1 use crate::interface::{Compiler, Result};
3 use crate::proc_macro_decls;
5 use log::{info, warn, log_enabled};
6 use rustc::dep_graph::DepGraph;
8 use rustc::hir::lowering::lower_crate;
9 use rustc::hir::def_id::{CrateNum, LOCAL_CRATE};
11 use rustc::middle::{self, reachable, resolve_lifetime, stability};
12 use rustc::middle::cstore::{CrateStore, MetadataLoader, MetadataLoaderDyn};
13 use rustc::ty::{self, AllArenas, ResolverOutputs, TyCtxt, GlobalCtxt};
14 use rustc::ty::steal::Steal;
16 use rustc::util::common::{time, ErrorReported};
17 use rustc::session::Session;
18 use rustc::session::config::{self, CrateType, Input, OutputFilenames, OutputType};
19 use rustc::session::config::{PpMode, PpSourceMode};
20 use rustc::session::search_paths::PathKind;
21 use rustc_codegen_ssa::back::link::emit_metadata;
22 use rustc_codegen_utils::codegen_backend::CodegenBackend;
23 use rustc_codegen_utils::link::filename_for_metadata;
24 use rustc_data_structures::{box_region_allow_access, declare_box_region_type, parallel};
25 use rustc_data_structures::sync::{Lrc, Once, ParallelIterator, par_iter};
26 use rustc_errors::PResult;
27 use rustc_incremental;
28 use rustc_metadata::cstore;
30 use rustc_parse::{parse_crate_from_file, parse_crate_from_source_str};
31 use rustc_passes::{self, ast_validation, hir_stats, layout_test};
32 use rustc_plugin_impl as plugin;
33 use rustc_plugin_impl::registry::Registry;
35 use rustc_resolve::{Resolver, ResolverArenas};
37 use rustc_typeck as typeck;
38 use syntax::{self, ast, visit};
39 use syntax::early_buffered_lints::BufferedEarlyLint;
40 use syntax_expand::base::ExtCtxt;
41 use syntax::mut_visit::MutVisitor;
42 use syntax::util::node_count::NodeCounter;
43 use syntax::symbol::Symbol;
44 use syntax_pos::FileName;
47 use rustc_serialize::json;
48 use tempfile::Builder as TempFileBuilder;
50 use std::{env, fs, iter, mem};
52 use std::ffi::OsString;
53 use std::io::{self, Write};
54 use std::path::PathBuf;
55 use std::cell::RefCell;
58 pub fn parse<'a>(sess: &'a Session, input: &Input) -> PResult<'a, ast::Crate> {
60 .set_continue_after_error(sess.opts.debugging_opts.continue_parse_after_error);
61 let krate = time(sess, "parsing", || {
62 let _prof_timer = sess.prof.generic_activity("parse_crate");
65 Input::File(file) => parse_crate_from_file(file, &sess.parse_sess),
66 Input::Str { input, name } => {
67 parse_crate_from_source_str(name.clone(), input.clone(), &sess.parse_sess)
72 sess.diagnostic().set_continue_after_error(true);
74 if sess.opts.debugging_opts.ast_json_noexpand {
75 println!("{}", json::as_json(&krate));
78 if sess.opts.debugging_opts.input_stats {
81 sess.source_map().count_lines()
83 println!("Pre-expansion node count: {}", count_nodes(&krate));
86 if let Some(ref s) = sess.opts.debugging_opts.show_span {
87 syntax::show_span::run(sess.diagnostic(), s, &krate);
90 if sess.opts.debugging_opts.hir_stats {
91 hir_stats::print_ast_stats(&krate, "PRE EXPANSION AST STATS");
97 fn count_nodes(krate: &ast::Crate) -> usize {
98 let mut counter = NodeCounter::new();
99 visit::walk_crate(&mut counter, krate);
103 declare_box_region_type!(
106 (&mut Resolver<'_>) -> (Result<ast::Crate>, ResolverOutputs)
109 /// Runs the "early phases" of the compiler: initial `cfg` processing,
110 /// loading compiler plugins (including those from `addl_plugins`),
111 /// syntax expansion, secondary `cfg` expansion, synthesis of a test
112 /// harness if one is to be provided, injection of a dependency on the
113 /// standard library and prelude, and name resolution.
115 /// Returns `None` if we're aborting after handling -W help.
116 pub fn configure_and_expand(
118 lint_store: Lrc<lint::LintStore>,
119 metadata_loader: Box<MetadataLoaderDyn>,
122 ) -> Result<(ast::Crate, BoxedResolver)> {
123 // Currently, we ignore the name resolution data structures for the purposes of dependency
124 // tracking. Instead we will run name resolution and include its output in the hash of each
125 // item, much like we do for macro expansion. In other words, the hash reflects not just
126 // its contents but the results of name resolution on those contents. Hopefully we'll push
127 // this back at some point.
128 let crate_name = crate_name.to_string();
129 let (result, resolver) = BoxedResolver::new(static move || {
131 let resolver_arenas = Resolver::arenas();
132 let res = configure_and_expand_inner(
140 let mut resolver = match res {
142 yield BoxedResolver::initial_yield(Err(v));
145 Ok((krate, resolver)) => {
146 yield BoxedResolver::initial_yield(Ok(krate));
150 box_region_allow_access!(for(), (&mut Resolver<'_>), (&mut resolver));
151 resolver.into_outputs()
153 result.map(|k| (k, resolver))
157 pub fn to_resolver_outputs(resolver: Rc<RefCell<BoxedResolver>>) -> ResolverOutputs {
158 match Rc::try_unwrap(resolver) {
159 Ok(resolver) => resolver.into_inner().complete(),
160 Err(resolver) => resolver.borrow_mut().access(|resolver| resolver.clone_outputs()),
165 pub fn register_plugins<'a>(
167 metadata_loader: &'a dyn MetadataLoader,
168 register_lints: impl Fn(&Session, &mut lint::LintStore),
169 mut krate: ast::Crate,
171 ) -> Result<(ast::Crate, Lrc<lint::LintStore>)> {
172 krate = time(sess, "attributes injection", || {
173 syntax_ext::cmdline_attrs::inject(
174 krate, &sess.parse_sess, &sess.opts.debugging_opts.crate_attr
178 let (krate, features) = syntax_expand::config::features(
182 &sess.opts.debugging_opts.allow_features,
184 // these need to be set "early" so that expansion sees `quote` if enabled.
185 sess.init_features(features);
187 let crate_types = util::collect_crate_types(sess, &krate.attrs);
188 sess.crate_types.set(crate_types);
190 let disambiguator = util::compute_crate_disambiguator(sess);
191 sess.crate_disambiguator.set(disambiguator);
192 rustc_incremental::prepare_session_directory(sess, &crate_name, disambiguator);
194 if sess.opts.incremental.is_some() {
195 time(sess, "garbage-collect incremental cache directory", || {
197 sess.prof.generic_activity("incr_comp_garbage_collect_session_directories");
198 if let Err(e) = rustc_incremental::garbage_collect_session_directories(sess) {
200 "Error while trying to garbage collect incremental \
201 compilation cache directory: {}",
208 time(sess, "recursion limit", || {
209 middle::recursion_limit::update_limits(sess, &krate);
212 let registrars = time(sess, "plugin loading", || {
213 plugin::load::load_plugins(
217 Some(sess.opts.debugging_opts.extra_plugins.clone()),
221 let mut lint_store = rustc_lint::new_lint_store(
222 sess.opts.debugging_opts.no_interleave_lints,
223 sess.unstable_options(),
226 (register_lints)(&sess, &mut lint_store);
228 let mut registry = Registry::new(sess, &mut lint_store, krate.span);
230 time(sess, "plugin registration", || {
231 for registrar in registrars {
232 registry.args_hidden = Some(registrar.args);
233 (registrar.fun)(&mut registry);
237 *sess.plugin_llvm_passes.borrow_mut() = registry.llvm_passes;
239 Ok((krate, Lrc::new(lint_store)))
242 fn configure_and_expand_inner<'a>(
244 lint_store: &'a lint::LintStore,
245 mut krate: ast::Crate,
247 resolver_arenas: &'a ResolverArenas<'a>,
248 metadata_loader: &'a MetadataLoaderDyn,
249 ) -> Result<(ast::Crate, Resolver<'a>)> {
250 time(sess, "pre-AST-expansion lint checks", || {
251 lint::check_ast_crate(
257 rustc_lint::BuiltinCombinedPreExpansionLintPass::new());
260 let mut resolver = Resolver::new(
267 syntax_ext::register_builtin_macros(&mut resolver, sess.edition());
269 krate = time(sess, "crate injection", || {
270 let alt_std_name = sess.opts.alt_std_name.as_ref().map(|s| Symbol::intern(s));
271 let (krate, name) = syntax_ext::standard_library_imports::inject(
277 if let Some(name) = name {
278 sess.parse_sess.injected_crate_name.set(name);
283 util::check_attr_crate_type(&krate.attrs, &mut resolver.lint_buffer());
286 krate = time(sess, "expansion", || {
287 let _prof_timer = sess.prof.generic_activity("macro_expand_crate");
288 // Windows dlls do not have rpaths, so they don't know how to find their
289 // dependencies. It's up to us to tell the system where to find all the
290 // dependent dlls. Note that this uses cfg!(windows) as opposed to
291 // targ_cfg because syntax extensions are always loaded for the host
292 // compiler, not for the target.
294 // This is somewhat of an inherently racy operation, however, as
295 // multiple threads calling this function could possibly continue
296 // extending PATH far beyond what it should. To solve this for now we
297 // just don't add any new elements to PATH which are already there
298 // within PATH. This is basically a targeted fix at #17360 for rustdoc
299 // which runs rustc in parallel but has been seen (#33844) to cause
300 // problems with PATH becoming too long.
301 let mut old_path = OsString::new();
303 old_path = env::var_os("PATH").unwrap_or(old_path);
304 let mut new_path = sess.host_filesearch(PathKind::All).search_path_dirs();
305 for path in env::split_paths(&old_path) {
306 if !new_path.contains(&path) {
315 .filter(|p| env::join_paths(iter::once(p)).is_ok()),
320 // Create the config for macro expansion
321 let features = sess.features_untracked();
322 let cfg = syntax_expand::expand::ExpansionConfig {
323 features: Some(&features),
324 recursion_limit: *sess.recursion_limit.get(),
325 trace_mac: sess.opts.debugging_opts.trace_macros,
326 should_test: sess.opts.test,
327 ..syntax_expand::expand::ExpansionConfig::default(crate_name.to_string())
330 let mut ecx = ExtCtxt::new(&sess.parse_sess, cfg, &mut resolver);
332 // Expand macros now!
333 let krate = time(sess, "expand crate", || {
334 ecx.monotonic_expander().expand_crate(krate)
337 // The rest is error reporting
339 time(sess, "check unused macros", || {
340 ecx.check_unused_macros();
343 let mut missing_fragment_specifiers: Vec<_> = ecx.parse_sess
344 .missing_fragment_specifiers
349 missing_fragment_specifiers.sort();
351 for span in missing_fragment_specifiers {
352 let lint = lint::builtin::MISSING_FRAGMENT_SPECIFIER;
353 let msg = "missing fragment specifier";
354 resolver.lint_buffer().buffer_lint(lint, ast::CRATE_NODE_ID, span, msg);
357 env::set_var("PATH", &old_path);
362 time(sess, "maybe building test harness", || {
363 syntax_ext::test_harness::inject(
369 &sess.features_untracked(),
370 sess.panic_strategy(),
371 sess.target.target.options.panic_strategy,
372 sess.opts.debugging_opts.panic_abort_tests,
376 // If we're actually rustdoc then there's no need to actually compile
377 // anything, so switch everything to just looping
378 let mut should_loop = sess.opts.actually_rustdoc;
379 if let Some(PpMode::PpmSource(PpSourceMode::PpmEveryBodyLoops)) = sess.opts.pretty {
383 util::ReplaceBodyWithLoop::new(&mut resolver).visit_crate(&mut krate);
386 let has_proc_macro_decls = time(sess, "AST validation", || {
387 ast_validation::check_crate(sess, &krate, &mut resolver.lint_buffer())
391 let crate_types = sess.crate_types.borrow();
392 let is_proc_macro_crate = crate_types.contains(&config::CrateType::ProcMacro);
394 // For backwards compatibility, we don't try to run proc macro injection
395 // if rustdoc is run on a proc macro crate without '--crate-type proc-macro' being
396 // specified. This should only affect users who manually invoke 'rustdoc', as
397 // 'cargo doc' will automatically pass the proper '--crate-type' flags.
398 // However, we do emit a warning, to let such users know that they should
399 // start passing '--crate-type proc-macro'
400 if has_proc_macro_decls && sess.opts.actually_rustdoc && !is_proc_macro_crate {
401 let mut msg = sess.diagnostic().struct_warn(&"Trying to document proc macro crate \
402 without passing '--crate-type proc-macro to rustdoc");
404 msg.warn("The generated documentation may be incorrect");
407 krate = time(sess, "maybe creating a macro crate", || {
408 let num_crate_types = crate_types.len();
409 let is_test_crate = sess.opts.test;
410 syntax_ext::proc_macro_harness::inject(
415 has_proc_macro_decls,
423 // Done with macro expansion!
425 if sess.opts.debugging_opts.input_stats {
426 println!("Post-expansion node count: {}", count_nodes(&krate));
429 if sess.opts.debugging_opts.hir_stats {
430 hir_stats::print_ast_stats(&krate, "POST EXPANSION AST STATS");
433 if sess.opts.debugging_opts.ast_json {
434 println!("{}", json::as_json(&krate));
437 time(sess, "name resolution", || {
438 resolver.resolve_crate(&krate);
441 // Needs to go *after* expansion to be able to check the results of macro expansion.
442 time(sess, "complete gated feature checking", || {
443 syntax::feature_gate::check_crate(
446 &sess.features_untracked(),
447 sess.opts.unstable_features,
451 // Add all buffered lints from the `ParseSess` to the `Session`.
452 sess.parse_sess.buffered_lints.with_lock(|buffered_lints| {
453 info!("{} parse sess buffered_lints", buffered_lints.len());
454 for BufferedEarlyLint{id, span, msg, lint_id} in buffered_lints.drain(..) {
455 let lint = lint::Lint::from_parser_lint_id(lint_id);
456 resolver.lint_buffer().buffer_lint(lint, id, span, &msg);
460 Ok((krate, resolver))
465 lint_store: &lint::LintStore,
466 resolver: &mut Resolver<'_>,
467 dep_graph: &DepGraph,
469 ) -> Result<hir::map::Forest> {
471 let hir_forest = time(sess, "lowering AST -> HIR", || {
472 let nt_to_tokenstream = rustc_parse::nt_to_tokenstream;
473 let hir_crate = lower_crate(sess, &dep_graph, &krate, resolver, nt_to_tokenstream);
475 if sess.opts.debugging_opts.hir_stats {
476 hir_stats::print_hir_stats(&hir_crate);
479 hir::map::Forest::new(hir_crate, &dep_graph)
482 time(sess, "early lint checks", || {
483 lint::check_ast_crate(
488 Some(std::mem::take(resolver.lint_buffer())),
489 rustc_lint::BuiltinCombinedEarlyLintPass::new(),
493 // Discard hygiene data, which isn't required after lowering to HIR.
494 if !sess.opts.debugging_opts.keep_hygiene_data {
495 syntax_pos::hygiene::clear_syntax_context_map();
501 // Returns all the paths that correspond to generated files.
502 fn generated_output_paths(
504 outputs: &OutputFilenames,
508 let mut out_filenames = Vec::new();
509 for output_type in sess.opts.output_types.keys() {
510 let file = outputs.path(*output_type);
512 // If the filename has been overridden using `-o`, it will not be modified
513 // by appending `.rlib`, `.exe`, etc., so we can skip this transformation.
514 OutputType::Exe if !exact_name => for crate_type in sess.crate_types.borrow().iter() {
515 let p = ::rustc_codegen_utils::link::filename_for_input(
521 out_filenames.push(p);
523 OutputType::DepInfo if sess.opts.debugging_opts.dep_info_omit_d_target => {
524 // Don't add the dep-info output when omitting it from dep-info targets
527 out_filenames.push(file);
534 // Runs `f` on every output file path and returns the first non-None result, or None if `f`
535 // returns None for every file path.
536 fn check_output<F, T>(output_paths: &[PathBuf], f: F) -> Option<T>
538 F: Fn(&PathBuf) -> Option<T>,
540 for output_path in output_paths {
541 if let Some(result) = f(output_path) {
548 fn output_contains_path(output_paths: &[PathBuf], input_path: &PathBuf) -> bool {
549 let input_path = input_path.canonicalize().ok();
550 if input_path.is_none() {
553 let check = |output_path: &PathBuf| {
554 if output_path.canonicalize().ok() == input_path {
560 check_output(output_paths, check).is_some()
563 fn output_conflicts_with_dir(output_paths: &[PathBuf]) -> Option<PathBuf> {
564 let check = |output_path: &PathBuf| {
565 if output_path.is_dir() {
566 Some(output_path.clone())
571 check_output(output_paths, check)
574 fn escape_dep_filename(filename: &FileName) -> String {
575 // Apparently clang and gcc *only* escape spaces:
576 // http://llvm.org/klaus/clang/commit/9d50634cfc268ecc9a7250226dd5ca0e945240d4
577 filename.to_string().replace(" ", "\\ ")
582 boxed_resolver: &Steal<Rc<RefCell<BoxedResolver>>>,
583 outputs: &OutputFilenames,
584 out_filenames: &[PathBuf],
586 // Write out dependency rules to the dep-info file if requested
587 if !sess.opts.output_types.contains_key(&OutputType::DepInfo) {
590 let deps_filename = outputs.path(OutputType::DepInfo);
592 let result = (|| -> io::Result<()> {
593 // Build a list of files used to compile the output and
594 // write Makefile-compatible dependency rules
595 let mut files: Vec<String> = sess.source_map()
598 .filter(|fmap| fmap.is_real_file())
599 .filter(|fmap| !fmap.is_imported())
600 .map(|fmap| escape_dep_filename(&fmap.unmapped_path.as_ref().unwrap_or(&fmap.name)))
603 if sess.binary_dep_depinfo() {
604 boxed_resolver.borrow().borrow_mut().access(|resolver| {
605 for cnum in resolver.cstore().crates_untracked() {
606 let source = resolver.cstore().crate_source_untracked(cnum);
607 if let Some((path, _)) = source.dylib {
608 files.push(escape_dep_filename(&FileName::Real(path)));
610 if let Some((path, _)) = source.rlib {
611 files.push(escape_dep_filename(&FileName::Real(path)));
613 if let Some((path, _)) = source.rmeta {
614 files.push(escape_dep_filename(&FileName::Real(path)));
620 let mut file = fs::File::create(&deps_filename)?;
621 for path in out_filenames {
622 writeln!(file, "{}: {}\n", path.display(), files.join(" "))?;
625 // Emit a fake target for each input file to the compilation. This
626 // prevents `make` from spitting out an error if a file is later
627 // deleted. For more info see #28735
629 writeln!(file, "{}:", path)?;
636 if sess.opts.json_artifact_notifications {
637 sess.parse_sess.span_diagnostic
638 .emit_artifact_notification(&deps_filename, "dep-info");
643 "error writing dependencies to `{}`: {}",
644 deps_filename.display(),
651 pub fn prepare_outputs(
655 boxed_resolver: &Steal<Rc<RefCell<BoxedResolver>>>,
657 ) -> Result<OutputFilenames> {
658 // FIXME: rustdoc passes &[] instead of &krate.attrs here
659 let outputs = util::build_output_filenames(
661 &compiler.output_dir,
662 &compiler.output_file,
667 let output_paths = generated_output_paths(
670 compiler.output_file.is_some(),
674 // Ensure the source file isn't accidentally overwritten during compilation.
675 if let Some(ref input_path) = compiler.input_path {
676 if sess.opts.will_create_output_file() {
677 if output_contains_path(&output_paths, input_path) {
679 "the input file \"{}\" would be overwritten by the generated \
683 return Err(ErrorReported);
685 if let Some(dir_path) = output_conflicts_with_dir(&output_paths) {
687 "the generated executable for the input file \"{}\" conflicts with the \
688 existing directory \"{}\"",
689 input_path.display(),
692 return Err(ErrorReported);
697 write_out_deps(sess, boxed_resolver, &outputs, &output_paths);
699 let only_dep_info = sess.opts.output_types.contains_key(&OutputType::DepInfo)
700 && sess.opts.output_types.len() == 1;
703 if let Some(ref dir) = compiler.output_dir {
704 if fs::create_dir_all(dir).is_err() {
705 sess.err("failed to find or create the directory specified by `--out-dir`");
706 return Err(ErrorReported);
714 pub fn default_provide(providers: &mut ty::query::Providers<'_>) {
715 providers.analysis = analysis;
716 proc_macro_decls::provide(providers);
717 plugin::build::provide(providers);
718 hir::provide(providers);
719 mir::provide(providers);
720 reachable::provide(providers);
721 resolve_lifetime::provide(providers);
722 rustc_privacy::provide(providers);
723 typeck::provide(providers);
724 ty::provide(providers);
725 traits::provide(providers);
726 stability::provide(providers);
727 reachable::provide(providers);
728 rustc_passes::provide(providers);
729 rustc_traits::provide(providers);
730 middle::region::provide(providers);
731 cstore::provide(providers);
732 lint::provide(providers);
733 rustc_lint::provide(providers);
734 rustc_codegen_utils::provide(providers);
735 rustc_codegen_ssa::provide(providers);
738 pub fn default_provide_extern(providers: &mut ty::query::Providers<'_>) {
739 cstore::provide_extern(providers);
740 rustc_codegen_ssa::provide_extern(providers);
743 pub struct BoxedGlobalCtxt<'tcx>(&'tcx GlobalCtxt<'tcx>);
745 impl<'gcx> BoxedGlobalCtxt<'gcx> {
746 pub fn enter<F, R>(&mut self, f: F) -> R
748 F: for<'tcx> FnOnce(TyCtxt<'tcx>) -> R,
750 ty::tls::enter_global(self.0, |tcx| f(tcx))
753 pub fn print_stats(&self) {
754 self.0.queries.print_stats()
758 pub fn create_global_ctxt<'gcx>(
759 compiler: &'gcx Compiler,
760 lint_store: Lrc<lint::LintStore>,
761 hir_forest: &'gcx hir::map::Forest,
762 mut resolver_outputs: ResolverOutputs,
763 outputs: OutputFilenames,
765 global_ctxt: &'gcx Once<GlobalCtxt<'gcx>>,
766 arenas: &'gcx Once<AllArenas>,
767 ) -> BoxedGlobalCtxt<'gcx> {
768 let sess = &compiler.session();
769 let codegen_backend = compiler.codegen_backend().clone();
770 let defs = mem::take(&mut resolver_outputs.definitions);
771 let override_queries = compiler.override_queries;
773 let arenas = arenas.init_locking(|| AllArenas::new());
775 // Construct the HIR map.
776 let hir_map = time(sess, "indexing HIR", || {
777 hir::map::map_crate(sess, &*resolver_outputs.cstore, &hir_forest, defs)
780 let query_result_on_disk_cache = time(sess, "load query result cache", || {
781 rustc_incremental::load_query_result_cache(sess)
784 let mut local_providers = ty::query::Providers::default();
785 default_provide(&mut local_providers);
786 codegen_backend.provide(&mut local_providers);
788 let mut extern_providers = local_providers;
789 default_provide_extern(&mut extern_providers);
790 codegen_backend.provide_extern(&mut extern_providers);
792 if let Some(callback) = override_queries {
793 callback(sess, &mut local_providers, &mut extern_providers);
796 let gcx = global_ctxt.init_locking(move || TyCtxt::create_global_ctxt(
804 query_result_on_disk_cache,
809 ty::tls::enter_global(&gcx, |tcx| {
810 // Do some initialization of the DepGraph that can only be done with the
812 time(tcx.sess, "dep graph tcx init", || rustc_incremental::dep_graph_tcx_init(tcx));
818 /// Runs the resolution, type-checking, region checking and other
819 /// miscellaneous analysis passes on the crate.
820 fn analysis(tcx: TyCtxt<'_>, cnum: CrateNum) -> Result<()> {
821 assert_eq!(cnum, LOCAL_CRATE);
824 let mut entry_point = None;
826 time(sess, "misc checking 1", || {
828 entry_point = time(sess, "looking for entry point", || {
829 rustc_passes::entry::find_entry_point(tcx)
832 time(sess, "looking for plugin registrar", || {
833 plugin::build::find_plugin_registrar(tcx)
836 time(sess, "looking for derive registrar", || {
837 proc_macro_decls::find(tcx)
840 par_iter(&tcx.hir().krate().modules).for_each(|(&module, _)| {
841 let local_def_id = tcx.hir().local_def_id(module);
842 tcx.ensure().check_mod_loops(local_def_id);
843 tcx.ensure().check_mod_attrs(local_def_id);
844 tcx.ensure().check_mod_unstable_api_usage(local_def_id);
845 tcx.ensure().check_mod_const_bodies(local_def_id);
850 // passes are timed inside typeck
851 typeck::check_crate(tcx)?;
853 time(sess, "misc checking 2", || {
855 time(sess, "match checking", || {
856 tcx.par_body_owners(|def_id| {
857 tcx.ensure().check_match(def_id);
861 time(sess, "liveness checking + intrinsic checking", || {
862 par_iter(&tcx.hir().krate().modules).for_each(|(&module, _)| {
863 // this must run before MIR dump, because
864 // "not all control paths return a value" is reported here.
866 // maybe move the check to a MIR pass?
867 let local_def_id = tcx.hir().local_def_id(module);
869 tcx.ensure().check_mod_liveness(local_def_id);
870 tcx.ensure().check_mod_intrinsics(local_def_id);
876 time(sess, "MIR borrow checking", || {
877 tcx.par_body_owners(|def_id| tcx.ensure().mir_borrowck(def_id));
880 time(sess, "dumping Chalk-like clauses", || {
881 rustc_traits::lowering::dump_program_clauses(tcx);
884 time(sess, "MIR effect checking", || {
885 for def_id in tcx.body_owners() {
886 mir::transform::check_unsafety::check_unsafety(tcx, def_id)
890 time(sess, "layout testing", || layout_test::test_layout(tcx));
892 // Avoid overwhelming user with errors if borrow checking failed.
893 // I'm not sure how helpful this is, to be honest, but it avoids a
894 // lot of annoying errors in the compile-fail tests (basically,
895 // lint warnings and so on -- kindck used to do this abort, but
896 // kindck is gone now). -nmatsakis
897 if sess.has_errors() {
898 return Err(ErrorReported);
901 time(sess, "misc checking 3", || {
903 time(sess, "privacy access levels", || {
904 tcx.ensure().privacy_access_levels(LOCAL_CRATE);
907 time(sess, "private in public", || {
908 tcx.ensure().check_private_in_public(LOCAL_CRATE);
911 time(sess, "death checking", || rustc_passes::dead::check_crate(tcx));
913 time(sess, "unused lib feature checking", || {
914 stability::check_unused_or_stable_features(tcx)
917 time(sess, "lint checking", || {
918 lint::check_crate(tcx, || rustc_lint::BuiltinCombinedLateLintPass::new());
922 time(sess, "privacy checking modules", || {
923 par_iter(&tcx.hir().krate().modules).for_each(|(&module, _)| {
924 tcx.ensure().check_mod_privacy(tcx.hir().local_def_id(module));
933 fn encode_and_write_metadata(
935 outputs: &OutputFilenames,
936 ) -> (middle::cstore::EncodedMetadata, bool) {
937 #[derive(PartialEq, Eq, PartialOrd, Ord)]
944 let metadata_kind = tcx.sess.crate_types.borrow().iter().map(|ty| {
946 CrateType::Executable |
947 CrateType::Staticlib |
948 CrateType::Cdylib => MetadataKind::None,
950 CrateType::Rlib => MetadataKind::Uncompressed,
953 CrateType::ProcMacro => MetadataKind::Compressed,
955 }).max().unwrap_or(MetadataKind::None);
957 let metadata = match metadata_kind {
958 MetadataKind::None => middle::cstore::EncodedMetadata::new(),
959 MetadataKind::Uncompressed |
960 MetadataKind::Compressed => tcx.encode_metadata(),
963 let need_metadata_file = tcx.sess.opts.output_types.contains_key(&OutputType::Metadata);
964 if need_metadata_file {
965 let crate_name = &tcx.crate_name(LOCAL_CRATE).as_str();
966 let out_filename = filename_for_metadata(tcx.sess, crate_name, outputs);
967 // To avoid races with another rustc process scanning the output directory,
968 // we need to write the file somewhere else and atomically move it to its
969 // final destination, with an `fs::rename` call. In order for the rename to
970 // always succeed, the temporary file needs to be on the same filesystem,
971 // which is why we create it inside the output directory specifically.
972 let metadata_tmpdir = TempFileBuilder::new()
974 .tempdir_in(out_filename.parent().unwrap())
975 .unwrap_or_else(|err| {
976 tcx.sess.fatal(&format!("couldn't create a temp dir: {}", err))
978 let metadata_filename = emit_metadata(tcx.sess, &metadata, &metadata_tmpdir);
979 if let Err(e) = fs::rename(&metadata_filename, &out_filename) {
980 tcx.sess.fatal(&format!("failed to write {}: {}", out_filename.display(), e));
982 if tcx.sess.opts.json_artifact_notifications {
983 tcx.sess.parse_sess.span_diagnostic
984 .emit_artifact_notification(&out_filename, "metadata");
988 let need_metadata_module = metadata_kind == MetadataKind::Compressed;
990 (metadata, need_metadata_module)
993 /// Runs the codegen backend, after which the AST and analysis can
995 pub fn start_codegen<'tcx>(
996 codegen_backend: &dyn CodegenBackend,
998 outputs: &OutputFilenames,
1000 if log_enabled!(::log::Level::Info) {
1001 println!("Pre-codegen");
1002 tcx.print_debug_stats();
1005 let (metadata, need_metadata_module) = time(tcx.sess, "metadata encoding and writing", || {
1006 encode_and_write_metadata(tcx, outputs)
1009 let codegen = time(tcx.sess, "codegen", move || {
1010 let _prof_timer = tcx.prof.generic_activity("codegen_crate");
1011 codegen_backend.codegen_crate(tcx, metadata, need_metadata_module)
1014 if log_enabled!(::log::Level::Info) {
1015 println!("Post-codegen");
1016 tcx.print_debug_stats();
1019 if tcx.sess.opts.output_types.contains_key(&OutputType::Mir) {
1020 if let Err(e) = mir::transform::dump_mir::emit_mir(tcx, outputs) {
1021 tcx.sess.err(&format!("could not emit MIR: {}", e));
1022 tcx.sess.abort_if_errors();