2020-11-03 22:23:08 -08:00
|
|
|
use rustc_data_structures::fingerprint::{Fingerprint, PackedFingerprint};
|
2017-08-21 16:44:05 +02:00
|
|
|
use rustc_data_structures::fx::{FxHashMap, FxHashSet};
|
2020-01-03 11:49:14 +01:00
|
|
|
use rustc_data_structures::profiling::QueryInvocationId;
|
2019-12-22 17:42:04 -05:00
|
|
|
use rustc_data_structures::sharded::{self, Sharded};
|
|
|
|
use rustc_data_structures::stable_hasher::{HashStable, StableHasher};
|
|
|
|
use rustc_data_structures::sync::{AtomicU32, AtomicU64, Lock, Lrc, Ordering};
|
2020-03-18 10:25:22 +01:00
|
|
|
use rustc_data_structures::unlikely;
|
2020-01-09 11:18:47 +01:00
|
|
|
use rustc_errors::Diagnostic;
|
2019-09-26 05:38:33 +00:00
|
|
|
use rustc_index::vec::{Idx, IndexVec};
|
2020-03-18 10:25:22 +01:00
|
|
|
|
|
|
|
use parking_lot::{Condvar, Mutex};
|
|
|
|
use smallvec::{smallvec, SmallVec};
|
2019-12-22 17:42:04 -05:00
|
|
|
use std::collections::hash_map::Entry;
|
2017-09-28 16:19:10 +02:00
|
|
|
use std::env;
|
2017-08-21 16:44:05 +02:00
|
|
|
use std::hash::Hash;
|
2020-03-22 20:47:30 +01:00
|
|
|
use std::marker::PhantomData;
|
2019-04-19 18:49:15 +02:00
|
|
|
use std::mem;
|
2020-01-03 11:49:14 +01:00
|
|
|
use std::sync::atomic::Ordering::Relaxed;
|
2016-03-28 17:37:34 -04:00
|
|
|
|
2017-09-28 16:19:10 +02:00
|
|
|
use super::debug::EdgeFilter;
|
2019-12-22 17:42:04 -05:00
|
|
|
use super::prev::PreviousDepGraph;
|
2016-03-28 17:37:34 -04:00
|
|
|
use super::query::DepGraphQuery;
|
2017-09-22 13:00:42 +02:00
|
|
|
use super::serialized::{SerializedDepGraph, SerializedDepNodeIndex};
|
2020-03-18 10:25:22 +01:00
|
|
|
use super::{DepContext, DepKind, DepNode, WorkProductId};
|
2016-03-28 17:37:34 -04:00
|
|
|
|
|
|
|
#[derive(Clone)]
|
2020-03-18 10:25:22 +01:00
|
|
|
pub struct DepGraph<K: DepKind> {
|
|
|
|
data: Option<Lrc<DepGraphData<K>>>,
|
2019-12-13 14:44:08 +01:00
|
|
|
|
|
|
|
/// This field is used for assigning DepNodeIndices when running in
|
|
|
|
/// non-incremental mode. Even in non-incremental mode we make sure that
|
2019-12-17 14:44:07 +01:00
|
|
|
/// each task has a `DepNodeIndex` that uniquely identifies it. This unique
|
2019-12-13 14:44:08 +01:00
|
|
|
/// ID is used for self-profiling.
|
|
|
|
virtual_dep_node_index: Lrc<AtomicU32>,
|
2016-07-21 12:33:23 -04:00
|
|
|
}
|
|
|
|
|
2019-09-26 05:38:33 +00:00
|
|
|
rustc_index::newtype_index! {
|
2018-07-25 13:41:32 +03:00
|
|
|
pub struct DepNodeIndex { .. }
|
|
|
|
}
|
2017-08-21 16:44:05 +02:00
|
|
|
|
|
|
|
impl DepNodeIndex {
|
2019-10-09 16:41:24 +02:00
|
|
|
pub const INVALID: DepNodeIndex = DepNodeIndex::MAX;
|
2017-08-21 16:44:05 +02:00
|
|
|
}
|
|
|
|
|
2019-12-13 14:44:08 +01:00
|
|
|
impl std::convert::From<DepNodeIndex> for QueryInvocationId {
|
|
|
|
#[inline]
|
|
|
|
fn from(dep_node_index: DepNodeIndex) -> Self {
|
2020-01-03 11:49:14 +01:00
|
|
|
QueryInvocationId(dep_node_index.as_u32())
|
2019-12-13 14:44:08 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-20 15:54:53 +11:00
|
|
|
#[derive(PartialEq)]
|
2017-09-25 12:25:41 +02:00
|
|
|
pub enum DepNodeColor {
|
|
|
|
Red,
|
2019-12-22 17:42:04 -05:00
|
|
|
Green(DepNodeIndex),
|
2017-09-25 12:25:41 +02:00
|
|
|
}
|
|
|
|
|
2017-09-28 11:58:45 +02:00
|
|
|
impl DepNodeColor {
|
|
|
|
pub fn is_green(self) -> bool {
|
|
|
|
match self {
|
|
|
|
DepNodeColor::Red => false,
|
|
|
|
DepNodeColor::Green(_) => true,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
struct DepGraphData<K: DepKind> {
|
2017-08-21 16:44:05 +02:00
|
|
|
/// The new encoding of the dependency graph, optimized for red/green
|
|
|
|
/// tracking. The `current` field is the dependency graph of only the
|
|
|
|
/// current compilation session: We don't merge the previous dep-graph into
|
|
|
|
/// current one anymore.
|
2020-03-18 10:25:22 +01:00
|
|
|
current: CurrentDepGraph<K>,
|
2017-08-21 16:44:05 +02:00
|
|
|
|
2017-09-22 13:00:42 +02:00
|
|
|
/// The dep-graph from the previous compilation session. It contains all
|
|
|
|
/// nodes and edges as well as all fingerprints of nodes that have them.
|
2020-03-18 10:25:22 +01:00
|
|
|
previous: PreviousDepGraph<K>,
|
2017-09-22 13:00:42 +02:00
|
|
|
|
2018-12-22 18:03:40 +01:00
|
|
|
colors: DepNodeColorMap,
|
2017-09-25 12:25:41 +02:00
|
|
|
|
2019-04-19 18:49:15 +02:00
|
|
|
/// A set of loaded diagnostics that is in the progress of being emitted.
|
|
|
|
emitting_diagnostics: Mutex<FxHashSet<DepNodeIndex>>,
|
2018-12-22 18:59:03 +01:00
|
|
|
|
|
|
|
/// Used to wait for diagnostics to be emitted.
|
2019-04-19 18:49:15 +02:00
|
|
|
emitting_diagnostics_cond_var: Condvar,
|
2018-12-22 18:59:03 +01:00
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// When we load, there may be `.o` files, cached MIR, or other such
|
2016-07-21 12:33:23 -04:00
|
|
|
/// things available to us. If we find that they are not dirty, we
|
|
|
|
/// load the path to the file storing those work-products here into
|
|
|
|
/// this map. We can later look for and extract that data.
|
2018-05-07 22:30:44 -04:00
|
|
|
previous_work_products: FxHashMap<WorkProductId, WorkProduct>,
|
2016-07-21 12:33:23 -04:00
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
dep_node_debug: Lock<FxHashMap<DepNode<K>, String>>,
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn hash_result<HashCtxt, R>(hcx: &mut HashCtxt, result: &R) -> Option<Fingerprint>
|
2019-01-20 05:44:02 +01:00
|
|
|
where
|
2020-03-18 10:25:22 +01:00
|
|
|
R: HashStable<HashCtxt>,
|
2019-01-20 05:44:02 +01:00
|
|
|
{
|
|
|
|
let mut stable_hasher = StableHasher::new();
|
|
|
|
result.hash_stable(hcx, &mut stable_hasher);
|
|
|
|
|
|
|
|
Some(stable_hasher.finish())
|
|
|
|
}
|
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
impl<K: DepKind> DepGraph<K> {
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn new(
|
2020-03-18 10:25:22 +01:00
|
|
|
prev_graph: PreviousDepGraph<K>,
|
2019-12-22 17:42:04 -05:00
|
|
|
prev_work_products: FxHashMap<WorkProductId, WorkProduct>,
|
2020-03-18 10:25:22 +01:00
|
|
|
) -> DepGraph<K> {
|
2018-02-13 17:40:46 +01:00
|
|
|
let prev_graph_node_count = prev_graph.node_count();
|
|
|
|
|
2016-03-28 17:37:34 -04:00
|
|
|
DepGraph {
|
2018-02-27 17:11:14 +01:00
|
|
|
data: Some(Lrc::new(DepGraphData {
|
2018-05-07 22:30:44 -04:00
|
|
|
previous_work_products: prev_work_products,
|
2018-07-25 15:44:06 +03:00
|
|
|
dep_node_debug: Default::default(),
|
2019-06-13 22:42:24 +02:00
|
|
|
current: CurrentDepGraph::new(prev_graph_node_count),
|
2019-04-19 18:49:15 +02:00
|
|
|
emitting_diagnostics: Default::default(),
|
|
|
|
emitting_diagnostics_cond_var: Condvar::new(),
|
2017-09-22 13:00:42 +02:00
|
|
|
previous: prev_graph,
|
2018-12-22 18:03:40 +01:00
|
|
|
colors: DepNodeColorMap::new(prev_graph_node_count),
|
2017-09-22 13:00:42 +02:00
|
|
|
})),
|
2019-12-13 14:44:08 +01:00
|
|
|
virtual_dep_node_index: Lrc::new(AtomicU32::new(0)),
|
2017-09-22 13:00:42 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn new_disabled() -> DepGraph<K> {
|
2020-01-03 11:49:14 +01:00
|
|
|
DepGraph { data: None, virtual_dep_node_index: Lrc::new(AtomicU32::new(0)) }
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Returns `true` if we are actually building the full dep-graph, and `false` otherwise.
|
2016-12-20 22:46:11 +02:00
|
|
|
#[inline]
|
|
|
|
pub fn is_fully_enabled(&self) -> bool {
|
2017-07-04 15:06:57 +02:00
|
|
|
self.data.is_some()
|
2016-12-20 22:46:11 +02:00
|
|
|
}
|
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn query(&self) -> DepGraphQuery<K> {
|
2019-06-13 22:42:24 +02:00
|
|
|
let data = self.data.as_ref().unwrap().current.data.lock();
|
|
|
|
let nodes: Vec<_> = data.iter().map(|n| n.node).collect();
|
2017-09-28 13:26:15 +02:00
|
|
|
let mut edges = Vec::new();
|
2019-06-13 22:42:24 +02:00
|
|
|
for (from, edge_targets) in data.iter().map(|d| (d.node, &d.edges)) {
|
2018-05-09 12:21:48 +10:00
|
|
|
for &edge_target in edge_targets.iter() {
|
2019-06-13 22:42:24 +02:00
|
|
|
let to = data[edge_target].node;
|
2017-09-28 13:26:15 +02:00
|
|
|
edges.push((from, to));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
DepGraphQuery::new(&nodes[..], &edges[..])
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn assert_ignored(&self) {
|
2018-04-06 14:52:36 +02:00
|
|
|
if let Some(..) = self.data {
|
2020-03-21 00:27:09 +01:00
|
|
|
K::read_deps(|task_deps| {
|
|
|
|
assert!(task_deps.is_none(), "expected no task dependency tracking");
|
|
|
|
})
|
2017-12-28 06:05:45 +01:00
|
|
|
}
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn with_ignore<OP, R>(&self, op: OP) -> R
|
|
|
|
where
|
|
|
|
OP: FnOnce() -> R,
|
2016-03-28 17:37:34 -04:00
|
|
|
{
|
2020-03-21 00:27:09 +01:00
|
|
|
K::with_deps(None, op)
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2017-03-08 09:14:27 -05:00
|
|
|
/// Starts a new dep-graph task. Dep-graph tasks are specified
|
|
|
|
/// using a free function (`task`) and **not** a closure -- this
|
|
|
|
/// is intentional because we want to exercise tight control over
|
|
|
|
/// what state they have access to. In particular, we want to
|
|
|
|
/// prevent implicit 'leaks' of tracked state into the task (which
|
|
|
|
/// could then be read without generating correct edges in the
|
2020-03-05 18:07:42 -03:00
|
|
|
/// dep-graph -- see the [rustc dev guide] for more details on
|
2017-12-31 17:08:04 +01:00
|
|
|
/// the dep-graph). To this end, the task function gets exactly two
|
2017-03-08 09:14:27 -05:00
|
|
|
/// pieces of state: the context `cx` and an argument `arg`. Both
|
|
|
|
/// of these bits of state must be of some type that implements
|
|
|
|
/// `DepGraphSafe` and hence does not leak.
|
|
|
|
///
|
|
|
|
/// The choice of two arguments is not fundamental. One argument
|
|
|
|
/// would work just as well, since multiple values can be
|
|
|
|
/// collected using tuples. However, using two arguments works out
|
|
|
|
/// to be quite convenient, since it is common to need a context
|
|
|
|
/// (`cx`) and some argument (e.g., a `DefId` identifying what
|
|
|
|
/// item to process).
|
|
|
|
///
|
|
|
|
/// For cases where you need some other number of arguments:
|
|
|
|
///
|
|
|
|
/// - If you only need one argument, just use `()` for the `arg`
|
|
|
|
/// parameter.
|
|
|
|
/// - If you need 3+ arguments, use a tuple for the
|
|
|
|
/// `arg` parameter.
|
|
|
|
///
|
2020-03-09 18:33:04 -03:00
|
|
|
/// [rustc dev guide]: https://rustc-dev-guide.rust-lang.org/incremental-compilation.html
|
2020-03-24 20:09:06 +01:00
|
|
|
pub fn with_task<Ctxt: DepContext<DepKind = K>, A, R>(
|
2019-01-20 05:44:02 +01:00
|
|
|
&self,
|
2020-03-18 10:25:22 +01:00
|
|
|
key: DepNode<K>,
|
2020-03-24 20:09:06 +01:00
|
|
|
cx: Ctxt,
|
2019-01-20 05:44:02 +01:00
|
|
|
arg: A,
|
2020-03-24 20:09:06 +01:00
|
|
|
task: fn(Ctxt, A) -> R,
|
|
|
|
hash_result: impl FnOnce(&mut Ctxt::StableHashingContext, &R) -> Option<Fingerprint>,
|
|
|
|
) -> (R, DepNodeIndex) {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.with_task_impl(
|
|
|
|
key,
|
|
|
|
cx,
|
|
|
|
arg,
|
|
|
|
false,
|
|
|
|
task,
|
|
|
|
|_key| {
|
|
|
|
Some(TaskDeps {
|
|
|
|
#[cfg(debug_assertions)]
|
|
|
|
node: Some(_key),
|
|
|
|
reads: SmallVec::new(),
|
|
|
|
read_set: Default::default(),
|
2020-03-22 20:47:30 +01:00
|
|
|
phantom_data: PhantomData,
|
2019-12-22 17:42:04 -05:00
|
|
|
})
|
2019-01-20 05:44:02 +01:00
|
|
|
},
|
2019-12-22 17:42:04 -05:00
|
|
|
|data, key, fingerprint, task| data.complete_task(key, task.unwrap(), fingerprint),
|
|
|
|
hash_result,
|
|
|
|
)
|
2018-04-06 14:52:36 +02:00
|
|
|
}
|
|
|
|
|
2020-03-24 20:09:06 +01:00
|
|
|
fn with_task_impl<Ctxt: DepContext<DepKind = K>, A, R>(
|
2018-04-25 02:30:18 +02:00
|
|
|
&self,
|
2020-03-18 10:25:22 +01:00
|
|
|
key: DepNode<K>,
|
2020-03-24 20:09:06 +01:00
|
|
|
cx: Ctxt,
|
2018-04-25 02:30:18 +02:00
|
|
|
arg: A,
|
|
|
|
no_tcx: bool,
|
2020-03-24 20:09:06 +01:00
|
|
|
task: fn(Ctxt, A) -> R,
|
2020-03-18 10:25:22 +01:00
|
|
|
create_task: fn(DepNode<K>) -> Option<TaskDeps<K>>,
|
2019-12-22 17:42:04 -05:00
|
|
|
finish_task_and_alloc_depnode: fn(
|
2020-03-18 10:25:22 +01:00
|
|
|
&CurrentDepGraph<K>,
|
|
|
|
DepNode<K>,
|
2019-12-22 17:42:04 -05:00
|
|
|
Fingerprint,
|
2020-03-18 10:25:22 +01:00
|
|
|
Option<TaskDeps<K>>,
|
2019-12-22 17:42:04 -05:00
|
|
|
) -> DepNodeIndex,
|
2020-03-24 20:09:06 +01:00
|
|
|
hash_result: impl FnOnce(&mut Ctxt::StableHashingContext, &R) -> Option<Fingerprint>,
|
|
|
|
) -> (R, DepNodeIndex) {
|
2017-07-04 17:33:43 +02:00
|
|
|
if let Some(ref data) = self.data {
|
2020-03-22 12:43:19 +01:00
|
|
|
let task_deps = create_task(key).map(Lock::new);
|
2017-09-07 16:11:58 +02:00
|
|
|
|
|
|
|
// In incremental mode, hash the result of the task. We don't
|
|
|
|
// do anything with the hash yet, but we are computing it
|
|
|
|
// anyway so that
|
|
|
|
// - we make sure that the infrastructure works and
|
|
|
|
// - we can get an idea of the runtime cost.
|
2020-03-24 20:09:06 +01:00
|
|
|
let mut hcx = cx.create_stable_hashing_context();
|
2017-12-03 14:21:23 +01:00
|
|
|
|
2018-04-25 11:55:12 +02:00
|
|
|
let result = if no_tcx {
|
|
|
|
task(cx, arg)
|
2018-04-06 14:52:36 +02:00
|
|
|
} else {
|
2020-03-18 10:25:22 +01:00
|
|
|
K::with_deps(task_deps.as_ref(), || task(cx, arg))
|
2018-04-06 14:52:36 +02:00
|
|
|
};
|
2017-12-03 14:21:23 +01:00
|
|
|
|
2019-01-20 05:44:02 +01:00
|
|
|
let current_fingerprint = hash_result(&mut hcx, &result);
|
2017-09-25 12:25:41 +02:00
|
|
|
|
2018-12-22 12:40:23 +01:00
|
|
|
let dep_node_index = finish_task_and_alloc_depnode(
|
|
|
|
&data.current,
|
|
|
|
key,
|
2019-01-20 05:44:02 +01:00
|
|
|
current_fingerprint.unwrap_or(Fingerprint::ZERO),
|
2018-12-25 04:36:17 +01:00
|
|
|
task_deps.map(|lock| lock.into_inner()),
|
2018-12-22 12:40:23 +01:00
|
|
|
);
|
2017-09-07 16:11:58 +02:00
|
|
|
|
2020-03-27 07:50:28 +01:00
|
|
|
let print_status = cfg!(debug_assertions) && cx.debug_dep_tasks();
|
2019-02-11 00:03:51 +01:00
|
|
|
|
2017-10-04 12:35:56 +02:00
|
|
|
// Determine the color of the new DepNode.
|
2018-02-13 17:40:46 +01:00
|
|
|
if let Some(prev_index) = data.previous.node_to_index_opt(&key) {
|
|
|
|
let prev_fingerprint = data.previous.fingerprint_by_index(prev_index);
|
2017-09-25 12:25:41 +02:00
|
|
|
|
2019-01-20 05:44:02 +01:00
|
|
|
let color = if let Some(current_fingerprint) = current_fingerprint {
|
|
|
|
if current_fingerprint == prev_fingerprint {
|
2019-02-11 00:03:51 +01:00
|
|
|
if print_status {
|
|
|
|
eprintln!("[task::green] {:?}", key);
|
|
|
|
}
|
2019-01-20 05:44:02 +01:00
|
|
|
DepNodeColor::Green(dep_node_index)
|
|
|
|
} else {
|
2019-02-11 00:03:51 +01:00
|
|
|
if print_status {
|
|
|
|
eprintln!("[task::red] {:?}", key);
|
|
|
|
}
|
2019-01-20 05:44:02 +01:00
|
|
|
DepNodeColor::Red
|
|
|
|
}
|
2017-10-04 12:35:56 +02:00
|
|
|
} else {
|
2019-02-11 00:03:51 +01:00
|
|
|
if print_status {
|
|
|
|
eprintln!("[task::unknown] {:?}", key);
|
|
|
|
}
|
2019-01-20 05:44:02 +01:00
|
|
|
// Mark the node as Red if we can't hash the result
|
2017-10-04 12:35:56 +02:00
|
|
|
DepNodeColor::Red
|
|
|
|
};
|
2017-09-25 12:25:41 +02:00
|
|
|
|
2019-12-22 17:42:04 -05:00
|
|
|
debug_assert!(
|
|
|
|
data.colors.get(prev_index).is_none(),
|
|
|
|
"DepGraph::with_task() - Duplicate DepNodeColor \
|
|
|
|
insertion for {:?}",
|
|
|
|
key
|
|
|
|
);
|
2018-02-13 17:40:46 +01:00
|
|
|
|
2018-12-22 18:03:40 +01:00
|
|
|
data.colors.insert(prev_index, color);
|
2020-10-26 21:02:48 -04:00
|
|
|
} else if print_status {
|
|
|
|
eprintln!("[task::new] {:?}", key);
|
2017-10-04 12:35:56 +02:00
|
|
|
}
|
2017-09-25 12:25:41 +02:00
|
|
|
|
2017-09-28 16:19:10 +02:00
|
|
|
(result, dep_node_index)
|
2017-07-04 17:33:43 +02:00
|
|
|
} else {
|
2019-12-13 14:44:08 +01:00
|
|
|
(task(cx, arg), self.next_virtual_depnode_index())
|
2017-07-04 17:33:43 +02:00
|
|
|
}
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Executes something within an "anonymous" task, that is, a task the
|
|
|
|
/// `DepNode` of which is determined by the list of inputs it read from.
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn with_anon_task<OP, R>(&self, dep_kind: K, op: OP) -> (R, DepNodeIndex)
|
2019-12-22 17:42:04 -05:00
|
|
|
where
|
|
|
|
OP: FnOnce() -> R,
|
2017-06-23 16:37:12 +02:00
|
|
|
{
|
|
|
|
if let Some(ref data) = self.data {
|
2020-03-18 10:25:22 +01:00
|
|
|
let task_deps = Lock::new(TaskDeps::default());
|
2019-12-22 17:42:04 -05:00
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
let result = K::with_deps(Some(&task_deps), op);
|
|
|
|
let task_deps = task_deps.into_inner();
|
2018-04-06 14:52:36 +02:00
|
|
|
|
2019-12-22 17:42:04 -05:00
|
|
|
let dep_node_index = data.current.complete_anon_task(dep_kind, task_deps);
|
2017-09-28 16:19:10 +02:00
|
|
|
(result, dep_node_index)
|
2017-06-23 16:37:12 +02:00
|
|
|
} else {
|
2019-12-13 14:44:08 +01:00
|
|
|
(op(), self.next_virtual_depnode_index())
|
2017-06-23 16:37:12 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Executes something within an "eval-always" task which is a task
|
|
|
|
/// that runs whenever anything changes.
|
2020-03-24 20:09:06 +01:00
|
|
|
pub fn with_eval_always_task<Ctxt: DepContext<DepKind = K>, A, R>(
|
2019-01-20 05:44:02 +01:00
|
|
|
&self,
|
2020-03-18 10:25:22 +01:00
|
|
|
key: DepNode<K>,
|
2020-03-24 20:09:06 +01:00
|
|
|
cx: Ctxt,
|
2019-01-20 05:44:02 +01:00
|
|
|
arg: A,
|
2020-03-24 20:09:06 +01:00
|
|
|
task: fn(Ctxt, A) -> R,
|
|
|
|
hash_result: impl FnOnce(&mut Ctxt::StableHashingContext, &R) -> Option<Fingerprint>,
|
|
|
|
) -> (R, DepNodeIndex) {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.with_task_impl(
|
|
|
|
key,
|
|
|
|
cx,
|
|
|
|
arg,
|
|
|
|
false,
|
|
|
|
task,
|
2018-12-25 04:36:17 +01:00
|
|
|
|_| None,
|
2019-12-22 17:42:04 -05:00
|
|
|
|data, key, fingerprint, _| data.alloc_node(key, smallvec![], fingerprint),
|
|
|
|
hash_result,
|
|
|
|
)
|
2017-10-17 22:50:33 -04:00
|
|
|
}
|
|
|
|
|
2017-07-04 15:06:57 +02:00
|
|
|
#[inline]
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn read(&self, v: DepNode<K>) {
|
2017-07-04 15:06:57 +02:00
|
|
|
if let Some(ref data) = self.data {
|
2019-06-13 23:14:44 +02:00
|
|
|
let map = data.current.node_to_node_index.get_shard_by_value(&v).lock();
|
2019-06-13 22:42:24 +02:00
|
|
|
if let Some(dep_node_index) = map.get(&v).copied() {
|
|
|
|
std::mem::drop(map);
|
2018-12-25 04:36:17 +01:00
|
|
|
data.read_index(dep_node_index);
|
2017-09-22 13:00:42 +02:00
|
|
|
} else {
|
2020-03-22 20:47:30 +01:00
|
|
|
panic!("DepKind {:?} should be pre-allocated but isn't.", v.kind)
|
2017-09-22 13:00:42 +02:00
|
|
|
}
|
2016-10-18 14:46:41 +11:00
|
|
|
}
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
|
|
|
|
2017-07-04 17:33:43 +02:00
|
|
|
#[inline]
|
2017-09-28 16:19:10 +02:00
|
|
|
pub fn read_index(&self, dep_node_index: DepNodeIndex) {
|
2017-07-04 17:33:43 +02:00
|
|
|
if let Some(ref data) = self.data {
|
2018-12-25 04:36:17 +01:00
|
|
|
data.read_index(dep_node_index);
|
2017-07-04 17:33:43 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-14 19:52:49 +01:00
|
|
|
#[inline]
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn dep_node_index_of(&self, dep_node: &DepNode<K>) -> DepNodeIndex {
|
2017-12-19 18:01:19 +01:00
|
|
|
self.data
|
|
|
|
.as_ref()
|
|
|
|
.unwrap()
|
|
|
|
.current
|
|
|
|
.node_to_node_index
|
2019-06-13 23:14:44 +02:00
|
|
|
.get_shard_by_value(dep_node)
|
2019-06-13 22:42:24 +02:00
|
|
|
.lock()
|
2017-12-19 18:01:19 +01:00
|
|
|
.get(dep_node)
|
|
|
|
.cloned()
|
|
|
|
.unwrap()
|
|
|
|
}
|
|
|
|
|
2018-02-13 17:40:46 +01:00
|
|
|
#[inline]
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn dep_node_exists(&self, dep_node: &DepNode<K>) -> bool {
|
2018-02-13 17:40:46 +01:00
|
|
|
if let Some(ref data) = self.data {
|
2019-06-13 23:14:44 +02:00
|
|
|
data.current
|
|
|
|
.node_to_node_index
|
|
|
|
.get_shard_by_value(&dep_node)
|
|
|
|
.lock()
|
|
|
|
.contains_key(dep_node)
|
2018-02-13 17:40:46 +01:00
|
|
|
} else {
|
|
|
|
false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-12-19 18:01:19 +01:00
|
|
|
#[inline]
|
|
|
|
pub fn fingerprint_of(&self, dep_node_index: DepNodeIndex) -> Fingerprint {
|
2019-06-13 22:42:24 +02:00
|
|
|
let data = self.data.as_ref().expect("dep graph enabled").current.data.lock();
|
|
|
|
data[dep_node_index].fingerprint
|
2017-08-18 20:24:19 +02:00
|
|
|
}
|
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn prev_fingerprint_of(&self, dep_node: &DepNode<K>) -> Option<Fingerprint> {
|
2017-09-22 13:00:42 +02:00
|
|
|
self.data.as_ref().unwrap().previous.fingerprint_of(dep_node)
|
2017-09-14 17:43:03 +02:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Checks whether a previous work product exists for `v` and, if
|
2016-07-21 12:33:23 -04:00
|
|
|
/// so, return the path that leads to it. Used to skip doing work.
|
2017-06-06 15:09:21 +02:00
|
|
|
pub fn previous_work_product(&self, v: &WorkProductId) -> Option<WorkProduct> {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.data.as_ref().and_then(|data| data.previous_work_products.get(v).cloned())
|
2016-07-21 12:33:23 -04:00
|
|
|
}
|
|
|
|
|
2017-01-16 17:54:20 -05:00
|
|
|
/// Access the map of work-products created during the cached run. Only
|
|
|
|
/// used during saving of the dep-graph.
|
2018-05-07 22:30:44 -04:00
|
|
|
pub fn previous_work_products(&self) -> &FxHashMap<WorkProductId, WorkProduct> {
|
|
|
|
&self.data.as_ref().unwrap().previous_work_products
|
2017-01-16 17:54:20 -05:00
|
|
|
}
|
2017-06-12 17:00:55 +02:00
|
|
|
|
|
|
|
#[inline(always)]
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn register_dep_node_debug_str<F>(&self, dep_node: DepNode<K>, debug_str_gen: F)
|
2019-12-22 17:42:04 -05:00
|
|
|
where
|
|
|
|
F: FnOnce() -> String,
|
2017-06-12 17:00:55 +02:00
|
|
|
{
|
2017-08-30 11:53:57 -07:00
|
|
|
let dep_node_debug = &self.data.as_ref().unwrap().dep_node_debug;
|
2017-06-12 17:00:55 +02:00
|
|
|
|
2017-08-30 11:53:57 -07:00
|
|
|
if dep_node_debug.borrow().contains_key(&dep_node) {
|
2019-12-22 17:42:04 -05:00
|
|
|
return;
|
2017-08-30 11:53:57 -07:00
|
|
|
}
|
|
|
|
let debug_str = debug_str_gen();
|
|
|
|
dep_node_debug.borrow_mut().insert(dep_node, debug_str);
|
2017-06-12 17:00:55 +02:00
|
|
|
}
|
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn dep_node_debug_str(&self, dep_node: DepNode<K>) -> Option<String> {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.data.as_ref()?.dep_node_debug.borrow().get(&dep_node).cloned()
|
2017-06-12 17:00:55 +02:00
|
|
|
}
|
2017-09-22 13:00:42 +02:00
|
|
|
|
2018-12-25 04:36:17 +01:00
|
|
|
pub fn edge_deduplication_data(&self) -> Option<(u64, u64)> {
|
|
|
|
if cfg!(debug_assertions) {
|
2019-06-13 22:42:24 +02:00
|
|
|
let current_dep_graph = &self.data.as_ref().unwrap().current;
|
2017-11-11 14:32:01 -05:00
|
|
|
|
2019-12-22 17:42:04 -05:00
|
|
|
Some((
|
2019-12-13 14:46:10 +01:00
|
|
|
current_dep_graph.total_read_count.load(Relaxed),
|
|
|
|
current_dep_graph.total_duplicate_read_count.load(Relaxed),
|
2019-12-22 17:42:04 -05:00
|
|
|
))
|
2018-12-25 04:36:17 +01:00
|
|
|
} else {
|
|
|
|
None
|
|
|
|
}
|
2017-11-11 14:32:01 -05:00
|
|
|
}
|
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn serialize(&self) -> SerializedDepGraph<K> {
|
2019-06-13 22:42:24 +02:00
|
|
|
let data = self.data.as_ref().unwrap().current.data.lock();
|
2017-09-22 13:00:42 +02:00
|
|
|
|
2018-12-22 12:40:23 +01:00
|
|
|
let fingerprints: IndexVec<SerializedDepNodeIndex, _> =
|
2019-06-13 22:42:24 +02:00
|
|
|
data.iter().map(|d| d.fingerprint).collect();
|
2019-12-22 17:42:04 -05:00
|
|
|
let nodes: IndexVec<SerializedDepNodeIndex, _> = data.iter().map(|d| d.node).collect();
|
2017-09-22 13:00:42 +02:00
|
|
|
|
2019-06-13 22:42:24 +02:00
|
|
|
let total_edge_count: usize = data.iter().map(|d| d.edges.len()).sum();
|
2017-09-22 13:00:42 +02:00
|
|
|
|
|
|
|
let mut edge_list_indices = IndexVec::with_capacity(nodes.len());
|
|
|
|
let mut edge_list_data = Vec::with_capacity(total_edge_count);
|
|
|
|
|
2019-06-13 22:42:24 +02:00
|
|
|
for (current_dep_node_index, edges) in data.iter_enumerated().map(|(i, d)| (i, &d.edges)) {
|
2017-09-22 13:00:42 +02:00
|
|
|
let start = edge_list_data.len() as u32;
|
|
|
|
// This should really just be a memcpy :/
|
2017-09-28 16:11:06 -03:00
|
|
|
edge_list_data.extend(edges.iter().map(|i| SerializedDepNodeIndex::new(i.index())));
|
2017-09-22 13:00:42 +02:00
|
|
|
let end = edge_list_data.len() as u32;
|
|
|
|
|
|
|
|
debug_assert_eq!(current_dep_node_index.index(), edge_list_indices.len());
|
|
|
|
edge_list_indices.push((start, end));
|
|
|
|
}
|
|
|
|
|
2020-03-04 13:18:08 +01:00
|
|
|
debug_assert!(edge_list_data.len() <= u32::MAX as usize);
|
2017-09-22 13:00:42 +02:00
|
|
|
debug_assert_eq!(edge_list_data.len(), total_edge_count);
|
|
|
|
|
2019-12-22 17:42:04 -05:00
|
|
|
SerializedDepGraph { nodes, fingerprints, edge_list_indices, edge_list_data }
|
2017-09-22 13:00:42 +02:00
|
|
|
}
|
2017-09-25 13:51:49 +02:00
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn node_color(&self, dep_node: &DepNode<K>) -> Option<DepNodeColor> {
|
2018-02-13 17:40:46 +01:00
|
|
|
if let Some(ref data) = self.data {
|
|
|
|
if let Some(prev_index) = data.previous.node_to_index_opt(dep_node) {
|
2019-12-22 17:42:04 -05:00
|
|
|
return data.colors.get(prev_index);
|
2018-02-13 17:40:46 +01:00
|
|
|
} else {
|
|
|
|
// This is a node that did not exist in the previous compilation
|
|
|
|
// session, so we consider it to be red.
|
2019-12-22 17:42:04 -05:00
|
|
|
return Some(DepNodeColor::Red);
|
2018-02-13 17:40:46 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
None
|
2017-09-25 13:51:49 +02:00
|
|
|
}
|
|
|
|
|
2018-12-22 18:03:40 +01:00
|
|
|
/// Try to read a node index for the node dep_node.
|
|
|
|
/// A node will have an index, when it's already been marked green, or when we can mark it
|
|
|
|
/// green. This function will mark the current task as a reader of the specified node, when
|
|
|
|
/// a node index can be found for that node.
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn try_mark_green_and_read<Ctxt: DepContext<DepKind = K>>(
|
2018-12-22 18:03:40 +01:00
|
|
|
&self,
|
2020-03-18 10:25:22 +01:00
|
|
|
tcx: Ctxt,
|
|
|
|
dep_node: &DepNode<K>,
|
2018-12-22 18:03:40 +01:00
|
|
|
) -> Option<(SerializedDepNodeIndex, DepNodeIndex)> {
|
|
|
|
self.try_mark_green(tcx, dep_node).map(|(prev_index, dep_node_index)| {
|
|
|
|
debug_assert!(self.is_green(&dep_node));
|
|
|
|
self.read_index(dep_node_index);
|
|
|
|
(prev_index, dep_node_index)
|
|
|
|
})
|
|
|
|
}
|
2017-09-25 13:51:49 +02:00
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn try_mark_green<Ctxt: DepContext<DepKind = K>>(
|
2018-12-22 18:03:40 +01:00
|
|
|
&self,
|
2020-03-18 10:25:22 +01:00
|
|
|
tcx: Ctxt,
|
|
|
|
dep_node: &DepNode<K>,
|
2018-12-22 18:03:40 +01:00
|
|
|
) -> Option<(SerializedDepNodeIndex, DepNodeIndex)> {
|
2019-03-10 10:11:15 +01:00
|
|
|
debug_assert!(!dep_node.kind.is_eval_always());
|
2017-09-25 13:51:49 +02:00
|
|
|
|
2018-12-22 18:03:40 +01:00
|
|
|
// Return None if the dep graph is disabled
|
|
|
|
let data = self.data.as_ref()?;
|
|
|
|
|
|
|
|
// Return None if the dep node didn't exist in the previous session
|
|
|
|
let prev_index = data.previous.node_to_index_opt(dep_node)?;
|
|
|
|
|
|
|
|
match data.colors.get(prev_index) {
|
|
|
|
Some(DepNodeColor::Green(dep_node_index)) => Some((prev_index, dep_node_index)),
|
|
|
|
Some(DepNodeColor::Red) => None,
|
2017-09-25 13:51:49 +02:00
|
|
|
None => {
|
2019-01-15 10:39:35 +01:00
|
|
|
// This DepNode and the corresponding query invocation existed
|
|
|
|
// in the previous compilation session too, so we can try to
|
|
|
|
// mark it as green by recursively marking all of its
|
|
|
|
// dependencies green.
|
2019-12-22 17:42:04 -05:00
|
|
|
self.try_mark_previous_green(tcx, data, prev_index, &dep_node)
|
|
|
|
.map(|dep_node_index| (prev_index, dep_node_index))
|
2017-09-25 13:51:49 +02:00
|
|
|
}
|
2018-12-22 18:03:40 +01:00
|
|
|
}
|
|
|
|
}
|
2017-09-25 13:51:49 +02:00
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Try to mark a dep-node which existed in the previous compilation session as green.
|
2020-03-18 10:25:22 +01:00
|
|
|
fn try_mark_previous_green<Ctxt: DepContext<DepKind = K>>(
|
2018-12-22 18:03:40 +01:00
|
|
|
&self,
|
2020-03-18 10:25:22 +01:00
|
|
|
tcx: Ctxt,
|
|
|
|
data: &DepGraphData<K>,
|
2018-12-22 18:03:40 +01:00
|
|
|
prev_dep_node_index: SerializedDepNodeIndex,
|
2020-03-18 10:25:22 +01:00
|
|
|
dep_node: &DepNode<K>,
|
2018-12-22 18:03:40 +01:00
|
|
|
) -> Option<DepNodeIndex> {
|
|
|
|
debug!("try_mark_previous_green({:?}) - BEGIN", dep_node);
|
|
|
|
|
2019-01-28 15:51:47 +01:00
|
|
|
#[cfg(not(parallel_compiler))]
|
2018-12-22 18:03:40 +01:00
|
|
|
{
|
2019-12-22 17:42:04 -05:00
|
|
|
debug_assert!(
|
|
|
|
!data
|
|
|
|
.current
|
|
|
|
.node_to_node_index
|
|
|
|
.get_shard_by_value(dep_node)
|
|
|
|
.lock()
|
|
|
|
.contains_key(dep_node)
|
|
|
|
);
|
2018-12-22 18:03:40 +01:00
|
|
|
debug_assert!(data.colors.get(prev_dep_node_index).is_none());
|
|
|
|
}
|
|
|
|
|
2019-03-10 10:11:15 +01:00
|
|
|
// We never try to mark eval_always nodes as green
|
|
|
|
debug_assert!(!dep_node.kind.is_eval_always());
|
2018-12-22 18:03:40 +01:00
|
|
|
|
2019-01-15 10:39:35 +01:00
|
|
|
debug_assert_eq!(data.previous.index_to_node(prev_dep_node_index), *dep_node);
|
2018-12-22 18:03:40 +01:00
|
|
|
|
|
|
|
let prev_deps = data.previous.edge_targets_from(prev_dep_node_index);
|
2018-02-13 17:40:46 +01:00
|
|
|
|
2018-05-09 12:21:48 +10:00
|
|
|
let mut current_deps = SmallVec::new();
|
2017-09-25 13:51:49 +02:00
|
|
|
|
2017-09-26 19:43:17 +02:00
|
|
|
for &dep_dep_node_index in prev_deps {
|
2018-12-22 18:03:40 +01:00
|
|
|
let dep_dep_node_color = data.colors.get(dep_dep_node_index);
|
2017-09-26 19:43:17 +02:00
|
|
|
|
2017-09-25 13:51:49 +02:00
|
|
|
match dep_dep_node_color {
|
|
|
|
Some(DepNodeColor::Green(node_index)) => {
|
|
|
|
// This dependency has been marked as green before, we are
|
|
|
|
// still fine and can continue with checking the other
|
|
|
|
// dependencies.
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"try_mark_previous_green({:?}) --- found dependency {:?} to \
|
2018-02-13 17:40:46 +01:00
|
|
|
be immediately green",
|
2019-12-22 17:42:04 -05:00
|
|
|
dep_node,
|
|
|
|
data.previous.index_to_node(dep_dep_node_index)
|
|
|
|
);
|
2017-09-25 13:51:49 +02:00
|
|
|
current_deps.push(node_index);
|
|
|
|
}
|
|
|
|
Some(DepNodeColor::Red) => {
|
|
|
|
// We found a dependency the value of which has changed
|
|
|
|
// compared to the previous compilation session. We cannot
|
|
|
|
// mark the DepNode as green and also don't need to bother
|
|
|
|
// with checking any of the other dependencies.
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"try_mark_previous_green({:?}) - END - dependency {:?} was \
|
2018-02-13 17:40:46 +01:00
|
|
|
immediately red",
|
2019-12-22 17:42:04 -05:00
|
|
|
dep_node,
|
|
|
|
data.previous.index_to_node(dep_dep_node_index)
|
|
|
|
);
|
|
|
|
return None;
|
2017-09-25 13:51:49 +02:00
|
|
|
}
|
|
|
|
None => {
|
2018-02-13 17:40:46 +01:00
|
|
|
let dep_dep_node = &data.previous.index_to_node(dep_dep_node_index);
|
|
|
|
|
2017-11-07 14:53:21 +01:00
|
|
|
// We don't know the state of this dependency. If it isn't
|
2019-03-10 10:11:15 +01:00
|
|
|
// an eval_always node, let's try to mark it green recursively.
|
|
|
|
if !dep_dep_node.kind.is_eval_always() {
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"try_mark_previous_green({:?}) --- state of dependency {:?} \
|
|
|
|
is unknown, trying to mark it green",
|
|
|
|
dep_node, dep_dep_node
|
|
|
|
);
|
2017-11-07 14:53:21 +01:00
|
|
|
|
2018-12-22 18:03:40 +01:00
|
|
|
let node_index = self.try_mark_previous_green(
|
|
|
|
tcx,
|
|
|
|
data,
|
|
|
|
dep_dep_node_index,
|
2019-12-22 17:42:04 -05:00
|
|
|
dep_dep_node,
|
2018-12-22 18:03:40 +01:00
|
|
|
);
|
|
|
|
if let Some(node_index) = node_index {
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"try_mark_previous_green({:?}) --- managed to MARK \
|
|
|
|
dependency {:?} as green",
|
|
|
|
dep_node, dep_dep_node
|
|
|
|
);
|
2017-11-07 14:53:21 +01:00
|
|
|
current_deps.push(node_index);
|
|
|
|
continue;
|
|
|
|
}
|
2017-09-26 19:43:17 +02:00
|
|
|
}
|
|
|
|
|
2017-11-07 14:53:21 +01:00
|
|
|
// We failed to mark it green, so we try to force the query.
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"try_mark_previous_green({:?}) --- trying to force \
|
|
|
|
dependency {:?}",
|
|
|
|
dep_node, dep_dep_node
|
|
|
|
);
|
2020-03-22 20:47:30 +01:00
|
|
|
if tcx.try_force_from_dep_node(dep_dep_node) {
|
2018-12-22 18:03:40 +01:00
|
|
|
let dep_dep_node_color = data.colors.get(dep_dep_node_index);
|
2018-02-13 17:40:46 +01:00
|
|
|
|
2017-11-07 14:53:21 +01:00
|
|
|
match dep_dep_node_color {
|
|
|
|
Some(DepNodeColor::Green(node_index)) => {
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"try_mark_previous_green({:?}) --- managed to \
|
2017-11-07 14:53:21 +01:00
|
|
|
FORCE dependency {:?} to green",
|
2019-12-22 17:42:04 -05:00
|
|
|
dep_node, dep_dep_node
|
|
|
|
);
|
2017-11-07 14:53:21 +01:00
|
|
|
current_deps.push(node_index);
|
|
|
|
}
|
|
|
|
Some(DepNodeColor::Red) => {
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"try_mark_previous_green({:?}) - END - \
|
2017-11-07 14:53:21 +01:00
|
|
|
dependency {:?} was red after forcing",
|
2019-12-22 17:42:04 -05:00
|
|
|
dep_node, dep_dep_node
|
|
|
|
);
|
|
|
|
return None;
|
2017-11-07 14:53:21 +01:00
|
|
|
}
|
|
|
|
None => {
|
2020-03-18 10:25:22 +01:00
|
|
|
if !tcx.has_errors_or_delayed_span_bugs() {
|
2020-03-22 20:47:30 +01:00
|
|
|
panic!(
|
2019-12-22 17:42:04 -05:00
|
|
|
"try_mark_previous_green() - Forcing the DepNode \
|
|
|
|
should have set its color"
|
|
|
|
)
|
2018-03-16 16:18:14 +01:00
|
|
|
} else {
|
2019-12-06 12:48:53 +03:00
|
|
|
// If the query we just forced has resulted in
|
|
|
|
// some kind of compilation error, we cannot rely on
|
|
|
|
// the dep-node color having been properly updated.
|
|
|
|
// This means that the query system has reached an
|
|
|
|
// invalid state. We let the compiler continue (by
|
|
|
|
// returning `None`) so it can emit error messages
|
|
|
|
// and wind down, but rely on the fact that this
|
|
|
|
// invalid state will not be persisted to the
|
|
|
|
// incremental compilation cache because of
|
|
|
|
// compilation errors being present.
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"try_mark_previous_green({:?}) - END - \
|
2019-12-06 12:48:53 +03:00
|
|
|
dependency {:?} resulted in compilation error",
|
2019-12-22 17:42:04 -05:00
|
|
|
dep_node, dep_dep_node
|
|
|
|
);
|
|
|
|
return None;
|
2018-03-16 16:18:14 +01:00
|
|
|
}
|
2017-09-26 19:43:17 +02:00
|
|
|
}
|
|
|
|
}
|
2017-11-07 14:53:21 +01:00
|
|
|
} else {
|
|
|
|
// The DepNode could not be forced.
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"try_mark_previous_green({:?}) - END - dependency {:?} \
|
|
|
|
could not be forced",
|
|
|
|
dep_node, dep_dep_node
|
|
|
|
);
|
|
|
|
return None;
|
2017-09-25 13:51:49 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we got here without hitting a `return` that means that all
|
|
|
|
// dependencies of this DepNode could be marked as green. Therefore we
|
2018-04-06 14:52:36 +02:00
|
|
|
// can also mark this DepNode as green.
|
2017-09-25 13:51:49 +02:00
|
|
|
|
2018-04-06 14:52:36 +02:00
|
|
|
// There may be multiple threads trying to mark the same dep node green concurrently
|
|
|
|
|
2019-04-19 18:49:15 +02:00
|
|
|
let dep_node_index = {
|
2018-12-23 05:54:10 +01:00
|
|
|
// Copy the fingerprint from the previous graph,
|
|
|
|
// so we don't have to recompute it
|
|
|
|
let fingerprint = data.previous.fingerprint_by_index(prev_dep_node_index);
|
|
|
|
|
|
|
|
// We allocating an entry for the node in the current dependency graph and
|
|
|
|
// adding all the appropriate edges imported from the previous graph
|
2019-06-13 22:42:24 +02:00
|
|
|
data.current.intern_node(*dep_node, current_deps, fingerprint)
|
2018-04-06 14:52:36 +02:00
|
|
|
};
|
2017-09-25 13:51:49 +02:00
|
|
|
|
2017-10-19 14:32:39 +02:00
|
|
|
// ... emitting any stored diagnostic ...
|
2018-04-06 14:52:36 +02:00
|
|
|
|
2019-04-19 18:49:15 +02:00
|
|
|
// FIXME: Store the fact that a node has diagnostics in a bit in the dep graph somewhere
|
|
|
|
// Maybe store a list on disk and encode this fact in the DepNodeState
|
2020-03-18 10:25:22 +01:00
|
|
|
let diagnostics = tcx.load_diagnostics(prev_dep_node_index);
|
2019-04-19 18:49:15 +02:00
|
|
|
|
|
|
|
#[cfg(not(parallel_compiler))]
|
2019-12-22 17:42:04 -05:00
|
|
|
debug_assert!(
|
|
|
|
data.colors.get(prev_dep_node_index).is_none(),
|
|
|
|
"DepGraph::try_mark_previous_green() - Duplicate DepNodeColor \
|
|
|
|
insertion for {:?}",
|
|
|
|
dep_node
|
|
|
|
);
|
2017-10-19 14:32:39 +02:00
|
|
|
|
2020-02-28 14:20:33 +01:00
|
|
|
if unlikely!(!diagnostics.is_empty()) {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.emit_diagnostics(tcx, data, dep_node_index, prev_dep_node_index, diagnostics);
|
2017-10-19 14:32:39 +02:00
|
|
|
}
|
|
|
|
|
2017-09-25 13:51:49 +02:00
|
|
|
// ... and finally storing a "Green" entry in the color map.
|
2018-04-06 14:52:36 +02:00
|
|
|
// Multiple threads can all write the same color here
|
2018-12-22 18:03:40 +01:00
|
|
|
data.colors.insert(prev_dep_node_index, DepNodeColor::Green(dep_node_index));
|
2018-02-13 17:40:46 +01:00
|
|
|
|
2018-12-22 18:03:40 +01:00
|
|
|
debug!("try_mark_previous_green({:?}) - END - successfully marked as green", dep_node);
|
2017-09-28 16:19:10 +02:00
|
|
|
Some(dep_node_index)
|
2017-09-25 13:51:49 +02:00
|
|
|
}
|
|
|
|
|
2019-04-19 18:49:15 +02:00
|
|
|
/// Atomically emits some loaded diagnostics.
|
|
|
|
/// This may be called concurrently on multiple threads for the same dep node.
|
2018-12-22 18:59:03 +01:00
|
|
|
#[cold]
|
|
|
|
#[inline(never)]
|
2020-03-18 10:25:22 +01:00
|
|
|
fn emit_diagnostics<Ctxt: DepContext<DepKind = K>>(
|
2018-12-22 18:59:03 +01:00
|
|
|
&self,
|
2020-03-18 10:25:22 +01:00
|
|
|
tcx: Ctxt,
|
|
|
|
data: &DepGraphData<K>,
|
2018-12-22 18:59:03 +01:00
|
|
|
dep_node_index: DepNodeIndex,
|
2019-04-19 18:49:15 +02:00
|
|
|
prev_dep_node_index: SerializedDepNodeIndex,
|
2018-12-22 18:59:03 +01:00
|
|
|
diagnostics: Vec<Diagnostic>,
|
|
|
|
) {
|
2019-04-19 18:49:15 +02:00
|
|
|
let mut emitting = data.emitting_diagnostics.lock();
|
|
|
|
|
|
|
|
if data.colors.get(prev_dep_node_index) == Some(DepNodeColor::Green(dep_node_index)) {
|
|
|
|
// The node is already green so diagnostics must have been emitted already
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if emitting.insert(dep_node_index) {
|
|
|
|
// We were the first to insert the node in the set so this thread
|
|
|
|
// must emit the diagnostics and signal other potentially waiting
|
|
|
|
// threads after.
|
|
|
|
mem::drop(emitting);
|
2018-12-22 18:59:03 +01:00
|
|
|
|
|
|
|
// Promote the previous diagnostics to the current session.
|
2020-03-18 10:25:22 +01:00
|
|
|
tcx.store_diagnostics(dep_node_index, diagnostics.clone().into());
|
2019-04-19 18:49:15 +02:00
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
let handle = tcx.diagnostic();
|
2018-12-22 18:59:03 +01:00
|
|
|
|
|
|
|
for diagnostic in diagnostics {
|
2019-09-07 10:20:56 -04:00
|
|
|
handle.emit_diagnostic(&diagnostic);
|
2018-12-22 18:59:03 +01:00
|
|
|
}
|
|
|
|
|
2019-04-19 18:49:15 +02:00
|
|
|
// Mark the node as green now that diagnostics are emitted
|
|
|
|
data.colors.insert(prev_dep_node_index, DepNodeColor::Green(dep_node_index));
|
|
|
|
|
|
|
|
// Remove the node from the set
|
|
|
|
data.emitting_diagnostics.lock().remove(&dep_node_index);
|
|
|
|
|
|
|
|
// Wake up waiters
|
|
|
|
data.emitting_diagnostics_cond_var.notify_all();
|
2018-12-22 18:59:03 +01:00
|
|
|
} else {
|
2019-04-19 18:49:15 +02:00
|
|
|
// We must wait for the other thread to finish emitting the diagnostic
|
2018-12-22 18:59:03 +01:00
|
|
|
|
|
|
|
loop {
|
2019-04-19 18:49:15 +02:00
|
|
|
data.emitting_diagnostics_cond_var.wait(&mut emitting);
|
2019-12-22 17:42:04 -05:00
|
|
|
if data.colors.get(prev_dep_node_index) == Some(DepNodeColor::Green(dep_node_index))
|
|
|
|
{
|
2018-12-22 18:59:03 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-13 17:40:46 +01:00
|
|
|
// Returns true if the given node has been marked as green during the
|
|
|
|
// current compilation session. Used in various assertions
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn is_green(&self, dep_node: &DepNode<K>) -> bool {
|
2018-02-13 17:40:46 +01:00
|
|
|
self.node_color(dep_node).map(|c| c.is_green()).unwrap_or(false)
|
2017-09-25 13:51:49 +02:00
|
|
|
}
|
2017-09-28 11:58:45 +02:00
|
|
|
|
2017-11-20 13:11:03 +01:00
|
|
|
// This method loads all on-disk cacheable query results into memory, so
|
|
|
|
// they can be written out to the new cache file again. Most query results
|
|
|
|
// will already be in memory but in the case where we marked something as
|
|
|
|
// green but then did not need the value, that value will never have been
|
|
|
|
// loaded from disk.
|
|
|
|
//
|
|
|
|
// This method will only load queries that will end up in the disk cache.
|
|
|
|
// Other queries will not be executed.
|
2020-03-18 10:25:22 +01:00
|
|
|
pub fn exec_cache_promotions<Ctxt: DepContext<DepKind = K>>(&self, tcx: Ctxt) {
|
|
|
|
let _prof_timer = tcx.profiler().generic_activity("incr_comp_query_cache_promotion");
|
2019-10-08 14:05:41 +02:00
|
|
|
|
2019-04-05 13:11:44 +02:00
|
|
|
let data = self.data.as_ref().unwrap();
|
|
|
|
for prev_index in data.colors.values.indices() {
|
|
|
|
match data.colors.get(prev_index) {
|
|
|
|
Some(DepNodeColor::Green(_)) => {
|
|
|
|
let dep_node = data.previous.index_to_node(prev_index);
|
2020-03-18 10:25:22 +01:00
|
|
|
tcx.try_load_from_on_disk_cache(&dep_node);
|
2017-11-20 13:11:03 +01:00
|
|
|
}
|
2019-12-22 17:42:04 -05:00
|
|
|
None | Some(DepNodeColor::Red) => {
|
2019-04-05 13:11:44 +02:00
|
|
|
// We can skip red nodes because a node can only be marked
|
|
|
|
// as red if the query result was recomputed and thus is
|
|
|
|
// already in memory.
|
|
|
|
}
|
|
|
|
}
|
2017-11-20 13:11:03 +01:00
|
|
|
}
|
|
|
|
}
|
2019-12-13 14:44:08 +01:00
|
|
|
|
|
|
|
fn next_virtual_depnode_index(&self) -> DepNodeIndex {
|
|
|
|
let index = self.virtual_dep_node_index.fetch_add(1, Relaxed);
|
|
|
|
DepNodeIndex::from_u32(index)
|
|
|
|
}
|
2016-07-21 12:33:23 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/// A "work product" is an intermediate result that we save into the
|
|
|
|
/// incremental directory for later re-use. The primary example are
|
|
|
|
/// the object files that we save for each partition at code
|
|
|
|
/// generation time.
|
|
|
|
///
|
|
|
|
/// Each work product is associated with a dep-node, representing the
|
|
|
|
/// process that produced the work-product. If that dep-node is found
|
|
|
|
/// to be dirty when we load up, then we will delete the work-product
|
2016-07-22 10:39:30 -04:00
|
|
|
/// at load time. If the work-product is found to be clean, then we
|
2016-07-21 12:33:23 -04:00
|
|
|
/// will keep a record in the `previous_work_products` list.
|
|
|
|
///
|
|
|
|
/// In addition, work products have an associated hash. This hash is
|
|
|
|
/// an extra hash that can be used to decide if the work-product from
|
|
|
|
/// a previous compilation can be re-used (in addition to the dirty
|
|
|
|
/// edges check).
|
|
|
|
///
|
|
|
|
/// As the primary example, consider the object files we generate for
|
|
|
|
/// each partition. In the first run, we create partitions based on
|
|
|
|
/// the symbols that need to be compiled. For each partition P, we
|
|
|
|
/// hash the symbols in P and create a `WorkProduct` record associated
|
2018-05-08 16:10:16 +03:00
|
|
|
/// with `DepNode::CodegenUnit(P)`; the hash is the set of symbols
|
2016-07-21 12:33:23 -04:00
|
|
|
/// in P.
|
|
|
|
///
|
2018-05-08 16:10:16 +03:00
|
|
|
/// The next time we compile, if the `DepNode::CodegenUnit(P)` is
|
2016-07-21 12:33:23 -04:00
|
|
|
/// judged to be clean (which means none of the things we read to
|
|
|
|
/// generate the partition were found to be dirty), it will be loaded
|
|
|
|
/// into previous work products. We will then regenerate the set of
|
|
|
|
/// symbols in the partition P and hash them (note that new symbols
|
|
|
|
/// may be added -- for example, new monomorphizations -- even if
|
|
|
|
/// nothing in P changed!). We will compare that hash against the
|
|
|
|
/// previous hash. If it matches up, we can reuse the object file.
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Debug, Encodable, Decodable)]
|
2016-07-21 12:33:23 -04:00
|
|
|
pub struct WorkProduct {
|
2017-06-23 16:37:12 +02:00
|
|
|
pub cgu_name: String,
|
2020-05-12 15:56:02 +10:00
|
|
|
/// Saved file associated with this CGU.
|
|
|
|
pub saved_file: Option<String>,
|
2016-03-28 17:37:34 -04:00
|
|
|
}
|
2017-08-21 16:44:05 +02:00
|
|
|
|
2018-12-22 12:40:23 +01:00
|
|
|
#[derive(Clone)]
|
2020-03-18 10:25:22 +01:00
|
|
|
struct DepNodeData<K> {
|
|
|
|
node: DepNode<K>,
|
2020-03-07 22:46:15 +01:00
|
|
|
edges: EdgesVec,
|
2018-12-22 12:40:23 +01:00
|
|
|
fingerprint: Fingerprint,
|
|
|
|
}
|
|
|
|
|
2019-06-13 22:42:24 +02:00
|
|
|
/// `CurrentDepGraph` stores the dependency graph for the current session.
|
|
|
|
/// It will be populated as we run queries or tasks.
|
|
|
|
///
|
|
|
|
/// The nodes in it are identified by an index (`DepNodeIndex`).
|
|
|
|
/// The data for each node is stored in its `DepNodeData`, found in the `data` field.
|
|
|
|
///
|
|
|
|
/// We never remove nodes from the graph: they are only added.
|
|
|
|
///
|
|
|
|
/// This struct uses two locks internally. The `data` and `node_to_node_index` fields are
|
|
|
|
/// locked separately. Operations that take a `DepNodeIndex` typically just access
|
|
|
|
/// the data field.
|
|
|
|
///
|
|
|
|
/// The only operation that must manipulate both locks is adding new nodes, in which case
|
|
|
|
/// we first acquire the `node_to_node_index` lock and then, once a new node is to be inserted,
|
|
|
|
/// acquire the lock on `data.`
|
2020-03-18 10:25:22 +01:00
|
|
|
pub(super) struct CurrentDepGraph<K> {
|
|
|
|
data: Lock<IndexVec<DepNodeIndex, DepNodeData<K>>>,
|
|
|
|
node_to_node_index: Sharded<FxHashMap<DepNode<K>, DepNodeIndex>>,
|
2019-06-13 22:42:24 +02:00
|
|
|
|
|
|
|
/// Used to trap when a specific edge is added to the graph.
|
|
|
|
/// This is used for debug purposes and is only active with `debug_assertions`.
|
2018-12-25 04:36:17 +01:00
|
|
|
#[allow(dead_code)]
|
2017-09-28 16:19:10 +02:00
|
|
|
forbidden_edge: Option<EdgeFilter>,
|
2017-10-04 12:35:56 +02:00
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Anonymous `DepNode`s are nodes whose IDs we compute from the list of
|
|
|
|
/// their edges. This has the beneficial side-effect that multiple anonymous
|
|
|
|
/// nodes can be coalesced into one without changing the semantics of the
|
|
|
|
/// dependency graph. However, the merging of nodes can lead to a subtle
|
|
|
|
/// problem during red-green marking: The color of an anonymous node from
|
|
|
|
/// the current session might "shadow" the color of the node with the same
|
|
|
|
/// ID from the previous session. In order to side-step this problem, we make
|
|
|
|
/// sure that anonymous `NodeId`s allocated in different sessions don't overlap.
|
|
|
|
/// This is implemented by mixing a session-key into the ID fingerprint of
|
|
|
|
/// each anon node. The session-key is just a random number generated when
|
|
|
|
/// the `DepGraph` is created.
|
2017-10-04 12:35:56 +02:00
|
|
|
anon_id_seed: Fingerprint,
|
2017-11-11 14:32:01 -05:00
|
|
|
|
2019-06-13 22:42:24 +02:00
|
|
|
/// These are simple counters that are for profiling and
|
|
|
|
/// debugging and only active with `debug_assertions`.
|
2019-12-17 16:28:33 -05:00
|
|
|
total_read_count: AtomicU64,
|
|
|
|
total_duplicate_read_count: AtomicU64,
|
2017-08-21 16:44:05 +02:00
|
|
|
}
|
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
impl<K: DepKind> CurrentDepGraph<K> {
|
|
|
|
fn new(prev_graph_node_count: usize) -> CurrentDepGraph<K> {
|
2017-09-28 11:58:45 +02:00
|
|
|
use std::time::{SystemTime, UNIX_EPOCH};
|
|
|
|
|
|
|
|
let duration = SystemTime::now().duration_since(UNIX_EPOCH).unwrap();
|
2019-12-22 17:42:04 -05:00
|
|
|
let nanos = duration.as_secs() * 1_000_000_000 + duration.subsec_nanos() as u64;
|
2017-09-28 11:58:45 +02:00
|
|
|
let mut stable_hasher = StableHasher::new();
|
|
|
|
nanos.hash(&mut stable_hasher);
|
|
|
|
|
2017-09-28 16:19:10 +02:00
|
|
|
let forbidden_edge = if cfg!(debug_assertions) {
|
|
|
|
match env::var("RUST_FORBID_DEP_GRAPH_EDGE") {
|
2019-12-22 17:42:04 -05:00
|
|
|
Ok(s) => match EdgeFilter::new(&s) {
|
|
|
|
Ok(f) => Some(f),
|
2020-03-22 20:47:30 +01:00
|
|
|
Err(err) => panic!("RUST_FORBID_DEP_GRAPH_EDGE invalid: {}", err),
|
2019-12-22 17:42:04 -05:00
|
|
|
},
|
2017-09-28 16:19:10 +02:00
|
|
|
Err(_) => None,
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
|
2018-12-22 12:40:23 +01:00
|
|
|
// Pre-allocate the dep node structures. We over-allocate a little so
|
|
|
|
// that we hopefully don't have to re-allocate during this compilation
|
2019-04-01 16:40:45 +11:00
|
|
|
// session. The over-allocation is 2% plus a small constant to account
|
|
|
|
// for the fact that in very small crates 2% might not be enough.
|
|
|
|
let new_node_count_estimate = (prev_graph_node_count * 102) / 100 + 200;
|
2018-12-22 12:40:23 +01:00
|
|
|
|
2017-08-21 16:44:05 +02:00
|
|
|
CurrentDepGraph {
|
2019-06-13 22:42:24 +02:00
|
|
|
data: Lock::new(IndexVec::with_capacity(new_node_count_estimate)),
|
2019-12-22 17:42:04 -05:00
|
|
|
node_to_node_index: Sharded::new(|| {
|
|
|
|
FxHashMap::with_capacity_and_hasher(
|
|
|
|
new_node_count_estimate / sharded::SHARDS,
|
|
|
|
Default::default(),
|
|
|
|
)
|
|
|
|
}),
|
2017-09-28 11:58:45 +02:00
|
|
|
anon_id_seed: stable_hasher.finish(),
|
2017-09-28 16:19:10 +02:00
|
|
|
forbidden_edge,
|
2019-12-17 16:28:33 -05:00
|
|
|
total_read_count: AtomicU64::new(0),
|
|
|
|
total_duplicate_read_count: AtomicU64::new(0),
|
2017-08-21 16:44:05 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-22 12:40:23 +01:00
|
|
|
fn complete_task(
|
2019-06-13 22:42:24 +02:00
|
|
|
&self,
|
2020-03-18 10:25:22 +01:00
|
|
|
node: DepNode<K>,
|
|
|
|
task_deps: TaskDeps<K>,
|
2019-12-22 17:42:04 -05:00
|
|
|
fingerprint: Fingerprint,
|
2018-12-22 12:40:23 +01:00
|
|
|
) -> DepNodeIndex {
|
2018-12-25 04:36:17 +01:00
|
|
|
self.alloc_node(node, task_deps.reads, fingerprint)
|
|
|
|
}
|
2017-08-21 16:44:05 +02:00
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
fn complete_anon_task(&self, kind: K, task_deps: TaskDeps<K>) -> DepNodeIndex {
|
2019-03-10 10:11:15 +01:00
|
|
|
debug_assert!(!kind.is_eval_always());
|
2017-08-21 16:44:05 +02:00
|
|
|
|
2018-12-25 04:36:17 +01:00
|
|
|
let mut hasher = StableHasher::new();
|
2017-08-21 16:44:05 +02:00
|
|
|
|
2019-04-16 09:59:55 +02:00
|
|
|
// The dep node indices are hashed here instead of hashing the dep nodes of the
|
|
|
|
// dependencies. These indices may refer to different nodes per session, but this isn't
|
|
|
|
// a problem here because we that ensure the final dep node hash is per session only by
|
|
|
|
// combining it with the per session random number `anon_id_seed`. This hash only need
|
|
|
|
// to map the dependencies to a single value on a per session basis.
|
|
|
|
task_deps.reads.hash(&mut hasher);
|
2017-08-21 16:44:05 +02:00
|
|
|
|
2019-04-16 09:59:55 +02:00
|
|
|
let target_dep_node = DepNode {
|
|
|
|
kind,
|
2017-08-21 16:44:05 +02:00
|
|
|
|
2018-12-25 04:36:17 +01:00
|
|
|
// Fingerprint::combine() is faster than sending Fingerprint
|
|
|
|
// through the StableHasher (at least as long as StableHasher
|
|
|
|
// is so slow).
|
2020-11-03 22:23:08 -08:00
|
|
|
hash: PackedFingerprint(self.anon_id_seed.combine(hasher.finish())),
|
2018-12-25 04:36:17 +01:00
|
|
|
};
|
|
|
|
|
2019-04-19 18:49:15 +02:00
|
|
|
self.intern_node(target_dep_node, task_deps.reads, Fingerprint::ZERO)
|
2017-08-21 16:44:05 +02:00
|
|
|
}
|
|
|
|
|
2018-12-23 05:54:10 +01:00
|
|
|
fn alloc_node(
|
2019-06-13 22:42:24 +02:00
|
|
|
&self,
|
2020-03-18 10:25:22 +01:00
|
|
|
dep_node: DepNode<K>,
|
2020-03-07 22:46:15 +01:00
|
|
|
edges: EdgesVec,
|
2019-12-22 17:42:04 -05:00
|
|
|
fingerprint: Fingerprint,
|
2018-12-23 05:54:10 +01:00
|
|
|
) -> DepNodeIndex {
|
2019-12-22 17:42:04 -05:00
|
|
|
debug_assert!(
|
|
|
|
!self.node_to_node_index.get_shard_by_value(&dep_node).lock().contains_key(&dep_node)
|
|
|
|
);
|
2019-04-19 18:49:15 +02:00
|
|
|
self.intern_node(dep_node, edges, fingerprint)
|
2018-12-23 05:54:10 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
fn intern_node(
|
2019-06-13 22:42:24 +02:00
|
|
|
&self,
|
2020-03-18 10:25:22 +01:00
|
|
|
dep_node: DepNode<K>,
|
2020-03-07 22:46:15 +01:00
|
|
|
edges: EdgesVec,
|
2019-12-22 17:42:04 -05:00
|
|
|
fingerprint: Fingerprint,
|
2019-04-19 18:49:15 +02:00
|
|
|
) -> DepNodeIndex {
|
2019-06-13 23:14:44 +02:00
|
|
|
match self.node_to_node_index.get_shard_by_value(&dep_node).lock().entry(dep_node) {
|
2019-04-19 18:49:15 +02:00
|
|
|
Entry::Occupied(entry) => *entry.get(),
|
2018-12-23 05:54:10 +01:00
|
|
|
Entry::Vacant(entry) => {
|
2019-06-13 22:42:24 +02:00
|
|
|
let mut data = self.data.lock();
|
|
|
|
let dep_node_index = DepNodeIndex::new(data.len());
|
2019-12-22 17:42:04 -05:00
|
|
|
data.push(DepNodeData { node: dep_node, edges, fingerprint });
|
2018-12-23 05:54:10 +01:00
|
|
|
entry.insert(dep_node_index);
|
2019-04-19 18:49:15 +02:00
|
|
|
dep_node_index
|
2018-12-23 05:54:10 +01:00
|
|
|
}
|
|
|
|
}
|
2017-08-21 16:44:05 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-18 10:25:22 +01:00
|
|
|
impl<K: DepKind> DepGraphData<K> {
|
2020-02-17 18:38:30 +01:00
|
|
|
#[inline(never)]
|
2018-12-25 04:36:17 +01:00
|
|
|
fn read_index(&self, source: DepNodeIndex) {
|
2020-03-18 10:25:22 +01:00
|
|
|
K::read_deps(|task_deps| {
|
|
|
|
if let Some(task_deps) = task_deps {
|
2018-12-25 04:36:17 +01:00
|
|
|
let mut task_deps = task_deps.lock();
|
2020-03-06 16:44:22 +01:00
|
|
|
let task_deps = &mut *task_deps;
|
2018-12-25 04:36:17 +01:00
|
|
|
if cfg!(debug_assertions) {
|
2019-12-13 14:46:10 +01:00
|
|
|
self.current.total_read_count.fetch_add(1, Relaxed);
|
2018-12-25 04:36:17 +01:00
|
|
|
}
|
2020-03-06 16:44:22 +01:00
|
|
|
|
|
|
|
// As long as we only have a low number of reads we can avoid doing a hash
|
|
|
|
// insert and potentially allocating/reallocating the hashmap
|
|
|
|
let new_read = if task_deps.reads.len() < TASK_DEPS_READS_CAP {
|
|
|
|
task_deps.reads.iter().all(|other| *other != source)
|
|
|
|
} else {
|
|
|
|
task_deps.read_set.insert(source)
|
|
|
|
};
|
|
|
|
if new_read {
|
2018-12-25 04:36:17 +01:00
|
|
|
task_deps.reads.push(source);
|
2020-03-06 16:44:22 +01:00
|
|
|
if task_deps.reads.len() == TASK_DEPS_READS_CAP {
|
|
|
|
// Fill `read_set` with what we have so far so we can use the hashset next
|
|
|
|
// time
|
|
|
|
task_deps.read_set.extend(task_deps.reads.iter().copied());
|
|
|
|
}
|
2018-12-25 04:36:17 +01:00
|
|
|
|
|
|
|
#[cfg(debug_assertions)]
|
|
|
|
{
|
|
|
|
if let Some(target) = task_deps.node {
|
2019-06-13 22:42:24 +02:00
|
|
|
let data = self.current.data.lock();
|
|
|
|
if let Some(ref forbidden_edge) = self.current.forbidden_edge {
|
|
|
|
let source = data[source].node;
|
2018-12-25 04:36:17 +01:00
|
|
|
if forbidden_edge.test(&source, &target) {
|
2020-03-22 20:47:30 +01:00
|
|
|
panic!("forbidden edge {:?} -> {:?} created", source, target)
|
2018-12-25 04:36:17 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if cfg!(debug_assertions) {
|
2019-12-13 14:46:10 +01:00
|
|
|
self.current.total_duplicate_read_count.fetch_add(1, Relaxed);
|
2018-12-25 04:36:17 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
2018-04-25 11:55:12 +02:00
|
|
|
}
|
|
|
|
|
2020-03-07 22:46:15 +01:00
|
|
|
/// The capacity of the `reads` field `SmallVec`
|
2020-03-06 16:44:22 +01:00
|
|
|
const TASK_DEPS_READS_CAP: usize = 8;
|
2020-03-07 22:46:15 +01:00
|
|
|
type EdgesVec = SmallVec<[DepNodeIndex; TASK_DEPS_READS_CAP]>;
|
2020-03-18 10:25:22 +01:00
|
|
|
|
|
|
|
pub struct TaskDeps<K> {
|
2018-12-25 04:36:17 +01:00
|
|
|
#[cfg(debug_assertions)]
|
2020-03-18 10:25:22 +01:00
|
|
|
node: Option<DepNode<K>>,
|
2020-03-07 22:46:15 +01:00
|
|
|
reads: EdgesVec,
|
2018-04-25 11:55:12 +02:00
|
|
|
read_set: FxHashSet<DepNodeIndex>,
|
2020-03-22 20:47:30 +01:00
|
|
|
phantom_data: PhantomData<DepNode<K>>,
|
2020-03-18 10:25:22 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
impl<K> Default for TaskDeps<K> {
|
|
|
|
fn default() -> Self {
|
|
|
|
Self {
|
|
|
|
#[cfg(debug_assertions)]
|
|
|
|
node: None,
|
|
|
|
reads: EdgesVec::new(),
|
|
|
|
read_set: FxHashSet::default(),
|
2020-03-22 20:47:30 +01:00
|
|
|
phantom_data: PhantomData,
|
2020-03-18 10:25:22 +01:00
|
|
|
}
|
|
|
|
}
|
2018-04-25 11:55:12 +02:00
|
|
|
}
|
|
|
|
|
2018-02-13 17:40:46 +01:00
|
|
|
// A data structure that stores Option<DepNodeColor> values as a contiguous
|
|
|
|
// array, using one u32 per entry.
|
|
|
|
struct DepNodeColorMap {
|
2018-12-22 18:03:40 +01:00
|
|
|
values: IndexVec<SerializedDepNodeIndex, AtomicU32>,
|
2018-02-13 17:40:46 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
const COMPRESSED_NONE: u32 = 0;
|
|
|
|
const COMPRESSED_RED: u32 = 1;
|
|
|
|
const COMPRESSED_FIRST_GREEN: u32 = 2;
|
|
|
|
|
|
|
|
impl DepNodeColorMap {
|
|
|
|
fn new(size: usize) -> DepNodeColorMap {
|
2019-12-22 17:42:04 -05:00
|
|
|
DepNodeColorMap { values: (0..size).map(|_| AtomicU32::new(COMPRESSED_NONE)).collect() }
|
2018-02-13 17:40:46 +01:00
|
|
|
}
|
|
|
|
|
2020-03-30 14:36:28 +02:00
|
|
|
#[inline]
|
2018-02-13 17:40:46 +01:00
|
|
|
fn get(&self, index: SerializedDepNodeIndex) -> Option<DepNodeColor> {
|
2018-12-22 18:03:40 +01:00
|
|
|
match self.values[index].load(Ordering::Acquire) {
|
2018-02-13 17:40:46 +01:00
|
|
|
COMPRESSED_NONE => None,
|
|
|
|
COMPRESSED_RED => Some(DepNodeColor::Red),
|
2019-12-22 17:42:04 -05:00
|
|
|
value => {
|
|
|
|
Some(DepNodeColor::Green(DepNodeIndex::from_u32(value - COMPRESSED_FIRST_GREEN)))
|
|
|
|
}
|
2018-02-13 17:40:46 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-22 18:03:40 +01:00
|
|
|
fn insert(&self, index: SerializedDepNodeIndex, color: DepNodeColor) {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.values[index].store(
|
|
|
|
match color {
|
|
|
|
DepNodeColor::Red => COMPRESSED_RED,
|
|
|
|
DepNodeColor::Green(index) => index.as_u32() + COMPRESSED_FIRST_GREEN,
|
|
|
|
},
|
|
|
|
Ordering::Release,
|
|
|
|
)
|
2018-02-13 17:40:46 +01:00
|
|
|
}
|
|
|
|
}
|