1 use crate::interface::{Compiler, Result};
3 use crate::proc_macro_decls;
5 use log::{info, warn, log_enabled};
6 use rustc::dep_graph::DepGraph;
8 use rustc::hir::lowering::lower_crate;
9 use rustc::hir::def_id::{CrateNum, LOCAL_CRATE};
11 use rustc::middle::{self, reachable, resolve_lifetime, stability};
12 use rustc::middle::cstore::CrateStore;
13 use rustc::ty::{self, AllArenas, Resolutions, TyCtxt, GlobalCtxt};
14 use rustc::ty::steal::Steal;
16 use rustc::util::common::{time, ErrorReported};
17 use rustc::session::Session;
18 use rustc::session::config::{self, CrateType, Input, OutputFilenames, OutputType};
19 use rustc::session::search_paths::PathKind;
20 use rustc_codegen_ssa::back::link::emit_metadata;
21 use rustc_codegen_utils::codegen_backend::CodegenBackend;
22 use rustc_codegen_utils::link::filename_for_metadata;
23 use rustc_data_structures::{box_region_allow_access, declare_box_region_type, parallel};
24 use rustc_data_structures::sync::{Lrc, ParallelIterator, par_iter};
25 use rustc_incremental;
26 use rustc_metadata::creader::CrateLoader;
27 use rustc_metadata::cstore::{self, CStore};
29 use rustc_passes::{self, ast_validation, hir_stats, layout_test};
30 use rustc_plugin as plugin;
31 use rustc_plugin::registry::Registry;
33 use rustc_resolve::{Resolver, ResolverArenas};
35 use rustc_typeck as typeck;
36 use syntax::{self, ast, visit};
37 use syntax::early_buffered_lints::BufferedEarlyLint;
38 use syntax_expand::base::{NamedSyntaxExtension, ExtCtxt};
39 use syntax::mut_visit::MutVisitor;
40 use syntax::parse::{self, PResult};
41 use syntax::util::node_count::NodeCounter;
42 use syntax::symbol::Symbol;
43 use syntax_pos::FileName;
46 use rustc_serialize::json;
47 use tempfile::Builder as TempFileBuilder;
51 use std::ffi::OsString;
53 use std::io::{self, Write};
55 use std::path::PathBuf;
56 use std::cell::RefCell;
59 pub fn parse<'a>(sess: &'a Session, input: &Input) -> PResult<'a, ast::Crate> {
61 .set_continue_after_error(sess.opts.debugging_opts.continue_parse_after_error);
62 let krate = time(sess, "parsing", || {
63 let _prof_timer = sess.prof.generic_activity("parse_crate");
66 Input::File(ref file) => parse::parse_crate_from_file(file, &sess.parse_sess),
70 } => parse::parse_crate_from_source_str(name.clone(), input.clone(), &sess.parse_sess),
74 sess.diagnostic().set_continue_after_error(true);
76 if sess.opts.debugging_opts.ast_json_noexpand {
77 println!("{}", json::as_json(&krate));
80 if sess.opts.debugging_opts.input_stats {
83 sess.source_map().count_lines()
85 println!("Pre-expansion node count: {}", count_nodes(&krate));
88 if let Some(ref s) = sess.opts.debugging_opts.show_span {
89 syntax::show_span::run(sess.diagnostic(), s, &krate);
92 if sess.opts.debugging_opts.hir_stats {
93 hir_stats::print_ast_stats(&krate, "PRE EXPANSION AST STATS");
99 fn count_nodes(krate: &ast::Crate) -> usize {
100 let mut counter = NodeCounter::new();
101 visit::walk_crate(&mut counter, krate);
105 declare_box_region_type!(
108 (&mut Resolver<'_>) -> (Result<ast::Crate>, ExpansionResult)
111 /// Runs the "early phases" of the compiler: initial `cfg` processing,
112 /// loading compiler plugins (including those from `addl_plugins`),
113 /// syntax expansion, secondary `cfg` expansion, synthesis of a test
114 /// harness if one is to be provided, injection of a dependency on the
115 /// standard library and prelude, and name resolution.
117 /// Returns `None` if we're aborting after handling -W help.
118 pub fn configure_and_expand(
120 lint_store: Lrc<lint::LintStore>,
124 plugin_info: PluginInfo,
125 ) -> Result<(ast::Crate, BoxedResolver)> {
126 // Currently, we ignore the name resolution data structures for the purposes of dependency
127 // tracking. Instead we will run name resolution and include its output in the hash of each
128 // item, much like we do for macro expansion. In other words, the hash reflects not just
129 // its contents but the results of name resolution on those contents. Hopefully we'll push
130 // this back at some point.
131 let crate_name = crate_name.to_string();
132 let (result, resolver) = BoxedResolver::new(static move || {
134 let crate_loader = CrateLoader::new(sess, &*cstore, &crate_name);
135 let resolver_arenas = Resolver::arenas();
136 let res = configure_and_expand_inner(
146 let mut resolver = match res {
148 yield BoxedResolver::initial_yield(Err(v));
151 Ok((krate, resolver)) => {
152 yield BoxedResolver::initial_yield(Ok(krate));
156 box_region_allow_access!(for(), (&mut Resolver<'_>), (&mut resolver));
157 ExpansionResult::from_owned_resolver(resolver)
159 result.map(|k| (k, resolver))
162 pub struct ExpansionResult {
163 pub defs: Steal<hir::map::Definitions>,
164 pub resolutions: Steal<Resolutions>,
167 impl ExpansionResult {
168 fn from_owned_resolver(
169 resolver: Resolver<'_>,
172 defs: Steal::new(resolver.definitions),
173 resolutions: Steal::new(Resolutions {
174 extern_crate_map: resolver.extern_crate_map,
175 export_map: resolver.export_map,
176 trait_map: resolver.trait_map,
177 glob_map: resolver.glob_map,
178 maybe_unused_trait_imports: resolver.maybe_unused_trait_imports,
179 maybe_unused_extern_crates: resolver.maybe_unused_extern_crates,
180 extern_prelude: resolver.extern_prelude.iter().map(|(ident, entry)| {
181 (ident.name, entry.introduced_by_item)
187 pub fn from_resolver_ref(
188 resolver: &Resolver<'_>,
191 defs: Steal::new(resolver.definitions.clone()),
192 resolutions: Steal::new(Resolutions {
193 extern_crate_map: resolver.extern_crate_map.clone(),
194 export_map: resolver.export_map.clone(),
195 trait_map: resolver.trait_map.clone(),
196 glob_map: resolver.glob_map.clone(),
197 maybe_unused_trait_imports: resolver.maybe_unused_trait_imports.clone(),
198 maybe_unused_extern_crates: resolver.maybe_unused_extern_crates.clone(),
199 extern_prelude: resolver.extern_prelude.iter().map(|(ident, entry)| {
200 (ident.name, entry.introduced_by_item)
208 pub fn to_expansion_result(
209 resolver: Rc<RefCell<BoxedResolver>>,
210 ) -> ExpansionResult {
211 match Rc::try_unwrap(resolver) {
212 Ok(resolver) => resolver.into_inner().complete(),
214 let resolver = &*resolver;
215 resolver.borrow_mut().access(|resolver| {
216 ExpansionResult::from_resolver_ref(resolver)
223 pub struct PluginInfo {
224 syntax_exts: Vec<NamedSyntaxExtension>,
227 pub fn register_plugins<'a>(
230 mut krate: ast::Crate,
232 ) -> Result<(ast::Crate, PluginInfo, Lrc<lint::LintStore>)> {
233 krate = time(sess, "attributes injection", || {
234 syntax_ext::cmdline_attrs::inject(
235 krate, &sess.parse_sess, &sess.opts.debugging_opts.crate_attr
239 let (krate, features) = syntax::config::features(
243 &sess.opts.debugging_opts.allow_features,
245 // these need to be set "early" so that expansion sees `quote` if enabled.
246 sess.init_features(features);
248 let crate_types = util::collect_crate_types(sess, &krate.attrs);
249 sess.crate_types.set(crate_types);
251 let disambiguator = util::compute_crate_disambiguator(sess);
252 sess.crate_disambiguator.set(disambiguator);
253 rustc_incremental::prepare_session_directory(sess, &crate_name, disambiguator);
255 if sess.opts.incremental.is_some() {
256 time(sess, "garbage-collect incremental cache directory", || {
258 sess.prof.generic_activity("incr_comp_garbage_collect_session_directories");
259 if let Err(e) = rustc_incremental::garbage_collect_session_directories(sess) {
261 "Error while trying to garbage collect incremental \
262 compilation cache directory: {}",
269 time(sess, "recursion limit", || {
270 middle::recursion_limit::update_limits(sess, &krate);
273 let registrars = time(sess, "plugin loading", || {
274 plugin::load::load_plugins(
279 Some(sess.opts.debugging_opts.extra_plugins.clone()),
283 let mut lint_store = rustc_lint::new_lint_store(
284 sess.opts.debugging_opts.no_interleave_lints,
285 sess.unstable_options(),
288 let mut registry = Registry::new(sess, &mut lint_store, krate.span);
290 time(sess, "plugin registration", || {
291 for registrar in registrars {
292 registry.args_hidden = Some(registrar.args);
293 (registrar.fun)(&mut registry);
304 *sess.plugin_llvm_passes.borrow_mut() = llvm_passes;
305 *sess.plugin_attributes.borrow_mut() = attributes;
307 Ok((krate, PluginInfo { syntax_exts }, Lrc::new(lint_store)))
310 fn configure_and_expand_inner<'a>(
312 lint_store: &'a lint::LintStore,
314 mut krate: ast::Crate,
316 resolver_arenas: &'a ResolverArenas<'a>,
317 crate_loader: &'a CrateLoader<'a>,
318 plugin_info: PluginInfo,
319 ) -> Result<(ast::Crate, Resolver<'a>)> {
320 time(sess, "pre-AST-expansion lint checks", || {
321 lint::check_ast_crate(
326 rustc_lint::BuiltinCombinedPreExpansionLintPass::new());
329 let mut resolver = Resolver::new(
337 syntax_ext::register_builtin_macros(&mut resolver, sess.edition());
339 krate = time(sess, "crate injection", || {
340 let alt_std_name = sess.opts.alt_std_name.as_ref().map(|s| Symbol::intern(s));
341 let (krate, name) = syntax_ext::standard_library_imports::inject(
347 if let Some(name) = name {
348 sess.parse_sess.injected_crate_name.set(name);
353 syntax_ext::plugin_macro_defs::inject(
354 &mut krate, &mut resolver, plugin_info.syntax_exts, sess.edition()
358 krate = time(sess, "expansion", || {
359 let _prof_timer = sess.prof.generic_activity("macro_expand_crate");
360 // Windows dlls do not have rpaths, so they don't know how to find their
361 // dependencies. It's up to us to tell the system where to find all the
362 // dependent dlls. Note that this uses cfg!(windows) as opposed to
363 // targ_cfg because syntax extensions are always loaded for the host
364 // compiler, not for the target.
366 // This is somewhat of an inherently racy operation, however, as
367 // multiple threads calling this function could possibly continue
368 // extending PATH far beyond what it should. To solve this for now we
369 // just don't add any new elements to PATH which are already there
370 // within PATH. This is basically a targeted fix at #17360 for rustdoc
371 // which runs rustc in parallel but has been seen (#33844) to cause
372 // problems with PATH becoming too long.
373 let mut old_path = OsString::new();
375 old_path = env::var_os("PATH").unwrap_or(old_path);
376 let mut new_path = sess.host_filesearch(PathKind::All).search_path_dirs();
377 for path in env::split_paths(&old_path) {
378 if !new_path.contains(&path) {
387 .filter(|p| env::join_paths(iter::once(p)).is_ok()),
392 // Create the config for macro expansion
393 let features = sess.features_untracked();
394 let cfg = syntax_expand::expand::ExpansionConfig {
395 features: Some(&features),
396 recursion_limit: *sess.recursion_limit.get(),
397 trace_mac: sess.opts.debugging_opts.trace_macros,
398 should_test: sess.opts.test,
399 ..syntax_expand::expand::ExpansionConfig::default(crate_name.to_string())
402 let mut ecx = ExtCtxt::new(&sess.parse_sess, cfg, &mut resolver);
404 // Expand macros now!
405 let krate = time(sess, "expand crate", || {
406 ecx.monotonic_expander().expand_crate(krate)
409 // The rest is error reporting
411 time(sess, "check unused macros", || {
412 ecx.check_unused_macros();
415 let mut missing_fragment_specifiers: Vec<_> = ecx.parse_sess
416 .missing_fragment_specifiers
421 missing_fragment_specifiers.sort();
423 for span in missing_fragment_specifiers {
424 let lint = lint::builtin::MISSING_FRAGMENT_SPECIFIER;
425 let msg = "missing fragment specifier";
426 sess.buffer_lint(lint, ast::CRATE_NODE_ID, span, msg);
429 env::set_var("PATH", &old_path);
434 time(sess, "maybe building test harness", || {
435 syntax_ext::test_harness::inject(
441 &sess.features_untracked(),
442 sess.panic_strategy(),
443 sess.target.target.options.panic_strategy,
444 sess.opts.debugging_opts.panic_abort_tests,
448 // If we're actually rustdoc then there's no need to actually compile
449 // anything, so switch everything to just looping
450 if sess.opts.actually_rustdoc {
451 util::ReplaceBodyWithLoop::new(sess).visit_crate(&mut krate);
454 let has_proc_macro_decls = time(sess, "AST validation", || {
455 ast_validation::check_crate(sess, &krate)
459 let crate_types = sess.crate_types.borrow();
460 let is_proc_macro_crate = crate_types.contains(&config::CrateType::ProcMacro);
462 // For backwards compatibility, we don't try to run proc macro injection
463 // if rustdoc is run on a proc macro crate without '--crate-type proc-macro' being
464 // specified. This should only affect users who manually invoke 'rustdoc', as
465 // 'cargo doc' will automatically pass the proper '--crate-type' flags.
466 // However, we do emit a warning, to let such users know that they should
467 // start passing '--crate-type proc-macro'
468 if has_proc_macro_decls && sess.opts.actually_rustdoc && !is_proc_macro_crate {
469 let mut msg = sess.diagnostic().struct_warn(&"Trying to document proc macro crate \
470 without passing '--crate-type proc-macro to rustdoc");
472 msg.warn("The generated documentation may be incorrect");
475 krate = time(sess, "maybe creating a macro crate", || {
476 let num_crate_types = crate_types.len();
477 let is_test_crate = sess.opts.test;
478 syntax_ext::proc_macro_harness::inject(
483 has_proc_macro_decls,
491 // Done with macro expansion!
493 if sess.opts.debugging_opts.input_stats {
494 println!("Post-expansion node count: {}", count_nodes(&krate));
497 if sess.opts.debugging_opts.hir_stats {
498 hir_stats::print_ast_stats(&krate, "POST EXPANSION AST STATS");
501 if sess.opts.debugging_opts.ast_json {
502 println!("{}", json::as_json(&krate));
505 time(sess, "name resolution", || {
506 resolver.resolve_crate(&krate);
509 // Needs to go *after* expansion to be able to check the results of macro expansion.
510 time(sess, "complete gated feature checking", || {
511 syntax::feature_gate::check_crate(
514 &sess.features_untracked(),
515 sess.opts.unstable_features,
519 // Add all buffered lints from the `ParseSess` to the `Session`.
520 sess.parse_sess.buffered_lints.with_lock(|buffered_lints| {
521 info!("{} parse sess buffered_lints", buffered_lints.len());
522 for BufferedEarlyLint{id, span, msg, lint_id} in buffered_lints.drain(..) {
523 let lint = lint::Lint::from_parser_lint_id(lint_id);
524 sess.buffer_lint(lint, id, span, &msg);
528 Ok((krate, resolver))
533 lint_store: &lint::LintStore,
535 resolver: &mut Resolver<'_>,
536 dep_graph: &DepGraph,
538 ) -> Result<hir::map::Forest> {
540 let hir_forest = time(sess, "lowering AST -> HIR", || {
541 let nt_to_tokenstream = syntax::parse::nt_to_tokenstream;
542 let hir_crate = lower_crate(sess, cstore, &dep_graph, &krate, resolver, nt_to_tokenstream);
544 if sess.opts.debugging_opts.hir_stats {
545 hir_stats::print_hir_stats(&hir_crate);
548 hir::map::Forest::new(hir_crate, &dep_graph)
551 time(sess, "early lint checks", || {
552 lint::check_ast_crate(
557 rustc_lint::BuiltinCombinedEarlyLintPass::new(),
561 // Discard hygiene data, which isn't required after lowering to HIR.
562 if !sess.opts.debugging_opts.keep_hygiene_data {
563 syntax_expand::hygiene::clear_syntax_context_map();
569 // Returns all the paths that correspond to generated files.
570 fn generated_output_paths(
572 outputs: &OutputFilenames,
576 let mut out_filenames = Vec::new();
577 for output_type in sess.opts.output_types.keys() {
578 let file = outputs.path(*output_type);
580 // If the filename has been overridden using `-o`, it will not be modified
581 // by appending `.rlib`, `.exe`, etc., so we can skip this transformation.
582 OutputType::Exe if !exact_name => for crate_type in sess.crate_types.borrow().iter() {
583 let p = ::rustc_codegen_utils::link::filename_for_input(
589 out_filenames.push(p);
591 OutputType::DepInfo if sess.opts.debugging_opts.dep_info_omit_d_target => {
592 // Don't add the dep-info output when omitting it from dep-info targets
595 out_filenames.push(file);
602 // Runs `f` on every output file path and returns the first non-None result, or None if `f`
603 // returns None for every file path.
604 fn check_output<F, T>(output_paths: &[PathBuf], f: F) -> Option<T>
606 F: Fn(&PathBuf) -> Option<T>,
608 for output_path in output_paths {
609 if let Some(result) = f(output_path) {
616 fn output_contains_path(output_paths: &[PathBuf], input_path: &PathBuf) -> bool {
617 let input_path = input_path.canonicalize().ok();
618 if input_path.is_none() {
621 let check = |output_path: &PathBuf| {
622 if output_path.canonicalize().ok() == input_path {
628 check_output(output_paths, check).is_some()
631 fn output_conflicts_with_dir(output_paths: &[PathBuf]) -> Option<PathBuf> {
632 let check = |output_path: &PathBuf| {
633 if output_path.is_dir() {
634 Some(output_path.clone())
639 check_output(output_paths, check)
642 fn escape_dep_filename(filename: &FileName) -> String {
643 // Apparently clang and gcc *only* escape spaces:
644 // http://llvm.org/klaus/clang/commit/9d50634cfc268ecc9a7250226dd5ca0e945240d4
645 filename.to_string().replace(" ", "\\ ")
648 fn write_out_deps(compiler: &Compiler, outputs: &OutputFilenames, out_filenames: &[PathBuf]) {
649 let sess = &compiler.sess;
650 // Write out dependency rules to the dep-info file if requested
651 if !sess.opts.output_types.contains_key(&OutputType::DepInfo) {
654 let deps_filename = outputs.path(OutputType::DepInfo);
656 let result = (|| -> io::Result<()> {
657 // Build a list of files used to compile the output and
658 // write Makefile-compatible dependency rules
659 let mut files: Vec<String> = sess.source_map()
662 .filter(|fmap| fmap.is_real_file())
663 .filter(|fmap| !fmap.is_imported())
664 .map(|fmap| escape_dep_filename(&fmap.unmapped_path.as_ref().unwrap_or(&fmap.name)))
667 if sess.binary_dep_depinfo() {
668 for cnum in compiler.cstore.crates_untracked() {
669 let source = compiler.cstore.crate_source_untracked(cnum);
670 if let Some((path, _)) = source.dylib {
671 files.push(escape_dep_filename(&FileName::Real(path)));
673 if let Some((path, _)) = source.rlib {
674 files.push(escape_dep_filename(&FileName::Real(path)));
676 if let Some((path, _)) = source.rmeta {
677 files.push(escape_dep_filename(&FileName::Real(path)));
682 let mut file = fs::File::create(&deps_filename)?;
683 for path in out_filenames {
684 writeln!(file, "{}: {}\n", path.display(), files.join(" "))?;
687 // Emit a fake target for each input file to the compilation. This
688 // prevents `make` from spitting out an error if a file is later
689 // deleted. For more info see #28735
691 writeln!(file, "{}:", path)?;
698 if sess.opts.json_artifact_notifications {
699 sess.parse_sess.span_diagnostic
700 .emit_artifact_notification(&deps_filename, "dep-info");
705 "error writing dependencies to `{}`: {}",
706 deps_filename.display(),
713 pub fn prepare_outputs(
718 ) -> Result<OutputFilenames> {
719 // FIXME: rustdoc passes &[] instead of &krate.attrs here
720 let outputs = util::build_output_filenames(
722 &compiler.output_dir,
723 &compiler.output_file,
728 let output_paths = generated_output_paths(
731 compiler.output_file.is_some(),
735 // Ensure the source file isn't accidentally overwritten during compilation.
736 if let Some(ref input_path) = compiler.input_path {
737 if sess.opts.will_create_output_file() {
738 if output_contains_path(&output_paths, input_path) {
740 "the input file \"{}\" would be overwritten by the generated \
744 return Err(ErrorReported);
746 if let Some(dir_path) = output_conflicts_with_dir(&output_paths) {
748 "the generated executable for the input file \"{}\" conflicts with the \
749 existing directory \"{}\"",
750 input_path.display(),
753 return Err(ErrorReported);
758 write_out_deps(compiler, &outputs, &output_paths);
760 let only_dep_info = sess.opts.output_types.contains_key(&OutputType::DepInfo)
761 && sess.opts.output_types.len() == 1;
764 if let Some(ref dir) = compiler.output_dir {
765 if fs::create_dir_all(dir).is_err() {
766 sess.err("failed to find or create the directory specified by `--out-dir`");
767 return Err(ErrorReported);
775 pub fn default_provide(providers: &mut ty::query::Providers<'_>) {
776 providers.analysis = analysis;
777 proc_macro_decls::provide(providers);
778 plugin::build::provide(providers);
779 hir::provide(providers);
780 mir::provide(providers);
781 reachable::provide(providers);
782 resolve_lifetime::provide(providers);
783 rustc_privacy::provide(providers);
784 typeck::provide(providers);
785 ty::provide(providers);
786 traits::provide(providers);
787 stability::provide(providers);
788 reachable::provide(providers);
789 rustc_passes::provide(providers);
790 rustc_traits::provide(providers);
791 middle::region::provide(providers);
792 cstore::provide(providers);
793 lint::provide(providers);
794 rustc_lint::provide(providers);
795 rustc_codegen_utils::provide(providers);
796 rustc_codegen_ssa::provide(providers);
799 pub fn default_provide_extern(providers: &mut ty::query::Providers<'_>) {
800 cstore::provide_extern(providers);
801 rustc_codegen_ssa::provide_extern(providers);
804 declare_box_region_type!(
807 (&'tcx GlobalCtxt<'tcx>) -> ((), ())
810 impl BoxedGlobalCtxt {
811 pub fn enter<F, R>(&mut self, f: F) -> R
813 F: for<'tcx> FnOnce(TyCtxt<'tcx>) -> R,
815 self.access(|gcx| ty::tls::enter_global(gcx, |tcx| f(tcx)))
819 pub fn create_global_ctxt(
821 lint_store: Lrc<lint::LintStore>,
822 mut hir_forest: hir::map::Forest,
823 defs: hir::map::Definitions,
824 resolutions: Resolutions,
825 outputs: OutputFilenames,
827 ) -> BoxedGlobalCtxt {
828 let sess = compiler.session().clone();
829 let cstore = compiler.cstore.clone();
830 let codegen_backend = compiler.codegen_backend().clone();
831 let crate_name = crate_name.to_string();
833 let ((), result) = BoxedGlobalCtxt::new(static move || {
835 let cstore = &*cstore;
837 let global_ctxt: Option<GlobalCtxt<'_>>;
838 let arenas = AllArenas::new();
840 // Construct the HIR map.
841 let hir_map = time(sess, "indexing HIR", || {
842 hir::map::map_crate(sess, cstore, &mut hir_forest, &defs)
845 let query_result_on_disk_cache = time(sess, "load query result cache", || {
846 rustc_incremental::load_query_result_cache(sess)
849 let mut local_providers = ty::query::Providers::default();
850 default_provide(&mut local_providers);
851 codegen_backend.provide(&mut local_providers);
853 let mut extern_providers = local_providers;
854 default_provide_extern(&mut extern_providers);
855 codegen_backend.provide_extern(&mut extern_providers);
857 let gcx = TyCtxt::create_global_ctxt(
866 query_result_on_disk_cache,
871 global_ctxt = Some(gcx);
872 let gcx = global_ctxt.as_ref().unwrap();
874 ty::tls::enter_global(gcx, |tcx| {
875 // Do some initialization of the DepGraph that can only be done with the
877 time(tcx.sess, "dep graph tcx init", || rustc_incremental::dep_graph_tcx_init(tcx));
880 yield BoxedGlobalCtxt::initial_yield(());
881 box_region_allow_access!(for('tcx), (&'tcx GlobalCtxt<'tcx>), (gcx));
883 if sess.opts.debugging_opts.query_stats {
884 gcx.queries.print_stats();
891 /// Runs the resolution, type-checking, region checking and other
892 /// miscellaneous analysis passes on the crate.
893 fn analysis(tcx: TyCtxt<'_>, cnum: CrateNum) -> Result<()> {
894 assert_eq!(cnum, LOCAL_CRATE);
897 let mut entry_point = None;
899 time(sess, "misc checking 1", || {
901 entry_point = time(sess, "looking for entry point", || {
902 rustc_passes::entry::find_entry_point(tcx)
905 time(sess, "looking for plugin registrar", || {
906 plugin::build::find_plugin_registrar(tcx)
909 time(sess, "looking for derive registrar", || {
910 proc_macro_decls::find(tcx)
913 par_iter(&tcx.hir().krate().modules).for_each(|(&module, _)| {
914 let local_def_id = tcx.hir().local_def_id(module);
915 tcx.ensure().check_mod_loops(local_def_id);
916 tcx.ensure().check_mod_attrs(local_def_id);
917 tcx.ensure().check_mod_unstable_api_usage(local_def_id);
922 // passes are timed inside typeck
923 typeck::check_crate(tcx)?;
925 time(sess, "misc checking 2", || {
927 time(sess, "match checking", || {
928 tcx.par_body_owners(|def_id| {
929 tcx.ensure().check_match(def_id);
933 time(sess, "liveness checking + intrinsic checking", || {
934 par_iter(&tcx.hir().krate().modules).for_each(|(&module, _)| {
935 // this must run before MIR dump, because
936 // "not all control paths return a value" is reported here.
938 // maybe move the check to a MIR pass?
939 let local_def_id = tcx.hir().local_def_id(module);
941 tcx.ensure().check_mod_liveness(local_def_id);
942 tcx.ensure().check_mod_intrinsics(local_def_id);
948 time(sess, "MIR borrow checking", || {
949 tcx.par_body_owners(|def_id| tcx.ensure().mir_borrowck(def_id));
952 time(sess, "dumping Chalk-like clauses", || {
953 rustc_traits::lowering::dump_program_clauses(tcx);
956 time(sess, "MIR effect checking", || {
957 for def_id in tcx.body_owners() {
958 mir::transform::check_unsafety::check_unsafety(tcx, def_id)
962 time(sess, "layout testing", || layout_test::test_layout(tcx));
964 // Avoid overwhelming user with errors if borrow checking failed.
965 // I'm not sure how helpful this is, to be honest, but it avoids a
966 // lot of annoying errors in the compile-fail tests (basically,
967 // lint warnings and so on -- kindck used to do this abort, but
968 // kindck is gone now). -nmatsakis
969 if sess.has_errors() {
970 return Err(ErrorReported);
973 time(sess, "misc checking 3", || {
975 time(sess, "privacy access levels", || {
976 tcx.ensure().privacy_access_levels(LOCAL_CRATE);
979 time(sess, "private in public", || {
980 tcx.ensure().check_private_in_public(LOCAL_CRATE);
983 time(sess, "death checking", || rustc_passes::dead::check_crate(tcx));
985 time(sess, "unused lib feature checking", || {
986 stability::check_unused_or_stable_features(tcx)
989 time(sess, "lint checking", || {
990 lint::check_crate(tcx, || rustc_lint::BuiltinCombinedLateLintPass::new());
994 time(sess, "privacy checking modules", || {
995 par_iter(&tcx.hir().krate().modules).for_each(|(&module, _)| {
996 tcx.ensure().check_mod_privacy(tcx.hir().local_def_id(module));
1005 fn encode_and_write_metadata(
1007 outputs: &OutputFilenames,
1008 ) -> (middle::cstore::EncodedMetadata, bool) {
1009 #[derive(PartialEq, Eq, PartialOrd, Ord)]
1016 let metadata_kind = tcx.sess.crate_types.borrow().iter().map(|ty| {
1018 CrateType::Executable |
1019 CrateType::Staticlib |
1020 CrateType::Cdylib => MetadataKind::None,
1022 CrateType::Rlib => MetadataKind::Uncompressed,
1025 CrateType::ProcMacro => MetadataKind::Compressed,
1027 }).max().unwrap_or(MetadataKind::None);
1029 let metadata = match metadata_kind {
1030 MetadataKind::None => middle::cstore::EncodedMetadata::new(),
1031 MetadataKind::Uncompressed |
1032 MetadataKind::Compressed => tcx.encode_metadata(),
1035 let need_metadata_file = tcx.sess.opts.output_types.contains_key(&OutputType::Metadata);
1036 if need_metadata_file {
1037 let crate_name = &tcx.crate_name(LOCAL_CRATE).as_str();
1038 let out_filename = filename_for_metadata(tcx.sess, crate_name, outputs);
1039 // To avoid races with another rustc process scanning the output directory,
1040 // we need to write the file somewhere else and atomically move it to its
1041 // final destination, with an `fs::rename` call. In order for the rename to
1042 // always succeed, the temporary file needs to be on the same filesystem,
1043 // which is why we create it inside the output directory specifically.
1044 let metadata_tmpdir = TempFileBuilder::new()
1046 .tempdir_in(out_filename.parent().unwrap())
1047 .unwrap_or_else(|err| {
1048 tcx.sess.fatal(&format!("couldn't create a temp dir: {}", err))
1050 let metadata_filename = emit_metadata(tcx.sess, &metadata, &metadata_tmpdir);
1051 if let Err(e) = fs::rename(&metadata_filename, &out_filename) {
1052 tcx.sess.fatal(&format!("failed to write {}: {}", out_filename.display(), e));
1054 if tcx.sess.opts.json_artifact_notifications {
1055 tcx.sess.parse_sess.span_diagnostic
1056 .emit_artifact_notification(&out_filename, "metadata");
1060 let need_metadata_module = metadata_kind == MetadataKind::Compressed;
1062 (metadata, need_metadata_module)
1065 /// Runs the codegen backend, after which the AST and analysis can
1067 pub fn start_codegen<'tcx>(
1068 codegen_backend: &dyn CodegenBackend,
1070 outputs: &OutputFilenames,
1072 if log_enabled!(::log::Level::Info) {
1073 println!("Pre-codegen");
1074 tcx.print_debug_stats();
1077 let (metadata, need_metadata_module) = time(tcx.sess, "metadata encoding and writing", || {
1078 encode_and_write_metadata(tcx, outputs)
1081 let codegen = time(tcx.sess, "codegen", move || {
1082 let _prof_timer = tcx.prof.generic_activity("codegen_crate");
1083 codegen_backend.codegen_crate(tcx, metadata, need_metadata_module)
1086 if log_enabled!(::log::Level::Info) {
1087 println!("Post-codegen");
1088 tcx.print_debug_stats();
1091 if tcx.sess.opts.output_types.contains_key(&OutputType::Mir) {
1092 if let Err(e) = mir::transform::dump_mir::emit_mir(tcx, outputs) {
1093 tcx.sess.err(&format!("could not emit MIR: {}", e));
1094 tcx.sess.abort_if_errors();