2022-08-23 17:16:04 -06:00
|
|
|
use crate::errors::{
|
|
|
|
FailedCreateEncodedMetadata, FailedCreateFile, FailedCreateTempdir, FailedWriteError,
|
|
|
|
};
|
2022-04-24 23:49:04 +09:00
|
|
|
use crate::{encode_metadata, EncodedMetadata};
|
|
|
|
|
2022-04-24 19:34:35 +09:00
|
|
|
use rustc_data_structures::temp_dir::MaybeTempDir;
|
2022-04-24 23:49:04 +09:00
|
|
|
use rustc_hir::def_id::LOCAL_CRATE;
|
|
|
|
use rustc_middle::ty::TyCtxt;
|
|
|
|
use rustc_session::config::{CrateType, OutputFilenames, OutputType};
|
|
|
|
use rustc_session::output::filename_for_metadata;
|
2022-04-24 19:34:35 +09:00
|
|
|
use rustc_session::Session;
|
2022-04-24 23:49:04 +09:00
|
|
|
use tempfile::Builder as TempFileBuilder;
|
2022-04-24 19:34:35 +09:00
|
|
|
|
|
|
|
use std::fs;
|
2022-04-24 23:49:04 +09:00
|
|
|
use std::path::{Path, PathBuf};
|
2022-04-24 19:34:35 +09:00
|
|
|
|
|
|
|
// FIXME(eddyb) maybe include the crate name in this?
|
|
|
|
pub const METADATA_FILENAME: &str = "lib.rmeta";
|
|
|
|
|
|
|
|
/// We use a temp directory here to avoid races between concurrent rustc processes,
|
|
|
|
/// such as builds in the same directory using the same filename for metadata while
|
|
|
|
/// building an `.rlib` (stomping over one another), or writing an `.rmeta` into a
|
|
|
|
/// directory being searched for `extern crate` (observing an incomplete file).
|
|
|
|
/// The returned path is the temporary file containing the complete metadata.
|
|
|
|
pub fn emit_metadata(sess: &Session, metadata: &[u8], tmpdir: &MaybeTempDir) -> PathBuf {
|
|
|
|
let out_filename = tmpdir.as_ref().join(METADATA_FILENAME);
|
|
|
|
let result = fs::write(&out_filename, metadata);
|
|
|
|
|
|
|
|
if let Err(e) = result {
|
2022-08-23 17:16:04 -06:00
|
|
|
sess.emit_fatal(FailedWriteError {
|
|
|
|
filename: out_filename.display().to_string(),
|
|
|
|
err: e.to_string(),
|
|
|
|
});
|
2022-04-24 19:34:35 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
out_filename
|
|
|
|
}
|
2022-04-24 23:49:04 +09:00
|
|
|
|
|
|
|
pub fn encode_and_write_metadata(
|
|
|
|
tcx: TyCtxt<'_>,
|
|
|
|
outputs: &OutputFilenames,
|
|
|
|
) -> (EncodedMetadata, bool) {
|
|
|
|
#[derive(PartialEq, Eq, PartialOrd, Ord)]
|
|
|
|
enum MetadataKind {
|
|
|
|
None,
|
|
|
|
Uncompressed,
|
|
|
|
Compressed,
|
|
|
|
}
|
|
|
|
|
|
|
|
let metadata_kind = tcx
|
|
|
|
.sess
|
|
|
|
.crate_types()
|
|
|
|
.iter()
|
|
|
|
.map(|ty| match *ty {
|
|
|
|
CrateType::Executable | CrateType::Staticlib | CrateType::Cdylib => MetadataKind::None,
|
|
|
|
|
|
|
|
CrateType::Rlib => MetadataKind::Uncompressed,
|
|
|
|
|
|
|
|
CrateType::Dylib | CrateType::ProcMacro => MetadataKind::Compressed,
|
|
|
|
})
|
|
|
|
.max()
|
|
|
|
.unwrap_or(MetadataKind::None);
|
|
|
|
|
2022-04-25 20:58:30 +09:00
|
|
|
let crate_name = tcx.crate_name(LOCAL_CRATE);
|
|
|
|
let out_filename = filename_for_metadata(tcx.sess, crate_name.as_str(), outputs);
|
|
|
|
// To avoid races with another rustc process scanning the output directory,
|
|
|
|
// we need to write the file somewhere else and atomically move it to its
|
|
|
|
// final destination, with an `fs::rename` call. In order for the rename to
|
|
|
|
// always succeed, the temporary file needs to be on the same filesystem,
|
|
|
|
// which is why we create it inside the output directory specifically.
|
|
|
|
let metadata_tmpdir = TempFileBuilder::new()
|
|
|
|
.prefix("rmeta")
|
2022-06-25 01:12:08 +09:00
|
|
|
.tempdir_in(out_filename.parent().unwrap_or_else(|| Path::new("")))
|
2022-08-23 17:16:04 -06:00
|
|
|
.unwrap_or_else(|err| tcx.sess.emit_fatal(FailedCreateTempdir { err: err.to_string() }));
|
2022-04-25 20:58:30 +09:00
|
|
|
let metadata_tmpdir = MaybeTempDir::new(metadata_tmpdir, tcx.sess.opts.cg.save_temps);
|
|
|
|
let metadata_filename = metadata_tmpdir.as_ref().join(METADATA_FILENAME);
|
2022-06-01 00:14:42 +09:00
|
|
|
|
2022-06-05 22:23:06 +09:00
|
|
|
// Always create a file at `metadata_filename`, even if we have nothing to write to it.
|
|
|
|
// This simplifies the creation of the output `out_filename` when requested.
|
2022-06-01 00:14:42 +09:00
|
|
|
match metadata_kind {
|
2022-04-28 10:27:38 +09:00
|
|
|
MetadataKind::None => {
|
2022-06-01 00:14:42 +09:00
|
|
|
std::fs::File::create(&metadata_filename).unwrap_or_else(|e| {
|
2022-08-23 17:16:04 -06:00
|
|
|
tcx.sess.emit_fatal(FailedCreateFile {
|
|
|
|
filename: metadata_filename.display().to_string(),
|
|
|
|
err: e.to_string(),
|
|
|
|
});
|
2022-06-01 00:14:42 +09:00
|
|
|
});
|
2022-04-28 10:27:38 +09:00
|
|
|
}
|
2022-04-25 20:58:30 +09:00
|
|
|
MetadataKind::Uncompressed | MetadataKind::Compressed => {
|
2022-05-02 16:37:26 +09:00
|
|
|
encode_metadata(tcx, &metadata_filename);
|
2022-06-01 00:14:42 +09:00
|
|
|
}
|
|
|
|
};
|
2022-05-02 16:37:26 +09:00
|
|
|
|
2022-06-01 00:14:42 +09:00
|
|
|
let _prof_timer = tcx.sess.prof.generic_activity("write_crate_metadata");
|
|
|
|
|
2022-06-05 22:23:06 +09:00
|
|
|
// If the user requests metadata as output, rename `metadata_filename`
|
|
|
|
// to the expected output `out_filename`. The match above should ensure
|
|
|
|
// this file always exists.
|
2022-06-01 00:14:42 +09:00
|
|
|
let need_metadata_file = tcx.sess.opts.output_types.contains_key(&OutputType::Metadata);
|
|
|
|
let (metadata_filename, metadata_tmpdir) = if need_metadata_file {
|
|
|
|
if let Err(e) = non_durable_rename(&metadata_filename, &out_filename) {
|
2022-08-23 17:16:04 -06:00
|
|
|
tcx.sess.emit_fatal(FailedWriteError {
|
|
|
|
filename: out_filename.display().to_string(),
|
|
|
|
err: e.to_string(),
|
|
|
|
});
|
2022-04-25 20:58:30 +09:00
|
|
|
}
|
2022-06-01 00:14:42 +09:00
|
|
|
if tcx.sess.opts.json_artifact_notifications {
|
|
|
|
tcx.sess
|
|
|
|
.parse_sess
|
|
|
|
.span_diagnostic
|
|
|
|
.emit_artifact_notification(&out_filename, "metadata");
|
|
|
|
}
|
|
|
|
(out_filename, None)
|
|
|
|
} else {
|
|
|
|
(metadata_filename, Some(metadata_tmpdir))
|
2022-04-24 23:49:04 +09:00
|
|
|
};
|
|
|
|
|
2022-06-05 22:23:06 +09:00
|
|
|
// Load metadata back to memory: codegen may need to include it in object files.
|
2022-06-01 00:14:42 +09:00
|
|
|
let metadata =
|
|
|
|
EncodedMetadata::from_path(metadata_filename, metadata_tmpdir).unwrap_or_else(|e| {
|
2022-08-23 17:16:04 -06:00
|
|
|
tcx.sess.emit_fatal(FailedCreateEncodedMetadata { err: e.to_string() });
|
2022-06-01 00:14:42 +09:00
|
|
|
});
|
|
|
|
|
2022-04-24 23:49:04 +09:00
|
|
|
let need_metadata_module = metadata_kind == MetadataKind::Compressed;
|
|
|
|
|
|
|
|
(metadata, need_metadata_module)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(not(target_os = "linux"))]
|
|
|
|
pub fn non_durable_rename(src: &Path, dst: &Path) -> std::io::Result<()> {
|
|
|
|
std::fs::rename(src, dst)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// This function attempts to bypass the auto_da_alloc heuristic implemented by some filesystems
|
|
|
|
/// such as btrfs and ext4. When renaming over a file that already exists then they will "helpfully"
|
|
|
|
/// write back the source file before committing the rename in case a developer forgot some of
|
|
|
|
/// the fsyncs in the open/write/fsync(file)/rename/fsync(dir) dance for atomic file updates.
|
|
|
|
///
|
|
|
|
/// To avoid triggering this heuristic we delete the destination first, if it exists.
|
|
|
|
/// The cost of an extra syscall is much lower than getting descheduled for the sync IO.
|
|
|
|
#[cfg(target_os = "linux")]
|
|
|
|
pub fn non_durable_rename(src: &Path, dst: &Path) -> std::io::Result<()> {
|
|
|
|
let _ = std::fs::remove_file(dst);
|
|
|
|
std::fs::rename(src, dst)
|
|
|
|
}
|