Micro-optimize `Iterable` usage in `ActionExecutionFunction#addDiscoveredInputs`.

Problem: In practice, the implementation of `Environment#getOrderedValuesAndExceptions` iterates over its given `Iterable` 3 times. For the call in `ActionExecutionFunction#addDiscoveredInputs`, this `Iterable` is a lazy transformation of the one from `InputDiscoveryState#filterKnownDiscoveredInputs` which itself is a lazy filter using `ActionInputMap#getMetadata`. When there are a lot of inputs, this wasteful repeated work adds up.

Solution: Create a temporary `ImmutableList` formed by doing `InputDiscoveryState#filterKnownDiscoveredInputs` once, and use that for the call to `Environment#getOrderedValuesAndExceptions`. The theoretical downside is we potentially increase our peak heap usage. On a benchmark of extreme build with lots of actions with lots of input files, this approach consistently saves 2% CPU but has no significant impact on peak heap usage.

Alternatives considered: Refactor `Environment#getOrderedValuesAndExceptions` to reduce the number of iterations over the given `Iterable`. But given that both aggregate and specific CPU profiles show the heavy hitter source of the problem is `ActionExecutionFunction#addDiscoveredInputs` and also a general refactor might not reduce the number of iterations as well as this CL here, I decided against this approach.

PiperOrigin-RevId: 446464608
1 file changed
tree: 1f74a26ef919ac470dadce1b6a89a0a540a47ce2
  1. .bazelci/
  2. .github/
  3. examples/
  4. scripts/
  5. site/
  6. src/
  7. third_party/
  8. tools/
  9. .bazelrc
  10. .gitattributes
  11. .gitignore
  12. AUTHORS
  13. BUILD
  14. CHANGELOG.md
  15. CODE_OF_CONDUCT.md
  16. CODEBASE.md
  17. CODEOWNERS
  18. combine_distfiles.py
  19. combine_distfiles_to_tar.sh
  20. compile.sh
  21. CONTRIBUTING.md
  22. CONTRIBUTORS
  23. distdir.bzl
  24. distdir_deps.bzl
  25. LICENSE
  26. MODULE.bazel
  27. README.md
  28. SECURITY.md
  29. WORKSPACE
  30. WORKSPACE.bzlmod
README.md

Bazel

{Fast, Correct} - Choose two

Build and test software of any size, quickly and reliably.

  • Speed up your builds and tests: Bazel rebuilds only what is necessary. With advanced local and distributed caching, optimized dependency analysis and parallel execution, you get fast and incremental builds.

  • One tool, multiple languages: Build and test Java, C++, Android, iOS, Go, and a wide variety of other language platforms. Bazel runs on Windows, macOS, and Linux.

  • Scalable: Bazel helps you scale your organization, codebase, and continuous integration solution. It handles codebases of any size, in multiple repositories or a huge monorepo.

  • Extensible to your needs: Easily add support for new languages and platforms with Bazel's familiar extension language. Share and re-use language rules written by the growing Bazel community.

Getting Started

Documentation

Reporting a Vulnerability

To report a security issue, please email security@bazel.build with a description of the issue, the steps you took to create the issue, affected versions, and, if known, mitigations for the issue. Our vulnerability management team will respond within 3 working days of your email. If the issue is confirmed as a vulnerability, we will open a Security Advisory. This project follows a 90 day disclosure timeline.

Contributing to Bazel

See CONTRIBUTING.md

Build status