 -08:00
|
|
|
|
2022-01-08 18:22:06 -05:00
|
|
|
#[cfg(debug_assertions)]
|
|
|
|
{
|
|
|
|
if let Some(target) = task_deps.node {
|
|
|
|
if let Some(ref forbidden_edge) = data.current.forbidden_edge {
|
|
|
|
let src = forbidden_edge.index_to_node.lock()[&dep_node_index];
|
|
|
|
if forbidden_edge.test(&src, &target) {
|
|
|
|
panic!("forbidden edge {:?} -> {:?} created", src, target)
|
2020-11-26 01:10:43 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-01-08 18:22:06 -05:00
|
|
|
} else if cfg!(debug_assertions) {
|
2024-01-02 22:36:01 +03:00
|
|
|
data.current.total_duplicate_read_count.fetch_add(1, Ordering::Relaxed);
|
2020-11-26 01:10:43 -08:00
|
|
|
}
|
|
|
|
})
|
2016-10-18 14:46:41 +11:00
|
|
|
}
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2022-03-22 21:45:32 +01:00
|
|
|
/// Create a node when we force-feed a value into the query cache.
|
|
|
|
/// This is used to remove cycles during type-checking const generic parameters.
|
|
|
|
///
|
|
|
|
/// As usual in the query system, we consider the current state of the calling query
|
2022-11-16 20:34:16 +00:00
|
|
|
/// only depends on the list of dependencies up to now. As a consequence, the value
|
|
|
|
/// that this query gives us can only depend on those dependencies too. Therefore,
|
2022-03-22 21:45:32 +01:00
|
|
|
/// it is sound to use the current dependency set for the created node.
|
|
|
|
///
|
|
|
|
/// During replay, the order of the nodes is relevant in the dependency graph.
|
|
|
|
/// So the unchanged replay will mark the caller query before trying to mark this one.
|
|
|
|
/// If there is a change to report, the caller query will be re-executed before this one.
|
|
|
|
///
|
|
|
|
/// FIXME: If the code is changed enough for this node to be marked before requiring the
|
|
|
|
/// caller's node, we suppose that those changes will be enough to mark this node red and
|
|
|
|
/// force a recomputation using the "normal" way.
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn with_feed_task<Ctxt: DepContext<Deps = D>, A: Debug, R: Debug>(
|
2022-03-22 21:45:32 +01:00
|
|
|
&self,
|
2023-09-15 15:39:11 +02:00
|
|
|
node: DepNode,
|
2022-03-22 21:45:32 +01:00
|
|
|
cx: Ctxt,
|
|
|
|
key: A,
|
|
|
|
result: &R,
|
2022-12-03 18:06:39 +00:00
|
|
|
hash_result: Option<fn(&mut StableHashingContext<'_>, &R) -> Fingerprint>,
|
2022-03-22 21:45:32 +01:00
|
|
|
) -> DepNodeIndex {
|
|
|
|
if let Some(data) = self.data.as_ref() {
|
2022-11-16 20:34:16 +00:00
|
|
|
// The caller query has more dependencies than the node we are creating. We may
|
2022-09-04 22:42:05 +02:00
|
|
|
// encounter a case where this created node is marked as green, but the caller query is
|
2022-11-16 20:34:16 +00:00
|
|
|
// subsequently marked as red or recomputed. In this case, we will end up feeding a
|
2022-09-04 22:42:05 +02:00
|
|
|
// value to an existing node.
|
|
|
|
//
|
|
|
|
// For sanity, we still check that the loaded stable hash and the new one match.
|
2023-03-25 03:12:41 +01:00
|
|
|
if let Some(prev_index) = data.previous.node_to_index_opt(&node) {
|
|
|
|
let dep_node_index = data.current.prev_index_to_index.lock()[prev_index];
|
|
|
|
if let Some(dep_node_index) = dep_node_index {
|
2023-03-26 11:00:26 +02:00
|
|
|
crate::query::incremental_verify_ich(
|
|
|
|
cx,
|
|
|
|
data,
|
|
|
|
result,
|
|
|
|
prev_index,
|
|
|
|
hash_result,
|
2023-07-25 22:00:13 +02:00
|
|
|
|value| format!("{value:?}"),
|
2023-03-26 11:00:26 +02:00
|
|
|
);
|
2022-09-04 22:42:05 +02:00
|
|
|
|
2023-03-25 03:12:41 +01:00
|
|
|
#[cfg(debug_assertions)]
|
|
|
|
if hash_result.is_some() {
|
|
|
|
data.current.record_edge(
|
|
|
|
dep_node_index,
|
|
|
|
node,
|
|
|
|
data.prev_fingerprint_of(prev_index),
|
|
|
|
);
|
|
|
|
}
|
2022-03-22 21:45:32 +01:00
|
|
|
|
2023-03-25 03:12:41 +01:00
|
|
|
return dep_node_index;
|
|
|
|
}
|
2022-03-22 21:45:32 +01:00
|
|
|
}
|
|
|
|
|
2023-04-29 21:51:32 -04:00
|
|
|
let mut edges = EdgesVec::new();
|
2023-09-15 15:39:11 +02:00
|
|
|
D::read_deps(|task_deps| match task_deps {
|
2023-09-06 21:15:03 -04:00
|
|
|
TaskDepsRef::Allow(deps) => edges.extend(deps.lock().reads.iter().copied()),
|
2023-04-04 14:38:46 +02:00
|
|
|
TaskDepsRef::EvalAlways => {
|
|
|
|
edges.push(DepNodeIndex::FOREVER_RED_NODE);
|
|
|
|
}
|
|
|
|
TaskDepsRef::Ignore => {}
|
2022-12-01 10:33:28 +00:00
|
|
|
TaskDepsRef::Forbid => {
|
2022-03-22 21:45:32 +01:00
|
|
|
panic!("Cannot summarize when dependencies are not recorded.")
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
let hashing_timer = cx.profiler().incr_result_hashing();
|
2022-12-03 18:06:39 +00:00
|
|
|
let current_fingerprint = hash_result.map(|hash_result| {
|
|
|
|
cx.with_stable_hashing_context(|mut hcx| hash_result(&mut hcx, result))
|
|
|
|
});
|
2022-03-22 21:45:32 +01:00
|
|
|
|
|
|
|
// Intern the new `DepNode` with the dependencies up-to-now.
|
2024-03-06 04:31:56 +01:00
|
|
|
let (dep_node_index, prev_and_color) =
|
|
|
|
data.current.intern_node(&data.previous, node, edges, current_fingerprint);
|
2022-03-22 21:45:32 +01:00
|
|
|
|
|
|
|
hashing_timer.finish_with_query_invocation_id(dep_node_index.into());
|
|
|
|
|
|
|
|
if let Some((prev_index, color)) = prev_and_color {
|
|
|
|
debug_assert!(
|
|
|
|
data.colors.get(prev_index).is_none(),
|
|
|
|
"DepGraph::with_task() - Duplicate DepNodeColor insertion for {key:?}",
|
|
|
|
);
|
|
|
|
|
|
|
|
data.colors.insert(prev_index, color);
|
|
|
|
}
|
|
|
|
|
|
|
|
dep_node_index
|
|
|
|
} else {
|
|
|
|
// Incremental compilation is turned off. We just execute the task
|
|
|
|
// without tracking. We still provide a dep-node index that uniquely
|
|
|
|
// identifies the task so that we have a cheap way of referring to
|
|
|
|
// the query for self-profiling.
|
|
|
|
self.next_virtual_depnode_index()
|
|
|
|
}
|
|
|
|
}
|
2023-02-24 00:48:50 +01:00
|
|
|
}
|
2020-11-26 01:10:43 -08:00
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
impl<D: Deps> DepGraphData<D> {
|
2023-02-24 00:48:50 +01:00
|
|
|
#[inline]
|
2023-11-15 16:15:38 +11:00
|
|
|
fn dep_node_index_of_opt(&self, dep_node: &DepNode) -> Option<DepNodeIndex> {
|
2023-02-24 00:48:50 +01:00
|
|
|
if let Some(prev_index) = self.previous.node_to_index_opt(dep_node) {
|
|
|
|
self.current.prev_index_to_index.lock()[prev_index]
|
2020-11-26 01:10:43 -08:00
|
|
|
} else {
|
2023-08-16 13:50:31 +02:00
|
|
|
self.current.new_node_to_index.lock_shard_by_value(dep_node).get(dep_node).copied()
|
2020-11-26 01:10:43 -08:00
|
|
|
}
|
2017-12-19 18:01:19 +01:00
|
|
|
}
|
|
|
|
|
2018-02-13 17:40:46 +01:00
|
|
|
#[inline]
|
2023-11-15 16:15:38 +11:00
|
|
|
fn dep_node_exists(&self, dep_node: &DepNode) -> bool {
|
2023-02-24 00:48:50 +01:00
|
|
|
self.dep_node_index_of_opt(dep_node).is_some()
|
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
fn node_color(&self, dep_node: &DepNode) -> Option<DepNodeColor> {
|
2023-02-24 00:48:50 +01:00
|
|
|
if let Some(prev_index) = self.previous.node_to_index_opt(dep_node) {
|
|
|
|
self.colors.get(prev_index)
|
|
|
|
} else {
|
|
|
|
// This is a node that did not exist in the previous compilation session.
|
|
|
|
None
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns true if the given node has been marked as green during the
|
|
|
|
/// current compilation session. Used in various assertions
|
2023-03-19 23:48:08 +01:00
|
|
|
#[inline]
|
2023-11-15 16:15:38 +11:00
|
|
|
pub(crate) fn is_index_green(&self, prev_index: SerializedDepNodeIndex) -> bool {
|
2023-05-24 14:19:22 +00:00
|
|
|
self.colors.get(prev_index).is_some_and(|c| c.is_green())
|
2023-03-19 23:48:08 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#[inline]
|
2023-11-15 16:15:38 +11:00
|
|
|
pub(crate) fn prev_fingerprint_of(&self, prev_index: SerializedDepNodeIndex) -> Fingerprint {
|
2023-03-19 23:48:08 +01:00
|
|
|
self.previous.fingerprint_by_index(prev_index)
|
2020-11-26 01:10:43 -08:00
|
|
|
}
|
|
|
|
|
2023-02-23 01:14:48 +01:00
|
|
|
#[inline]
|
2023-11-15 16:15:38 +11:00
|
|
|
pub(crate) fn prev_node_of(&self, prev_index: SerializedDepNodeIndex) -> DepNode {
|
2023-03-19 23:48:08 +01:00
|
|
|
self.previous.index_to_node(prev_index)
|
2023-02-24 00:48:50 +01:00
|
|
|
}
|
|
|
|
|
2023-11-15 16:15:38 +11:00
|
|
|
pub(crate) fn mark_debug_loaded_from_disk(&self, dep_node: DepNode) {
|
2023-02-24 00:48:50 +01:00
|
|
|
self.debug_loaded_from_disk.lock().insert(dep_node);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
impl<D: Deps> DepGraph<D> {
|
2023-02-24 00:48:50 +01:00
|
|
|
#[inline]
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn dep_node_exists(&self, dep_node: &DepNode) -> bool {
|
2023-05-24 14:19:22 +00:00
|
|
|
self.data.as_ref().is_some_and(|data| data.dep_node_exists(dep_node))
|
2017-09-14 17:43:03 +02:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Checks whether a previous work product exists for `v` and, if
|
2016-07-21 12:33:23 -04:00
|
|
|
/// so, return the path that leads to it. Used to skip doing work.
|
2017-06-06 15:09:21 +02:00
|
|
|
pub fn previous_work_product(&self, v: &WorkProductId) -> Option<WorkProduct> {
|
2018-05-07 22:30:44 -04:00
|
|
|
self.data.as_ref().and_then(|data| data.previous_work_products.get(v).cloned())
|
2016-07-21 12:33:23 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 17:54:20 -05:00
|
|
|
/// Access the map of work-products created during the cached run. Only
|
|
|
|
/// used during saving of the dep-graph.
|
2023-08-13 16:07:41 +00:00
|
|
|
pub fn previous_work_products(&self) -> &WorkProductMap {
|
2018-05-07 22:30:44 -04:00
|
|
|
&self.data.as_ref().unwrap().previous_work_products
|
2017-01-16 17:54:20 -05:00
|
|
|
}
|
2017-06-12 17:00:55 +02:00
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn debug_was_loaded_from_disk(&self, dep_node: DepNode) -> bool {
|
2021-12-21 16:31:35 -05:00
|
|
|
self.data.as_ref().unwrap().debug_loaded_from_disk.lock().contains(&dep_node)
|
|
|
|
}
|
|
|
|
|
2023-11-15 16:15:38 +11:00
|
|
|
#[cfg(debug_assertions)]
|
2017-06-12 17:00:55 +02:00
|
|
|
#[inline(always)]
|
2023-11-15 16:15:38 +11:00
|
|
|
pub(crate) fn register_dep_node_debug_str<F>(&self, dep_node: DepNode, debug_str_gen: F)
|
2017-06-12 17:00:55 +02:00
|
|
|
where
|
|
|
|
F: FnOnce() -> String,
|
|
|
|
{
|
2017-08-30 11:53:57 -07:00
|
|
|
let dep_node_debug = &self.data.as_ref().unwrap().dep_node_debug;
|
2017-06-12 17:00:55 +02:00
|
|
|
|
2017-08-30 11:53:57 -07:00
|
|
|
if dep_node_debug.borrow().contains_key(&dep_node) {
|
|
|
|
return;
|
|
|
|
}
|
2021-04-30 19:38:06 +02:00
|
|
|
let debug_str = self.with_ignore(debug_str_gen);
|
2017-08-30 11:53:57 -07:00
|
|
|
dep_node_debug.borrow_mut().insert(dep_node, debug_str);
|
2017-06-12 17:00:55 +02:00
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn dep_node_debug_str(&self, dep_node: DepNode) -> Option<String> {
|
2018-04-03 08:45:06 +09:00
|
|
|
self.data.as_ref()?.dep_node_debug.borrow().get(&dep_node).cloned()
|
2017-06-12 17:00:55 +02:00
|
|
|
}
|
2017-09-22 13:00:42 +02:00
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
fn node_color(&self, dep_node: &DepNode) -> Option<DepNodeColor> {
|
2018-02-13 17:40:46 +01:00
|
|
|
if let Some(ref data) = self.data {
|
2023-02-24 00:48:50 +01:00
|
|
|
return data.node_color(dep_node);
|
2018-02-13 17:40:46 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
None
|
2017-09-25 13:51:49 +02:00
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn try_mark_green<Qcx: QueryContext<Deps = D>>(
|
2023-02-24 00:48:50 +01:00
|
|
|
&self,
|
|
|
|
qcx: Qcx,
|
2023-09-15 15:39:11 +02:00
|
|
|
dep_node: &DepNode,
|
2023-02-24 00:48:50 +01:00
|
|
|
) -> Option<(SerializedDepNodeIndex, DepNodeIndex)> {
|
|
|
|
self.data().and_then(|data| data.try_mark_green(qcx, dep_node))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
impl<D: Deps> DepGraphData<D> {
|
2021-05-30 10:48:48 +02:00
|
|
|
/// Try to mark a node index for the node dep_node.
|
|
|
|
///
|
2018-12-22 18:03:40 +01:00
|
|
|
/// A node will have an index, when it's already been marked green, or when we can mark it
|
|
|
|
/// green. This function will mark the current task as a reader of the specified node, when
|
|
|
|
/// a node index can be found for that node.
|
2023-11-15 16:15:38 +11:00
|
|
|
pub(crate) fn try_mark_green<Qcx: QueryContext<Deps = D>>(
|
2018-12-22 18:03:40 +01:00
|
|
|
&self,
|
2022-11-05 21:04:19 +01:00
|
|
|
qcx: Qcx,
|
2023-09-15 15:39:11 +02:00
|
|
|
dep_node: &DepNode,
|
2018-12-22 18:03:40 +01:00
|
|
|
) -> Option<(SerializedDepNodeIndex, DepNodeIndex)> {
|
2022-11-05 20:58:10 +01:00
|
|
|
debug_assert!(!qcx.dep_context().is_eval_always(dep_node.kind));
|
2017-09-25 13:51:49 +02:00
|
|
|
|
2018-12-22 18:03:40 +01:00
|
|
|
// Return None if the dep node didn't exist in the previous session
|
2023-02-24 00:48:50 +01:00
|
|
|
let prev_index = self.previous.node_to_index_opt(dep_node)?;
|
2018-12-22 18:03:40 +01:00
|
|
|
|
2023-02-24 00:48:50 +01:00
|
|
|
match self.colors.get(prev_index) {
|
2023-02-27 05:56:48 +01:00
|
|
|
Some(DepNodeColor::Green(dep_node_index)) => Some((prev_index, dep_node_index)),
|
|
|
|
Some(DepNodeColor::Red) => None,
|
|
|
|
None => {
|
|
|
|
// This DepNode and the corresponding query invocation existed
|
|
|
|
// in the previous compilation session too, so we can try to
|
|
|
|
// mark it as green by recursively marking all of its
|
|
|
|
// dependencies green.
|
2023-11-21 20:07:32 +01:00
|
|
|
self.try_mark_previous_green(qcx, prev_index, dep_node, None)
|
2023-02-27 05:56:48 +01:00
|
|
|
.map(|dep_node_index| (prev_index, dep_node_index))
|
|
|
|
}
|
2018-12-22 18:03:40 +01:00
|
|
|
}
|
|
|
|
}
|
2017-09-25 13:51:49 +02:00
|
|
|
|
2023-02-27 05:56:48 +01:00
|
|
|
#[instrument(skip(self, qcx, parent_dep_node_index, frame), level = "debug")]
|
2023-09-15 15:39:11 +02:00
|
|
|
fn try_mark_parent_green<Qcx: QueryContext<Deps = D>>(
|
2020-11-01 16:55:13 +01:00
|
|
|
&self,
|
2022-11-05 21:04:19 +01:00
|
|
|
qcx: Qcx,
|
2020-11-01 16:55:13 +01:00
|
|
|
parent_dep_node_index: SerializedDepNodeIndex,
|
2023-02-27 05:56:48 +01:00
|
|
|
frame: Option<&MarkFrame<'_>>,
|
2020-11-01 16:55:13 +01:00
|
|
|
) -> Option<()> {
|
2023-02-24 00:48:50 +01:00
|
|
|
let dep_dep_node_color = self.colors.get(parent_dep_node_index);
|
|
|
|
let dep_dep_node = &self.previous.index_to_node(parent_dep_node_index);
|
2020-11-01 16:55:13 +01:00
|
|
|
|
|
|
|
match dep_dep_node_color {
|
|
|
|
Some(DepNodeColor::Green(_)) => {
|
|
|
|
// This dependency has been marked as green before, we are
|
|
|
|
// still fine and can continue with checking the other
|
|
|
|
// dependencies.
|
2022-11-05 20:40:42 +01:00
|
|
|
debug!("dependency {dep_dep_node:?} was immediately green");
|
2020-11-01 16:55:13 +01:00
|
|
|
return Some(());
|
|
|
|
}
|
|
|
|
Some(DepNodeColor::Red) => {
|
|
|
|
// We found a dependency the value of which has changed
|
|
|
|
// compared to the previous compilation session. We cannot
|
|
|
|
// mark the DepNode as green and also don't need to bother
|
|
|
|
// with checking any of the other dependencies.
|
2022-11-05 20:40:42 +01:00
|
|
|
debug!("dependency {dep_dep_node:?} was immediately red");
|
2020-11-01 16:55:13 +01:00
|
|
|
return None;
|
|
|
|
}
|
|
|
|
None => {}
|
|
|
|
}
|
|
|
|
|
|
|
|
// We don't know the state of this dependency. If it isn't
|
|
|
|
// an eval_always node, let's try to mark it green recursively.
|
2022-11-05 20:58:10 +01:00
|
|
|
if !qcx.dep_context().is_eval_always(dep_dep_node.kind) {
|
2020-11-01 16:55:13 +01:00
|
|
|
debug!(
|
2022-11-05 20:40:42 +01:00
|
|
|
"state of dependency {:?} ({}) is unknown, trying to mark it green",
|
|
|
|
dep_dep_node, dep_dep_node.hash,
|
2020-11-01 16:55:13 +01:00
|
|
|
);
|
|
|
|
|
2023-02-27 05:56:48 +01:00
|
|
|
let node_index =
|
|
|
|
self.try_mark_previous_green(qcx, parent_dep_node_index, dep_dep_node, frame);
|
2022-11-05 20:40:42 +01:00
|
|
|
|
2020-11-01 16:55:13 +01:00
|
|
|
if node_index.is_some() {
|
2022-11-05 20:40:42 +01:00
|
|
|
debug!("managed to MARK dependency {dep_dep_node:?} as green",);
|
2020-11-01 16:55:13 +01:00
|
|
|
return Some(());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// We failed to mark it green, so we try to force the query.
|
2022-11-05 20:40:42 +01:00
|
|
|
debug!("trying to force dependency {dep_dep_node:?}");
|
2023-03-09 08:35:01 +01:00
|
|
|
if !qcx.dep_context().try_force_from_dep_node(*dep_dep_node, frame) {
|
2020-11-01 16:55:13 +01:00
|
|
|
// The DepNode could not be forced.
|
2022-11-05 20:40:42 +01:00
|
|
|
debug!("dependency {dep_dep_node:?} could not be forced");
|
2020-11-01 16:55:13 +01:00
|
|
|
return None;
|
|
|
|
}
|
|
|
|
|
2023-02-24 00:48:50 +01:00
|
|
|
let dep_dep_node_color = self.colors.get(parent_dep_node_index);
|
2020-11-01 16:55:13 +01:00
|
|
|
|
|
|
|
match dep_dep_node_color {
|
|
|
|
Some(DepNodeColor::Green(_)) => {
|
2022-11-05 20:40:42 +01:00
|
|
|
debug!("managed to FORCE dependency {dep_dep_node:?} to green");
|
2020-11-01 16:55:13 +01:00
|
|
|
return Some(());
|
|
|
|
}
|
|
|
|
Some(DepNodeColor::Red) => {
|
2022-11-05 20:40:42 +01:00
|
|
|
debug!("dependency {dep_dep_node:?} was red after forcing",);
|
2020-11-01 16:55:13 +01:00
|
|
|
return None;
|
|
|
|
}
|
|
|
|
None => {}
|
|
|
|
}
|
|
|
|
|
2024-02-19 09:36:08 +11:00
|
|
|
if let None = qcx.dep_context().sess().dcx().has_errors_or_delayed_bugs() {
|
2020-11-01 16:55:13 +01:00
|
|
|
panic!("try_mark_previous_green() - Forcing the DepNode should have set its color")
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the query we just forced has resulted in
|
|
|
|
// some kind of compilation error, we cannot rely on
|
|
|
|
// the dep-node color having been properly updated.
|
|
|
|
// This means that the query system has reached an
|
|
|
|
// invalid state. We let the compiler continue (by
|
|
|
|
// returning `None`) so it can emit error messages
|
|
|
|
// and wind down, but rely on the fact that this
|
|
|
|
// invalid state will not be persisted to the
|
|
|
|
// incremental compilation cache because of
|
|
|
|
// compilation errors being present.
|
2022-11-05 20:40:42 +01:00
|
|
|
debug!("dependency {dep_dep_node:?} resulted in compilation error",);
|
2020-11-01 16:55:13 +01:00
|
|
|
return None;
|
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Try to mark a dep-node which existed in the previous compilation session as green.
|
2023-02-27 05:56:48 +01:00
|
|
|
#[instrument(skip(self, qcx, prev_dep_node_index, frame), level = "debug")]
|
2023-09-15 15:39:11 +02:00
|
|
|
fn try_mark_previous_green<Qcx: QueryContext<Deps = D>>(
|
2018-12-22 18:03:40 +01:00
|
|
|
&self,
|
2022-11-05 21:04:19 +01:00
|
|
|
qcx: Qcx,
|
2018-12-22 18:03:40 +01:00
|
|
|
prev_dep_node_index: SerializedDepNodeIndex,
|
2023-09-15 15:39:11 +02:00
|
|
|
dep_node: &DepNode,
|
2023-02-27 05:56:48 +01:00
|
|
|
frame: Option<&MarkFrame<'_>>,
|
2018-12-22 18:03:40 +01:00
|
|
|
) -> Option<DepNodeIndex> {
|
2023-02-27 05:56:48 +01:00
|
|
|
let frame = MarkFrame { index: prev_dep_node_index, parent: frame };
|
|
|
|
|
2019-03-10 10:11:15 +01:00
|
|
|
// We never try to mark eval_always nodes as green
|
2022-11-05 20:58:10 +01:00
|
|
|
debug_assert!(!qcx.dep_context().is_eval_always(dep_node.kind));
|
2018-12-22 18:03:40 +01:00
|
|
|
|
2023-02-24 00:48:50 +01:00
|
|
|
debug_assert_eq!(self.previous.index_to_node(prev_dep_node_index), *dep_node);
|
2018-12-22 18:03:40 +01:00
|
|
|
|
2023-02-24 00:48:50 +01:00
|
|
|
let prev_deps = self.previous.edge_targets_from(prev_dep_node_index);
|
2018-02-13 17:40:46 +01:00
|
|
|
|
2023-04-29 21:51:32 -04:00
|
|
|
for dep_dep_node_index in prev_deps {
|
2024-02-02 22:45:25 +00:00
|
|
|
self.try_mark_parent_green(qcx, dep_dep_node_index, Some(&frame))?;
|
2017-09-25 13:51:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// If we got here without hitting a `return` that means that all
|
|
|
|
// dependencies of this DepNode could be marked as green. Therefore we
|
2018-04-06 14:52:36 +02:00
|
|
|
// can also mark this DepNode as green.
|
2017-09-25 13:51:49 +02:00
|
|
|
|
2018-04-06 14:52:36 +02:00
|
|
|
// There may be multiple threads trying to mark the same dep node green concurrently
|
|
|
|
|
2021-03-18 19:26:08 +01:00
|
|
|
// We allocating an entry for the node in the current dependency graph and
|
|
|
|
// adding all the appropriate edges imported from the previous graph
|
2024-03-06 04:17:17 +01:00
|
|
|
let dep_node_index =
|
|
|
|
self.current.promote_node_and_deps_to_current(&self.previous, prev_dep_node_index);
|
2017-09-25 13:51:49 +02:00
|
|
|
|
2017-10-19 14:32:39 +02:00
|
|
|
// ... emitting any stored diagnostic ...
|
2018-04-06 14:52:36 +02:00
|
|
|
|
2019-04-19 18:49:15 +02:00
|
|
|
// FIXME: Store the fact that a node has diagnostics in a bit in the dep graph somewhere
|
|
|
|
// Maybe store a list on disk and encode this fact in the DepNodeState
|
2022-11-05 20:58:10 +01:00
|
|
|
let side_effects = qcx.load_side_effects(prev_dep_node_index);
|
2019-04-19 18:49:15 +02:00
|
|
|
|
2023-02-16 19:29:11 +01:00
|
|
|
if side_effects.maybe_any() {
|
2023-03-09 07:30:15 +01:00
|
|
|
qcx.dep_context().dep_graph().with_query_deserialization(|| {
|
2023-02-24 00:48:50 +01:00
|
|
|
self.emit_side_effects(qcx, dep_node_index, side_effects)
|
2021-04-30 19:38:06 +02:00
|
|
|
});
|
2017-10-19 14:32:39 +02:00
|
|
|
}
|
|
|
|
|
2017-09-25 13:51:49 +02:00
|
|
|
// ... and finally storing a "Green" entry in the color map.
|
2018-04-06 14:52:36 +02:00
|
|
|
// Multiple threads can all write the same color here
|
2023-02-24 00:48:50 +01:00
|
|
|
self.colors.insert(prev_dep_node_index, DepNodeColor::Green(dep_node_index));
|
2018-02-13 17:40:46 +01:00
|
|
|
|
2022-11-05 20:40:42 +01:00
|
|
|
debug!("successfully marked {dep_node:?} as green");
|
2017-09-28 16:19:10 +02:00
|
|
|
Some(dep_node_index)
|
2017-09-25 13:51:49 +02:00
|
|
|
}
|
|
|
|
|
2019-04-19 18:49:15 +02:00
|
|
|
/// Atomically emits some loaded diagnostics.
|
|
|
|
/// This may be called concurrently on multiple threads for the same dep node.
|
2018-12-22 18:59:03 +01:00
|
|
|
#[cold]
|
|
|
|
#[inline(never)]
|
2023-09-15 15:39:11 +02:00
|
|
|
fn emit_side_effects<Qcx: QueryContext<Deps = D>>(
|
2018-12-22 18:59:03 +01:00
|
|
|
&self,
|
2022-11-05 21:04:19 +01:00
|
|
|
qcx: Qcx,
|
2018-12-22 18:59:03 +01:00
|
|
|
dep_node_index: DepNodeIndex,
|
2021-07-23 16:40:26 -05:00
|
|
|
side_effects: QuerySideEffects,
|
2018-12-22 18:59:03 +01:00
|
|
|
) {
|
2023-02-24 00:48:50 +01:00
|
|
|
let mut processed = self.processed_side_effects.lock();
|
2019-04-19 18:49:15 +02:00
|
|
|
|
2021-07-23 16:40:26 -05:00
|
|
|
if processed.insert(dep_node_index) {
|
2019-04-19 18:49:15 +02:00
|
|
|
// We were the first to insert the node in the set so this thread
|
2021-07-23 16:40:26 -05:00
|
|
|
// must process side effects
|
2018-12-22 18:59:03 +01:00
|
|
|
|
|
|
|
// Promote the previous diagnostics to the current session.
|
2022-11-05 20:58:10 +01:00
|
|
|
qcx.store_side_effects(dep_node_index, side_effects.clone());
|
2019-04-19 18:49:15 +02:00
|
|
|
|
2023-12-18 11:15:13 +11:00
|
|
|
let dcx = qcx.dep_context().sess().dcx();
|
2018-12-22 18:59:03 +01:00
|
|
|
|
2023-12-14 14:13:35 +11:00
|
|
|
for diagnostic in side_effects.diagnostics {
|
2023-12-18 11:15:13 +11:00
|
|
|
dcx.emit_diagnostic(diagnostic);
|
2018-12-22 18:59:03 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-02-24 00:48:50 +01:00
|
|
|
}
|
2018-12-22 18:59:03 +01:00
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
impl<D: Deps> DepGraph<D> {
|
2022-11-27 11:15:06 +00:00
|
|
|
/// Returns true if the given node has been marked as red during the
|
|
|
|
/// current compilation session. Used in various assertions
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn is_red(&self, dep_node: &DepNode) -> bool {
|
2023-09-06 10:46:54 +00:00
|
|
|
matches!(self.node_color(dep_node), Some(DepNodeColor::Red))
|
2021-03-02 22:38:49 +01:00
|
|
|
}
|
|
|
|
|
2022-11-27 11:15:06 +00:00
|
|
|
/// Returns true if the given node has been marked as green during the
|
|
|
|
/// current compilation session. Used in various assertions
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn is_green(&self, dep_node: &DepNode) -> bool {
|
2023-05-24 14:19:22 +00:00
|
|
|
self.node_color(dep_node).is_some_and(|c| c.is_green())
|
2017-09-25 13:51:49 +02:00
|
|
|
}
|
2017-09-28 11:58:45 +02:00
|
|
|
|
2022-11-27 11:15:06 +00:00
|
|
|
/// This method loads all on-disk cacheable query results into memory, so
|
|
|
|
/// they can be written out to the new cache file again. Most query results
|
|
|
|
/// will already be in memory but in the case where we marked something as
|
|
|
|
/// green but then did not need the value, that value will never have been
|
|
|
|
/// loaded from disk.
|
|
|
|
///
|
|
|
|
/// This method will only load queries that will end up in the disk cache.
|
|
|
|
/// Other queries will not be executed.
|
2023-09-15 15:39:11 +02:00
|
|
|
pub fn exec_cache_promotions<Tcx: DepContext>(&self, tcx: Tcx) {
|
2020-03-18 10:25:22 +01:00
|
|
|
let _prof_timer = tcx.profiler().generic_activity("incr_comp_query_cache_promotion");
|
2019-10-08 14:05:41 +02:00
|
|
|
|
2019-04-05 13:11:44 +02:00
|
|
|
let data = self.data.as_ref().unwrap();
|
|
|
|
for prev_index in data.colors.values.indices() {
|
|
|
|
match data.colors.get(prev_index) {
|
|
|
|
Some(DepNodeColor::Green(_)) => {
|
2020-12-18 16:00:52 -08:00
|
|
|
let dep_node = data.previous.index_to_node(prev_index);
|
2021-10-16 21:12:34 +02:00
|
|
|
tcx.try_load_from_on_disk_cache(dep_node);
|
2017-11-20 13:11:03 +01:00
|
|
|
}
|
2019-04-05 13:11:44 +02:00
|
|
|
None | Some(DepNodeColor::Red) => {
|
|
|
|
// We can skip red nodes because a node can only be marked
|
|
|
|
// as red if the query result was recomputed and thus is
|
|
|
|
// already in memory.
|
|
|
|
}
|
|
|
|
}
|
2017-11-20 13:11:03 +01:00
|
|
|
}
|
|
|
|
}
|
2020-12-18 16:00:52 -08:00
|
|
|
|
2021-01-12 13:04:51 -08:00
|
|
|
pub fn print_incremental_info(&self) {
|
2021-03-02 22:38:49 +01:00
|
|
|
if let Some(data) = &self.data {
|
2024-03-06 04:40:39 +01:00
|
|
|
data.current.encoder.print_incremental_info(
|
2024-01-02 22:36:01 +03:00
|
|
|
data.current.total_read_count.load(Ordering::Relaxed),
|
|
|
|
data.current.total_duplicate_read_count.load(Ordering::Relaxed),
|
2021-03-02 22:38:49 +01:00
|
|
|
)
|
2021-01-12 13:04:51 -08:00
|
|
|
}
|
2021-03-02 22:38:49 +01:00
|
|
|
}
|
2021-01-12 13:04:51 -08:00
|
|
|
|
2024-03-06 04:17:17 +01:00
|
|
|
pub fn finish_encoding(&self) -> FileEncodeResult {
|
2024-03-06 04:40:39 +01:00
|
|
|
if let Some(data) = &self.data { data.current.encoder.finish() } else { Ok(0) }
|
2021-01-12 13:04:51 -08:00
|
|
|
}
|
|
|
|
|
2021-05-12 08:49:49 +02:00
|
|
|
pub(crate) fn next_virtual_depnode_index(&self) -> DepNodeIndex {
|
2023-03-19 17:39:27 +01:00
|
|
|
debug_assert!(self.data.is_none());
|
2024-01-02 22:36:01 +03:00
|
|
|
let index = self.virtual_dep_node_index.fetch_add(1, Ordering::Relaxed);
|
2019-12-13 14:44:08 +01:00
|
|
|
DepNodeIndex::from_u32(index)
|
|
|
|
}
|
2016-07-21 12:33:23 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/// A "work product" is an intermediate result that we save into the
|
|
|
|
/// incremental directory for later re-use. The primary example are
|
|
|
|
/// the object files that we save for each partition at code
|
|
|
|
/// generation time.
|
|
|
|
///
|
|
|
|
/// Each work product is associated with a dep-node, representing the
|
|
|
|
/// process that produced the work-product. If that dep-node is found
|
|
|
|
/// to be dirty when we load up, then we will delete the work-product
|
2016-07-22 10:39:30 -04:00
|
|
|
/// at load time. If the work-product is found to be clean, then we
|
2016-07-21 12:33:23 -04:00
|
|
|
/// will keep a record in the `previous_work_products` list.
|
|
|
|
///
|
|
|
|
/// In addition, work products have an associated hash. This hash is
|
|
|
|
/// an extra hash that can be used to decide if the work-product from
|
|
|
|
/// a previous compilation can be re-used (in addition to the dirty
|
|
|
|
/// edges check).
|
|
|
|
///
|
|
|
|
/// As the primary example, consider the object files we generate for
|
|
|
|
/// each partition. In the first run, we create partitions based on
|
|
|
|
/// the symbols that need to be compiled. For each partition P, we
|
|
|
|
/// hash the symbols in P and create a `WorkProduct` record associated
|
2018-05-08 16:10:16 +03:00
|
|
|
/// with `DepNode::CodegenUnit(P)`; the hash is the set of symbols
|
2016-07-21 12:33:23 -04:00
|
|
|
/// in P.
|
|
|
|
///
|
2018-05-08 16:10:16 +03:00
|
|
|
/// The next time we compile, if the `DepNode::CodegenUnit(P)` is
|
2016-07-21 12:33:23 -04:00
|
|
|
/// judged to be clean (which means none of the things we read to
|
|
|
|
/// generate the partition were found to be dirty), it will be loaded
|
|
|
|
/// into previous work products. We will then regenerate the set of
|
|
|
|
/// symbols in the partition P and hash them (note that new symbols
|
|
|
|
/// may be added -- for example, new monomorphizations -- even if
|
|
|
|
/// nothing in P changed!). We will compare that hash against the
|
|
|
|
/// previous hash. If it matches up, we can reuse the object file.
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Debug, Encodable, Decodable)]
|
2016-07-21 12:33:23 -04:00
|
|
|
pub struct WorkProduct {
|
2017-06-23 16:37:12 +02:00
|
|
|
pub cgu_name: String,
|
2022-07-04 14:38:42 +01:00
|
|
|
/// Saved files associated with this CGU. In each key/value pair, the value is the path to the
|
|
|
|
/// saved file and the key is some identifier for the type of file being saved.
|
|
|
|
///
|
|
|
|
/// By convention, file extensions are currently used as identifiers, i.e. the key "o" maps to
|
|
|
|
/// the object file's path, and "dwo" to the dwarf object file's path.
|
2023-05-07 21:08:47 -04:00
|
|
|
pub saved_files: UnordMap<String, String>,
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
2017-08-21 16:44:05 +02:00
|
|
|
|
2023-08-13 16:07:41 +00:00
|
|
|
pub type WorkProductMap = UnordMap<WorkProductId, WorkProduct>;
|
|
|
|
|
2020-11-30 21:07:08 -08:00
|
|
|
// Index type for `DepNodeData`'s edges.
|
|
|
|
rustc_index::newtype_index! {
|
2022-12-18 21:47:28 +01:00
|
|
|
struct EdgeIndex {}
|
2020-11-30 21:07:08 -08:00
|
|
|
}
|
|
|
|
|
2020-11-26 01:10:43 -08:00
|
|
|
/// `CurrentDepGraph` stores the dependency graph for the current session. It
|
|
|
|
/// will be populated as we run queries or tasks. We never remove nodes from the
|
|
|
|
/// graph: they are only added.
|
2019-06-13 22:42:24 +02:00
|
|
|
///
|
2021-03-18 19:26:08 +01:00
|
|
|
/// The nodes in it are identified by a `DepNodeIndex`. We avoid keeping the nodes
|
2022-11-16 20:34:16 +00:00
|
|
|
/// in memory. This is important, because these graph structures are some of the
|
2021-03-18 19:26:08 +01:00
|
|
|
/// largest in the compiler.
|
2019-06-13 22:42:24 +02:00
|
|
|
///
|
2021-03-18 19:26:08 +01:00
|
|
|
/// For this reason, we avoid storing `DepNode`s more than once as map
|
2020-11-26 01:10:43 -08:00
|
|
|
/// keys. The `new_node_to_index` map only contains nodes not in the previous
|
|
|
|
/// graph, and we map nodes in the previous graph to indices via a two-step
|
2021-05-22 11:46:54 +02:00
|
|
|
/// mapping. `SerializedDepGraph` maps from `DepNode` to `SerializedDepNodeIndex`,
|
2020-11-26 01:10:43 -08:00
|
|
|
/// and the `prev_index_to_index` vector (which is more compact and faster than
|
|
|
|
/// using a map) maps from `SerializedDepNodeIndex` to `DepNodeIndex`.
|
2019-06-13 22:42:24 +02:00
|
|
|
///
|
2020-11-26 01:10:43 -08:00
|
|
|
/// This struct uses three locks internally. The `data`, `new_node_to_index`,
|
|
|
|
/// and `prev_index_to_index` fields are locked separately. Operations that take
|
|
|
|
/// a `DepNodeIndex` typically just access the `data` field.
|
2019-06-13 22:42:24 +02:00
|
|
|
///
|
2020-11-26 01:10:43 -08:00
|
|
|
/// We only need to manipulate at most two locks simultaneously:
|
2020-11-28 17:42:41 -08:00
|
|
|
/// `new_node_to_index` and `data`, or `prev_index_to_index` and `data`. When
|
|
|
|
/// manipulating both, we acquire `new_node_to_index` or `prev_index_to_index`
|
|
|
|
/// first, and `data` second.
|
2023-09-15 15:39:11 +02:00
|
|
|
pub(super) struct CurrentDepGraph<D: Deps> {
|
2024-03-06 04:40:39 +01:00
|
|
|
encoder: GraphEncoder<D>,
|
2023-09-15 15:39:11 +02:00
|
|
|
new_node_to_index: Sharded<FxHashMap<DepNode, DepNodeIndex>>,
|
2020-11-26 01:10:43 -08:00
|
|
|
prev_index_to_index: Lock<IndexVec<SerializedDepNodeIndex, Option<DepNodeIndex>>>,
|
2019-06-13 22:42:24 +02:00
|
|
|
|
2022-05-08 14:42:12 +02:00
|
|
|
/// This is used to verify that fingerprints do not change between the creation of a node
|
|
|
|
/// and its recomputation.
|
|
|
|
#[cfg(debug_assertions)]
|
2023-03-12 10:10:12 +00:00
|
|
|
fingerprints: Lock<IndexVec<DepNodeIndex, Option<Fingerprint>>>,
|
2022-05-08 14:42:12 +02:00
|
|
|
|
2019-06-13 22:42:24 +02:00
|
|
|
/// Used to trap when a specific edge is added to the graph.
|
|
|
|
/// This is used for debug purposes and is only active with `debug_assertions`.
|
2021-03-02 22:38:49 +01:00
|
|
|
#[cfg(debug_assertions)]
|
2023-09-15 15:39:11 +02:00
|
|
|
forbidden_edge: Option<EdgeFilter>,
|
2017-10-04 12:35:56 +02:00
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Anonymous `DepNode`s are nodes whose IDs we compute from the list of
|
|
|
|
/// their edges. This has the beneficial side-effect that multiple anonymous
|
|
|
|
/// nodes can be coalesced into one without changing the semantics of the
|
|
|
|
/// dependency graph. However, the merging of nodes can lead to a subtle
|
|
|
|
/// problem during red-green marking: The color of an anonymous node from
|
|
|
|
/// the current session might "shadow" the color of the node with the same
|
|
|
|
/// ID from the previous session. In order to side-step this problem, we make
|
|
|
|
/// sure that anonymous `NodeId`s allocated in different sessions don't overlap.
|
|
|
|
/// This is implemented by mixing a session-key into the ID fingerprint of
|
|
|
|
/// each anon node. The session-key is just a random number generated when
|
|
|
|
/// the `DepGraph` is created.
|
2017-10-04 12:35:56 +02:00
|
|
|
anon_id_seed: Fingerprint,
|
2017-11-11 14:32:01 -05:00
|
|
|
|
2019-06-13 22:42:24 +02:00
|
|
|
/// These are simple counters that are for profiling and
|
|
|
|
/// debugging and only active with `debug_assertions`.
|
2019-12-17 16:28:33 -05:00
|
|
|
total_read_count: AtomicU64,
|
|
|
|
total_duplicate_read_count: AtomicU64,
|
2017-08-21 16:44:05 +02:00
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
impl<D: Deps> CurrentDepGraph<D> {
|
2021-03-02 22:38:49 +01:00
|
|
|
fn new(
|
2021-10-07 19:20:41 +02:00
|
|
|
profiler: &SelfProfilerRef,
|
2021-03-02 22:38:49 +01:00
|
|
|
prev_graph_node_count: usize,
|
|
|
|
encoder: FileEncoder,
|
|
|
|
record_graph: bool,
|
|
|
|
record_stats: bool,
|
2023-09-24 01:34:45 +02:00
|
|
|
previous: Arc<SerializedDepGraph>,
|
2023-09-15 15:39:11 +02:00
|
|
|
) -> Self {
|
2017-09-28 11:58:45 +02:00
|
|
|
use std::time::{SystemTime, UNIX_EPOCH};
|
|
|
|
|
|
|
|
let duration = SystemTime::now().duration_since(UNIX_EPOCH).unwrap();
|
2024-11-02 15:08:53 +03:00
|
|
|
let nanos = duration.as_nanos();
|
2017-09-28 11:58:45 +02:00
|
|
|
let mut stable_hasher = StableHasher::new();
|
|
|
|
nanos.hash(&mut stable_hasher);
|
2022-04-27 19:18:26 +02:00
|
|
|
let anon_id_seed = stable_hasher.finish();
|
2017-09-28 11:58:45 +02:00
|
|
|
|
2021-03-02 22:38:49 +01:00
|
|
|
#[cfg(debug_assertions)]
|
|
|
|
let forbidden_edge = match env::var("RUST_FORBID_DEP_GRAPH_EDGE") {
|
|
|
|
Ok(s) => match EdgeFilter::new(&s) {
|
|
|
|
Ok(f) => Some(f),
|
|
|
|
Err(err) => panic!("RUST_FORBID_DEP_GRAPH_EDGE invalid: {}", err),
|
|
|
|
},
|
|
|
|
Err(_) => None,
|
2017-09-28 16:19:10 +02:00
|
|
|
};
|
|
|
|
|
2021-03-02 22:38:49 +01:00
|
|
|
let new_node_count_estimate = 102 * prev_graph_node_count / 100 + 200;
|
|
|
|
|
2017-08-21 16:44:05 +02:00
|
|
|
CurrentDepGraph {
|
2024-03-06 04:40:39 +01:00
|
|
|
encoder: GraphEncoder::new(
|
2021-03-02 22:38:49 +01:00
|
|
|
encoder,
|
|
|
|
prev_graph_node_count,
|
|
|
|
record_graph,
|
|
|
|
record_stats,
|
2024-03-06 04:17:17 +01:00
|
|
|
profiler,
|
2023-09-24 01:34:45 +02:00
|
|
|
previous,
|
2024-03-06 04:40:39 +01:00
|
|
|
),
|
2020-11-26 01:10:43 -08:00
|
|
|
new_node_to_index: Sharded::new(|| {
|
2019-06-13 23:14:44 +02:00
|
|
|
FxHashMap::with_capacity_and_hasher(
|
2023-08-16 10:00:25 +02:00
|
|
|
new_node_count_estimate / sharded::shards(),
|
2018-12-22 12:40:23 +01:00
|
|
|
Default::default(),
|
2019-06-13 22:42:24 +02:00
|
|
|
)
|
|
|
|
}),
|
2020-11-26 01:10:43 -08:00
|
|
|
prev_index_to_index: Lock::new(IndexVec::from_elem_n(None, prev_graph_node_count)),
|
2022-04-27 19:18:26 +02:00
|
|
|
anon_id_seed,
|
2021-03-02 22:38:49 +01:00
|
|
|
#[cfg(debug_assertions)]
|
2017-09-28 16:19:10 +02:00
|
|
|
forbidden_edge,
|
2022-05-08 14:42:12 +02:00
|
|
|
#[cfg(debug_assertions)]
|
2023-03-12 10:10:12 +00:00
|
|
|
fingerprints: Lock::new(IndexVec::from_elem_n(None, new_node_count_estimate)),
|
2019-12-17 16:28:33 -05:00
|
|
|
total_read_count: AtomicU64::new(0),
|
|
|
|
total_duplicate_read_count: AtomicU64::new(0),
|
2017-08-21 16:44:05 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-18 19:26:08 +01:00
|
|
|
#[cfg(debug_assertions)]
|
2023-09-15 15:39:11 +02:00
|
|
|
fn record_edge(&self, dep_node_index: DepNodeIndex, key: DepNode, fingerprint: Fingerprint) {
|
2021-03-18 19:26:08 +01:00
|
|
|
if let Some(forbidden_edge) = &self.forbidden_edge {
|
|
|
|
forbidden_edge.index_to_node.lock().insert(dep_node_index, key);
|
|
|
|
}
|
2023-03-12 10:10:12 +00:00
|
|
|
let previous = *self.fingerprints.lock().get_or_insert_with(dep_node_index, || fingerprint);
|
|
|
|
assert_eq!(previous, fingerprint, "Unstable fingerprints for {:?}", key);
|
2021-03-18 19:26:08 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Writes the node to the current dep-graph and allocates a `DepNodeIndex` for it.
|
|
|
|
/// Assumes that this is a node that has no equivalent in the previous dep-graph.
|
2023-02-23 01:14:48 +01:00
|
|
|
#[inline(always)]
|
2020-12-15 22:57:21 -08:00
|
|
|
fn intern_new_node(
|
2019-06-13 22:42:24 +02:00
|
|
|
&self,
|
2023-09-15 15:39:11 +02:00
|
|
|
key: DepNode,
|
2020-03-07 22:46:15 +01:00
|
|
|
edges: EdgesVec,
|
2021-03-02 22:38:49 +01:00
|
|
|
current_fingerprint: Fingerprint,
|
2018-12-23 05:54:10 +01:00
|
|
|
) -> DepNodeIndex {
|
2023-08-16 13:50:31 +02:00
|
|
|
let dep_node_index = match self.new_node_to_index.lock_shard_by_value(&key).entry(key) {
|
2020-11-26 01:10:43 -08:00
|
|
|
Entry::Occupied(entry) => *entry.get(),
|
|
|
|
Entry::Vacant(entry) => {
|
2024-03-06 04:40:39 +01:00
|
|
|
let dep_node_index = self.encoder.send(key, current_fingerprint, edges);
|
2020-11-26 01:10:43 -08:00
|
|
|
entry.insert(dep_node_index);
|
|
|
|
dep_node_index
|
|
|
|
}
|
2022-05-08 14:42:12 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
#[cfg(debug_assertions)]
|
|
|
|
self.record_edge(dep_node_index, key, current_fingerprint);
|
|
|
|
|
|
|
|
dep_node_index
|
2018-12-23 05:54:10 +01:00
|
|
|
}
|
|
|
|
|
2021-03-02 22:38:49 +01:00
|
|
|
fn intern_node(
|
2019-06-13 22:42:24 +02:00
|
|
|
&self,
|
2023-09-15 15:39:11 +02:00
|
|
|
prev_graph: &SerializedDepGraph,
|
|
|
|
key: DepNode,
|
2020-03-07 22:46:15 +01:00
|
|
|
edges: EdgesVec,
|
2021-03-18 19:26:08 +01:00
|
|
|
fingerprint: Option<Fingerprint>,
|
2021-03-02 22:38:49 +01:00
|
|
|
) -> (DepNodeIndex, Option<(SerializedDepNodeIndex, DepNodeColor)>) {
|
|
|
|
if let Some(prev_index) = prev_graph.node_to_index_opt(&key) {
|
2023-10-08 12:21:58 +00:00
|
|
|
let get_dep_node_index = |fingerprint| {
|
2023-04-27 15:40:17 +10:00
|
|
|
let mut prev_index_to_index = self.prev_index_to_index.lock();
|
|
|
|
|
|
|
|
let dep_node_index = match prev_index_to_index[prev_index] {
|
|
|
|
Some(dep_node_index) => dep_node_index,
|
|
|
|
None => {
|
2024-03-06 04:40:39 +01:00
|
|
|
let dep_node_index = self.encoder.send(key, fingerprint, edges);
|
2023-04-27 15:40:17 +10:00
|
|
|
prev_index_to_index[prev_index] = Some(dep_node_index);
|
|
|
|
dep_node_index
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
#[cfg(debug_assertions)]
|
|
|
|
self.record_edge(dep_node_index, key, fingerprint);
|
|
|
|
|
|
|
|
dep_node_index
|
|
|
|
};
|
|
|
|
|
2021-03-02 22:38:49 +01:00
|
|
|
// Determine the color and index of the new `DepNode`.
|
2021-03-18 19:26:08 +01:00
|
|
|
if let Some(fingerprint) = fingerprint {
|
|
|
|
if fingerprint == prev_graph.fingerprint_by_index(prev_index) {
|
|
|
|
// This is a green node: it existed in the previous compilation,
|
2021-03-02 22:38:49 +01:00
|
|
|
// its query was re-executed, and it has the same result as before.
|
2023-10-08 12:21:58 +00:00
|
|
|
let dep_node_index = get_dep_node_index(fingerprint);
|
2021-03-02 22:38:49 +01:00
|
|
|
(dep_node_index, Some((prev_index, DepNodeColor::Green(dep_node_index))))
|
|
|
|
} else {
|
|
|
|
// This is a red node: it existed in the previous compilation, its query
|
|
|
|
// was re-executed, but it has a different result from before.
|
2023-10-08 12:21:58 +00:00
|
|
|
let dep_node_index = get_dep_node_index(fingerprint);
|
2021-03-02 22:38:49 +01:00
|
|
|
(dep_node_index, Some((prev_index, DepNodeColor::Red)))
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// This is a red node, effectively: it existed in the previous compilation
|
|
|
|
// session, its query was re-executed, but it doesn't compute a result hash
|
|
|
|
// (i.e. it represents a `no_hash` query), so we have no way of determining
|
|
|
|
// whether or not the result was the same as before.
|
2023-10-08 12:21:58 +00:00
|
|
|
let dep_node_index = get_dep_node_index(Fingerprint::ZERO);
|
2021-03-02 22:38:49 +01:00
|
|
|
(dep_node_index, Some((prev_index, DepNodeColor::Red)))
|
2020-11-28 17:42:41 -08:00
|
|
|
}
|
2021-03-02 22:38:49 +01:00
|
|
|
} else {
|
2021-03-18 19:26:08 +01:00
|
|
|
let fingerprint = fingerprint.unwrap_or(Fingerprint::ZERO);
|
2021-03-02 22:38:49 +01:00
|
|
|
|
|
|
|
// This is a new node: it didn't exist in the previous compilation session.
|
2024-03-06 04:17:17 +01:00
|
|
|
let dep_node_index = self.intern_new_node(key, edges, fingerprint);
|
2021-03-02 22:38:49 +01:00
|
|
|
|
|
|
|
(dep_node_index, None)
|
2020-11-28 17:42:41 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-18 19:26:08 +01:00
|
|
|
fn promote_node_and_deps_to_current(
|
2020-11-28 17:42:41 -08:00
|
|
|
&self,
|
2023-09-15 15:39:11 +02:00
|
|
|
prev_graph: &SerializedDepGraph,
|
2020-11-28 17:42:41 -08:00
|
|
|
prev_index: SerializedDepNodeIndex,
|
|
|
|
) -> DepNodeIndex {
|
|
|
|
self.debug_assert_not_in_new_nodes(prev_graph, prev_index);
|
|
|
|
|
|
|
|
let mut prev_index_to_index = self.prev_index_to_index.lock();
|
|
|
|
|
|
|
|
match prev_index_to_index[prev_index] {
|
|
|
|
Some(dep_node_index) => dep_node_index,
|
|
|
|
None => {
|
2024-03-23 20:23:25 +01:00
|
|
|
let dep_node_index = self.encoder.send_promoted(prev_index, &*prev_index_to_index);
|
2020-11-26 01:10:43 -08:00
|
|
|
prev_index_to_index[prev_index] = Some(dep_node_index);
|
2021-03-02 22:38:49 +01:00
|
|
|
#[cfg(debug_assertions)]
|
2023-09-24 01:34:45 +02:00
|
|
|
self.record_edge(
|
|
|
|
dep_node_index,
|
|
|
|
prev_graph.index_to_node(prev_index),
|
|
|
|
prev_graph.fingerprint_by_index(prev_index),
|
|
|
|
);
|
2020-11-26 01:10:43 -08:00
|
|
|
dep_node_index
|
2018-12-25 04:36:17 +01:00
|
|
|
}
|
2020-11-26 01:10:43 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[inline]
|
|
|
|
fn debug_assert_not_in_new_nodes(
|
|
|
|
&self,
|
2023-09-15 15:39:11 +02:00
|
|
|
prev_graph: &SerializedDepGraph,
|
2020-11-26 01:10:43 -08:00
|
|
|
prev_index: SerializedDepNodeIndex,
|
|
|
|
) {
|
|
|
|
let node = &prev_graph.index_to_node(prev_index);
|
|
|
|
debug_assert!(
|
2023-08-16 13:50:31 +02:00
|
|
|
!self.new_node_to_index.lock_shard_by_value(node).contains_key(node),
|
2020-11-26 01:10:43 -08:00
|
|
|
"node from previous graph present in new node collection"
|
|
|
|
);
|
2018-12-25 04:36:17 +01:00
|
|
|
}
|
2018-04-25 11:55:12 +02:00
|
|
|
}
|
|
|
|
|
2022-01-08 18:22:06 -05:00
|
|
|
#[derive(Debug, Clone, Copy)]
|
2023-09-15 15:39:11 +02:00
|
|
|
pub enum TaskDepsRef<'a> {
|
2022-01-08 18:22:06 -05:00
|
|
|
/// New dependencies can be added to the
|
|
|
|
/// `TaskDeps`. This is used when executing a 'normal' query
|
|
|
|
/// (no `eval_always` modifier)
|
2023-09-15 15:39:11 +02:00
|
|
|
Allow(&'a Lock<TaskDeps>),
|
2023-04-04 14:38:46 +02:00
|
|
|
/// This is used when executing an `eval_always` query. We don't
|
2022-01-08 18:22:06 -05:00
|
|
|
/// need to track dependencies for a query that's always
|
2023-04-04 14:38:46 +02:00
|
|
|
/// re-executed -- but we need to know that this is an `eval_always`
|
|
|
|
/// query in order to emit dependencies to `DepNodeIndex::FOREVER_RED_NODE`
|
|
|
|
/// when directly feeding other queries.
|
|
|
|
EvalAlways,
|
|
|
|
/// New dependencies are ignored. This is also used for `dep_graph.with_ignore`.
|
2022-01-08 18:22:06 -05:00
|
|
|
Ignore,
|
|
|
|
/// Any attempt to add new dependencies will cause a panic.
|
|
|
|
/// This is used when decoding a query result from disk,
|
|
|
|
/// to ensure that the decoding process doesn't itself
|
|
|
|
/// require the execution of any queries.
|
|
|
|
Forbid,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
2023-09-15 15:39:11 +02:00
|
|
|
pub struct TaskDeps {
|
2018-12-25 04:36:17 +01:00
|
|
|
#[cfg(debug_assertions)]
|
2023-09-15 15:39:11 +02:00
|
|
|
node: Option<DepNode>,
|
2020-03-07 22:46:15 +01:00
|
|
|
reads: EdgesVec,
|
2018-04-25 11:55:12 +02:00
|
|
|
read_set: FxHashSet<DepNodeIndex>,
|
2023-09-15 15:39:11 +02:00
|
|
|
phantom_data: PhantomData<DepNode>,
|
2020-03-18 10:25:22 +01:00
|
|
|
}
|
|
|
|
|
2023-09-15 15:39:11 +02:00
|
|
|
impl Default for TaskDeps {
|
2020-03-18 10:25:22 +01:00
|
|
|
fn default() -> Self {
|
|
|
|
Self {
|
|
|
|
#[cfg(debug_assertions)]
|
|
|
|
node: None,
|
|
|
|
reads: EdgesVec::new(),
|
|
|
|
read_set: FxHashSet::default(),
|
2020-03-22 20:47:30 +01:00
|
|
|
phantom_data: PhantomData,
|
2020-03-18 10:25:22 +01:00
|
|
|
}
|
|
|
|
}
|
2018-04-25 11:55:12 +02:00
|
|
|
}
|
|
|
|
|
2018-02-13 17:40:46 +01:00
|
|
|
// A data structure that stores Option<DepNodeColor> values as a contiguous
|
|
|
|
// array, using one u32 per entry.
|
|
|
|
struct DepNodeColorMap {
|
2018-12-22 18:03:40 +01:00
|
|
|
values: IndexVec<SerializedDepNodeIndex, AtomicU32>,
|
2018-02-13 17:40:46 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
const COMPRESSED_NONE: u32 = 0;
|
|
|
|
const COMPRESSED_RED: u32 = 1;
|
|
|
|
const COMPRESSED_FIRST_GREEN: u32 = 2;
|
|
|
|
|
|
|
|
impl DepNodeColorMap {
|
|
|
|
fn new(size: usize) -> DepNodeColorMap {
|
2018-12-22 18:03:40 +01:00
|
|
|
DepNodeColorMap { values: (0..size).map(|_| AtomicU32::new(COMPRESSED_NONE)).collect() }
|
2018-02-13 17:40:46 +01:00
|
|
|
}
|
|
|
|
|
2020-03-30 14:36:28 +02:00
|
|
|
#[inline]
|
2018-02-13 17:40:46 +01:00
|
|
|
fn get(&self, index: SerializedDepNodeIndex) -> Option<DepNodeColor> {
|
2018-12-22 18:03:40 +01:00
|
|
|
match self.values[index].load(Ordering::Acquire) {
|
2018-02-13 17:40:46 +01:00
|
|
|
COMPRESSED_NONE => None,
|
|
|
|
COMPRESSED_RED => Some(DepNodeColor::Red),
|
2018-08-28 12:20:56 -04:00
|
|
|
value => {
|
|
|
|
Some(DepNodeColor::Green(DepNodeIndex::from_u32(value - COMPRESSED_FIRST_GREEN)))
|
2019-12-22 17:42:04 -05:00
|
|
|
}
|
2018-02-13 17:40:46 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-02-23 01:14:48 +01:00
|
|
|
#[inline]
|
2018-12-22 18:03:40 +01:00
|
|
|
fn insert(&self, index: SerializedDepNodeIndex, color: DepNodeColor) {
|
|
|
|
self.values[index].store(
|
|
|
|
match color {
|
2018-02-13 17:40:46 +01:00
|
|
|
DepNodeColor::Red => COMPRESSED_RED,
|
2018-08-28 12:20:56 -04:00
|
|
|
DepNodeColor::Green(index) => index.as_u32() + COMPRESSED_FIRST_GREEN,
|
2018-12-22 18:03:40 +01:00
|
|
|
},
|
|
|
|
Ordering::Release,
|
|
|
|
)
|
2018-02-13 17:40:46 +01:00
|
|
|
}
|
|
|
|
}
|
2023-01-28 12:38:22 +00:00
|
|
|
|
2023-02-27 05:56:48 +01:00
|
|
|
#[inline(never)]
|
|
|
|
#[cold]
|
2023-09-15 15:39:11 +02:00
|
|
|
pub(crate) fn print_markframe_trace<D: Deps>(graph: &DepGraph<D>, frame: Option<&MarkFrame<'_>>) {
|
2023-03-09 08:35:01 +01:00
|
|
|
let data = graph.data.as_ref().unwrap();
|
|
|
|
|
2023-02-27 05:56:48 +01:00
|
|
|
eprintln!("there was a panic while trying to force a dep node");
|
|
|
|
eprintln!("try_mark_green dep node stack:");
|
|
|
|
|
|
|
|
let mut i = 0;
|
|
|
|
let mut current = frame;
|
|
|
|
while let Some(frame) = current {
|
2023-03-09 08:35:01 +01:00
|
|
|
let node = data.previous.index_to_node(frame.index);
|
2023-07-25 22:00:13 +02:00
|
|
|
eprintln!("#{i} {node:?}");
|
2023-02-27 05:56:48 +01:00
|
|
|
current = frame.parent;
|
|
|
|
i += 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
eprintln!("end of try_mark_green dep node stack");
|
2023-01-28 12:38:22 +00:00
|
|
|
}
|
2024-04-22 12:11:07 +02:00
|
|
|
|
|
|
|
#[cold]
|
|
|
|
#[inline(never)]
|
|
|
|
fn panic_on_forbidden_read<D: Deps>(data: &DepGraphData<D>, dep_node_index: DepNodeIndex) -> ! {
|
|
|
|
// We have to do an expensive reverse-lookup of the DepNode that
|
|
|
|
// corresponds to `dep_node_index`, but that's OK since we are about
|
|
|
|
// to ICE anyway.
|
|
|
|
let mut dep_node = None;
|
|
|
|
|
|
|
|
// First try to find the dep node among those that already existed in the
|
|
|
|
// previous session
|
|
|
|
for (prev_index, index) in data.current.prev_index_to_index.lock().iter_enumerated() {
|
|
|
|
if index == &Some(dep_node_index) {
|
|
|
|
dep_node = Some(data.previous.index_to_node(prev_index));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if dep_node.is_none() {
|
|
|
|
// Try to find it among the new nodes
|
|
|
|
for shard in data.current.new_node_to_index.lock_shards() {
|
|
|
|
if let Some((node, _)) = shard.iter().find(|(_, index)| **index == dep_node_index) {
|
|
|
|
dep_node = Some(*node);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let dep_node = dep_node.map_or_else(
|
|
|
|
|| format!("with index {:?}", dep_node_index),
|
|
|
|
|dep_node| format!("`{:?}`", dep_node),
|
|
|
|
);
|
|
|
|
|
|
|
|
panic!(
|
|
|
|
"Error: trying to record dependency on DepNode {dep_node} in a \
|
2024-04-22 14:54:28 +02:00
|
|
|
context that does not allow it (e.g. during query deserialization). \
|
|
|
|
The most common case of recording a dependency on a DepNode `foo` is \
|
2024-09-02 07:50:22 +02:00
|
|
|
when the corresponding query `foo` is invoked. Invoking queries is not \
|
2024-04-22 14:54:28 +02:00
|
|
|
allowed as part of loading something from the incremental on-disk cache. \
|
|
|
|
See <https://github.com/rust-lang/rust/pull/91919>."
|
2024-04-22 12:11:07 +02:00
|
|
|
)
|
|
|
|
}
|