]> git.lizzy.rs Git - rust.git/blob - compiler/rustc_session/src/session.rs
Add LLVM KCFI support to the Rust compiler
[rust.git] / compiler / rustc_session / src / session.rs
1 use crate::cgu_reuse_tracker::CguReuseTracker;
2 use crate::code_stats::CodeStats;
3 pub use crate::code_stats::{DataTypeKind, FieldInfo, SizeKind, VariantInfo};
4 use crate::config::{self, CrateType, InstrumentCoverage, OptLevel, OutputType, SwitchWithOptPath};
5 use crate::errors::{
6     CannotEnableCrtStaticLinux, CannotMixAndMatchSanitizers, LinkerPluginToWindowsNotSupported,
7     NotCircumventFeature, ProfileSampleUseFileDoesNotExist, ProfileUseFileDoesNotExist,
8     SanitizerCfiEnabled, SanitizerNotSupported, SanitizersNotSupported, SkippingConstChecks,
9     SplitDebugInfoUnstablePlatform, StackProtectorNotSupportedForTarget,
10     TargetRequiresUnwindTables, UnleashedFeatureHelp, UnstableVirtualFunctionElimination,
11     UnsupportedDwarfVersion,
12 };
13 use crate::parse::{add_feature_diagnostics, ParseSess};
14 use crate::search_paths::{PathKind, SearchPath};
15 use crate::{filesearch, lint};
16
17 pub use rustc_ast::attr::MarkedAttrs;
18 pub use rustc_ast::Attribute;
19 use rustc_data_structures::flock;
20 use rustc_data_structures::fx::{FxHashMap, FxHashSet};
21 use rustc_data_structures::jobserver::{self, Client};
22 use rustc_data_structures::profiling::{duration_to_secs_str, SelfProfiler, SelfProfilerRef};
23 use rustc_data_structures::sync::{
24     self, AtomicU64, AtomicUsize, Lock, Lrc, OnceCell, OneThread, Ordering, Ordering::SeqCst,
25 };
26 use rustc_errors::annotate_snippet_emitter_writer::AnnotateSnippetEmitterWriter;
27 use rustc_errors::emitter::{Emitter, EmitterWriter, HumanReadableErrorType};
28 use rustc_errors::json::JsonEmitter;
29 use rustc_errors::registry::Registry;
30 use rustc_errors::{
31     error_code, fallback_fluent_bundle, DiagnosticBuilder, DiagnosticId, DiagnosticMessage,
32     ErrorGuaranteed, FluentBundle, IntoDiagnostic, LazyFallbackBundle, MultiSpan, Noted,
33 };
34 use rustc_macros::HashStable_Generic;
35 pub use rustc_span::def_id::StableCrateId;
36 use rustc_span::edition::Edition;
37 use rustc_span::source_map::{FileLoader, RealFileLoader, SourceMap, Span};
38 use rustc_span::{sym, SourceFileHashAlgorithm, Symbol};
39 use rustc_target::asm::InlineAsmArch;
40 use rustc_target::spec::{CodeModel, PanicStrategy, RelocModel, RelroLevel};
41 use rustc_target::spec::{
42     DebuginfoKind, SanitizerSet, SplitDebuginfo, StackProtector, Target, TargetTriple, TlsModel,
43 };
44
45 use std::cell::{self, RefCell};
46 use std::env;
47 use std::fmt;
48 use std::ops::{Div, Mul};
49 use std::path::{Path, PathBuf};
50 use std::str::FromStr;
51 use std::sync::Arc;
52 use std::time::Duration;
53
54 pub struct OptimizationFuel {
55     /// If `-zfuel=crate=n` is specified, initially set to `n`, otherwise `0`.
56     remaining: u64,
57     /// We're rejecting all further optimizations.
58     out_of_fuel: bool,
59 }
60
61 /// The behavior of the CTFE engine when an error occurs with regards to backtraces.
62 #[derive(Clone, Copy)]
63 pub enum CtfeBacktrace {
64     /// Do nothing special, return the error as usual without a backtrace.
65     Disabled,
66     /// Capture a backtrace at the point the error is created and return it in the error
67     /// (to be printed later if/when the error ever actually gets shown to the user).
68     Capture,
69     /// Capture a backtrace at the point the error is created and immediately print it out.
70     Immediate,
71 }
72
73 /// New-type wrapper around `usize` for representing limits. Ensures that comparisons against
74 /// limits are consistent throughout the compiler.
75 #[derive(Clone, Copy, Debug, HashStable_Generic)]
76 pub struct Limit(pub usize);
77
78 impl Limit {
79     /// Create a new limit from a `usize`.
80     pub fn new(value: usize) -> Self {
81         Limit(value)
82     }
83
84     /// Check that `value` is within the limit. Ensures that the same comparisons are used
85     /// throughout the compiler, as mismatches can cause ICEs, see #72540.
86     #[inline]
87     pub fn value_within_limit(&self, value: usize) -> bool {
88         value <= self.0
89     }
90 }
91
92 impl From<usize> for Limit {
93     fn from(value: usize) -> Self {
94         Self::new(value)
95     }
96 }
97
98 impl fmt::Display for Limit {
99     fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
100         self.0.fmt(f)
101     }
102 }
103
104 impl Div<usize> for Limit {
105     type Output = Limit;
106
107     fn div(self, rhs: usize) -> Self::Output {
108         Limit::new(self.0 / rhs)
109     }
110 }
111
112 impl Mul<usize> for Limit {
113     type Output = Limit;
114
115     fn mul(self, rhs: usize) -> Self::Output {
116         Limit::new(self.0 * rhs)
117     }
118 }
119
120 impl rustc_errors::IntoDiagnosticArg for Limit {
121     fn into_diagnostic_arg(self) -> rustc_errors::DiagnosticArgValue<'static> {
122         self.to_string().into_diagnostic_arg()
123     }
124 }
125
126 #[derive(Clone, Copy, Debug, HashStable_Generic)]
127 pub struct Limits {
128     /// The maximum recursion limit for potentially infinitely recursive
129     /// operations such as auto-dereference and monomorphization.
130     pub recursion_limit: Limit,
131     /// The size at which the `large_assignments` lint starts
132     /// being emitted.
133     pub move_size_limit: Limit,
134     /// The maximum length of types during monomorphization.
135     pub type_length_limit: Limit,
136     /// The maximum blocks a const expression can evaluate.
137     pub const_eval_limit: Limit,
138 }
139
140 /// Represents the data associated with a compilation
141 /// session for a single crate.
142 pub struct Session {
143     pub target: Target,
144     pub host: Target,
145     pub opts: config::Options,
146     pub host_tlib_path: Lrc<SearchPath>,
147     pub target_tlib_path: Lrc<SearchPath>,
148     pub parse_sess: ParseSess,
149     pub sysroot: PathBuf,
150     /// The name of the root source file of the crate, in the local file system.
151     /// `None` means that there is no source file.
152     pub local_crate_source_file: Option<PathBuf>,
153
154     crate_types: OnceCell<Vec<CrateType>>,
155     /// The `stable_crate_id` is constructed out of the crate name and all the
156     /// `-C metadata` arguments passed to the compiler. Its value forms a unique
157     /// global identifier for the crate. It is used to allow multiple crates
158     /// with the same name to coexist. See the
159     /// `rustc_codegen_llvm::back::symbol_names` module for more information.
160     pub stable_crate_id: OnceCell<StableCrateId>,
161
162     features: OnceCell<rustc_feature::Features>,
163
164     incr_comp_session: OneThread<RefCell<IncrCompSession>>,
165     /// Used for incremental compilation tests. Will only be populated if
166     /// `-Zquery-dep-graph` is specified.
167     pub cgu_reuse_tracker: CguReuseTracker,
168
169     /// Used by `-Z self-profile`.
170     pub prof: SelfProfilerRef,
171
172     /// Some measurements that are being gathered during compilation.
173     pub perf_stats: PerfStats,
174
175     /// Data about code being compiled, gathered during compilation.
176     pub code_stats: CodeStats,
177
178     /// Tracks fuel info if `-zfuel=crate=n` is specified.
179     optimization_fuel: Lock<OptimizationFuel>,
180
181     /// Always set to zero and incremented so that we can print fuel expended by a crate.
182     pub print_fuel: AtomicU64,
183
184     /// Loaded up early on in the initialization of this `Session` to avoid
185     /// false positives about a job server in our environment.
186     pub jobserver: Client,
187
188     /// Cap lint level specified by a driver specifically.
189     pub driver_lint_caps: FxHashMap<lint::LintId, lint::Level>,
190
191     /// Tracks the current behavior of the CTFE engine when an error occurs.
192     /// Options range from returning the error without a backtrace to returning an error
193     /// and immediately printing the backtrace to stderr.
194     /// The `Lock` is only used by miri to allow setting `ctfe_backtrace` after analysis when
195     /// `MIRI_BACKTRACE` is set. This makes it only apply to miri's errors and not to all CTFE
196     /// errors.
197     pub ctfe_backtrace: Lock<CtfeBacktrace>,
198
199     /// This tracks where `-Zunleash-the-miri-inside-of-you` was used to get around a
200     /// const check, optionally with the relevant feature gate.  We use this to
201     /// warn about unleashing, but with a single diagnostic instead of dozens that
202     /// drown everything else in noise.
203     miri_unleashed_features: Lock<Vec<(Span, Option<Symbol>)>>,
204
205     /// Architecture to use for interpreting asm!.
206     pub asm_arch: Option<InlineAsmArch>,
207
208     /// Set of enabled features for the current target.
209     pub target_features: FxHashSet<Symbol>,
210
211     /// Set of enabled features for the current target, including unstable ones.
212     pub unstable_target_features: FxHashSet<Symbol>,
213 }
214
215 pub struct PerfStats {
216     /// The accumulated time spent on computing symbol hashes.
217     pub symbol_hash_time: Lock<Duration>,
218     /// Total number of values canonicalized queries constructed.
219     pub queries_canonicalized: AtomicUsize,
220     /// Number of times this query is invoked.
221     pub normalize_generic_arg_after_erasing_regions: AtomicUsize,
222     /// Number of times this query is invoked.
223     pub normalize_projection_ty: AtomicUsize,
224 }
225
226 impl Session {
227     pub fn miri_unleashed_feature(&self, span: Span, feature_gate: Option<Symbol>) {
228         self.miri_unleashed_features.lock().push((span, feature_gate));
229     }
230
231     fn check_miri_unleashed_features(&self) {
232         let unleashed_features = self.miri_unleashed_features.lock();
233         if !unleashed_features.is_empty() {
234             let mut must_err = false;
235             // Create a diagnostic pointing at where things got unleashed.
236             self.emit_warning(SkippingConstChecks {
237                 unleashed_features: unleashed_features
238                     .iter()
239                     .map(|(span, gate)| {
240                         gate.map(|gate| {
241                             must_err = true;
242                             UnleashedFeatureHelp::Named { span: *span, gate }
243                         })
244                         .unwrap_or(UnleashedFeatureHelp::Unnamed { span: *span })
245                     })
246                     .collect(),
247             });
248
249             // If we should err, make sure we did.
250             if must_err && self.has_errors().is_none() {
251                 // We have skipped a feature gate, and not run into other errors... reject.
252                 self.emit_err(NotCircumventFeature);
253             }
254         }
255     }
256
257     /// Invoked all the way at the end to finish off diagnostics printing.
258     pub fn finish_diagnostics(&self, registry: &Registry) {
259         self.check_miri_unleashed_features();
260         self.diagnostic().print_error_count(registry);
261         self.emit_future_breakage();
262     }
263
264     fn emit_future_breakage(&self) {
265         if !self.opts.json_future_incompat {
266             return;
267         }
268
269         let diags = self.diagnostic().take_future_breakage_diagnostics();
270         if diags.is_empty() {
271             return;
272         }
273         self.parse_sess.span_diagnostic.emit_future_breakage_report(diags);
274     }
275
276     pub fn local_stable_crate_id(&self) -> StableCrateId {
277         self.stable_crate_id.get().copied().unwrap()
278     }
279
280     pub fn crate_types(&self) -> &[CrateType] {
281         self.crate_types.get().unwrap().as_slice()
282     }
283
284     pub fn init_crate_types(&self, crate_types: Vec<CrateType>) {
285         self.crate_types.set(crate_types).expect("`crate_types` was initialized twice")
286     }
287
288     #[rustc_lint_diagnostics]
289     #[track_caller]
290     pub fn struct_span_warn<S: Into<MultiSpan>>(
291         &self,
292         sp: S,
293         msg: impl Into<DiagnosticMessage>,
294     ) -> DiagnosticBuilder<'_, ()> {
295         self.diagnostic().struct_span_warn(sp, msg)
296     }
297     #[rustc_lint_diagnostics]
298     #[track_caller]
299     pub fn struct_span_warn_with_expectation<S: Into<MultiSpan>>(
300         &self,
301         sp: S,
302         msg: impl Into<DiagnosticMessage>,
303         id: lint::LintExpectationId,
304     ) -> DiagnosticBuilder<'_, ()> {
305         self.diagnostic().struct_span_warn_with_expectation(sp, msg, id)
306     }
307     #[rustc_lint_diagnostics]
308     #[track_caller]
309     pub fn struct_span_warn_with_code<S: Into<MultiSpan>>(
310         &self,
311         sp: S,
312         msg: impl Into<DiagnosticMessage>,
313         code: DiagnosticId,
314     ) -> DiagnosticBuilder<'_, ()> {
315         self.diagnostic().struct_span_warn_with_code(sp, msg, code)
316     }
317     #[rustc_lint_diagnostics]
318     #[track_caller]
319     pub fn struct_warn(&self, msg: impl Into<DiagnosticMessage>) -> DiagnosticBuilder<'_, ()> {
320         self.diagnostic().struct_warn(msg)
321     }
322     #[rustc_lint_diagnostics]
323     #[track_caller]
324     pub fn struct_warn_with_expectation(
325         &self,
326         msg: impl Into<DiagnosticMessage>,
327         id: lint::LintExpectationId,
328     ) -> DiagnosticBuilder<'_, ()> {
329         self.diagnostic().struct_warn_with_expectation(msg, id)
330     }
331     #[rustc_lint_diagnostics]
332     #[track_caller]
333     pub fn struct_span_allow<S: Into<MultiSpan>>(
334         &self,
335         sp: S,
336         msg: impl Into<DiagnosticMessage>,
337     ) -> DiagnosticBuilder<'_, ()> {
338         self.diagnostic().struct_span_allow(sp, msg)
339     }
340     #[rustc_lint_diagnostics]
341     #[track_caller]
342     pub fn struct_allow(&self, msg: impl Into<DiagnosticMessage>) -> DiagnosticBuilder<'_, ()> {
343         self.diagnostic().struct_allow(msg)
344     }
345     #[rustc_lint_diagnostics]
346     #[track_caller]
347     pub fn struct_expect(
348         &self,
349         msg: impl Into<DiagnosticMessage>,
350         id: lint::LintExpectationId,
351     ) -> DiagnosticBuilder<'_, ()> {
352         self.diagnostic().struct_expect(msg, id)
353     }
354     #[rustc_lint_diagnostics]
355     #[track_caller]
356     pub fn struct_span_err<S: Into<MultiSpan>>(
357         &self,
358         sp: S,
359         msg: impl Into<DiagnosticMessage>,
360     ) -> DiagnosticBuilder<'_, ErrorGuaranteed> {
361         self.diagnostic().struct_span_err(sp, msg)
362     }
363     #[rustc_lint_diagnostics]
364     #[track_caller]
365     pub fn struct_span_err_with_code<S: Into<MultiSpan>>(
366         &self,
367         sp: S,
368         msg: impl Into<DiagnosticMessage>,
369         code: DiagnosticId,
370     ) -> DiagnosticBuilder<'_, ErrorGuaranteed> {
371         self.diagnostic().struct_span_err_with_code(sp, msg, code)
372     }
373     // FIXME: This method should be removed (every error should have an associated error code).
374     #[rustc_lint_diagnostics]
375     #[track_caller]
376     pub fn struct_err(
377         &self,
378         msg: impl Into<DiagnosticMessage>,
379     ) -> DiagnosticBuilder<'_, ErrorGuaranteed> {
380         self.parse_sess.struct_err(msg)
381     }
382     #[track_caller]
383     #[rustc_lint_diagnostics]
384     pub fn struct_err_with_code(
385         &self,
386         msg: impl Into<DiagnosticMessage>,
387         code: DiagnosticId,
388     ) -> DiagnosticBuilder<'_, ErrorGuaranteed> {
389         self.diagnostic().struct_err_with_code(msg, code)
390     }
391     #[rustc_lint_diagnostics]
392     #[track_caller]
393     pub fn struct_warn_with_code(
394         &self,
395         msg: impl Into<DiagnosticMessage>,
396         code: DiagnosticId,
397     ) -> DiagnosticBuilder<'_, ()> {
398         self.diagnostic().struct_warn_with_code(msg, code)
399     }
400     #[rustc_lint_diagnostics]
401     #[track_caller]
402     pub fn struct_span_fatal<S: Into<MultiSpan>>(
403         &self,
404         sp: S,
405         msg: impl Into<DiagnosticMessage>,
406     ) -> DiagnosticBuilder<'_, !> {
407         self.diagnostic().struct_span_fatal(sp, msg)
408     }
409     #[rustc_lint_diagnostics]
410     pub fn struct_span_fatal_with_code<S: Into<MultiSpan>>(
411         &self,
412         sp: S,
413         msg: impl Into<DiagnosticMessage>,
414         code: DiagnosticId,
415     ) -> DiagnosticBuilder<'_, !> {
416         self.diagnostic().struct_span_fatal_with_code(sp, msg, code)
417     }
418     #[rustc_lint_diagnostics]
419     pub fn struct_fatal(&self, msg: impl Into<DiagnosticMessage>) -> DiagnosticBuilder<'_, !> {
420         self.diagnostic().struct_fatal(msg)
421     }
422
423     #[rustc_lint_diagnostics]
424     #[track_caller]
425     pub fn span_fatal<S: Into<MultiSpan>>(&self, sp: S, msg: impl Into<DiagnosticMessage>) -> ! {
426         self.diagnostic().span_fatal(sp, msg)
427     }
428     #[rustc_lint_diagnostics]
429     pub fn span_fatal_with_code<S: Into<MultiSpan>>(
430         &self,
431         sp: S,
432         msg: impl Into<DiagnosticMessage>,
433         code: DiagnosticId,
434     ) -> ! {
435         self.diagnostic().span_fatal_with_code(sp, msg, code)
436     }
437     #[rustc_lint_diagnostics]
438     pub fn fatal(&self, msg: impl Into<DiagnosticMessage>) -> ! {
439         self.diagnostic().fatal(msg).raise()
440     }
441     #[rustc_lint_diagnostics]
442     #[track_caller]
443     pub fn span_err_or_warn<S: Into<MultiSpan>>(
444         &self,
445         is_warning: bool,
446         sp: S,
447         msg: impl Into<DiagnosticMessage>,
448     ) {
449         if is_warning {
450             self.span_warn(sp, msg);
451         } else {
452             self.span_err(sp, msg);
453         }
454     }
455     #[rustc_lint_diagnostics]
456     #[track_caller]
457     pub fn span_err<S: Into<MultiSpan>>(
458         &self,
459         sp: S,
460         msg: impl Into<DiagnosticMessage>,
461     ) -> ErrorGuaranteed {
462         self.diagnostic().span_err(sp, msg)
463     }
464     #[rustc_lint_diagnostics]
465     pub fn span_err_with_code<S: Into<MultiSpan>>(
466         &self,
467         sp: S,
468         msg: impl Into<DiagnosticMessage>,
469         code: DiagnosticId,
470     ) {
471         self.diagnostic().span_err_with_code(sp, msg, code)
472     }
473     #[rustc_lint_diagnostics]
474     pub fn err(&self, msg: impl Into<DiagnosticMessage>) -> ErrorGuaranteed {
475         self.diagnostic().err(msg)
476     }
477     #[track_caller]
478     pub fn create_err<'a>(
479         &'a self,
480         err: impl IntoDiagnostic<'a>,
481     ) -> DiagnosticBuilder<'a, ErrorGuaranteed> {
482         self.parse_sess.create_err(err)
483     }
484     #[track_caller]
485     pub fn create_feature_err<'a>(
486         &'a self,
487         err: impl IntoDiagnostic<'a>,
488         feature: Symbol,
489     ) -> DiagnosticBuilder<'a, ErrorGuaranteed> {
490         let mut err = self.parse_sess.create_err(err);
491         if err.code.is_none() {
492             err.code = std::option::Option::Some(error_code!(E0658));
493         }
494         add_feature_diagnostics(&mut err, &self.parse_sess, feature);
495         err
496     }
497     #[track_caller]
498     pub fn emit_err<'a>(&'a self, err: impl IntoDiagnostic<'a>) -> ErrorGuaranteed {
499         self.parse_sess.emit_err(err)
500     }
501     #[track_caller]
502     pub fn create_warning<'a>(
503         &'a self,
504         err: impl IntoDiagnostic<'a, ()>,
505     ) -> DiagnosticBuilder<'a, ()> {
506         self.parse_sess.create_warning(err)
507     }
508     #[track_caller]
509     pub fn emit_warning<'a>(&'a self, warning: impl IntoDiagnostic<'a, ()>) {
510         self.parse_sess.emit_warning(warning)
511     }
512     #[track_caller]
513     pub fn create_note<'a>(
514         &'a self,
515         note: impl IntoDiagnostic<'a, Noted>,
516     ) -> DiagnosticBuilder<'a, Noted> {
517         self.parse_sess.create_note(note)
518     }
519     #[track_caller]
520     pub fn emit_note<'a>(&'a self, note: impl IntoDiagnostic<'a, Noted>) -> Noted {
521         self.parse_sess.emit_note(note)
522     }
523     #[track_caller]
524     pub fn create_fatal<'a>(
525         &'a self,
526         fatal: impl IntoDiagnostic<'a, !>,
527     ) -> DiagnosticBuilder<'a, !> {
528         self.parse_sess.create_fatal(fatal)
529     }
530     #[track_caller]
531     pub fn emit_fatal<'a>(&'a self, fatal: impl IntoDiagnostic<'a, !>) -> ! {
532         self.parse_sess.emit_fatal(fatal)
533     }
534     #[inline]
535     pub fn err_count(&self) -> usize {
536         self.diagnostic().err_count()
537     }
538     pub fn has_errors(&self) -> Option<ErrorGuaranteed> {
539         self.diagnostic().has_errors()
540     }
541     pub fn has_errors_or_delayed_span_bugs(&self) -> bool {
542         self.diagnostic().has_errors_or_delayed_span_bugs()
543     }
544     pub fn abort_if_errors(&self) {
545         self.diagnostic().abort_if_errors();
546     }
547     pub fn compile_status(&self) -> Result<(), ErrorGuaranteed> {
548         if let Some(reported) = self.diagnostic().has_errors_or_lint_errors() {
549             let _ = self.diagnostic().emit_stashed_diagnostics();
550             Err(reported)
551         } else {
552             Ok(())
553         }
554     }
555     // FIXME(matthewjasper) Remove this method, it should never be needed.
556     pub fn track_errors<F, T>(&self, f: F) -> Result<T, ErrorGuaranteed>
557     where
558         F: FnOnce() -> T,
559     {
560         let old_count = self.err_count();
561         let result = f();
562         if self.err_count() == old_count {
563             Ok(result)
564         } else {
565             Err(self.delay_span_bug(
566                 rustc_span::DUMMY_SP,
567                 "`self.err_count()` changed but an error was not emitted",
568             ))
569         }
570     }
571     #[allow(rustc::untranslatable_diagnostic)]
572     #[allow(rustc::diagnostic_outside_of_impl)]
573     #[track_caller]
574     pub fn span_warn<S: Into<MultiSpan>>(&self, sp: S, msg: impl Into<DiagnosticMessage>) {
575         self.diagnostic().span_warn(sp, msg)
576     }
577     #[allow(rustc::untranslatable_diagnostic)]
578     #[allow(rustc::diagnostic_outside_of_impl)]
579     pub fn span_warn_with_code<S: Into<MultiSpan>>(
580         &self,
581         sp: S,
582         msg: impl Into<DiagnosticMessage>,
583         code: DiagnosticId,
584     ) {
585         self.diagnostic().span_warn_with_code(sp, msg, code)
586     }
587     pub fn warn(&self, msg: impl Into<DiagnosticMessage>) {
588         self.diagnostic().warn(msg)
589     }
590     /// Delay a span_bug() call until abort_if_errors()
591     #[track_caller]
592     pub fn delay_span_bug<S: Into<MultiSpan>>(
593         &self,
594         sp: S,
595         msg: impl Into<DiagnosticMessage>,
596     ) -> ErrorGuaranteed {
597         self.diagnostic().delay_span_bug(sp, msg)
598     }
599
600     /// Used for code paths of expensive computations that should only take place when
601     /// warnings or errors are emitted. If no messages are emitted ("good path"), then
602     /// it's likely a bug.
603     pub fn delay_good_path_bug(&self, msg: impl Into<DiagnosticMessage>) {
604         if self.opts.unstable_opts.print_type_sizes
605             || self.opts.unstable_opts.query_dep_graph
606             || self.opts.unstable_opts.dump_mir.is_some()
607             || self.opts.unstable_opts.unpretty.is_some()
608             || self.opts.output_types.contains_key(&OutputType::Mir)
609             || std::env::var_os("RUSTC_LOG").is_some()
610         {
611             return;
612         }
613
614         self.diagnostic().delay_good_path_bug(msg)
615     }
616
617     pub fn note_without_error(&self, msg: impl Into<DiagnosticMessage>) {
618         self.diagnostic().note_without_error(msg)
619     }
620
621     #[track_caller]
622     pub fn span_note_without_error<S: Into<MultiSpan>>(
623         &self,
624         sp: S,
625         msg: impl Into<DiagnosticMessage>,
626     ) {
627         self.diagnostic().span_note_without_error(sp, msg)
628     }
629     #[allow(rustc::untranslatable_diagnostic)]
630     #[allow(rustc::diagnostic_outside_of_impl)]
631     pub fn struct_note_without_error(
632         &self,
633         msg: impl Into<DiagnosticMessage>,
634     ) -> DiagnosticBuilder<'_, ()> {
635         self.diagnostic().struct_note_without_error(msg)
636     }
637
638     #[inline]
639     pub fn diagnostic(&self) -> &rustc_errors::Handler {
640         &self.parse_sess.span_diagnostic
641     }
642
643     #[inline]
644     pub fn source_map(&self) -> &SourceMap {
645         self.parse_sess.source_map()
646     }
647
648     /// Returns `true` if internal lints should be added to the lint store - i.e. if
649     /// `-Zunstable-options` is provided and this isn't rustdoc (internal lints can trigger errors
650     /// to be emitted under rustdoc).
651     pub fn enable_internal_lints(&self) -> bool {
652         self.unstable_options() && !self.opts.actually_rustdoc
653     }
654
655     pub fn instrument_coverage(&self) -> bool {
656         self.opts.cg.instrument_coverage() != InstrumentCoverage::Off
657     }
658
659     pub fn instrument_coverage_except_unused_generics(&self) -> bool {
660         self.opts.cg.instrument_coverage() == InstrumentCoverage::ExceptUnusedGenerics
661     }
662
663     pub fn instrument_coverage_except_unused_functions(&self) -> bool {
664         self.opts.cg.instrument_coverage() == InstrumentCoverage::ExceptUnusedFunctions
665     }
666
667     /// Gets the features enabled for the current compilation session.
668     /// DO NOT USE THIS METHOD if there is a TyCtxt available, as it circumvents
669     /// dependency tracking. Use tcx.features() instead.
670     #[inline]
671     pub fn features_untracked(&self) -> &rustc_feature::Features {
672         self.features.get().unwrap()
673     }
674
675     pub fn init_features(&self, features: rustc_feature::Features) {
676         match self.features.set(features) {
677             Ok(()) => {}
678             Err(_) => panic!("`features` was initialized twice"),
679         }
680     }
681
682     pub fn is_sanitizer_cfi_enabled(&self) -> bool {
683         self.opts.unstable_opts.sanitizer.contains(SanitizerSet::CFI)
684     }
685
686     pub fn is_sanitizer_kcfi_enabled(&self) -> bool {
687         self.opts.unstable_opts.sanitizer.contains(SanitizerSet::KCFI)
688     }
689
690     /// Check whether this compile session and crate type use static crt.
691     pub fn crt_static(&self, crate_type: Option<CrateType>) -> bool {
692         if !self.target.crt_static_respected {
693             // If the target does not opt in to crt-static support, use its default.
694             return self.target.crt_static_default;
695         }
696
697         let requested_features = self.opts.cg.target_feature.split(',');
698         let found_negative = requested_features.clone().any(|r| r == "-crt-static");
699         let found_positive = requested_features.clone().any(|r| r == "+crt-static");
700
701         // JUSTIFICATION: necessary use of crate_types directly (see FIXME below)
702         #[allow(rustc::bad_opt_access)]
703         if found_positive || found_negative {
704             found_positive
705         } else if crate_type == Some(CrateType::ProcMacro)
706             || crate_type == None && self.opts.crate_types.contains(&CrateType::ProcMacro)
707         {
708             // FIXME: When crate_type is not available,
709             // we use compiler options to determine the crate_type.
710             // We can't check `#![crate_type = "proc-macro"]` here.
711             false
712         } else {
713             self.target.crt_static_default
714         }
715     }
716
717     pub fn is_wasi_reactor(&self) -> bool {
718         self.target.options.os == "wasi"
719             && matches!(
720                 self.opts.unstable_opts.wasi_exec_model,
721                 Some(config::WasiExecModel::Reactor)
722             )
723     }
724
725     /// Returns `true` if the target can use the current split debuginfo configuration.
726     pub fn target_can_use_split_dwarf(&self) -> bool {
727         self.target.debuginfo_kind == DebuginfoKind::Dwarf
728     }
729
730     pub fn generate_proc_macro_decls_symbol(&self, stable_crate_id: StableCrateId) -> String {
731         format!("__rustc_proc_macro_decls_{:08x}__", stable_crate_id.to_u64())
732     }
733
734     pub fn target_filesearch(&self, kind: PathKind) -> filesearch::FileSearch<'_> {
735         filesearch::FileSearch::new(
736             &self.sysroot,
737             self.opts.target_triple.triple(),
738             &self.opts.search_paths,
739             &self.target_tlib_path,
740             kind,
741         )
742     }
743     pub fn host_filesearch(&self, kind: PathKind) -> filesearch::FileSearch<'_> {
744         filesearch::FileSearch::new(
745             &self.sysroot,
746             config::host_triple(),
747             &self.opts.search_paths,
748             &self.host_tlib_path,
749             kind,
750         )
751     }
752
753     /// Returns a list of directories where target-specific tool binaries are located.
754     pub fn get_tools_search_paths(&self, self_contained: bool) -> Vec<PathBuf> {
755         let rustlib_path = rustc_target::target_rustlib_path(&self.sysroot, &config::host_triple());
756         let p = PathBuf::from_iter([
757             Path::new(&self.sysroot),
758             Path::new(&rustlib_path),
759             Path::new("bin"),
760         ]);
761         if self_contained { vec![p.clone(), p.join("self-contained")] } else { vec![p] }
762     }
763
764     pub fn init_incr_comp_session(
765         &self,
766         session_dir: PathBuf,
767         lock_file: flock::Lock,
768         load_dep_graph: bool,
769     ) {
770         let mut incr_comp_session = self.incr_comp_session.borrow_mut();
771
772         if let IncrCompSession::NotInitialized = *incr_comp_session {
773         } else {
774             panic!("Trying to initialize IncrCompSession `{:?}`", *incr_comp_session)
775         }
776
777         *incr_comp_session =
778             IncrCompSession::Active { session_directory: session_dir, lock_file, load_dep_graph };
779     }
780
781     pub fn finalize_incr_comp_session(&self, new_directory_path: PathBuf) {
782         let mut incr_comp_session = self.incr_comp_session.borrow_mut();
783
784         if let IncrCompSession::Active { .. } = *incr_comp_session {
785         } else {
786             panic!("trying to finalize `IncrCompSession` `{:?}`", *incr_comp_session);
787         }
788
789         // Note: this will also drop the lock file, thus unlocking the directory.
790         *incr_comp_session = IncrCompSession::Finalized { session_directory: new_directory_path };
791     }
792
793     pub fn mark_incr_comp_session_as_invalid(&self) {
794         let mut incr_comp_session = self.incr_comp_session.borrow_mut();
795
796         let session_directory = match *incr_comp_session {
797             IncrCompSession::Active { ref session_directory, .. } => session_directory.clone(),
798             IncrCompSession::InvalidBecauseOfErrors { .. } => return,
799             _ => panic!("trying to invalidate `IncrCompSession` `{:?}`", *incr_comp_session),
800         };
801
802         // Note: this will also drop the lock file, thus unlocking the directory.
803         *incr_comp_session = IncrCompSession::InvalidBecauseOfErrors { session_directory };
804     }
805
806     pub fn incr_comp_session_dir(&self) -> cell::Ref<'_, PathBuf> {
807         let incr_comp_session = self.incr_comp_session.borrow();
808         cell::Ref::map(incr_comp_session, |incr_comp_session| match *incr_comp_session {
809             IncrCompSession::NotInitialized => panic!(
810                 "trying to get session directory from `IncrCompSession`: {:?}",
811                 *incr_comp_session,
812             ),
813             IncrCompSession::Active { ref session_directory, .. }
814             | IncrCompSession::Finalized { ref session_directory }
815             | IncrCompSession::InvalidBecauseOfErrors { ref session_directory } => {
816                 session_directory
817             }
818         })
819     }
820
821     pub fn incr_comp_session_dir_opt(&self) -> Option<cell::Ref<'_, PathBuf>> {
822         self.opts.incremental.as_ref().map(|_| self.incr_comp_session_dir())
823     }
824
825     pub fn print_perf_stats(&self) {
826         eprintln!(
827             "Total time spent computing symbol hashes:      {}",
828             duration_to_secs_str(*self.perf_stats.symbol_hash_time.lock())
829         );
830         eprintln!(
831             "Total queries canonicalized:                   {}",
832             self.perf_stats.queries_canonicalized.load(Ordering::Relaxed)
833         );
834         eprintln!(
835             "normalize_generic_arg_after_erasing_regions:   {}",
836             self.perf_stats.normalize_generic_arg_after_erasing_regions.load(Ordering::Relaxed)
837         );
838         eprintln!(
839             "normalize_projection_ty:                       {}",
840             self.perf_stats.normalize_projection_ty.load(Ordering::Relaxed)
841         );
842     }
843
844     /// We want to know if we're allowed to do an optimization for crate foo from -z fuel=foo=n.
845     /// This expends fuel if applicable, and records fuel if applicable.
846     pub fn consider_optimizing<T: Fn() -> String>(&self, crate_name: &str, msg: T) -> bool {
847         let mut ret = true;
848         if let Some((ref c, _)) = self.opts.unstable_opts.fuel {
849             if c == crate_name {
850                 assert_eq!(self.threads(), 1);
851                 let mut fuel = self.optimization_fuel.lock();
852                 ret = fuel.remaining != 0;
853                 if fuel.remaining == 0 && !fuel.out_of_fuel {
854                     if self.diagnostic().can_emit_warnings() {
855                         // We only call `msg` in case we can actually emit warnings.
856                         // Otherwise, this could cause a `delay_good_path_bug` to
857                         // trigger (issue #79546).
858                         self.warn(&format!("optimization-fuel-exhausted: {}", msg()));
859                     }
860                     fuel.out_of_fuel = true;
861                 } else if fuel.remaining > 0 {
862                     fuel.remaining -= 1;
863                 }
864             }
865         }
866         if let Some(ref c) = self.opts.unstable_opts.print_fuel {
867             if c == crate_name {
868                 assert_eq!(self.threads(), 1);
869                 self.print_fuel.fetch_add(1, SeqCst);
870             }
871         }
872         ret
873     }
874
875     pub fn rust_2015(&self) -> bool {
876         self.edition() == Edition::Edition2015
877     }
878
879     /// Are we allowed to use features from the Rust 2018 edition?
880     pub fn rust_2018(&self) -> bool {
881         self.edition() >= Edition::Edition2018
882     }
883
884     /// Are we allowed to use features from the Rust 2021 edition?
885     pub fn rust_2021(&self) -> bool {
886         self.edition() >= Edition::Edition2021
887     }
888
889     /// Are we allowed to use features from the Rust 2024 edition?
890     pub fn rust_2024(&self) -> bool {
891         self.edition() >= Edition::Edition2024
892     }
893
894     /// Returns `true` if we cannot skip the PLT for shared library calls.
895     pub fn needs_plt(&self) -> bool {
896         // Check if the current target usually needs PLT to be enabled.
897         // The user can use the command line flag to override it.
898         let needs_plt = self.target.needs_plt;
899
900         let dbg_opts = &self.opts.unstable_opts;
901
902         let relro_level = dbg_opts.relro_level.unwrap_or(self.target.relro_level);
903
904         // Only enable this optimization by default if full relro is also enabled.
905         // In this case, lazy binding was already unavailable, so nothing is lost.
906         // This also ensures `-Wl,-z,now` is supported by the linker.
907         let full_relro = RelroLevel::Full == relro_level;
908
909         // If user didn't explicitly forced us to use / skip the PLT,
910         // then try to skip it where possible.
911         dbg_opts.plt.unwrap_or(needs_plt || !full_relro)
912     }
913
914     /// Checks if LLVM lifetime markers should be emitted.
915     pub fn emit_lifetime_markers(&self) -> bool {
916         self.opts.optimize != config::OptLevel::No
917         // AddressSanitizer uses lifetimes to detect use after scope bugs.
918         // MemorySanitizer uses lifetimes to detect use of uninitialized stack variables.
919         // HWAddressSanitizer will use lifetimes to detect use after scope bugs in the future.
920         || self.opts.unstable_opts.sanitizer.intersects(SanitizerSet::ADDRESS | SanitizerSet::MEMORY | SanitizerSet::HWADDRESS)
921     }
922
923     pub fn is_proc_macro_attr(&self, attr: &Attribute) -> bool {
924         [sym::proc_macro, sym::proc_macro_attribute, sym::proc_macro_derive]
925             .iter()
926             .any(|kind| attr.has_name(*kind))
927     }
928
929     pub fn contains_name(&self, attrs: &[Attribute], name: Symbol) -> bool {
930         attrs.iter().any(|item| item.has_name(name))
931     }
932
933     pub fn find_by_name<'a>(
934         &'a self,
935         attrs: &'a [Attribute],
936         name: Symbol,
937     ) -> Option<&'a Attribute> {
938         attrs.iter().find(|attr| attr.has_name(name))
939     }
940
941     pub fn filter_by_name<'a>(
942         &'a self,
943         attrs: &'a [Attribute],
944         name: Symbol,
945     ) -> impl Iterator<Item = &'a Attribute> {
946         attrs.iter().filter(move |attr| attr.has_name(name))
947     }
948
949     pub fn first_attr_value_str_by_name(
950         &self,
951         attrs: &[Attribute],
952         name: Symbol,
953     ) -> Option<Symbol> {
954         attrs.iter().find(|at| at.has_name(name)).and_then(|at| at.value_str())
955     }
956 }
957
958 // JUSTIFICATION: defn of the suggested wrapper fns
959 #[allow(rustc::bad_opt_access)]
960 impl Session {
961     pub fn verbose(&self) -> bool {
962         self.opts.unstable_opts.verbose
963     }
964
965     pub fn instrument_mcount(&self) -> bool {
966         self.opts.unstable_opts.instrument_mcount
967     }
968
969     pub fn time_passes(&self) -> bool {
970         self.opts.unstable_opts.time_passes
971     }
972
973     pub fn time_llvm_passes(&self) -> bool {
974         self.opts.unstable_opts.time_llvm_passes
975     }
976
977     pub fn meta_stats(&self) -> bool {
978         self.opts.unstable_opts.meta_stats
979     }
980
981     pub fn asm_comments(&self) -> bool {
982         self.opts.unstable_opts.asm_comments
983     }
984
985     pub fn verify_llvm_ir(&self) -> bool {
986         self.opts.unstable_opts.verify_llvm_ir || option_env!("RUSTC_VERIFY_LLVM_IR").is_some()
987     }
988
989     pub fn print_llvm_passes(&self) -> bool {
990         self.opts.unstable_opts.print_llvm_passes
991     }
992
993     pub fn binary_dep_depinfo(&self) -> bool {
994         self.opts.unstable_opts.binary_dep_depinfo
995     }
996
997     pub fn mir_opt_level(&self) -> usize {
998         self.opts
999             .unstable_opts
1000             .mir_opt_level
1001             .unwrap_or_else(|| if self.opts.optimize != OptLevel::No { 2 } else { 1 })
1002     }
1003
1004     /// Calculates the flavor of LTO to use for this compilation.
1005     pub fn lto(&self) -> config::Lto {
1006         // If our target has codegen requirements ignore the command line
1007         if self.target.requires_lto {
1008             return config::Lto::Fat;
1009         }
1010
1011         // If the user specified something, return that. If they only said `-C
1012         // lto` and we've for whatever reason forced off ThinLTO via the CLI,
1013         // then ensure we can't use a ThinLTO.
1014         match self.opts.cg.lto {
1015             config::LtoCli::Unspecified => {
1016                 // The compiler was invoked without the `-Clto` flag. Fall
1017                 // through to the default handling
1018             }
1019             config::LtoCli::No => {
1020                 // The user explicitly opted out of any kind of LTO
1021                 return config::Lto::No;
1022             }
1023             config::LtoCli::Yes | config::LtoCli::Fat | config::LtoCli::NoParam => {
1024                 // All of these mean fat LTO
1025                 return config::Lto::Fat;
1026             }
1027             config::LtoCli::Thin => {
1028                 // The user explicitly asked for ThinLTO
1029                 return config::Lto::Thin;
1030             }
1031         }
1032
1033         // Ok at this point the target doesn't require anything and the user
1034         // hasn't asked for anything. Our next decision is whether or not
1035         // we enable "auto" ThinLTO where we use multiple codegen units and
1036         // then do ThinLTO over those codegen units. The logic below will
1037         // either return `No` or `ThinLocal`.
1038
1039         // If processing command line options determined that we're incompatible
1040         // with ThinLTO (e.g., `-C lto --emit llvm-ir`) then return that option.
1041         if self.opts.cli_forced_local_thinlto_off {
1042             return config::Lto::No;
1043         }
1044
1045         // If `-Z thinlto` specified process that, but note that this is mostly
1046         // a deprecated option now that `-C lto=thin` exists.
1047         if let Some(enabled) = self.opts.unstable_opts.thinlto {
1048             if enabled {
1049                 return config::Lto::ThinLocal;
1050             } else {
1051                 return config::Lto::No;
1052             }
1053         }
1054
1055         // If there's only one codegen unit and LTO isn't enabled then there's
1056         // no need for ThinLTO so just return false.
1057         if self.codegen_units() == 1 {
1058             return config::Lto::No;
1059         }
1060
1061         // Now we're in "defaults" territory. By default we enable ThinLTO for
1062         // optimized compiles (anything greater than O0).
1063         match self.opts.optimize {
1064             config::OptLevel::No => config::Lto::No,
1065             _ => config::Lto::ThinLocal,
1066         }
1067     }
1068
1069     /// Returns the panic strategy for this compile session. If the user explicitly selected one
1070     /// using '-C panic', use that, otherwise use the panic strategy defined by the target.
1071     pub fn panic_strategy(&self) -> PanicStrategy {
1072         self.opts.cg.panic.unwrap_or(self.target.panic_strategy)
1073     }
1074
1075     pub fn fewer_names(&self) -> bool {
1076         if let Some(fewer_names) = self.opts.unstable_opts.fewer_names {
1077             fewer_names
1078         } else {
1079             let more_names = self.opts.output_types.contains_key(&OutputType::LlvmAssembly)
1080                 || self.opts.output_types.contains_key(&OutputType::Bitcode)
1081                 // AddressSanitizer and MemorySanitizer use alloca name when reporting an issue.
1082                 || self.opts.unstable_opts.sanitizer.intersects(SanitizerSet::ADDRESS | SanitizerSet::MEMORY);
1083             !more_names
1084         }
1085     }
1086
1087     pub fn unstable_options(&self) -> bool {
1088         self.opts.unstable_opts.unstable_options
1089     }
1090
1091     pub fn is_nightly_build(&self) -> bool {
1092         self.opts.unstable_features.is_nightly_build()
1093     }
1094
1095     pub fn overflow_checks(&self) -> bool {
1096         self.opts.cg.overflow_checks.unwrap_or(self.opts.debug_assertions)
1097     }
1098
1099     pub fn relocation_model(&self) -> RelocModel {
1100         self.opts.cg.relocation_model.unwrap_or(self.target.relocation_model)
1101     }
1102
1103     pub fn code_model(&self) -> Option<CodeModel> {
1104         self.opts.cg.code_model.or(self.target.code_model)
1105     }
1106
1107     pub fn tls_model(&self) -> TlsModel {
1108         self.opts.unstable_opts.tls_model.unwrap_or(self.target.tls_model)
1109     }
1110
1111     pub fn split_debuginfo(&self) -> SplitDebuginfo {
1112         self.opts.cg.split_debuginfo.unwrap_or(self.target.split_debuginfo)
1113     }
1114
1115     pub fn stack_protector(&self) -> StackProtector {
1116         if self.target.options.supports_stack_protector {
1117             self.opts.unstable_opts.stack_protector
1118         } else {
1119             StackProtector::None
1120         }
1121     }
1122
1123     pub fn must_emit_unwind_tables(&self) -> bool {
1124         // This is used to control the emission of the `uwtable` attribute on
1125         // LLVM functions.
1126         //
1127         // Unwind tables are needed when compiling with `-C panic=unwind`, but
1128         // LLVM won't omit unwind tables unless the function is also marked as
1129         // `nounwind`, so users are allowed to disable `uwtable` emission.
1130         // Historically rustc always emits `uwtable` attributes by default, so
1131         // even they can be disabled, they're still emitted by default.
1132         //
1133         // On some targets (including windows), however, exceptions include
1134         // other events such as illegal instructions, segfaults, etc. This means
1135         // that on Windows we end up still needing unwind tables even if the `-C
1136         // panic=abort` flag is passed.
1137         //
1138         // You can also find more info on why Windows needs unwind tables in:
1139         //      https://bugzilla.mozilla.org/show_bug.cgi?id=1302078
1140         //
1141         // If a target requires unwind tables, then they must be emitted.
1142         // Otherwise, we can defer to the `-C force-unwind-tables=<yes/no>`
1143         // value, if it is provided, or disable them, if not.
1144         self.target.requires_uwtable
1145             || self.opts.cg.force_unwind_tables.unwrap_or(
1146                 self.panic_strategy() == PanicStrategy::Unwind || self.target.default_uwtable,
1147             )
1148     }
1149
1150     /// Returns the number of query threads that should be used for this
1151     /// compilation
1152     pub fn threads(&self) -> usize {
1153         self.opts.unstable_opts.threads
1154     }
1155
1156     /// Returns the number of codegen units that should be used for this
1157     /// compilation
1158     pub fn codegen_units(&self) -> usize {
1159         if let Some(n) = self.opts.cli_forced_codegen_units {
1160             return n;
1161         }
1162         if let Some(n) = self.target.default_codegen_units {
1163             return n as usize;
1164         }
1165
1166         // If incremental compilation is turned on, we default to a high number
1167         // codegen units in order to reduce the "collateral damage" small
1168         // changes cause.
1169         if self.opts.incremental.is_some() {
1170             return 256;
1171         }
1172
1173         // Why is 16 codegen units the default all the time?
1174         //
1175         // The main reason for enabling multiple codegen units by default is to
1176         // leverage the ability for the codegen backend to do codegen and
1177         // optimization in parallel. This allows us, especially for large crates, to
1178         // make good use of all available resources on the machine once we've
1179         // hit that stage of compilation. Large crates especially then often
1180         // take a long time in codegen/optimization and this helps us amortize that
1181         // cost.
1182         //
1183         // Note that a high number here doesn't mean that we'll be spawning a
1184         // large number of threads in parallel. The backend of rustc contains
1185         // global rate limiting through the `jobserver` crate so we'll never
1186         // overload the system with too much work, but rather we'll only be
1187         // optimizing when we're otherwise cooperating with other instances of
1188         // rustc.
1189         //
1190         // Rather a high number here means that we should be able to keep a lot
1191         // of idle cpus busy. By ensuring that no codegen unit takes *too* long
1192         // to build we'll be guaranteed that all cpus will finish pretty closely
1193         // to one another and we should make relatively optimal use of system
1194         // resources
1195         //
1196         // Note that the main cost of codegen units is that it prevents LLVM
1197         // from inlining across codegen units. Users in general don't have a lot
1198         // of control over how codegen units are split up so it's our job in the
1199         // compiler to ensure that undue performance isn't lost when using
1200         // codegen units (aka we can't require everyone to slap `#[inline]` on
1201         // everything).
1202         //
1203         // If we're compiling at `-O0` then the number doesn't really matter too
1204         // much because performance doesn't matter and inlining is ok to lose.
1205         // In debug mode we just want to try to guarantee that no cpu is stuck
1206         // doing work that could otherwise be farmed to others.
1207         //
1208         // In release mode, however (O1 and above) performance does indeed
1209         // matter! To recover the loss in performance due to inlining we'll be
1210         // enabling ThinLTO by default (the function for which is just below).
1211         // This will ensure that we recover any inlining wins we otherwise lost
1212         // through codegen unit partitioning.
1213         //
1214         // ---
1215         //
1216         // Ok that's a lot of words but the basic tl;dr; is that we want a high
1217         // number here -- but not too high. Additionally we're "safe" to have it
1218         // always at the same number at all optimization levels.
1219         //
1220         // As a result 16 was chosen here! Mostly because it was a power of 2
1221         // and most benchmarks agreed it was roughly a local optimum. Not very
1222         // scientific.
1223         16
1224     }
1225
1226     pub fn teach(&self, code: &DiagnosticId) -> bool {
1227         self.opts.unstable_opts.teach && self.diagnostic().must_teach(code)
1228     }
1229
1230     pub fn edition(&self) -> Edition {
1231         self.opts.edition
1232     }
1233
1234     pub fn link_dead_code(&self) -> bool {
1235         self.opts.cg.link_dead_code.unwrap_or(false)
1236     }
1237 }
1238
1239 // JUSTIFICATION: part of session construction
1240 #[allow(rustc::bad_opt_access)]
1241 fn default_emitter(
1242     sopts: &config::Options,
1243     registry: rustc_errors::registry::Registry,
1244     source_map: Lrc<SourceMap>,
1245     bundle: Option<Lrc<FluentBundle>>,
1246     fallback_bundle: LazyFallbackBundle,
1247 ) -> Box<dyn Emitter + sync::Send> {
1248     let macro_backtrace = sopts.unstable_opts.macro_backtrace;
1249     let track_diagnostics = sopts.unstable_opts.track_diagnostics;
1250     match sopts.error_format {
1251         config::ErrorOutputType::HumanReadable(kind) => {
1252             let (short, color_config) = kind.unzip();
1253
1254             if let HumanReadableErrorType::AnnotateSnippet(_) = kind {
1255                 let emitter = AnnotateSnippetEmitterWriter::new(
1256                     Some(source_map),
1257                     bundle,
1258                     fallback_bundle,
1259                     short,
1260                     macro_backtrace,
1261                 );
1262                 Box::new(emitter.ui_testing(sopts.unstable_opts.ui_testing))
1263             } else {
1264                 let emitter = EmitterWriter::stderr(
1265                     color_config,
1266                     Some(source_map),
1267                     bundle,
1268                     fallback_bundle,
1269                     short,
1270                     sopts.unstable_opts.teach,
1271                     sopts.diagnostic_width,
1272                     macro_backtrace,
1273                     track_diagnostics,
1274                 );
1275                 Box::new(emitter.ui_testing(sopts.unstable_opts.ui_testing))
1276             }
1277         }
1278         config::ErrorOutputType::Json { pretty, json_rendered } => Box::new(
1279             JsonEmitter::stderr(
1280                 Some(registry),
1281                 source_map,
1282                 bundle,
1283                 fallback_bundle,
1284                 pretty,
1285                 json_rendered,
1286                 sopts.diagnostic_width,
1287                 macro_backtrace,
1288                 track_diagnostics,
1289             )
1290             .ui_testing(sopts.unstable_opts.ui_testing),
1291         ),
1292     }
1293 }
1294
1295 // JUSTIFICATION: literally session construction
1296 #[allow(rustc::bad_opt_access)]
1297 pub fn build_session(
1298     sopts: config::Options,
1299     local_crate_source_file: Option<PathBuf>,
1300     bundle: Option<Lrc<rustc_errors::FluentBundle>>,
1301     registry: rustc_errors::registry::Registry,
1302     driver_lint_caps: FxHashMap<lint::LintId, lint::Level>,
1303     file_loader: Option<Box<dyn FileLoader + Send + Sync + 'static>>,
1304     target_override: Option<Target>,
1305 ) -> Session {
1306     // FIXME: This is not general enough to make the warning lint completely override
1307     // normal diagnostic warnings, since the warning lint can also be denied and changed
1308     // later via the source code.
1309     let warnings_allow = sopts
1310         .lint_opts
1311         .iter()
1312         .rfind(|&&(ref key, _)| *key == "warnings")
1313         .map_or(false, |&(_, level)| level == lint::Allow);
1314     let cap_lints_allow = sopts.lint_cap.map_or(false, |cap| cap == lint::Allow);
1315     let can_emit_warnings = !(warnings_allow || cap_lints_allow);
1316
1317     let sysroot = match &sopts.maybe_sysroot {
1318         Some(sysroot) => sysroot.clone(),
1319         None => filesearch::get_or_default_sysroot().expect("Failed finding sysroot"),
1320     };
1321
1322     let target_cfg = config::build_target_config(&sopts, target_override, &sysroot);
1323     let host_triple = TargetTriple::from_triple(config::host_triple());
1324     let (host, target_warnings) = Target::search(&host_triple, &sysroot).unwrap_or_else(|e| {
1325         early_error(sopts.error_format, &format!("Error loading host specification: {e}"))
1326     });
1327     for warning in target_warnings.warning_messages() {
1328         early_warn(sopts.error_format, &warning)
1329     }
1330
1331     let loader = file_loader.unwrap_or_else(|| Box::new(RealFileLoader));
1332     let hash_kind = sopts.unstable_opts.src_hash_algorithm.unwrap_or_else(|| {
1333         if target_cfg.is_like_msvc {
1334             SourceFileHashAlgorithm::Sha1
1335         } else {
1336             SourceFileHashAlgorithm::Md5
1337         }
1338     });
1339     let source_map = Lrc::new(SourceMap::with_file_loader_and_hash_kind(
1340         loader,
1341         sopts.file_path_mapping(),
1342         hash_kind,
1343     ));
1344
1345     let fallback_bundle = fallback_fluent_bundle(
1346         rustc_errors::DEFAULT_LOCALE_RESOURCES,
1347         sopts.unstable_opts.translate_directionality_markers,
1348     );
1349     let emitter = default_emitter(&sopts, registry, source_map.clone(), bundle, fallback_bundle);
1350
1351     let span_diagnostic = rustc_errors::Handler::with_emitter_and_flags(
1352         emitter,
1353         sopts.unstable_opts.diagnostic_handler_flags(can_emit_warnings),
1354     );
1355
1356     let self_profiler = if let SwitchWithOptPath::Enabled(ref d) = sopts.unstable_opts.self_profile
1357     {
1358         let directory =
1359             if let Some(ref directory) = d { directory } else { std::path::Path::new(".") };
1360
1361         let profiler = SelfProfiler::new(
1362             directory,
1363             sopts.crate_name.as_deref(),
1364             sopts.unstable_opts.self_profile_events.as_ref().map(|xs| &xs[..]),
1365             &sopts.unstable_opts.self_profile_counter,
1366         );
1367         match profiler {
1368             Ok(profiler) => Some(Arc::new(profiler)),
1369             Err(e) => {
1370                 early_warn(sopts.error_format, &format!("failed to create profiler: {e}"));
1371                 None
1372             }
1373         }
1374     } else {
1375         None
1376     };
1377
1378     let mut parse_sess = ParseSess::with_span_handler(span_diagnostic, source_map);
1379     parse_sess.assume_incomplete_release = sopts.unstable_opts.assume_incomplete_release;
1380
1381     let host_triple = config::host_triple();
1382     let target_triple = sopts.target_triple.triple();
1383     let host_tlib_path = Lrc::new(SearchPath::from_sysroot_and_triple(&sysroot, host_triple));
1384     let target_tlib_path = if host_triple == target_triple {
1385         // Use the same `SearchPath` if host and target triple are identical to avoid unnecessary
1386         // rescanning of the target lib path and an unnecessary allocation.
1387         host_tlib_path.clone()
1388     } else {
1389         Lrc::new(SearchPath::from_sysroot_and_triple(&sysroot, target_triple))
1390     };
1391
1392     let file_path_mapping = sopts.file_path_mapping();
1393
1394     let local_crate_source_file =
1395         local_crate_source_file.map(|path| file_path_mapping.map_prefix(path).0);
1396
1397     let optimization_fuel = Lock::new(OptimizationFuel {
1398         remaining: sopts.unstable_opts.fuel.as_ref().map_or(0, |i| i.1),
1399         out_of_fuel: false,
1400     });
1401     let print_fuel = AtomicU64::new(0);
1402
1403     let cgu_reuse_tracker = if sopts.unstable_opts.query_dep_graph {
1404         CguReuseTracker::new()
1405     } else {
1406         CguReuseTracker::new_disabled()
1407     };
1408
1409     let prof = SelfProfilerRef::new(self_profiler, sopts.unstable_opts.time_passes);
1410
1411     let ctfe_backtrace = Lock::new(match env::var("RUSTC_CTFE_BACKTRACE") {
1412         Ok(ref val) if val == "immediate" => CtfeBacktrace::Immediate,
1413         Ok(ref val) if val != "0" => CtfeBacktrace::Capture,
1414         _ => CtfeBacktrace::Disabled,
1415     });
1416
1417     let asm_arch =
1418         if target_cfg.allow_asm { InlineAsmArch::from_str(&target_cfg.arch).ok() } else { None };
1419
1420     let sess = Session {
1421         target: target_cfg,
1422         host,
1423         opts: sopts,
1424         host_tlib_path,
1425         target_tlib_path,
1426         parse_sess,
1427         sysroot,
1428         local_crate_source_file,
1429         crate_types: OnceCell::new(),
1430         stable_crate_id: OnceCell::new(),
1431         features: OnceCell::new(),
1432         incr_comp_session: OneThread::new(RefCell::new(IncrCompSession::NotInitialized)),
1433         cgu_reuse_tracker,
1434         prof,
1435         perf_stats: PerfStats {
1436             symbol_hash_time: Lock::new(Duration::from_secs(0)),
1437             queries_canonicalized: AtomicUsize::new(0),
1438             normalize_generic_arg_after_erasing_regions: AtomicUsize::new(0),
1439             normalize_projection_ty: AtomicUsize::new(0),
1440         },
1441         code_stats: Default::default(),
1442         optimization_fuel,
1443         print_fuel,
1444         jobserver: jobserver::client(),
1445         driver_lint_caps,
1446         ctfe_backtrace,
1447         miri_unleashed_features: Lock::new(Default::default()),
1448         asm_arch,
1449         target_features: FxHashSet::default(),
1450         unstable_target_features: FxHashSet::default(),
1451     };
1452
1453     validate_commandline_args_with_session_available(&sess);
1454
1455     sess
1456 }
1457
1458 /// Validate command line arguments with a `Session`.
1459 ///
1460 /// If it is useful to have a Session available already for validating a commandline argument, you
1461 /// can do so here.
1462 // JUSTIFICATION: needs to access args to validate them
1463 #[allow(rustc::bad_opt_access)]
1464 fn validate_commandline_args_with_session_available(sess: &Session) {
1465     // Since we don't know if code in an rlib will be linked to statically or
1466     // dynamically downstream, rustc generates `__imp_` symbols that help linkers
1467     // on Windows deal with this lack of knowledge (#27438). Unfortunately,
1468     // these manually generated symbols confuse LLD when it tries to merge
1469     // bitcode during ThinLTO. Therefore we disallow dynamic linking on Windows
1470     // when compiling for LLD ThinLTO. This way we can validly just not generate
1471     // the `dllimport` attributes and `__imp_` symbols in that case.
1472     if sess.opts.cg.linker_plugin_lto.enabled()
1473         && sess.opts.cg.prefer_dynamic
1474         && sess.target.is_like_windows
1475     {
1476         sess.emit_err(LinkerPluginToWindowsNotSupported);
1477     }
1478
1479     // Make sure that any given profiling data actually exists so LLVM can't
1480     // decide to silently skip PGO.
1481     if let Some(ref path) = sess.opts.cg.profile_use {
1482         if !path.exists() {
1483             sess.emit_err(ProfileUseFileDoesNotExist { path });
1484         }
1485     }
1486
1487     // Do the same for sample profile data.
1488     if let Some(ref path) = sess.opts.unstable_opts.profile_sample_use {
1489         if !path.exists() {
1490             sess.emit_err(ProfileSampleUseFileDoesNotExist { path });
1491         }
1492     }
1493
1494     // Unwind tables cannot be disabled if the target requires them.
1495     if let Some(include_uwtables) = sess.opts.cg.force_unwind_tables {
1496         if sess.target.requires_uwtable && !include_uwtables {
1497             sess.emit_err(TargetRequiresUnwindTables);
1498         }
1499     }
1500
1501     // Sanitizers can only be used on platforms that we know have working sanitizer codegen.
1502     let supported_sanitizers = sess.target.options.supported_sanitizers;
1503     let unsupported_sanitizers = sess.opts.unstable_opts.sanitizer - supported_sanitizers;
1504     match unsupported_sanitizers.into_iter().count() {
1505         0 => {}
1506         1 => {
1507             sess.emit_err(SanitizerNotSupported { us: unsupported_sanitizers.to_string() });
1508         }
1509         _ => {
1510             sess.emit_err(SanitizersNotSupported { us: unsupported_sanitizers.to_string() });
1511         }
1512     }
1513     // Cannot mix and match sanitizers.
1514     let mut sanitizer_iter = sess.opts.unstable_opts.sanitizer.into_iter();
1515     if let (Some(first), Some(second)) = (sanitizer_iter.next(), sanitizer_iter.next()) {
1516         sess.emit_err(CannotMixAndMatchSanitizers {
1517             first: first.to_string(),
1518             second: second.to_string(),
1519         });
1520     }
1521
1522     // Cannot enable crt-static with sanitizers on Linux
1523     if sess.crt_static(None) && !sess.opts.unstable_opts.sanitizer.is_empty() {
1524         sess.emit_err(CannotEnableCrtStaticLinux);
1525     }
1526
1527     // LLVM CFI and VFE both require LTO.
1528     if sess.lto() != config::Lto::Fat {
1529         if sess.is_sanitizer_cfi_enabled() {
1530             sess.emit_err(SanitizerCfiEnabled);
1531         }
1532         if sess.opts.unstable_opts.virtual_function_elimination {
1533             sess.emit_err(UnstableVirtualFunctionElimination);
1534         }
1535     }
1536
1537     // LLVM CFI and KCFI are mutually exclusive
1538     if sess.is_sanitizer_cfi_enabled() && sess.is_sanitizer_kcfi_enabled() {
1539         sess.emit_err(CannotMixAndMatchSanitizers {
1540             first: "cfi".to_string(),
1541             second: "kcfi".to_string(),
1542         });
1543     }
1544
1545     if sess.opts.unstable_opts.stack_protector != StackProtector::None {
1546         if !sess.target.options.supports_stack_protector {
1547             sess.emit_warning(StackProtectorNotSupportedForTarget {
1548                 stack_protector: sess.opts.unstable_opts.stack_protector,
1549                 target_triple: &sess.opts.target_triple,
1550             });
1551         }
1552     }
1553
1554     if let Some(dwarf_version) = sess.opts.unstable_opts.dwarf_version {
1555         if dwarf_version > 5 {
1556             sess.emit_err(UnsupportedDwarfVersion { dwarf_version });
1557         }
1558     }
1559
1560     if !sess.target.options.supported_split_debuginfo.contains(&sess.split_debuginfo())
1561         && !sess.opts.unstable_opts.unstable_options
1562     {
1563         sess.emit_err(SplitDebugInfoUnstablePlatform { debuginfo: sess.split_debuginfo() });
1564     }
1565 }
1566
1567 /// Holds data on the current incremental compilation session, if there is one.
1568 #[derive(Debug)]
1569 pub enum IncrCompSession {
1570     /// This is the state the session will be in until the incr. comp. dir is
1571     /// needed.
1572     NotInitialized,
1573     /// This is the state during which the session directory is private and can
1574     /// be modified.
1575     Active { session_directory: PathBuf, lock_file: flock::Lock, load_dep_graph: bool },
1576     /// This is the state after the session directory has been finalized. In this
1577     /// state, the contents of the directory must not be modified any more.
1578     Finalized { session_directory: PathBuf },
1579     /// This is an error state that is reached when some compilation error has
1580     /// occurred. It indicates that the contents of the session directory must
1581     /// not be used, since they might be invalid.
1582     InvalidBecauseOfErrors { session_directory: PathBuf },
1583 }
1584
1585 fn early_error_handler(output: config::ErrorOutputType) -> rustc_errors::Handler {
1586     let fallback_bundle = fallback_fluent_bundle(rustc_errors::DEFAULT_LOCALE_RESOURCES, false);
1587     let emitter: Box<dyn Emitter + sync::Send> = match output {
1588         config::ErrorOutputType::HumanReadable(kind) => {
1589             let (short, color_config) = kind.unzip();
1590             Box::new(EmitterWriter::stderr(
1591                 color_config,
1592                 None,
1593                 None,
1594                 fallback_bundle,
1595                 short,
1596                 false,
1597                 None,
1598                 false,
1599                 false,
1600             ))
1601         }
1602         config::ErrorOutputType::Json { pretty, json_rendered } => Box::new(JsonEmitter::basic(
1603             pretty,
1604             json_rendered,
1605             None,
1606             fallback_bundle,
1607             None,
1608             false,
1609             false,
1610         )),
1611     };
1612     rustc_errors::Handler::with_emitter(true, None, emitter)
1613 }
1614
1615 #[allow(rustc::untranslatable_diagnostic)]
1616 #[allow(rustc::diagnostic_outside_of_impl)]
1617 pub fn early_error_no_abort(output: config::ErrorOutputType, msg: &str) -> ErrorGuaranteed {
1618     early_error_handler(output).struct_err(msg).emit()
1619 }
1620
1621 #[allow(rustc::untranslatable_diagnostic)]
1622 #[allow(rustc::diagnostic_outside_of_impl)]
1623 pub fn early_error(output: config::ErrorOutputType, msg: &str) -> ! {
1624     early_error_handler(output).struct_fatal(msg).emit()
1625 }
1626
1627 #[allow(rustc::untranslatable_diagnostic)]
1628 #[allow(rustc::diagnostic_outside_of_impl)]
1629 pub fn early_warn(output: config::ErrorOutputType, msg: &str) {
1630     early_error_handler(output).struct_warn(msg).emit()
1631 }