2020-07-02 20:52:40 -04:00
|
|
|
// ignore-tidy-filelength
|
2020-04-11 00:50:02 -04:00
|
|
|
pub use self::fold::{TypeFoldable, TypeFolder, TypeVisitor};
|
2019-05-19 16:26:08 +08:00
|
|
|
pub use self::AssocItemContainer::*;
|
2014-11-06 00:05:53 -08:00
|
|
|
pub use self::BorrowKind::*;
|
|
|
|
pub use self::IntVarValue::*;
|
2019-12-22 17:42:04 -05:00
|
|
|
pub use self::Variance::*;
|
2014-11-06 00:05:53 -08:00
|
|
|
|
2020-01-02 04:53:12 +01:00
|
|
|
use crate::hir::exports::ExportMap;
|
2019-02-05 11:20:45 -06:00
|
|
|
use crate::ich::StableHashingContext;
|
|
|
|
use crate::infer::canonical::Canonical;
|
2019-10-20 03:28:36 +03:00
|
|
|
use crate::middle::cstore::CrateStoreDyn;
|
2019-02-05 11:20:45 -06:00
|
|
|
use crate::middle::resolve_lifetime::ObjectLifetimeDefault;
|
2019-11-30 08:42:56 +13:00
|
|
|
use crate::mir::interpret::ErrorHandled;
|
2020-04-12 10:31:00 -07:00
|
|
|
use crate::mir::Body;
|
2019-02-05 11:20:45 -06:00
|
|
|
use crate::mir::GeneratorLayout;
|
|
|
|
use crate::traits::{self, Reveal};
|
|
|
|
use crate::ty;
|
2020-05-26 23:12:01 +02:00
|
|
|
use crate::ty::subst::{GenericArg, InternalSubsts, Subst, SubstsRef};
|
2019-12-22 17:42:04 -05:00
|
|
|
use crate::ty::util::{Discr, IntTypeExt};
|
2020-04-27 23:26:11 +05:30
|
|
|
use rustc_ast as ast;
|
2020-01-11 13:15:20 +01:00
|
|
|
use rustc_attr as attr;
|
2020-01-06 07:03:46 +01:00
|
|
|
use rustc_data_structures::captures::Captures;
|
2020-03-24 09:09:42 +01:00
|
|
|
use rustc_data_structures::fingerprint::Fingerprint;
|
2019-12-24 05:02:53 +01:00
|
|
|
use rustc_data_structures::fx::FxHashMap;
|
2020-05-20 23:01:48 +01:00
|
|
|
use rustc_data_structures::fx::FxHashSet;
|
2020-01-05 02:37:57 +01:00
|
|
|
use rustc_data_structures::fx::FxIndexMap;
|
2020-02-17 13:09:01 -08:00
|
|
|
use rustc_data_structures::sorted_map::SortedIndexMultiMap;
|
2020-01-05 02:37:57 +01:00
|
|
|
use rustc_data_structures::stable_hasher::{HashStable, StableHasher};
|
2020-03-14 17:43:27 +01:00
|
|
|
use rustc_data_structures::sync::{self, par_iter, ParallelIterator};
|
2020-08-16 11:08:55 -04:00
|
|
|
use rustc_data_structures::tagged_ptr::CopyTaggedPtr;
|
2020-04-12 04:24:25 +03:00
|
|
|
use rustc_errors::ErrorReported;
|
2020-01-05 02:37:57 +01:00
|
|
|
use rustc_hir as hir;
|
2020-02-11 10:41:28 -08:00
|
|
|
use rustc_hir::def::{CtorKind, CtorOf, DefKind, Namespace, Res};
|
2020-03-22 16:59:02 -07:00
|
|
|
use rustc_hir::def_id::{CrateNum, DefId, DefIdMap, LocalDefId, CRATE_DEF_INDEX};
|
2020-08-18 11:47:27 +01:00
|
|
|
use rustc_hir::lang_items::LangItem;
|
2020-05-20 23:18:45 +01:00
|
|
|
use rustc_hir::{Constness, Node};
|
2020-01-05 02:37:57 +01:00
|
|
|
use rustc_index::vec::{Idx, IndexVec};
|
|
|
|
use rustc_macros::HashStable;
|
2019-07-23 18:50:47 +03:00
|
|
|
use rustc_serialize::{self, Encodable, Encoder};
|
2020-03-11 12:49:08 +01:00
|
|
|
use rustc_session::DataTypeKind;
|
2019-12-31 20:15:40 +03:00
|
|
|
use rustc_span::hygiene::ExpnId;
|
2020-04-19 13:00:18 +02:00
|
|
|
use rustc_span::symbol::{kw, sym, Ident, Symbol};
|
2019-12-31 20:15:40 +03:00
|
|
|
use rustc_span::Span;
|
2020-03-31 18:16:47 +02:00
|
|
|
use rustc_target::abi::{Align, VariantIdx};
|
2020-01-11 15:03:15 +01:00
|
|
|
|
2018-01-10 19:20:01 -05:00
|
|
|
use std::cell::RefCell;
|
2020-05-09 21:02:13 +02:00
|
|
|
use std::cmp::Ordering;
|
2017-04-24 19:35:47 +03:00
|
|
|
use std::fmt;
|
2015-09-14 14:55:56 +03:00
|
|
|
use std::hash::{Hash, Hasher};
|
2019-12-22 17:42:04 -05:00
|
|
|
use std::ops::Range;
|
2020-05-09 21:02:13 +02:00
|
|
|
use std::ptr;
|
2020-07-10 15:45:05 +10:00
|
|
|
use std::str;
|
2015-07-31 00:04:06 -07:00
|
|
|
|
2015-09-06 21:51:58 +03:00
|
|
|
pub use self::sty::BoundRegion::*;
|
|
|
|
pub use self::sty::InferTy::*;
|
2019-12-22 17:42:04 -05:00
|
|
|
pub use self::sty::RegionKind;
|
2017-04-20 04:45:53 -04:00
|
|
|
pub use self::sty::RegionKind::*;
|
2018-08-22 01:34:12 +01:00
|
|
|
pub use self::sty::TyKind::*;
|
2019-12-22 17:42:04 -05:00
|
|
|
pub use self::sty::{Binder, BoundTy, BoundTyKind, BoundVar, DebruijnIndex, INNERMOST};
|
|
|
|
pub use self::sty::{BoundRegion, EarlyBoundRegion, FreeRegion, Region};
|
|
|
|
pub use self::sty::{CanonicalPolyFnSig, FnSig, GenSig, PolyFnSig, PolyGenSig};
|
|
|
|
pub use self::sty::{ClosureSubsts, GeneratorSubsts, TypeAndMut, UpvarSubsts};
|
2020-07-13 17:12:07 +03:00
|
|
|
pub use self::sty::{ClosureSubstsParts, GeneratorSubstsParts};
|
2019-12-22 17:42:04 -05:00
|
|
|
pub use self::sty::{ConstVid, FloatVid, IntVid, RegionVid, TyVid};
|
2020-07-11 09:49:22 +02:00
|
|
|
pub use self::sty::{ExistentialPredicate, InferTy, ParamConst, ParamTy, ProjectionTy};
|
|
|
|
pub use self::sty::{ExistentialProjection, PolyExistentialProjection};
|
2019-12-22 17:42:04 -05:00
|
|
|
pub use self::sty::{ExistentialTraitRef, PolyExistentialTraitRef};
|
|
|
|
pub use self::sty::{PolyTraitRef, TraitRef, TyKind};
|
2019-11-18 10:33:05 -08:00
|
|
|
pub use crate::ty::diagnostics::*;
|
2015-09-06 21:51:58 +03:00
|
|
|
|
2017-07-21 19:29:43 -04:00
|
|
|
pub use self::binding::BindingMode;
|
|
|
|
pub use self::binding::BindingMode::*;
|
|
|
|
|
2020-04-06 22:29:18 +02:00
|
|
|
pub use self::context::{tls, FreeRegionInfo, TyCtxt};
|
2019-12-22 17:42:04 -05:00
|
|
|
pub use self::context::{
|
2020-07-16 10:21:10 -05:00
|
|
|
CanonicalUserType, CanonicalUserTypeAnnotation, CanonicalUserTypeAnnotations,
|
|
|
|
DelaySpanBugEmitted, ResolvedOpaqueTy, UserType, UserTypeAnnotationIndex,
|
2019-12-22 17:42:04 -05:00
|
|
|
};
|
2018-11-16 22:56:18 +01:00
|
|
|
pub use self::context::{
|
2020-07-17 08:47:04 +00:00
|
|
|
CtxtInterners, GeneratorInteriorTypeCause, GlobalCtxt, Lift, TypeckResults,
|
2018-11-16 22:56:18 +01:00
|
|
|
};
|
2015-09-06 21:51:58 +03:00
|
|
|
|
2017-02-08 18:31:03 +01:00
|
|
|
pub use self::instance::{Instance, InstanceDef};
|
|
|
|
|
2020-05-09 21:02:13 +02:00
|
|
|
pub use self::list::List;
|
|
|
|
|
2017-05-11 16:01:19 +02:00
|
|
|
pub use self::trait_def::TraitDef;
|
2015-12-22 16:39:33 -05:00
|
|
|
|
2018-06-13 16:44:43 +03:00
|
|
|
pub use self::query::queries;
|
2017-02-19 14:37:50 +02:00
|
|
|
|
2020-07-11 09:49:22 +02:00
|
|
|
pub use self::consts::{Const, ConstInt, ConstKind, InferConst};
|
2020-06-19 18:57:15 +02:00
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
pub mod _match;
|
2015-09-14 14:55:56 +03:00
|
|
|
pub mod adjustment;
|
2017-07-21 19:29:43 -04:00
|
|
|
pub mod binding;
|
2015-09-06 18:32:34 +03:00
|
|
|
pub mod cast;
|
2017-10-18 17:48:36 +02:00
|
|
|
pub mod codec;
|
2017-10-17 11:24:46 -04:00
|
|
|
mod erase_regions;
|
2019-12-22 17:42:04 -05:00
|
|
|
pub mod error;
|
2015-09-06 18:32:34 +03:00
|
|
|
pub mod fast_reject;
|
2019-03-18 20:55:19 +00:00
|
|
|
pub mod flags;
|
2015-09-06 18:32:34 +03:00
|
|
|
pub mod fold;
|
2016-12-11 22:30:14 +08:00
|
|
|
pub mod inhabitedness;
|
2016-04-18 16:03:16 +03:00
|
|
|
pub mod layout;
|
2020-01-05 19:43:25 +01:00
|
|
|
pub mod normalize_erasing_regions;
|
2015-09-06 18:32:34 +03:00
|
|
|
pub mod outlives;
|
2018-12-04 19:13:37 +02:00
|
|
|
pub mod print;
|
2018-06-13 16:44:43 +03:00
|
|
|
pub mod query;
|
2015-09-06 18:32:34 +03:00
|
|
|
pub mod relate;
|
2017-04-28 06:00:48 -04:00
|
|
|
pub mod steal;
|
2016-03-22 16:21:46 +02:00
|
|
|
pub mod subst;
|
2015-12-22 16:39:33 -05:00
|
|
|
pub mod trait_def;
|
2019-12-22 17:42:04 -05:00
|
|
|
pub mod util;
|
2015-09-06 18:32:34 +03:00
|
|
|
pub mod walk;
|
|
|
|
|
2020-06-19 18:57:15 +02:00
|
|
|
mod consts;
|
2015-09-06 21:51:58 +03:00
|
|
|
mod context;
|
2019-12-22 17:42:04 -05:00
|
|
|
mod diagnostics;
|
2017-02-08 18:31:03 +01:00
|
|
|
mod instance;
|
2020-05-09 21:02:13 +02:00
|
|
|
mod list;
|
2015-09-06 21:51:58 +03:00
|
|
|
mod structural_impls;
|
|
|
|
mod sty;
|
|
|
|
|
2011-06-15 11:19:50 -07:00
|
|
|
// Data types
|
2011-05-09 12:27:03 -07:00
|
|
|
|
2019-10-20 03:19:12 +03:00
|
|
|
pub struct ResolverOutputs {
|
2020-03-24 09:09:42 +01:00
|
|
|
pub definitions: rustc_hir::definitions::Definitions,
|
2019-10-20 03:28:36 +03:00
|
|
|
pub cstore: Box<CrateStoreDyn>,
|
2020-05-24 12:18:22 +01:00
|
|
|
pub extern_crate_map: FxHashMap<LocalDefId, CrateNum>,
|
2020-05-20 23:01:48 +01:00
|
|
|
pub maybe_unused_trait_imports: FxHashSet<LocalDefId>,
|
2020-05-24 12:18:22 +01:00
|
|
|
pub maybe_unused_extern_crates: Vec<(LocalDefId, Span)>,
|
2020-06-07 11:14:47 +01:00
|
|
|
pub export_map: ExportMap<LocalDefId>,
|
2020-05-20 23:18:45 +01:00
|
|
|
pub glob_map: FxHashMap<LocalDefId, FxHashSet<Symbol>>,
|
2018-10-22 22:54:18 +03:00
|
|
|
/// Extern prelude entries. The value is `true` if the entry was introduced
|
|
|
|
/// via `extern crate` item and not `--extern` option or compiler built-in.
|
2020-04-19 13:00:18 +02:00
|
|
|
pub extern_prelude: FxHashMap<Symbol, bool>,
|
2016-12-15 11:13:24 +00:00
|
|
|
}
|
|
|
|
|
2020-06-28 15:26:12 -07:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, Debug, HashStable, Hash)]
|
2019-05-19 16:26:08 +08:00
|
|
|
pub enum AssocItemContainer {
|
2015-08-16 06:32:28 -04:00
|
|
|
TraitContainer(DefId),
|
|
|
|
ImplContainer(DefId),
|
2013-08-23 14:34:00 -07:00
|
|
|
}
|
|
|
|
|
2019-05-19 16:26:08 +08:00
|
|
|
impl AssocItemContainer {
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Asserts that this is the `DefId` of an associated item declared
|
|
|
|
/// in a trait, and returns the trait `DefId`.
|
2017-11-03 18:03:43 -04:00
|
|
|
pub fn assert_trait(&self) -> DefId {
|
|
|
|
match *self {
|
|
|
|
TraitContainer(id) => id,
|
2019-12-22 17:42:04 -05:00
|
|
|
_ => bug!("associated item has wrong container type: {:?}", self),
|
2017-11-03 18:03:43 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-16 06:32:28 -04:00
|
|
|
pub fn id(&self) -> DefId {
|
2014-08-04 13:56:56 -07:00
|
|
|
match *self {
|
|
|
|
TraitContainer(id) => id,
|
|
|
|
ImplContainer(id) => id,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-26 10:51:10 -08:00
|
|
|
/// The "header" of an impl is everything outside the body: a Self type, a trait
|
|
|
|
/// ref (in the case of a trait impl), and a set of predicates (from the
|
2019-02-08 14:53:55 +01:00
|
|
|
/// bounds / where-clauses).
|
2019-11-13 21:36:57 +01:00
|
|
|
#[derive(Clone, Debug, TypeFoldable)]
|
2016-02-26 10:51:10 -08:00
|
|
|
pub struct ImplHeader<'tcx> {
|
|
|
|
pub impl_def_id: DefId,
|
|
|
|
pub self_ty: Ty<'tcx>,
|
|
|
|
pub trait_ref: Option<TraitRef<'tcx>>,
|
|
|
|
pub predicates: Vec<Predicate<'tcx>>,
|
|
|
|
}
|
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Copy, Clone, PartialEq, TyEncodable, TyDecodable, HashStable)]
|
2019-07-14 00:09:46 +03:00
|
|
|
pub enum ImplPolarity {
|
|
|
|
/// `impl Trait for Type`
|
|
|
|
Positive,
|
|
|
|
/// `impl !Trait for Type`
|
|
|
|
Negative,
|
|
|
|
/// `#[rustc_reservation_impl] impl Trait for Type`
|
2019-09-23 13:51:59 -04:00
|
|
|
///
|
|
|
|
/// This is a "stability hack", not a real Rust feature.
|
|
|
|
/// See #64631 for details.
|
2019-07-14 00:09:46 +03:00
|
|
|
Reservation,
|
|
|
|
}
|
|
|
|
|
2020-06-28 15:26:12 -07:00
|
|
|
#[derive(Copy, Clone, Debug, PartialEq, HashStable, Eq, Hash)]
|
2019-05-19 16:26:08 +08:00
|
|
|
pub struct AssocItem {
|
2016-11-10 02:06:34 +02:00
|
|
|
pub def_id: DefId,
|
2018-12-03 01:14:35 +01:00
|
|
|
#[stable_hasher(project(name))]
|
2018-06-10 22:24:24 +03:00
|
|
|
pub ident: Ident,
|
2019-05-19 16:26:08 +08:00
|
|
|
pub kind: AssocKind,
|
2016-11-10 02:06:34 +02:00
|
|
|
pub vis: Visibility,
|
|
|
|
pub defaultness: hir::Defaultness,
|
2019-05-19 16:26:08 +08:00
|
|
|
pub container: AssocItemContainer,
|
2014-08-04 13:56:56 -07:00
|
|
|
|
2016-11-10 02:06:34 +02:00
|
|
|
/// Whether this is a method with an explicit self
|
2020-04-01 10:09:50 +08:00
|
|
|
/// as its first parameter, allowing method calls.
|
|
|
|
pub fn_has_self_parameter: bool,
|
2016-11-10 02:06:34 +02:00
|
|
|
}
|
2015-03-14 12:05:00 -06:00
|
|
|
|
2020-06-28 15:26:12 -07:00
|
|
|
#[derive(Copy, Clone, PartialEq, Debug, HashStable, Eq, Hash)]
|
2019-05-19 16:26:08 +08:00
|
|
|
pub enum AssocKind {
|
2016-11-10 02:06:34 +02:00
|
|
|
Const,
|
2020-04-01 10:09:50 +08:00
|
|
|
Fn,
|
2019-12-22 17:42:04 -05:00
|
|
|
Type,
|
2016-11-10 02:06:34 +02:00
|
|
|
}
|
2014-10-17 09:07:45 -04:00
|
|
|
|
2019-12-03 22:19:18 -08:00
|
|
|
impl AssocKind {
|
2020-02-11 10:41:28 -08:00
|
|
|
pub fn namespace(&self) -> Namespace {
|
|
|
|
match *self {
|
2020-05-10 12:15:51 +01:00
|
|
|
ty::AssocKind::Type => Namespace::TypeNS,
|
2020-04-01 10:09:50 +08:00
|
|
|
ty::AssocKind::Const | ty::AssocKind::Fn => Namespace::ValueNS,
|
2020-02-11 10:41:28 -08:00
|
|
|
}
|
|
|
|
}
|
2019-12-03 22:19:18 -08:00
|
|
|
|
2020-04-01 10:09:50 +08:00
|
|
|
pub fn as_def_kind(&self) -> DefKind {
|
|
|
|
match self {
|
2019-05-19 16:26:08 +08:00
|
|
|
AssocKind::Const => DefKind::AssocConst,
|
2020-04-01 10:09:50 +08:00
|
|
|
AssocKind::Fn => DefKind::AssocFn,
|
2019-05-19 16:26:08 +08:00
|
|
|
AssocKind::Type => DefKind::AssocTy,
|
2014-10-17 09:07:45 -04:00
|
|
|
}
|
|
|
|
}
|
2020-04-01 10:09:50 +08:00
|
|
|
}
|
2017-01-11 15:58:37 +08:00
|
|
|
|
2020-04-01 10:09:50 +08:00
|
|
|
impl AssocItem {
|
2019-06-21 11:39:28 +02:00
|
|
|
pub fn signature(&self, tcx: TyCtxt<'_>) -> String {
|
Show trait method signature when impl differs
When the trait's span is available, it is already being used, add a
`note` for the cases where the span isn't available:
```
error[E0053]: method `fmt` has an incompatible type for trait
--> $DIR/trait_type.rs:17:4
|
17 | fn fmt(&self, x: &str) -> () { }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ types differ in mutability
|
= note: expected type `fn(&MyType, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
found type `fn(&MyType, &str)`
error[E0050]: method `fmt` has 1 parameter but the declaration in trait `std::fmt::Display::fmt` has 2
--> $DIR/trait_type.rs:21:11
|
21 | fn fmt(&self) -> () { }
| ^^^^^ expected 2 parameters, found 1
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
error[E0186]: method `fmt` has a `&self` declaration in the trait, but not in the impl
--> $DIR/trait_type.rs:25:4
|
25 | fn fmt() -> () { }
| ^^^^^^^^^^^^^^^^^^ expected `&self` in impl
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
error[E0046]: not all trait items implemented, missing: `fmt`
--> $DIR/trait_type.rs:28:1
|
28 | impl std::fmt::Display for MyType4 {}
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ missing `fmt` in implementation
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
```
2017-05-31 23:14:43 -07:00
|
|
|
match self.kind {
|
2020-04-01 10:09:50 +08:00
|
|
|
ty::AssocKind::Fn => {
|
Show trait method signature when impl differs
When the trait's span is available, it is already being used, add a
`note` for the cases where the span isn't available:
```
error[E0053]: method `fmt` has an incompatible type for trait
--> $DIR/trait_type.rs:17:4
|
17 | fn fmt(&self, x: &str) -> () { }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ types differ in mutability
|
= note: expected type `fn(&MyType, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
found type `fn(&MyType, &str)`
error[E0050]: method `fmt` has 1 parameter but the declaration in trait `std::fmt::Display::fmt` has 2
--> $DIR/trait_type.rs:21:11
|
21 | fn fmt(&self) -> () { }
| ^^^^^ expected 2 parameters, found 1
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
error[E0186]: method `fmt` has a `&self` declaration in the trait, but not in the impl
--> $DIR/trait_type.rs:25:4
|
25 | fn fmt() -> () { }
| ^^^^^^^^^^^^^^^^^^ expected `&self` in impl
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
error[E0046]: not all trait items implemented, missing: `fmt`
--> $DIR/trait_type.rs:28:1
|
28 | impl std::fmt::Display for MyType4 {}
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ missing `fmt` in implementation
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
```
2017-05-31 23:14:43 -07:00
|
|
|
// We skip the binder here because the binder would deanonymize all
|
|
|
|
// late-bound regions, and we don't want method signatures to show up
|
|
|
|
// `as for<'r> fn(&'r MyType)`. Pretty-printing handles late-bound
|
|
|
|
// regions just fine, showing `fn(&MyType)`.
|
2018-07-27 11:11:18 +02:00
|
|
|
tcx.fn_sig(self.def_id).skip_binder().to_string()
|
Show trait method signature when impl differs
When the trait's span is available, it is already being used, add a
`note` for the cases where the span isn't available:
```
error[E0053]: method `fmt` has an incompatible type for trait
--> $DIR/trait_type.rs:17:4
|
17 | fn fmt(&self, x: &str) -> () { }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ types differ in mutability
|
= note: expected type `fn(&MyType, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
found type `fn(&MyType, &str)`
error[E0050]: method `fmt` has 1 parameter but the declaration in trait `std::fmt::Display::fmt` has 2
--> $DIR/trait_type.rs:21:11
|
21 | fn fmt(&self) -> () { }
| ^^^^^ expected 2 parameters, found 1
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
error[E0186]: method `fmt` has a `&self` declaration in the trait, but not in the impl
--> $DIR/trait_type.rs:25:4
|
25 | fn fmt() -> () { }
| ^^^^^^^^^^^^^^^^^^ expected `&self` in impl
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
error[E0046]: not all trait items implemented, missing: `fmt`
--> $DIR/trait_type.rs:28:1
|
28 | impl std::fmt::Display for MyType4 {}
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ missing `fmt` in implementation
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
```
2017-05-31 23:14:43 -07:00
|
|
|
}
|
2019-05-19 16:26:08 +08:00
|
|
|
ty::AssocKind::Type => format!("type {};", self.ident),
|
|
|
|
ty::AssocKind::Const => {
|
2018-06-10 22:24:24 +03:00
|
|
|
format!("const {}: {:?};", self.ident, tcx.type_of(self.def_id))
|
Show trait method signature when impl differs
When the trait's span is available, it is already being used, add a
`note` for the cases where the span isn't available:
```
error[E0053]: method `fmt` has an incompatible type for trait
--> $DIR/trait_type.rs:17:4
|
17 | fn fmt(&self, x: &str) -> () { }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ types differ in mutability
|
= note: expected type `fn(&MyType, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
found type `fn(&MyType, &str)`
error[E0050]: method `fmt` has 1 parameter but the declaration in trait `std::fmt::Display::fmt` has 2
--> $DIR/trait_type.rs:21:11
|
21 | fn fmt(&self) -> () { }
| ^^^^^ expected 2 parameters, found 1
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
error[E0186]: method `fmt` has a `&self` declaration in the trait, but not in the impl
--> $DIR/trait_type.rs:25:4
|
25 | fn fmt() -> () { }
| ^^^^^^^^^^^^^^^^^^ expected `&self` in impl
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
error[E0046]: not all trait items implemented, missing: `fmt`
--> $DIR/trait_type.rs:28:1
|
28 | impl std::fmt::Display for MyType4 {}
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ missing `fmt` in implementation
|
= note: `fmt` from trait: `fn(&Self, &mut std::fmt::Formatter<'_>) -> std::result::Result<(), std::fmt::Error>`
```
2017-05-31 23:14:43 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2014-08-04 13:56:56 -07:00
|
|
|
}
|
|
|
|
|
2020-02-17 13:09:01 -08:00
|
|
|
/// A list of `ty::AssocItem`s in definition order that allows for efficient lookup by name.
|
|
|
|
///
|
|
|
|
/// When doing lookup by name, we try to postpone hygienic comparison for as long as possible since
|
|
|
|
/// it is relatively expensive. Instead, items are indexed by `Symbol` and hygienic comparison is
|
|
|
|
/// done only on items with the same name.
|
|
|
|
#[derive(Debug, Clone, PartialEq, HashStable)]
|
2020-04-15 00:07:31 +02:00
|
|
|
pub struct AssociatedItems<'tcx> {
|
|
|
|
items: SortedIndexMultiMap<u32, Symbol, &'tcx ty::AssocItem>,
|
2020-02-17 13:09:01 -08:00
|
|
|
}
|
|
|
|
|
2020-04-15 00:07:31 +02:00
|
|
|
impl<'tcx> AssociatedItems<'tcx> {
|
2020-02-17 13:09:01 -08:00
|
|
|
/// Constructs an `AssociatedItems` map from a series of `ty::AssocItem`s in definition order.
|
2020-04-15 00:07:31 +02:00
|
|
|
pub fn new(items_in_def_order: impl IntoIterator<Item = &'tcx ty::AssocItem>) -> Self {
|
2020-02-17 13:09:01 -08:00
|
|
|
let items = items_in_def_order.into_iter().map(|item| (item.ident.name, item)).collect();
|
|
|
|
AssociatedItems { items }
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns a slice of associated items in the order they were defined.
|
|
|
|
///
|
|
|
|
/// New code should avoid relying on definition order. If you need a particular associated item
|
|
|
|
/// for a known trait, make that trait a lang item instead of indexing this array.
|
|
|
|
pub fn in_definition_order(&self) -> impl '_ + Iterator<Item = &ty::AssocItem> {
|
2020-04-15 00:07:31 +02:00
|
|
|
self.items.iter().map(|(_, v)| *v)
|
2020-02-17 13:09:01 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns an iterator over all associated items with the given name, ignoring hygiene.
|
|
|
|
pub fn filter_by_name_unhygienic(
|
|
|
|
&self,
|
|
|
|
name: Symbol,
|
|
|
|
) -> impl '_ + Iterator<Item = &ty::AssocItem> {
|
Fix clippy warnings
Fixes clippy::{cone_on_copy, filter_next, redundant_closure, single_char_pattern, len_zero,redundant_field_names, useless_format, identity_conversion, map_clone, into_iter_on_ref, needless_return, option_as_ref_deref, unused_unit, unnecessary_mut_passed}
2020-05-11 13:01:37 +02:00
|
|
|
self.items.get_by_key(&name).copied()
|
2020-02-17 13:09:01 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns an iterator over all associated items with the given name.
|
|
|
|
///
|
|
|
|
/// Multiple items may have the same name if they are in different `Namespace`s. For example,
|
|
|
|
/// an associated type can have the same name as a method. Use one of the `find_by_name_and_*`
|
|
|
|
/// methods below if you know which item you are looking for.
|
|
|
|
pub fn filter_by_name(
|
|
|
|
&'a self,
|
|
|
|
tcx: TyCtxt<'a>,
|
|
|
|
ident: Ident,
|
|
|
|
parent_def_id: DefId,
|
|
|
|
) -> impl 'a + Iterator<Item = &'a ty::AssocItem> {
|
|
|
|
self.filter_by_name_unhygienic(ident.name)
|
|
|
|
.filter(move |item| tcx.hygienic_eq(ident, item.ident, parent_def_id))
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns the associated item with the given name and `AssocKind`, if one exists.
|
|
|
|
pub fn find_by_name_and_kind(
|
|
|
|
&self,
|
|
|
|
tcx: TyCtxt<'_>,
|
|
|
|
ident: Ident,
|
|
|
|
kind: AssocKind,
|
|
|
|
parent_def_id: DefId,
|
|
|
|
) -> Option<&ty::AssocItem> {
|
|
|
|
self.filter_by_name_unhygienic(ident.name)
|
|
|
|
.filter(|item| item.kind == kind)
|
|
|
|
.find(|item| tcx.hygienic_eq(ident, item.ident, parent_def_id))
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns the associated item with the given name in the given `Namespace`, if one exists.
|
|
|
|
pub fn find_by_name_and_namespace(
|
|
|
|
&self,
|
|
|
|
tcx: TyCtxt<'_>,
|
|
|
|
ident: Ident,
|
|
|
|
ns: Namespace,
|
|
|
|
parent_def_id: DefId,
|
|
|
|
) -> Option<&ty::AssocItem> {
|
|
|
|
self.filter_by_name_unhygienic(ident.name)
|
|
|
|
.filter(|item| item.kind.namespace() == ns)
|
|
|
|
.find(|item| tcx.hygienic_eq(ident, item.ident, parent_def_id))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Debug, PartialEq, Eq, Copy, Hash, TyEncodable, TyDecodable, HashStable)]
|
2016-03-25 06:08:11 +00:00
|
|
|
pub enum Visibility {
|
|
|
|
/// Visible everywhere (including in other crates).
|
|
|
|
Public,
|
|
|
|
/// Visible only in the given crate-local module.
|
2016-12-20 08:32:15 +00:00
|
|
|
Restricted(DefId),
|
2016-03-25 06:08:11 +00:00
|
|
|
/// Not visible anywhere in the local crate. This is the visibility of private external items.
|
2016-12-20 08:32:15 +00:00
|
|
|
Invisible,
|
2016-03-25 06:08:11 +00:00
|
|
|
}
|
|
|
|
|
2016-12-20 08:32:15 +00:00
|
|
|
pub trait DefIdTree: Copy {
|
|
|
|
fn parent(self, id: DefId) -> Option<DefId>;
|
2016-12-29 17:08:33 +08:00
|
|
|
|
|
|
|
fn is_descendant_of(self, mut descendant: DefId, ancestor: DefId) -> bool {
|
|
|
|
if descendant.krate != ancestor.krate {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
while descendant != ancestor {
|
|
|
|
match self.parent(descendant) {
|
|
|
|
Some(parent) => descendant = parent,
|
|
|
|
None => return false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
true
|
|
|
|
}
|
2016-04-27 02:29:59 +00:00
|
|
|
}
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
impl<'tcx> DefIdTree for TyCtxt<'tcx> {
|
2016-12-20 08:32:15 +00:00
|
|
|
fn parent(self, id: DefId) -> Option<DefId> {
|
2020-03-06 19:28:44 +01:00
|
|
|
self.def_key(id).parent.map(|index| DefId { index, ..id })
|
2016-04-27 02:29:59 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-25 06:08:11 +00:00
|
|
|
impl Visibility {
|
2019-11-30 17:46:46 +01:00
|
|
|
pub fn from_hir(visibility: &hir::Visibility<'_>, id: hir::HirId, tcx: TyCtxt<'_>) -> Self {
|
2018-06-30 20:34:18 -07:00
|
|
|
match visibility.node {
|
2018-07-01 11:05:10 -07:00
|
|
|
hir::VisibilityKind::Public => Visibility::Public,
|
|
|
|
hir::VisibilityKind::Crate(_) => Visibility::Restricted(DefId::local(CRATE_DEF_INDEX)),
|
2019-04-20 19:36:05 +03:00
|
|
|
hir::VisibilityKind::Restricted { ref path, .. } => match path.res {
|
2016-04-02 20:24:02 +00:00
|
|
|
// If there is no resolution, `resolve` will have already reported an error, so
|
|
|
|
// assume that the visibility is public to avoid reporting more privacy errors.
|
2019-04-20 19:36:05 +03:00
|
|
|
Res::Err => Visibility::Public,
|
2016-12-20 08:32:15 +00:00
|
|
|
def => Visibility::Restricted(def.def_id()),
|
2016-04-02 20:24:02 +00:00
|
|
|
},
|
2020-03-18 20:27:59 +02:00
|
|
|
hir::VisibilityKind::Inherited => {
|
|
|
|
Visibility::Restricted(tcx.parent_module(id).to_def_id())
|
|
|
|
}
|
2016-03-25 06:08:11 +00:00
|
|
|
}
|
|
|
|
}
|
2016-03-31 07:03:00 +00:00
|
|
|
|
2018-11-01 19:43:38 +00:00
|
|
|
/// Returns `true` if an item with this visibility is accessible from the given block.
|
2016-12-29 17:08:33 +08:00
|
|
|
pub fn is_accessible_from<T: DefIdTree>(self, module: DefId, tree: T) -> bool {
|
2016-03-31 07:03:00 +00:00
|
|
|
let restriction = match self {
|
|
|
|
// Public items are visible everywhere.
|
|
|
|
Visibility::Public => return true,
|
|
|
|
// Private items from other crates are visible nowhere.
|
2016-12-20 08:32:15 +00:00
|
|
|
Visibility::Invisible => return false,
|
2016-03-31 07:03:00 +00:00
|
|
|
// Restricted items are visible in an arbitrary local module.
|
2016-12-20 08:32:15 +00:00
|
|
|
Visibility::Restricted(other) if other.krate != module.krate => return false,
|
2016-03-31 07:03:00 +00:00
|
|
|
Visibility::Restricted(module) => module,
|
|
|
|
};
|
|
|
|
|
2016-12-29 17:08:33 +08:00
|
|
|
tree.is_descendant_of(module, restriction)
|
2016-03-31 07:03:00 +00:00
|
|
|
}
|
2016-04-01 20:16:31 +00:00
|
|
|
|
2018-11-01 19:43:38 +00:00
|
|
|
/// Returns `true` if this visibility is at least as accessible as the given visibility
|
2016-12-20 08:32:15 +00:00
|
|
|
pub fn is_at_least<T: DefIdTree>(self, vis: Visibility, tree: T) -> bool {
|
2016-04-01 20:16:31 +00:00
|
|
|
let vis_restriction = match vis {
|
|
|
|
Visibility::Public => return self == Visibility::Public,
|
2016-12-20 08:32:15 +00:00
|
|
|
Visibility::Invisible => return true,
|
2016-04-01 20:16:31 +00:00
|
|
|
Visibility::Restricted(module) => module,
|
|
|
|
};
|
|
|
|
|
2016-04-27 02:29:59 +00:00
|
|
|
self.is_accessible_from(vis_restriction, tree)
|
2016-04-01 20:16:31 +00:00
|
|
|
}
|
2017-11-29 11:20:49 -08:00
|
|
|
|
2018-11-01 19:43:38 +00:00
|
|
|
// Returns `true` if this item is visible anywhere in the local crate.
|
2017-11-29 11:20:49 -08:00
|
|
|
pub fn is_visible_locally(self) -> bool {
|
|
|
|
match self {
|
|
|
|
Visibility::Public => true,
|
|
|
|
Visibility::Restricted(def_id) => def_id.is_local(),
|
|
|
|
Visibility::Invisible => false,
|
|
|
|
}
|
|
|
|
}
|
2016-03-25 06:08:11 +00:00
|
|
|
}
|
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Copy, Clone, PartialEq, TyDecodable, TyEncodable, HashStable)]
|
2013-10-29 06:08:34 -04:00
|
|
|
pub enum Variance {
|
2019-12-22 17:42:04 -05:00
|
|
|
Covariant, // T<A> <: T<B> iff A <: B -- e.g., function return type
|
|
|
|
Invariant, // T<A> <: T<B> iff B == A -- e.g., type of mutable cell
|
|
|
|
Contravariant, // T<A> <: T<B> iff B <: A -- e.g., function param type
|
|
|
|
Bivariant, // T<A> <: T<B> -- e.g., unused type parameter
|
2013-07-02 12:47:32 -07:00
|
|
|
}
|
2012-08-09 09:59:50 -07:00
|
|
|
|
2017-04-24 11:15:12 -04:00
|
|
|
/// The crate variances map is computed during typeck and contains the
|
|
|
|
/// variance of every item in the local crate. You should not use it
|
|
|
|
/// directly, because to do so will make your pass dependent on the
|
|
|
|
/// HIR of every item in the local crate. Instead, use
|
2017-05-05 14:34:42 -04:00
|
|
|
/// `tcx.variances_of()` to get the variance for a *particular*
|
2017-04-24 11:15:12 -04:00
|
|
|
/// item.
|
2018-12-03 01:14:35 +01:00
|
|
|
#[derive(HashStable)]
|
2018-11-30 15:12:41 +01:00
|
|
|
pub struct CrateVariancesMap<'tcx> {
|
2017-04-24 11:15:12 -04:00
|
|
|
/// For each item with generics, maps to a vector of the variance
|
2019-02-08 14:53:55 +01:00
|
|
|
/// of its generics. If an item has no generics, it will have no
|
2017-04-24 11:15:12 -04:00
|
|
|
/// entry.
|
2018-11-30 15:12:41 +01:00
|
|
|
pub variances: FxHashMap<DefId, &'tcx [ty::Variance]>,
|
2017-04-24 11:15:12 -04:00
|
|
|
}
|
|
|
|
|
2017-05-02 15:03:34 -04:00
|
|
|
impl Variance {
|
|
|
|
/// `a.xform(b)` combines the variance of a context with the
|
2019-02-08 14:53:55 +01:00
|
|
|
/// variance of a type with the following meaning. If we are in a
|
2017-05-02 15:03:34 -04:00
|
|
|
/// context with variance `a`, and we encounter a type argument in
|
|
|
|
/// a position with variance `b`, then `a.xform(b)` is the new
|
|
|
|
/// variance with which the argument appears.
|
|
|
|
///
|
|
|
|
/// Example 1:
|
|
|
|
///
|
|
|
|
/// *mut Vec<i32>
|
|
|
|
///
|
|
|
|
/// Here, the "ambient" variance starts as covariant. `*mut T` is
|
|
|
|
/// invariant with respect to `T`, so the variance in which the
|
|
|
|
/// `Vec<i32>` appears is `Covariant.xform(Invariant)`, which
|
|
|
|
/// yields `Invariant`. Now, the type `Vec<T>` is covariant with
|
|
|
|
/// respect to its type argument `T`, and hence the variance of
|
|
|
|
/// the `i32` here is `Invariant.xform(Covariant)`, which results
|
|
|
|
/// (again) in `Invariant`.
|
|
|
|
///
|
|
|
|
/// Example 2:
|
|
|
|
///
|
|
|
|
/// fn(*const Vec<i32>, *mut Vec<i32)
|
|
|
|
///
|
|
|
|
/// The ambient variance is covariant. A `fn` type is
|
|
|
|
/// contravariant with respect to its parameters, so the variance
|
|
|
|
/// within which both pointer types appear is
|
2019-02-08 14:53:55 +01:00
|
|
|
/// `Covariant.xform(Contravariant)`, or `Contravariant`. `*const
|
2017-05-02 15:03:34 -04:00
|
|
|
/// T` is covariant with respect to `T`, so the variance within
|
|
|
|
/// which the first `Vec<i32>` appears is
|
2019-02-08 14:53:55 +01:00
|
|
|
/// `Contravariant.xform(Covariant)` or `Contravariant`. The same
|
2017-05-02 15:03:34 -04:00
|
|
|
/// is true for its `i32` argument. In the `*mut T` case, the
|
|
|
|
/// variance of `Vec<i32>` is `Contravariant.xform(Invariant)`,
|
|
|
|
/// and hence the outermost type is `Invariant` with respect to
|
|
|
|
/// `Vec<i32>` (and its `i32` argument).
|
|
|
|
///
|
|
|
|
/// Source: Figure 1 of "Taming the Wildcards:
|
|
|
|
/// Combining Definition- and Use-Site Variance" published in PLDI'11.
|
|
|
|
pub fn xform(self, v: ty::Variance) -> ty::Variance {
|
|
|
|
match (self, v) {
|
|
|
|
// Figure 1, column 1.
|
|
|
|
(ty::Covariant, ty::Covariant) => ty::Covariant,
|
|
|
|
(ty::Covariant, ty::Contravariant) => ty::Contravariant,
|
|
|
|
(ty::Covariant, ty::Invariant) => ty::Invariant,
|
|
|
|
(ty::Covariant, ty::Bivariant) => ty::Bivariant,
|
|
|
|
|
|
|
|
// Figure 1, column 2.
|
|
|
|
(ty::Contravariant, ty::Covariant) => ty::Contravariant,
|
|
|
|
(ty::Contravariant, ty::Contravariant) => ty::Covariant,
|
|
|
|
(ty::Contravariant, ty::Invariant) => ty::Invariant,
|
|
|
|
(ty::Contravariant, ty::Bivariant) => ty::Bivariant,
|
|
|
|
|
|
|
|
// Figure 1, column 3.
|
|
|
|
(ty::Invariant, _) => ty::Invariant,
|
|
|
|
|
|
|
|
// Figure 1, column 4.
|
|
|
|
(ty::Bivariant, _) => ty::Bivariant,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-05 19:36:47 +03:00
|
|
|
// Contains information needed to resolve types and (in the future) look up
|
|
|
|
// the types of AST nodes.
|
|
|
|
#[derive(Copy, Clone, PartialEq, Eq, Hash)]
|
2015-07-08 12:27:32 -07:00
|
|
|
pub struct CReaderCacheKey {
|
2015-05-05 19:36:47 +03:00
|
|
|
pub cnum: CrateNum,
|
|
|
|
pub pos: usize,
|
|
|
|
}
|
|
|
|
|
2014-10-24 10:20:02 -04:00
|
|
|
bitflags! {
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Flags that we track on types. These flags are propagated upwards
|
|
|
|
/// through the type during type construction, so that we can quickly check
|
|
|
|
/// whether the type has various kinds of types in it without recursing
|
|
|
|
/// over the type itself.
|
2017-09-08 15:08:01 -04:00
|
|
|
pub struct TypeFlags: u32 {
|
2020-02-22 15:09:17 +00:00
|
|
|
// Does this have parameters? Used to determine whether substitution is
|
|
|
|
// required.
|
|
|
|
/// Does this have [Param]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_TY_PARAM = 1 << 0;
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Does this have [ReEarlyBound]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_RE_PARAM = 1 << 1;
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Does this have [ConstKind::Param]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_CT_PARAM = 1 << 2;
|
2020-02-22 15:09:17 +00:00
|
|
|
|
2020-04-01 16:20:27 +01:00
|
|
|
const NEEDS_SUBST = TypeFlags::HAS_TY_PARAM.bits
|
|
|
|
| TypeFlags::HAS_RE_PARAM.bits
|
|
|
|
| TypeFlags::HAS_CT_PARAM.bits;
|
2020-02-22 15:09:17 +00:00
|
|
|
|
|
|
|
/// Does this have [Infer]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_TY_INFER = 1 << 3;
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Does this have [ReVar]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_RE_INFER = 1 << 4;
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Does this have [ConstKind::Infer]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_CT_INFER = 1 << 5;
|
2020-02-22 15:09:17 +00:00
|
|
|
|
|
|
|
/// Does this have inference variables? Used to determine whether
|
|
|
|
/// inference is required.
|
2020-04-01 16:20:27 +01:00
|
|
|
const NEEDS_INFER = TypeFlags::HAS_TY_INFER.bits
|
|
|
|
| TypeFlags::HAS_RE_INFER.bits
|
|
|
|
| TypeFlags::HAS_CT_INFER.bits;
|
2020-02-22 15:09:17 +00:00
|
|
|
|
|
|
|
/// Does this have [Placeholder]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_TY_PLACEHOLDER = 1 << 6;
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Does this have [RePlaceholder]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_RE_PLACEHOLDER = 1 << 7;
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Does this have [ConstKind::Placeholder]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_CT_PLACEHOLDER = 1 << 8;
|
Add a (somewhat hacky) cache to the tcx that tracks "global" trait refs
that are known to have been satisfied *somewhere*. This means that if
one fn finds that `SomeType: Foo`, then every other fn can just consider
that to hold.
Unfortunately, there are some complications:
1. If `SomeType: Foo` includes dependent conditions, those conditions
may trigger an error. This error will be repored in the first fn
where `SomeType: Foo` is evaluated, but not in the other fns, which
can lead to uneven error reporting (which is sometimes confusing).
2. This kind of caching can be unsound in the presence of
unsatisfiable where clauses. For example, suppose that the first fn
has a where-clause like `i32: Bar<u32>`, which in fact does not
hold. This will "fool" trait resolution into thinking that `i32:
Bar<u32>` holds. This is ok currently, because it means that the
first fn can never be calle (since its where clauses cannot be
satisfied), but if the first fn's successful resolution is cached, it
can allow other fns to compile that should not. This problem is fixed
in the next commit.
2015-06-09 17:02:18 -04:00
|
|
|
|
2020-03-11 20:34:57 +00:00
|
|
|
/// `true` if there are "names" of regions and so forth
|
|
|
|
/// that are local to a particular fn/inferctxt
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_FREE_LOCAL_REGIONS = 1 << 9;
|
2020-03-11 20:34:57 +00:00
|
|
|
|
2019-04-22 21:29:11 +03:00
|
|
|
/// `true` if there are "names" of types and regions and so forth
|
|
|
|
/// that are local to a particular fn
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_FREE_LOCAL_NAMES = TypeFlags::HAS_TY_PARAM.bits
|
|
|
|
| TypeFlags::HAS_CT_PARAM.bits
|
|
|
|
| TypeFlags::HAS_TY_INFER.bits
|
|
|
|
| TypeFlags::HAS_CT_INFER.bits
|
|
|
|
| TypeFlags::HAS_TY_PLACEHOLDER.bits
|
|
|
|
| TypeFlags::HAS_CT_PLACEHOLDER.bits
|
|
|
|
| TypeFlags::HAS_FREE_LOCAL_REGIONS.bits;
|
2020-02-22 15:09:17 +00:00
|
|
|
|
2020-05-12 01:56:29 -04:00
|
|
|
/// Does this have [Projection]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_TY_PROJECTION = 1 << 10;
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Does this have [Opaque]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_TY_OPAQUE = 1 << 11;
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Does this have [ConstKind::Unevaluated]?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_CT_PROJECTION = 1 << 12;
|
2020-02-22 15:09:17 +00:00
|
|
|
|
|
|
|
/// Could this type be normalized further?
|
2020-04-01 16:20:27 +01:00
|
|
|
const HAS_PROJECTION = TypeFlags::HAS_TY_PROJECTION.bits
|
|
|
|
| TypeFlags::HAS_TY_OPAQUE.bits
|
|
|
|
| TypeFlags::HAS_CT_PROJECTION.bits;
|
Add a (somewhat hacky) cache to the tcx that tracks "global" trait refs
that are known to have been satisfied *somewhere*. This means that if
one fn finds that `SomeType: Foo`, then every other fn can just consider
that to hold.
Unfortunately, there are some complications:
1. If `SomeType: Foo` includes dependent conditions, those conditions
may trigger an error. This error will be repored in the first fn
where `SomeType: Foo` is evaluated, but not in the other fns, which
can lead to uneven error reporting (which is sometimes confusing).
2. This kind of caching can be unsound in the presence of
unsatisfiable where clauses. For example, suppose that the first fn
has a where-clause like `i32: Bar<u32>`, which in fact does not
hold. This will "fool" trait resolution into thinking that `i32:
Bar<u32>` holds. This is ok currently, because it means that the
first fn can never be calle (since its where clauses cannot be
satisfied), but if the first fn's successful resolution is cached, it
can allow other fns to compile that should not. This problem is fixed
in the next commit.
2015-06-09 17:02:18 -04:00
|
|
|
|
2020-04-16 13:47:47 +03:00
|
|
|
/// Is an error type/const reachable?
|
|
|
|
const HAS_ERROR = 1 << 13;
|
2018-11-02 19:25:20 +01:00
|
|
|
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Does this have any region that "appears free" in the type?
|
|
|
|
/// Basically anything but [ReLateBound] and [ReErased].
|
2020-04-06 22:29:18 +02:00
|
|
|
const HAS_FREE_REGIONS = 1 << 14;
|
2019-12-28 15:52:51 +00:00
|
|
|
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Does this have any [ReLateBound] regions? Used to check
|
|
|
|
/// if a global bound is safe to evaluate.
|
2020-04-06 22:29:18 +02:00
|
|
|
const HAS_RE_LATE_BOUND = 1 << 15;
|
2019-02-20 01:18:30 +00:00
|
|
|
|
2020-02-22 15:09:17 +00:00
|
|
|
/// Does this have any [ReErased] regions?
|
2020-04-06 22:29:18 +02:00
|
|
|
const HAS_RE_ERASED = 1 << 16;
|
2020-04-01 16:20:27 +01:00
|
|
|
|
|
|
|
/// Does this value have parameters/placeholders/inference variables which could be
|
|
|
|
/// replaced later, in a way that would change the results of `impl` specialization?
|
2020-04-06 22:29:18 +02:00
|
|
|
const STILL_FURTHER_SPECIALIZABLE = 1 << 17;
|
2014-10-24 10:20:02 -04:00
|
|
|
}
|
2012-05-09 06:09:58 -07:00
|
|
|
}
|
|
|
|
|
2019-08-11 12:55:14 -04:00
|
|
|
#[allow(rustc::usage_of_ty_tykind)]
|
2014-09-29 22:11:30 +03:00
|
|
|
pub struct TyS<'tcx> {
|
2020-08-03 00:49:11 +02:00
|
|
|
/// This field shouldn't be used directly and may be removed in the future.
|
|
|
|
/// Use `TyS::kind()` instead.
|
|
|
|
kind: TyKind<'tcx>,
|
2017-05-12 12:01:43 -04:00
|
|
|
pub flags: TypeFlags,
|
2014-11-15 16:47:59 -05:00
|
|
|
|
2018-05-28 12:38:39 -04:00
|
|
|
/// This is a kind of confusing thing: it stores the smallest
|
|
|
|
/// binder such that
|
|
|
|
///
|
|
|
|
/// (a) the binder itself captures nothing but
|
|
|
|
/// (b) all the late-bound things within the type are captured
|
|
|
|
/// by some sub-binder.
|
|
|
|
///
|
|
|
|
/// So, for a type without any late-bound things, like `u32`, this
|
2018-11-27 02:59:49 +00:00
|
|
|
/// will be *innermost*, because that is the innermost binder that
|
2018-05-28 12:38:39 -04:00
|
|
|
/// captures nothing. But for a type `&'D u32`, where `'D` is a
|
2019-02-08 14:53:55 +01:00
|
|
|
/// late-bound region with De Bruijn index `D`, this would be `D + 1`
|
2018-11-27 02:59:49 +00:00
|
|
|
/// -- the binder itself does not capture `D`, but `D` is captured
|
|
|
|
/// by an inner binder.
|
2018-05-28 12:38:39 -04:00
|
|
|
///
|
2018-11-27 02:59:49 +00:00
|
|
|
/// We call this concept an "exclusive" binder `D` because all
|
2019-02-08 14:53:55 +01:00
|
|
|
/// De Bruijn indices within the type are contained within `0..D`
|
2018-11-27 02:59:49 +00:00
|
|
|
/// (exclusive).
|
2018-05-28 12:38:39 -04:00
|
|
|
outer_exclusive_binder: ty::DebruijnIndex,
|
2014-10-24 10:20:02 -04:00
|
|
|
}
|
|
|
|
|
2018-11-13 06:34:11 +11:00
|
|
|
// `TyS` is used a lot. Make sure it doesn't unintentionally get bigger.
|
|
|
|
#[cfg(target_arch = "x86_64")]
|
2019-05-19 13:59:44 +03:00
|
|
|
static_assert_size!(TyS<'_>, 32);
|
2018-11-13 06:34:11 +11:00
|
|
|
|
2018-05-17 17:42:02 -04:00
|
|
|
impl<'tcx> Ord for TyS<'tcx> {
|
|
|
|
fn cmp(&self, other: &TyS<'tcx>) -> Ordering {
|
2020-08-03 00:49:11 +02:00
|
|
|
self.kind().cmp(other.kind())
|
2018-05-17 17:42:02 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'tcx> PartialOrd for TyS<'tcx> {
|
|
|
|
fn partial_cmp(&self, other: &TyS<'tcx>) -> Option<Ordering> {
|
2020-08-03 00:49:11 +02:00
|
|
|
Some(self.kind().cmp(other.kind()))
|
2018-05-17 17:42:02 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-21 20:02:52 +01:00
|
|
|
impl<'tcx> PartialEq for TyS<'tcx> {
|
2015-04-21 19:00:12 +03:00
|
|
|
#[inline]
|
2015-01-21 20:02:52 +01:00
|
|
|
fn eq(&self, other: &TyS<'tcx>) -> bool {
|
2018-07-18 21:53:54 +03:00
|
|
|
ptr::eq(self, other)
|
2015-01-21 20:02:52 +01:00
|
|
|
}
|
|
|
|
}
|
2014-09-29 22:11:30 +03:00
|
|
|
impl<'tcx> Eq for TyS<'tcx> {}
|
2011-05-11 17:05:39 -07:00
|
|
|
|
2015-02-17 20:48:07 -08:00
|
|
|
impl<'tcx> Hash for TyS<'tcx> {
|
|
|
|
fn hash<H: Hasher>(&self, s: &mut H) {
|
2018-08-29 22:02:42 -07:00
|
|
|
(self as *const TyS<'_>).hash(s)
|
2015-02-17 20:48:07 -08:00
|
|
|
}
|
|
|
|
}
|
2014-02-19 18:56:33 -08:00
|
|
|
|
2020-06-10 09:30:39 +01:00
|
|
|
impl<'a, 'tcx> HashStable<StableHashingContext<'a>> for TyS<'tcx> {
|
2019-09-26 18:54:39 -04:00
|
|
|
fn hash_stable(&self, hcx: &mut StableHashingContext<'a>, hasher: &mut StableHasher) {
|
2017-04-05 23:39:02 +02:00
|
|
|
let ty::TyS {
|
2019-09-16 19:08:35 +01:00
|
|
|
ref kind,
|
2017-04-05 23:39:02 +02:00
|
|
|
|
|
|
|
// The other fields just provide fast access to information that is
|
2019-09-16 19:08:35 +01:00
|
|
|
// also contained in `kind`, so no need to hash them.
|
2017-04-05 23:39:02 +02:00
|
|
|
flags: _,
|
2018-05-28 12:38:39 -04:00
|
|
|
|
|
|
|
outer_exclusive_binder: _,
|
2017-04-05 23:39:02 +02:00
|
|
|
} = *self;
|
|
|
|
|
2019-09-16 19:08:35 +01:00
|
|
|
kind.hash_stable(hcx, hasher);
|
2017-04-05 23:39:02 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-25 08:42:46 -04:00
|
|
|
#[rustc_diagnostic_item = "Ty"]
|
2014-09-29 22:11:30 +03:00
|
|
|
pub type Ty<'tcx> = &'tcx TyS<'tcx>;
|
2014-09-28 18:31:04 +03:00
|
|
|
|
2020-05-09 21:02:13 +02:00
|
|
|
pub type CanonicalTy<'tcx> = Canonical<'tcx, Ty<'tcx>>;
|
2016-10-24 18:23:29 -06:00
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, Hash, TyEncodable, TyDecodable, HashStable)]
|
2018-11-14 21:14:46 -08:00
|
|
|
pub struct UpvarPath {
|
|
|
|
pub hir_id: hir::HirId,
|
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Upvars do not get their own `NodeId`. Instead, we use the pair of
|
|
|
|
/// the original var ID (that is, the root variable that is referenced
|
|
|
|
/// by the upvar) and the ID of the closure expression.
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, Hash, TyEncodable, TyDecodable, HashStable)]
|
2014-02-07 14:37:19 -05:00
|
|
|
pub struct UpvarId {
|
2018-11-14 21:14:46 -08:00
|
|
|
pub var_path: UpvarPath,
|
2017-11-16 14:04:01 +01:00
|
|
|
pub closure_expr_id: LocalDefId,
|
2014-02-07 14:37:19 -05:00
|
|
|
}
|
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, PartialEq, Debug, TyEncodable, TyDecodable, Copy, HashStable)]
|
2014-02-07 14:37:19 -05:00
|
|
|
pub enum BorrowKind {
|
|
|
|
/// Data must be immutable and is aliasable.
|
|
|
|
ImmBorrow,
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Data must be immutable but not aliasable. This kind of borrow
|
2014-02-07 14:37:19 -05:00
|
|
|
/// cannot currently be expressed by the user and is used only in
|
2017-01-27 02:05:33 +08:00
|
|
|
/// implicit closure bindings. It is needed when the closure
|
2014-02-07 14:37:19 -05:00
|
|
|
/// is borrowing or mutating a mutable referent, e.g.:
|
|
|
|
///
|
2015-03-25 17:06:52 -07:00
|
|
|
/// let x: &mut isize = ...;
|
2014-02-07 14:37:19 -05:00
|
|
|
/// let y = || *x += 5;
|
|
|
|
///
|
|
|
|
/// If we were to try to translate this closure into a more explicit
|
|
|
|
/// form, we'd encounter an error with the code as written:
|
|
|
|
///
|
2015-03-25 17:06:52 -07:00
|
|
|
/// struct Env { x: & &mut isize }
|
|
|
|
/// let x: &mut isize = ...;
|
2014-02-07 14:37:19 -05:00
|
|
|
/// let y = (&mut Env { &x }, fn_ptr); // Closure is pair of env and fn
|
|
|
|
/// fn fn_ptr(env: &mut Env) { **env.x += 5; }
|
|
|
|
///
|
|
|
|
/// This is then illegal because you cannot mutate a `&mut` found
|
|
|
|
/// in an aliasable location. To solve, you'd have to translate with
|
|
|
|
/// an `&mut` borrow:
|
|
|
|
///
|
2015-03-25 17:06:52 -07:00
|
|
|
/// struct Env { x: & &mut isize }
|
|
|
|
/// let x: &mut isize = ...;
|
2014-02-07 14:37:19 -05:00
|
|
|
/// let y = (&mut Env { &mut x }, fn_ptr); // changed from &x to &mut x
|
|
|
|
/// fn fn_ptr(env: &mut Env) { **env.x += 5; }
|
|
|
|
///
|
|
|
|
/// Now the assignment to `**env.x` is legal, but creating a
|
|
|
|
/// mutable pointer to `x` is not because `x` is not mutable. We
|
|
|
|
/// could fix this by declaring `x` as `let mut x`. This is ok in
|
|
|
|
/// user code, if awkward, but extra weird for closures, since the
|
|
|
|
/// borrow is hidden.
|
|
|
|
///
|
|
|
|
/// So we introduce a "unique imm" borrow -- the referent is
|
|
|
|
/// immutable, but not aliasable. This solves the problem. For
|
|
|
|
/// simplicity, we don't give users the way to express this
|
|
|
|
/// borrow, it's just used when translating closures.
|
|
|
|
UniqueImmBorrow,
|
|
|
|
|
|
|
|
/// Data is mutable and not aliasable.
|
2019-12-22 17:42:04 -05:00
|
|
|
MutBorrow,
|
2014-02-07 14:37:19 -05:00
|
|
|
}
|
|
|
|
|
2015-01-24 15:54:52 -05:00
|
|
|
/// Information describing the capture of an upvar. This is computed
|
|
|
|
/// during `typeck`, specifically by `regionck`.
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(PartialEq, Clone, Debug, Copy, TyEncodable, TyDecodable, HashStable)]
|
2016-08-25 23:58:52 +03:00
|
|
|
pub enum UpvarCapture<'tcx> {
|
2015-01-24 15:54:52 -05:00
|
|
|
/// Upvar is captured by value. This is always true when the
|
|
|
|
/// closure is labeled `move`, but can also be true in other cases
|
|
|
|
/// depending on inference.
|
2020-08-25 23:58:58 -04:00
|
|
|
///
|
|
|
|
/// If the upvar was inferred to be captured by value (e.g. `move`
|
|
|
|
/// was not used), then the `Span` points to a usage that
|
|
|
|
/// required it. There may be more than one such usage
|
|
|
|
/// (e.g. `|| { a; a; }`), in which case we pick an
|
|
|
|
/// arbitrary one.
|
|
|
|
ByValue(Option<Span>),
|
2015-01-24 15:54:52 -05:00
|
|
|
|
|
|
|
/// Upvar is captured by reference.
|
2016-08-25 23:58:52 +03:00
|
|
|
ByRef(UpvarBorrow<'tcx>),
|
2015-01-24 15:54:52 -05:00
|
|
|
}
|
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(PartialEq, Clone, Copy, TyEncodable, TyDecodable, HashStable)]
|
2016-08-25 23:58:52 +03:00
|
|
|
pub struct UpvarBorrow<'tcx> {
|
2015-01-24 15:54:52 -05:00
|
|
|
/// The kind of borrow: by-ref upvars have access to shared
|
|
|
|
/// immutable borrows, which are not part of the normal language
|
|
|
|
/// syntax.
|
2014-03-28 10:05:27 -07:00
|
|
|
pub kind: BorrowKind,
|
2015-01-24 15:54:52 -05:00
|
|
|
|
|
|
|
/// Region of the resulting reference.
|
2017-04-20 04:45:53 -04:00
|
|
|
pub region: ty::Region<'tcx>,
|
2014-02-07 14:37:19 -05:00
|
|
|
}
|
|
|
|
|
2019-05-14 19:42:57 +03:00
|
|
|
pub type UpvarListMap = FxHashMap<DefId, FxIndexMap<hir::HirId, UpvarId>>;
|
2016-11-08 14:02:55 +11:00
|
|
|
pub type UpvarCaptureMap<'tcx> = FxHashMap<UpvarId, UpvarCapture<'tcx>>;
|
2014-02-07 14:37:19 -05:00
|
|
|
|
2017-07-16 07:07:51 -04:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq)]
|
2013-01-30 12:17:17 -08:00
|
|
|
pub enum IntVarValue {
|
2015-09-14 21:58:20 +12:00
|
|
|
IntType(ast::IntTy),
|
|
|
|
UintType(ast::UintTy),
|
2013-01-22 07:02:40 -08:00
|
|
|
}
|
|
|
|
|
2017-07-16 07:07:51 -04:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq)]
|
|
|
|
pub struct FloatVarValue(pub ast::FloatTy);
|
|
|
|
|
2017-05-11 15:05:00 +03:00
|
|
|
impl ty::EarlyBoundRegion {
|
Reject specialized Drop impls.
See Issue 8142 for discussion.
This makes it illegal for a Drop impl to be more specialized than the
original item.
So for example, all of the following are now rejected (when they would
have been blindly accepted before):
```rust
struct S<A> { ... };
impl Drop for S<i8> { ... } // error: specialized to concrete type
struct T<'a> { ... };
impl Drop for T<'static> { ... } // error: specialized to concrete region
struct U<A> { ... };
impl<A:Clone> Drop for U<A> { ... } // error: added extra type requirement
struct V<'a,'b>;
impl<'a,'b:a> Drop for V<'a,'b> { ... } // error: added extra region requirement
```
Due to examples like the above, this is a [breaking-change].
(The fix is to either remove the specialization from the `Drop` impl,
or to transcribe the requirements into the struct/enum definition;
examples of both are shown in the PR's fixed to `libstd`.)
----
This is likely to be the last thing blocking the removal of the
`#[unsafe_destructor]` attribute.
Includes two new error codes for the new dropck check.
Update run-pass tests to accommodate new dropck pass.
Update tests and docs to reflect new destructor restriction.
----
Implementation notes:
We identify Drop impl specialization by not being as parametric as the
struct/enum definition via unification.
More specifically:
1. Attempt unification of a skolemized instance of the struct/enum
with an instance of the Drop impl's type expression where all of
the impl's generics (i.e. the free variables of the type
expression) have been replaced with unification variables.
2. If unification fails, then reject Drop impl as specialized.
3. If unification succeeds, check if any of the skolemized
variables "leaked" into the constraint set for the inference
context; if so, then reject Drop impl as specialized.
4. Otherwise, unification succeeded without leaking skolemized
variables: accept the Drop impl.
We identify whether a Drop impl is injecting new predicates by simply
looking whether the predicate, after an appropriate substitution,
appears on the struct/enum definition.
2015-03-21 13:12:08 +01:00
|
|
|
pub fn to_bound_region(&self) -> ty::BoundRegion {
|
2017-01-06 14:35:23 -05:00
|
|
|
ty::BoundRegion::BrNamed(self.def_id, self.name)
|
Reject specialized Drop impls.
See Issue 8142 for discussion.
This makes it illegal for a Drop impl to be more specialized than the
original item.
So for example, all of the following are now rejected (when they would
have been blindly accepted before):
```rust
struct S<A> { ... };
impl Drop for S<i8> { ... } // error: specialized to concrete type
struct T<'a> { ... };
impl Drop for T<'static> { ... } // error: specialized to concrete region
struct U<A> { ... };
impl<A:Clone> Drop for U<A> { ... } // error: added extra type requirement
struct V<'a,'b>;
impl<'a,'b:a> Drop for V<'a,'b> { ... } // error: added extra region requirement
```
Due to examples like the above, this is a [breaking-change].
(The fix is to either remove the specialization from the `Drop` impl,
or to transcribe the requirements into the struct/enum definition;
examples of both are shown in the PR's fixed to `libstd`.)
----
This is likely to be the last thing blocking the removal of the
`#[unsafe_destructor]` attribute.
Includes two new error codes for the new dropck check.
Update run-pass tests to accommodate new dropck pass.
Update tests and docs to reflect new destructor restriction.
----
Implementation notes:
We identify Drop impl specialization by not being as parametric as the
struct/enum definition via unification.
More specifically:
1. Attempt unification of a skolemized instance of the struct/enum
with an instance of the Drop impl's type expression where all of
the impl's generics (i.e. the free variables of the type
expression) have been replaced with unification variables.
2. If unification fails, then reject Drop impl as specialized.
3. If unification succeeds, check if any of the skolemized
variables "leaked" into the constraint set for the inference
context; if so, then reject Drop impl as specialized.
4. Otherwise, unification succeeded without leaking skolemized
variables: accept the Drop impl.
We identify whether a Drop impl is injecting new predicates by simply
looking whether the predicate, after an appropriate substitution,
appears on the struct/enum definition.
2015-03-21 13:12:08 +01:00
|
|
|
}
|
2018-08-06 21:15:15 +02:00
|
|
|
|
|
|
|
/// Does this early bound region have a name? Early bound regions normally
|
|
|
|
/// always have names except when using anonymous lifetimes (`'_`).
|
|
|
|
pub fn has_name(&self) -> bool {
|
2019-10-18 13:22:50 +11:00
|
|
|
self.name != kw::UnderscoreLifetime
|
2018-08-06 21:15:15 +02:00
|
|
|
}
|
2014-12-07 11:10:48 -05:00
|
|
|
}
|
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Debug, TyEncodable, TyDecodable, HashStable)]
|
2018-04-19 00:40:22 +01:00
|
|
|
pub enum GenericParamDefKind {
|
2018-05-10 23:46:57 +01:00
|
|
|
Lifetime,
|
2018-05-16 13:03:04 +03:00
|
|
|
Type {
|
|
|
|
has_default: bool,
|
|
|
|
object_lifetime_default: ObjectLifetimeDefault,
|
|
|
|
synthetic: Option<hir::SyntheticTyParamKind>,
|
2019-02-20 01:09:29 +00:00
|
|
|
},
|
|
|
|
Const,
|
2018-03-08 10:39:31 +00:00
|
|
|
}
|
|
|
|
|
2020-01-22 01:43:24 +00:00
|
|
|
impl GenericParamDefKind {
|
|
|
|
pub fn descr(&self) -> &'static str {
|
|
|
|
match self {
|
|
|
|
GenericParamDefKind::Lifetime => "lifetime",
|
|
|
|
GenericParamDefKind::Type { .. } => "type",
|
|
|
|
GenericParamDefKind::Const => "constant",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Debug, TyEncodable, TyDecodable, HashStable)]
|
2018-04-19 00:40:22 +01:00
|
|
|
pub struct GenericParamDef {
|
2019-10-18 13:22:50 +11:00
|
|
|
pub name: Symbol,
|
2018-04-19 00:40:22 +01:00
|
|
|
pub def_id: DefId,
|
|
|
|
pub index: u32,
|
2018-05-10 23:46:57 +01:00
|
|
|
|
|
|
|
/// `pure_wrt_drop`, set by the (unsafe) `#[may_dangle]` attribute
|
|
|
|
/// on generic parameter `'a`/`T`, asserts data behind the parameter
|
|
|
|
/// `'a`/`T` won't be accessed during the parent type's `Drop` impl.
|
|
|
|
pub pure_wrt_drop: bool,
|
|
|
|
|
2018-04-19 00:40:22 +01:00
|
|
|
pub kind: GenericParamDefKind,
|
|
|
|
}
|
|
|
|
|
2018-04-12 17:53:29 +01:00
|
|
|
impl GenericParamDef {
|
2018-04-19 00:40:22 +01:00
|
|
|
pub fn to_early_bound_region_data(&self) -> ty::EarlyBoundRegion {
|
2018-10-02 10:56:36 +02:00
|
|
|
if let GenericParamDefKind::Lifetime = self.kind {
|
2019-12-22 17:42:04 -05:00
|
|
|
ty::EarlyBoundRegion { def_id: self.def_id, index: self.index, name: self.name }
|
2018-10-02 10:56:36 +02:00
|
|
|
} else {
|
|
|
|
bug!("cannot convert a non-lifetime parameter def to an early bound region")
|
2018-04-19 00:40:22 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn to_bound_region(&self) -> ty::BoundRegion {
|
2018-10-02 10:56:36 +02:00
|
|
|
if let GenericParamDefKind::Lifetime = self.kind {
|
|
|
|
self.to_early_bound_region_data().to_bound_region()
|
|
|
|
} else {
|
|
|
|
bug!("cannot convert a non-lifetime parameter def to an early bound region")
|
2018-03-08 10:39:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-07 17:44:30 +01:00
|
|
|
#[derive(Default)]
|
2018-04-18 11:33:52 +01:00
|
|
|
pub struct GenericParamCount {
|
|
|
|
pub lifetimes: usize,
|
|
|
|
pub types: usize,
|
2019-02-20 01:09:29 +00:00
|
|
|
pub consts: usize,
|
2018-04-18 11:33:52 +01:00
|
|
|
}
|
|
|
|
|
2014-12-07 11:10:48 -05:00
|
|
|
/// Information about the formal type/lifetime parameters associated
|
2018-11-27 02:59:49 +00:00
|
|
|
/// with an item or method. Analogous to `hir::Generics`.
|
2017-10-02 10:43:36 +02:00
|
|
|
///
|
2018-11-27 02:59:49 +00:00
|
|
|
/// The ordering of parameters is the same as in `Subst` (excluding child generics):
|
|
|
|
/// `Self` (optionally), `Lifetime` params..., `Type` params...
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Debug, TyEncodable, TyDecodable, HashStable)]
|
2017-01-25 22:01:11 +02:00
|
|
|
pub struct Generics {
|
2016-08-10 20:39:09 +03:00
|
|
|
pub parent: Option<DefId>,
|
2018-02-24 18:29:40 +00:00
|
|
|
pub parent_count: usize,
|
2018-04-12 17:53:29 +01:00
|
|
|
pub params: Vec<GenericParamDef>,
|
2017-01-25 22:01:11 +02:00
|
|
|
|
2019-06-17 23:40:24 +01:00
|
|
|
/// Reverse map to the `index` field of each `GenericParamDef`.
|
2018-12-03 01:14:35 +01:00
|
|
|
#[stable_hasher(ignore)]
|
2018-04-18 12:45:13 +01:00
|
|
|
pub param_def_id_to_index: FxHashMap<DefId, u32>,
|
2017-01-25 22:01:11 +02:00
|
|
|
|
2016-08-08 23:39:49 +03:00
|
|
|
pub has_self: bool,
|
2017-07-19 23:12:58 +03:00
|
|
|
pub has_late_bound_regions: Option<Span>,
|
2014-12-05 11:04:49 -05:00
|
|
|
}
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
impl<'tcx> Generics {
|
2016-08-27 01:13:48 +03:00
|
|
|
pub fn count(&self) -> usize {
|
2018-03-08 12:10:13 +00:00
|
|
|
self.parent_count + self.params.len()
|
2016-08-27 01:13:48 +03:00
|
|
|
}
|
2016-10-17 16:14:25 +02:00
|
|
|
|
2018-05-11 00:30:34 +01:00
|
|
|
pub fn own_counts(&self) -> GenericParamCount {
|
2018-04-18 11:33:52 +01:00
|
|
|
// We could cache this as a property of `GenericParamCount`, but
|
|
|
|
// the aim is to refactor this away entirely eventually and the
|
|
|
|
// presence of this method will be a constant reminder.
|
2018-08-07 17:44:30 +01:00
|
|
|
let mut own_counts: GenericParamCount = Default::default();
|
2018-04-13 00:57:38 +01:00
|
|
|
|
2018-05-11 16:12:56 +01:00
|
|
|
for param in &self.params {
|
2018-04-19 00:40:22 +01:00
|
|
|
match param.kind {
|
2018-05-11 00:30:34 +01:00
|
|
|
GenericParamDefKind::Lifetime => own_counts.lifetimes += 1,
|
2018-08-07 18:53:43 +01:00
|
|
|
GenericParamDefKind::Type { .. } => own_counts.types += 1,
|
2019-02-20 01:09:29 +00:00
|
|
|
GenericParamDefKind::Const => own_counts.consts += 1,
|
2018-04-13 00:57:38 +01:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2018-05-11 00:30:34 +01:00
|
|
|
own_counts
|
2018-04-13 00:57:38 +01:00
|
|
|
}
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn requires_monomorphization(&self, tcx: TyCtxt<'tcx>) -> bool {
|
2019-04-17 23:09:22 +01:00
|
|
|
if self.own_requires_monomorphization() {
|
|
|
|
return true;
|
2018-02-24 18:29:40 +00:00
|
|
|
}
|
2019-04-17 23:09:22 +01:00
|
|
|
|
2018-02-24 18:29:40 +00:00
|
|
|
if let Some(parent_def_id) = self.parent {
|
|
|
|
let parent = tcx.generics_of(parent_def_id);
|
2018-04-12 17:51:08 +01:00
|
|
|
parent.requires_monomorphization(tcx)
|
2018-02-24 18:29:40 +00:00
|
|
|
} else {
|
|
|
|
false
|
|
|
|
}
|
2018-03-08 10:39:31 +00:00
|
|
|
}
|
|
|
|
|
2019-04-17 23:09:22 +01:00
|
|
|
pub fn own_requires_monomorphization(&self) -> bool {
|
|
|
|
for param in &self.params {
|
|
|
|
match param.kind {
|
|
|
|
GenericParamDefKind::Type { .. } | GenericParamDefKind::Const => return true,
|
|
|
|
GenericParamDefKind::Lifetime => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
false
|
|
|
|
}
|
|
|
|
|
2020-06-22 13:24:59 +01:00
|
|
|
/// Returns the `GenericParamDef` with the given index.
|
2020-03-22 11:01:46 +02:00
|
|
|
pub fn param_at(&'tcx self, param_index: usize, tcx: TyCtxt<'tcx>) -> &'tcx GenericParamDef {
|
|
|
|
if let Some(index) = param_index.checked_sub(self.parent_count) {
|
|
|
|
&self.params[index]
|
|
|
|
} else {
|
|
|
|
tcx.generics_of(self.parent.expect("parent_count > 0 but no parent?"))
|
|
|
|
.param_at(param_index, tcx)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-22 13:24:59 +01:00
|
|
|
/// Returns the `GenericParamDef` associated with this `EarlyBoundRegion`.
|
2019-06-12 00:11:55 +03:00
|
|
|
pub fn region_param(
|
|
|
|
&'tcx self,
|
|
|
|
param: &EarlyBoundRegion,
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
) -> &'tcx GenericParamDef {
|
2020-03-22 11:01:46 +02:00
|
|
|
let param = self.param_at(param.index as usize, tcx);
|
|
|
|
match param.kind {
|
|
|
|
GenericParamDefKind::Lifetime => param,
|
|
|
|
_ => bug!("expected lifetime parameter, but found another generic parameter"),
|
2017-10-01 17:15:15 +02:00
|
|
|
}
|
2016-10-17 16:14:25 +02:00
|
|
|
}
|
|
|
|
|
2018-05-16 13:03:04 +03:00
|
|
|
/// Returns the `GenericParamDef` associated with this `ParamTy`.
|
2019-06-14 01:32:15 +03:00
|
|
|
pub fn type_param(&'tcx self, param: &ParamTy, tcx: TyCtxt<'tcx>) -> &'tcx GenericParamDef {
|
2020-03-22 11:01:46 +02:00
|
|
|
let param = self.param_at(param.index as usize, tcx);
|
|
|
|
match param.kind {
|
|
|
|
GenericParamDefKind::Type { .. } => param,
|
|
|
|
_ => bug!("expected type parameter, but found another generic parameter"),
|
2017-10-01 17:15:15 +02:00
|
|
|
}
|
2016-10-17 16:14:25 +02:00
|
|
|
}
|
2019-02-20 01:09:29 +00:00
|
|
|
|
2020-06-22 13:24:59 +01:00
|
|
|
/// Returns the `GenericParamDef` associated with this `ParamConst`.
|
2019-06-14 01:32:15 +03:00
|
|
|
pub fn const_param(&'tcx self, param: &ParamConst, tcx: TyCtxt<'tcx>) -> &GenericParamDef {
|
2020-03-22 11:01:46 +02:00
|
|
|
let param = self.param_at(param.index as usize, tcx);
|
|
|
|
match param.kind {
|
|
|
|
GenericParamDefKind::Const => param,
|
|
|
|
_ => bug!("expected const parameter, but found another generic parameter"),
|
2019-02-20 01:09:29 +00:00
|
|
|
}
|
|
|
|
}
|
2016-08-27 01:13:48 +03:00
|
|
|
}
|
|
|
|
|
2015-02-11 06:54:05 -05:00
|
|
|
/// Bounds on generics.
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Copy, Clone, Default, Debug, TyEncodable, TyDecodable, HashStable)]
|
2015-02-11 06:54:05 -05:00
|
|
|
pub struct GenericPredicates<'tcx> {
|
2016-08-11 09:19:42 +03:00
|
|
|
pub parent: Option<DefId>,
|
2019-10-18 03:14:57 +03:00
|
|
|
pub predicates: &'tcx [(Predicate<'tcx>, Span)],
|
2015-02-11 06:54:05 -05:00
|
|
|
}
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
impl<'tcx> GenericPredicates<'tcx> {
|
2019-06-12 00:11:55 +03:00
|
|
|
pub fn instantiate(
|
|
|
|
&self,
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
substs: SubstsRef<'tcx>,
|
|
|
|
) -> InstantiatedPredicates<'tcx> {
|
2016-08-11 09:19:42 +03:00
|
|
|
let mut instantiated = InstantiatedPredicates::empty();
|
|
|
|
self.instantiate_into(tcx, &mut instantiated, substs);
|
|
|
|
instantiated
|
|
|
|
}
|
2018-11-01 19:43:38 +00:00
|
|
|
|
2019-06-12 00:11:55 +03:00
|
|
|
pub fn instantiate_own(
|
|
|
|
&self,
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
substs: SubstsRef<'tcx>,
|
|
|
|
) -> InstantiatedPredicates<'tcx> {
|
2015-02-11 06:54:05 -05:00
|
|
|
InstantiatedPredicates {
|
2018-09-16 20:15:49 +03:00
|
|
|
predicates: self.predicates.iter().map(|(p, _)| p.subst(tcx, substs)).collect(),
|
2020-01-29 16:55:37 -08:00
|
|
|
spans: self.predicates.iter().map(|(_, sp)| *sp).collect(),
|
2016-08-11 09:19:42 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-12 00:11:55 +03:00
|
|
|
fn instantiate_into(
|
|
|
|
&self,
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
instantiated: &mut InstantiatedPredicates<'tcx>,
|
|
|
|
substs: SubstsRef<'tcx>,
|
|
|
|
) {
|
2016-08-11 09:19:42 +03:00
|
|
|
if let Some(def_id) = self.parent {
|
2017-04-24 15:20:46 +03:00
|
|
|
tcx.predicates_of(def_id).instantiate_into(tcx, instantiated, substs);
|
2014-12-07 11:10:48 -05:00
|
|
|
}
|
2019-12-22 17:42:04 -05:00
|
|
|
instantiated.predicates.extend(self.predicates.iter().map(|(p, _)| p.subst(tcx, substs)));
|
2020-01-29 16:55:37 -08:00
|
|
|
instantiated.spans.extend(self.predicates.iter().map(|(_, sp)| *sp));
|
2014-12-07 11:10:48 -05:00
|
|
|
}
|
2015-02-24 09:24:42 -05:00
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn instantiate_identity(&self, tcx: TyCtxt<'tcx>) -> InstantiatedPredicates<'tcx> {
|
2017-05-11 15:05:00 +03:00
|
|
|
let mut instantiated = InstantiatedPredicates::empty();
|
|
|
|
self.instantiate_identity_into(tcx, &mut instantiated);
|
|
|
|
instantiated
|
|
|
|
}
|
|
|
|
|
2019-06-12 00:11:55 +03:00
|
|
|
fn instantiate_identity_into(
|
|
|
|
&self,
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
instantiated: &mut InstantiatedPredicates<'tcx>,
|
|
|
|
) {
|
2017-05-11 15:05:00 +03:00
|
|
|
if let Some(def_id) = self.parent {
|
|
|
|
tcx.predicates_of(def_id).instantiate_identity_into(tcx, instantiated);
|
|
|
|
}
|
2020-01-29 16:55:37 -08:00
|
|
|
instantiated.predicates.extend(self.predicates.iter().map(|(p, _)| p));
|
|
|
|
instantiated.spans.extend(self.predicates.iter().map(|(_, s)| s));
|
2017-05-11 15:05:00 +03:00
|
|
|
}
|
|
|
|
|
2019-06-12 00:11:55 +03:00
|
|
|
pub fn instantiate_supertrait(
|
|
|
|
&self,
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
poly_trait_ref: &ty::PolyTraitRef<'tcx>,
|
|
|
|
) -> InstantiatedPredicates<'tcx> {
|
2016-08-11 09:19:42 +03:00
|
|
|
assert_eq!(self.parent, None);
|
2015-02-24 09:24:42 -05:00
|
|
|
InstantiatedPredicates {
|
2019-12-22 17:42:04 -05:00
|
|
|
predicates: self
|
|
|
|
.predicates
|
|
|
|
.iter()
|
|
|
|
.map(|(pred, _)| pred.subst_supertrait(tcx, poly_trait_ref))
|
|
|
|
.collect(),
|
2020-01-29 16:55:37 -08:00
|
|
|
spans: self.predicates.iter().map(|(_, sp)| *sp).collect(),
|
2015-02-24 09:24:42 -05:00
|
|
|
}
|
|
|
|
}
|
2014-12-07 11:10:48 -05:00
|
|
|
}
|
|
|
|
|
2020-06-10 09:30:39 +01:00
|
|
|
#[derive(Debug)]
|
|
|
|
crate struct PredicateInner<'tcx> {
|
|
|
|
kind: PredicateKind<'tcx>,
|
|
|
|
flags: TypeFlags,
|
|
|
|
/// See the comment for the corresponding field of [TyS].
|
|
|
|
outer_exclusive_binder: ty::DebruijnIndex,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(target_arch = "x86_64")]
|
2020-07-09 00:35:55 +02:00
|
|
|
static_assert_size!(PredicateInner<'_>, 48);
|
2020-06-10 09:30:39 +01:00
|
|
|
|
|
|
|
#[derive(Clone, Copy, Lift)]
|
2020-05-11 22:06:41 +02:00
|
|
|
pub struct Predicate<'tcx> {
|
2020-06-10 09:30:39 +01:00
|
|
|
inner: &'tcx PredicateInner<'tcx>,
|
2020-05-11 22:06:41 +02:00
|
|
|
}
|
|
|
|
|
2020-05-11 20:23:15 +02:00
|
|
|
impl<'tcx> PartialEq for Predicate<'tcx> {
|
|
|
|
fn eq(&self, other: &Self) -> bool {
|
|
|
|
// `self.kind` is always interned.
|
2020-06-10 09:30:39 +01:00
|
|
|
ptr::eq(self.inner, other.inner)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Hash for Predicate<'_> {
|
|
|
|
fn hash<H: Hasher>(&self, s: &mut H) {
|
|
|
|
(self.inner as *const PredicateInner<'_>).hash(s)
|
2020-05-11 20:23:15 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'tcx> Eq for Predicate<'tcx> {}
|
|
|
|
|
|
|
|
impl<'tcx> Predicate<'tcx> {
|
2020-05-23 19:02:26 +02:00
|
|
|
#[inline(always)]
|
2020-05-11 20:23:15 +02:00
|
|
|
pub fn kind(self) -> &'tcx PredicateKind<'tcx> {
|
2020-06-10 09:30:39 +01:00
|
|
|
&self.inner.kind
|
|
|
|
}
|
2020-06-18 20:41:43 +02:00
|
|
|
|
2020-07-09 00:35:55 +02:00
|
|
|
/// Returns the inner `PredicateAtom`.
|
|
|
|
///
|
2020-07-18 14:37:36 +02:00
|
|
|
/// The returned atom may contain unbound variables bound to binders skipped in this method.
|
|
|
|
/// It is safe to reapply binders to the given atom.
|
|
|
|
///
|
2020-07-09 00:35:55 +02:00
|
|
|
/// Note that this method panics in case this predicate has unbound variables.
|
|
|
|
pub fn skip_binders(self) -> PredicateAtom<'tcx> {
|
2020-06-21 12:26:17 +02:00
|
|
|
match self.kind() {
|
2020-07-18 11:46:38 +02:00
|
|
|
&PredicateKind::ForAll(binder) => binder.skip_binder(),
|
2020-07-18 14:37:36 +02:00
|
|
|
&PredicateKind::Atom(atom) => {
|
|
|
|
debug_assert!(!atom.has_escaping_bound_vars());
|
|
|
|
atom
|
|
|
|
}
|
2020-06-21 12:26:17 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-09 00:35:55 +02:00
|
|
|
/// Returns the inner `PredicateAtom`.
|
2020-06-21 12:26:17 +02:00
|
|
|
///
|
2020-07-21 15:42:18 +02:00
|
|
|
/// Note that this method does not check if the predicate has unbound variables.
|
|
|
|
///
|
|
|
|
/// Rebinding the returned atom can causes the previously bound variables
|
2020-07-09 00:35:55 +02:00
|
|
|
/// to end up at the wrong binding level.
|
|
|
|
pub fn skip_binders_unchecked(self) -> PredicateAtom<'tcx> {
|
2020-06-18 20:41:43 +02:00
|
|
|
match self.kind() {
|
2020-07-18 11:46:38 +02:00
|
|
|
&PredicateKind::ForAll(binder) => binder.skip_binder(),
|
2020-07-21 15:42:18 +02:00
|
|
|
&PredicateKind::Atom(atom) => atom,
|
2020-07-09 00:35:55 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-21 15:42:18 +02:00
|
|
|
/// Allows using a `Binder<PredicateAtom<'tcx>>` even if the given predicate previously
|
|
|
|
/// contained unbound variables by shifting these variables outwards.
|
2020-07-09 00:35:55 +02:00
|
|
|
pub fn bound_atom(self, tcx: TyCtxt<'tcx>) -> Binder<PredicateAtom<'tcx>> {
|
|
|
|
match self.kind() {
|
2020-07-18 11:46:38 +02:00
|
|
|
&PredicateKind::ForAll(binder) => binder,
|
2020-07-21 15:42:18 +02:00
|
|
|
&PredicateKind::Atom(atom) => Binder::wrap_nonbinding(tcx, atom),
|
2020-06-18 20:41:43 +02:00
|
|
|
}
|
|
|
|
}
|
2020-06-10 09:30:39 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
impl<'a, 'tcx> HashStable<StableHashingContext<'a>> for Predicate<'tcx> {
|
|
|
|
fn hash_stable(&self, hcx: &mut StableHashingContext<'a>, hasher: &mut StableHasher) {
|
|
|
|
let PredicateInner {
|
|
|
|
ref kind,
|
|
|
|
|
|
|
|
// The other fields just provide fast access to information that is
|
|
|
|
// also contained in `kind`, so no need to hash them.
|
|
|
|
flags: _,
|
|
|
|
outer_exclusive_binder: _,
|
|
|
|
} = self.inner;
|
|
|
|
|
|
|
|
kind.hash_stable(hcx, hasher);
|
2020-05-11 22:06:41 +02:00
|
|
|
}
|
2020-06-13 15:04:28 +02:00
|
|
|
}
|
2020-06-11 21:42:39 +02:00
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, Hash, TyEncodable, TyDecodable)]
|
2020-06-18 20:41:43 +02:00
|
|
|
#[derive(HashStable, TypeFoldable)]
|
|
|
|
pub enum PredicateKind<'tcx> {
|
2020-07-09 00:35:55 +02:00
|
|
|
/// `for<'a>: ...`
|
2020-07-18 11:46:38 +02:00
|
|
|
ForAll(Binder<PredicateAtom<'tcx>>),
|
2020-07-09 00:35:55 +02:00
|
|
|
Atom(PredicateAtom<'tcx>),
|
|
|
|
}
|
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, Hash, TyEncodable, TyDecodable)]
|
2020-07-09 00:35:55 +02:00
|
|
|
#[derive(HashStable, TypeFoldable)]
|
|
|
|
pub enum PredicateAtom<'tcx> {
|
2020-06-11 21:42:39 +02:00
|
|
|
/// Corresponds to `where Foo: Bar<A, B, C>`. `Foo` here would be
|
|
|
|
/// the `Self` type of the trait reference and `A`, `B`, and `C`
|
|
|
|
/// would be the type parameters.
|
|
|
|
///
|
|
|
|
/// A trait predicate will have `Constness::Const` if it originates
|
|
|
|
/// from a bound on a `const fn` without the `?const` opt-out (e.g.,
|
|
|
|
/// `const fn foobar<Foo: Bar>() {}`).
|
|
|
|
Trait(TraitPredicate<'tcx>, Constness),
|
|
|
|
|
|
|
|
/// `where 'a: 'b`
|
|
|
|
RegionOutlives(RegionOutlivesPredicate<'tcx>),
|
|
|
|
|
|
|
|
/// `where T: 'a`
|
|
|
|
TypeOutlives(TypeOutlivesPredicate<'tcx>),
|
|
|
|
|
|
|
|
/// `where <T as TraitRef>::Name == X`, approximately.
|
|
|
|
/// See the `ProjectionPredicate` struct for details.
|
|
|
|
Projection(ProjectionPredicate<'tcx>),
|
|
|
|
|
|
|
|
/// No syntax: `T` well-formed.
|
|
|
|
WellFormed(GenericArg<'tcx>),
|
|
|
|
|
|
|
|
/// Trait must be object-safe.
|
|
|
|
ObjectSafe(DefId),
|
|
|
|
|
|
|
|
/// No direct syntax. May be thought of as `where T: FnFoo<...>`
|
|
|
|
/// for some substitutions `...` and `T` being a closure type.
|
|
|
|
/// Satisfied (or refuted) once we know the closure's kind.
|
|
|
|
ClosureKind(DefId, SubstsRef<'tcx>, ClosureKind),
|
|
|
|
|
|
|
|
/// `T1 <: T2`
|
|
|
|
Subtype(SubtypePredicate<'tcx>),
|
|
|
|
|
2017-08-07 08:08:53 +03:00
|
|
|
/// Constant initializer must evaluate successfully.
|
2020-07-15 10:50:54 +02:00
|
|
|
ConstEvaluatable(ty::WithOptConstParam<DefId>, SubstsRef<'tcx>),
|
2020-02-29 10:03:04 +13:00
|
|
|
|
|
|
|
/// Constants must be equal. The first component is the const that is expected.
|
|
|
|
ConstEquate(&'tcx Const<'tcx>, &'tcx Const<'tcx>),
|
2020-06-18 20:33:52 +02:00
|
|
|
}
|
|
|
|
|
2020-07-18 11:46:38 +02:00
|
|
|
impl<'tcx> PredicateAtom<'tcx> {
|
|
|
|
/// Wraps `self` with the given qualifier if this predicate has any unbound variables.
|
|
|
|
pub fn potentially_quantified(
|
|
|
|
self,
|
|
|
|
tcx: TyCtxt<'tcx>,
|
|
|
|
qualifier: impl FnOnce(Binder<PredicateAtom<'tcx>>) -> PredicateKind<'tcx>,
|
|
|
|
) -> Predicate<'tcx> {
|
|
|
|
if self.has_escaping_bound_vars() {
|
|
|
|
qualifier(Binder::bind(self))
|
|
|
|
} else {
|
|
|
|
PredicateKind::Atom(self)
|
|
|
|
}
|
|
|
|
.to_predicate(tcx)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-15 01:13:56 -04:00
|
|
|
/// The crate outlives map is computed during typeck and contains the
|
|
|
|
/// outlives of every item in the local crate. You should not use it
|
|
|
|
/// directly, because to do so will make your pass dependent on the
|
|
|
|
/// HIR of every item in the local crate. Instead, use
|
|
|
|
/// `tcx.inferred_outlives_of()` to get the outlives for a *particular*
|
|
|
|
/// item.
|
2018-12-03 01:14:35 +01:00
|
|
|
#[derive(HashStable)]
|
2017-10-15 01:13:56 -04:00
|
|
|
pub struct CratePredicatesMap<'tcx> {
|
|
|
|
/// For each struct with outlive bounds, maps to a vector of the
|
|
|
|
/// predicate of its outlive bounds. If an item has no outlives
|
|
|
|
/// bounds, it will have no entry.
|
2020-07-21 15:42:18 +02:00
|
|
|
pub predicates: FxHashMap<DefId, &'tcx [(Predicate<'tcx>, Span)]>,
|
2017-10-15 01:13:56 -04:00
|
|
|
}
|
|
|
|
|
2020-05-11 22:06:41 +02:00
|
|
|
impl<'tcx> Predicate<'tcx> {
|
2015-05-04 13:21:27 -04:00
|
|
|
/// Performs a substitution suitable for going from a
|
2015-02-24 09:24:42 -05:00
|
|
|
/// poly-trait-ref to supertraits that must hold if that
|
|
|
|
/// poly-trait-ref holds. This is slightly different from a normal
|
2019-02-08 14:53:55 +01:00
|
|
|
/// substitution in terms of what happens with bound regions. See
|
2015-02-24 09:24:42 -05:00
|
|
|
/// lengthy comment below for details.
|
2019-06-12 00:11:55 +03:00
|
|
|
pub fn subst_supertrait(
|
2020-05-11 20:23:15 +02:00
|
|
|
self,
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
trait_ref: &ty::PolyTraitRef<'tcx>,
|
2020-07-21 15:42:18 +02:00
|
|
|
) -> Predicate<'tcx> {
|
2015-02-24 09:24:42 -05:00
|
|
|
// The interaction between HRTB and supertraits is not entirely
|
|
|
|
// obvious. Let me walk you (and myself) through an example.
|
|
|
|
//
|
|
|
|
// Let's start with an easy case. Consider two traits:
|
|
|
|
//
|
2018-11-05 02:02:43 +00:00
|
|
|
// trait Foo<'a>: Bar<'a,'a> { }
|
2015-02-24 09:24:42 -05:00
|
|
|
// trait Bar<'b,'c> { }
|
|
|
|
//
|
2018-11-05 02:02:43 +00:00
|
|
|
// Now, if we have a trait reference `for<'x> T: Foo<'x>`, then
|
|
|
|
// we can deduce that `for<'x> T: Bar<'x,'x>`. Basically, if we
|
2015-02-24 09:24:42 -05:00
|
|
|
// knew that `Foo<'x>` (for any 'x) then we also know that
|
|
|
|
// `Bar<'x,'x>` (for any 'x). This more-or-less falls out from
|
|
|
|
// normal substitution.
|
|
|
|
//
|
|
|
|
// In terms of why this is sound, the idea is that whenever there
|
|
|
|
// is an impl of `T:Foo<'a>`, it must show that `T:Bar<'a,'a>`
|
|
|
|
// holds. So if there is an impl of `T:Foo<'a>` that applies to
|
|
|
|
// all `'a`, then we must know that `T:Bar<'a,'a>` holds for all
|
|
|
|
// `'a`.
|
|
|
|
//
|
|
|
|
// Another example to be careful of is this:
|
|
|
|
//
|
2018-11-05 02:02:43 +00:00
|
|
|
// trait Foo1<'a>: for<'b> Bar1<'a,'b> { }
|
2015-02-24 09:24:42 -05:00
|
|
|
// trait Bar1<'b,'c> { }
|
|
|
|
//
|
2018-11-05 02:02:43 +00:00
|
|
|
// Here, if we have `for<'x> T: Foo1<'x>`, then what do we know?
|
|
|
|
// The answer is that we know `for<'x,'b> T: Bar1<'x,'b>`. The
|
2015-02-24 09:24:42 -05:00
|
|
|
// reason is similar to the previous example: any impl of
|
2018-11-05 02:02:43 +00:00
|
|
|
// `T:Foo1<'x>` must show that `for<'b> T: Bar1<'x, 'b>`. So
|
2015-02-24 09:24:42 -05:00
|
|
|
// basically we would want to collapse the bound lifetimes from
|
|
|
|
// the input (`trait_ref`) and the supertraits.
|
|
|
|
//
|
|
|
|
// To achieve this in practice is fairly straightforward. Let's
|
|
|
|
// consider the more complicated scenario:
|
|
|
|
//
|
2018-11-05 02:02:43 +00:00
|
|
|
// - We start out with `for<'x> T: Foo1<'x>`. In this case, `'x`
|
|
|
|
// has a De Bruijn index of 1. We want to produce `for<'x,'b> T: Bar1<'x,'b>`,
|
2015-02-24 09:24:42 -05:00
|
|
|
// where both `'x` and `'b` would have a DB index of 1.
|
|
|
|
// The substitution from the input trait-ref is therefore going to be
|
|
|
|
// `'a => 'x` (where `'x` has a DB index of 1).
|
|
|
|
// - The super-trait-ref is `for<'b> Bar1<'a,'b>`, where `'a` is an
|
|
|
|
// early-bound parameter and `'b' is a late-bound parameter with a
|
|
|
|
// DB index of 1.
|
|
|
|
// - If we replace `'a` with `'x` from the input, it too will have
|
|
|
|
// a DB index of 1, and thus we'll have `for<'x,'b> Bar1<'x,'b>`
|
|
|
|
// just as we wanted.
|
|
|
|
//
|
|
|
|
// There is only one catch. If we just apply the substitution `'a
|
|
|
|
// => 'x` to `for<'b> Bar1<'a,'b>`, the substitution code will
|
|
|
|
// adjust the DB index because we substituting into a binder (it
|
|
|
|
// tries to be so smart...) resulting in `for<'x> for<'b>
|
|
|
|
// Bar1<'x,'b>` (we have no syntax for this, so use your
|
|
|
|
// imagination). Basically the 'x will have DB index of 2 and 'b
|
|
|
|
// will have DB index of 1. Not quite what we want. So we apply
|
|
|
|
// the substitution to the *contents* of the trait reference,
|
|
|
|
// rather than the trait reference itself (put another way, the
|
|
|
|
// substitution code expects equal binding levels in the values
|
|
|
|
// from the substitution and the value being substituted into, and
|
|
|
|
// this trick achieves that).
|
2020-06-17 23:20:17 +02:00
|
|
|
let substs = trait_ref.skip_binder().substs;
|
2020-07-09 00:35:55 +02:00
|
|
|
let pred = self.skip_binders();
|
2020-06-20 00:21:59 +02:00
|
|
|
let new = pred.subst(tcx, substs);
|
2020-07-18 11:46:38 +02:00
|
|
|
if new != pred { new.potentially_quantified(tcx, PredicateKind::ForAll) } else { self }
|
2015-02-24 09:24:42 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, Hash, TyEncodable, TyDecodable)]
|
2019-11-14 22:34:08 +01:00
|
|
|
#[derive(HashStable, TypeFoldable)]
|
2014-12-17 14:16:28 -05:00
|
|
|
pub struct TraitPredicate<'tcx> {
|
2019-12-22 17:42:04 -05:00
|
|
|
pub trait_ref: TraitRef<'tcx>,
|
2014-12-17 14:16:28 -05:00
|
|
|
}
|
2018-11-06 23:17:11 +00:00
|
|
|
|
2014-12-17 14:16:28 -05:00
|
|
|
pub type PolyTraitPredicate<'tcx> = ty::Binder<TraitPredicate<'tcx>>;
|
|
|
|
|
|
|
|
impl<'tcx> TraitPredicate<'tcx> {
|
2020-05-23 11:09:32 +02:00
|
|
|
pub fn def_id(self) -> DefId {
|
2014-12-17 14:16:28 -05:00
|
|
|
self.trait_ref.def_id
|
|
|
|
}
|
|
|
|
|
2020-05-23 11:09:32 +02:00
|
|
|
pub fn self_ty(self) -> Ty<'tcx> {
|
2014-12-17 14:16:28 -05:00
|
|
|
self.trait_ref.self_ty()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'tcx> PolyTraitPredicate<'tcx> {
|
2020-05-23 11:09:32 +02:00
|
|
|
pub fn def_id(self) -> DefId {
|
2019-06-17 23:40:24 +01:00
|
|
|
// Ok to skip binder since trait `DefId` does not care about regions.
|
2018-04-24 21:45:49 -05:00
|
|
|
self.skip_binder().def_id()
|
2014-12-17 14:16:28 -05:00
|
|
|
}
|
2014-12-13 05:34:34 -05:00
|
|
|
}
|
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash, Debug, TyEncodable, TyDecodable)]
|
2019-11-14 22:34:08 +01:00
|
|
|
#[derive(HashStable, TypeFoldable)]
|
2019-02-28 22:43:53 +00:00
|
|
|
pub struct OutlivesPredicate<A, B>(pub A, pub B); // `A: B`
|
|
|
|
pub type PolyOutlivesPredicate<A, B> = ty::Binder<OutlivesPredicate<A, B>>;
|
|
|
|
pub type RegionOutlivesPredicate<'tcx> = OutlivesPredicate<ty::Region<'tcx>, ty::Region<'tcx>>;
|
|
|
|
pub type TypeOutlivesPredicate<'tcx> = OutlivesPredicate<Ty<'tcx>, ty::Region<'tcx>>;
|
2018-03-14 13:38:03 +01:00
|
|
|
pub type PolyRegionOutlivesPredicate<'tcx> = ty::Binder<RegionOutlivesPredicate<'tcx>>;
|
|
|
|
pub type PolyTypeOutlivesPredicate<'tcx> = ty::Binder<TypeOutlivesPredicate<'tcx>>;
|
2014-12-13 05:34:34 -05:00
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, Hash, Debug, TyEncodable, TyDecodable)]
|
2019-11-14 22:34:08 +01:00
|
|
|
#[derive(HashStable, TypeFoldable)]
|
2017-03-09 21:47:09 -05:00
|
|
|
pub struct SubtypePredicate<'tcx> {
|
|
|
|
pub a_is_expected: bool,
|
|
|
|
pub a: Ty<'tcx>,
|
2019-12-22 17:42:04 -05:00
|
|
|
pub b: Ty<'tcx>,
|
2017-03-09 21:47:09 -05:00
|
|
|
}
|
|
|
|
pub type PolySubtypePredicate<'tcx> = ty::Binder<SubtypePredicate<'tcx>>;
|
|
|
|
|
2014-12-17 14:16:28 -05:00
|
|
|
/// This kind of predicate has no *direct* correspondent in the
|
|
|
|
/// syntax, but it roughly corresponds to the syntactic forms:
|
|
|
|
///
|
2019-02-08 14:53:55 +01:00
|
|
|
/// 1. `T: TraitRef<..., Item = Type>`
|
2014-12-17 14:16:28 -05:00
|
|
|
/// 2. `<T as TraitRef<...>>::Item == Type` (NYI)
|
|
|
|
///
|
|
|
|
/// In particular, form #1 is "desugared" to the combination of a
|
2018-11-04 04:47:10 +00:00
|
|
|
/// normal trait predicate (`T: TraitRef<...>`) and one of these
|
2014-12-17 14:16:28 -05:00
|
|
|
/// predicates. Form #2 is a broader form in that it also permits
|
2017-12-31 17:17:01 +01:00
|
|
|
/// equality between arbitrary types. Processing an instance of
|
|
|
|
/// Form #2 eventually yields one of these `ProjectionPredicate`
|
2014-12-17 14:16:28 -05:00
|
|
|
/// instances to normalize the LHS.
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Copy, Clone, PartialEq, Eq, Hash, TyEncodable, TyDecodable)]
|
2019-11-14 22:34:08 +01:00
|
|
|
#[derive(HashStable, TypeFoldable)]
|
2014-12-17 14:16:28 -05:00
|
|
|
pub struct ProjectionPredicate<'tcx> {
|
|
|
|
pub projection_ty: ProjectionTy<'tcx>,
|
|
|
|
pub ty: Ty<'tcx>,
|
|
|
|
}
|
|
|
|
|
|
|
|
pub type PolyProjectionPredicate<'tcx> = Binder<ProjectionPredicate<'tcx>>;
|
|
|
|
|
2014-12-26 04:36:04 -05:00
|
|
|
impl<'tcx> PolyProjectionPredicate<'tcx> {
|
2018-11-01 19:43:38 +00:00
|
|
|
/// Returns the `DefId` of the associated item being projected.
|
2018-04-10 05:55:18 -04:00
|
|
|
pub fn item_def_id(&self) -> DefId {
|
|
|
|
self.skip_binder().projection_ty.item_def_id
|
|
|
|
}
|
|
|
|
|
2018-11-29 21:13:04 +01:00
|
|
|
#[inline]
|
2019-12-08 17:04:17 +00:00
|
|
|
pub fn to_poly_trait_ref(&self, tcx: TyCtxt<'tcx>) -> PolyTraitRef<'tcx> {
|
2018-11-01 19:43:38 +00:00
|
|
|
// Note: unlike with `TraitRef::to_poly_trait_ref()`,
|
|
|
|
// `self.0.trait_ref` is permitted to have escaping regions.
|
2017-07-11 10:33:09 -04:00
|
|
|
// This is because here `self` has a `Binder` and so does our
|
|
|
|
// return value, so we are preserving the number of binding
|
|
|
|
// levels.
|
2018-04-24 21:45:49 -05:00
|
|
|
self.map_bound(|predicate| predicate.projection_ty.trait_ref(tcx))
|
2015-01-06 13:41:14 -05:00
|
|
|
}
|
2017-09-02 08:35:07 -04:00
|
|
|
|
|
|
|
pub fn ty(&self) -> Binder<Ty<'tcx>> {
|
2018-04-24 21:45:49 -05:00
|
|
|
self.map_bound(|predicate| predicate.ty)
|
|
|
|
}
|
|
|
|
|
2018-11-01 19:43:38 +00:00
|
|
|
/// The `DefId` of the `TraitItem` for the associated type.
|
2018-04-24 21:45:49 -05:00
|
|
|
///
|
2018-11-01 19:43:38 +00:00
|
|
|
/// Note that this is not the `DefId` of the `TraitRef` containing this
|
|
|
|
/// associated type, which is in `tcx.associated_item(projection_def_id()).container`.
|
2018-04-24 21:45:49 -05:00
|
|
|
pub fn projection_def_id(&self) -> DefId {
|
2019-06-17 23:40:24 +01:00
|
|
|
// Ok to skip binder since trait `DefId` does not care about regions.
|
2018-04-24 21:45:49 -05:00
|
|
|
self.skip_binder().projection_ty.item_def_id
|
2017-09-02 08:35:07 -04:00
|
|
|
}
|
2014-12-26 04:36:04 -05:00
|
|
|
}
|
|
|
|
|
2014-12-17 14:16:28 -05:00
|
|
|
pub trait ToPolyTraitRef<'tcx> {
|
|
|
|
fn to_poly_trait_ref(&self) -> PolyTraitRef<'tcx>;
|
|
|
|
}
|
|
|
|
|
2015-04-21 18:59:58 +03:00
|
|
|
impl<'tcx> ToPolyTraitRef<'tcx> for TraitRef<'tcx> {
|
2014-12-17 14:16:28 -05:00
|
|
|
fn to_poly_trait_ref(&self) -> PolyTraitRef<'tcx> {
|
2020-01-22 16:30:15 +01:00
|
|
|
ty::Binder::dummy(*self)
|
2014-12-17 14:16:28 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'tcx> ToPolyTraitRef<'tcx> for PolyTraitPredicate<'tcx> {
|
|
|
|
fn to_poly_trait_ref(&self) -> PolyTraitRef<'tcx> {
|
2016-02-15 19:08:53 +02:00
|
|
|
self.map_bound_ref(|trait_pred| trait_pred.trait_ref)
|
2014-12-17 14:16:28 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-23 11:50:50 -07:00
|
|
|
pub trait ToPredicate<'tcx> {
|
2020-07-08 23:40:06 +02:00
|
|
|
fn to_predicate(self, tcx: TyCtxt<'tcx>) -> Predicate<'tcx>;
|
2014-12-13 05:34:34 -05:00
|
|
|
}
|
|
|
|
|
2020-05-11 22:06:41 +02:00
|
|
|
impl ToPredicate<'tcx> for PredicateKind<'tcx> {
|
2020-05-23 19:02:26 +02:00
|
|
|
#[inline(always)]
|
2020-07-08 23:40:06 +02:00
|
|
|
fn to_predicate(self, tcx: TyCtxt<'tcx>) -> Predicate<'tcx> {
|
|
|
|
tcx.mk_predicate(self)
|
2020-05-11 22:06:41 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-09 00:35:55 +02:00
|
|
|
impl ToPredicate<'tcx> for PredicateAtom<'tcx> {
|
|
|
|
#[inline(always)]
|
2020-07-18 12:06:47 +02:00
|
|
|
fn to_predicate(self, tcx: TyCtxt<'tcx>) -> Predicate<'tcx> {
|
2020-07-18 14:37:36 +02:00
|
|
|
debug_assert!(!self.has_escaping_bound_vars(), "escaping bound vars for {:?}", self);
|
2020-07-21 15:42:18 +02:00
|
|
|
tcx.mk_predicate(PredicateKind::Atom(self))
|
2020-07-09 00:35:55 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-18 20:41:43 +02:00
|
|
|
impl<'tcx> ToPredicate<'tcx> for ConstnessAnd<TraitRef<'tcx>> {
|
2020-07-18 12:06:47 +02:00
|
|
|
fn to_predicate(self, tcx: TyCtxt<'tcx>) -> Predicate<'tcx> {
|
2020-07-21 15:42:18 +02:00
|
|
|
PredicateAtom::Trait(ty::TraitPredicate { trait_ref: self.value }, self.constness)
|
2020-06-18 20:41:43 +02:00
|
|
|
.to_predicate(tcx)
|
2020-06-11 21:42:39 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-18 20:41:43 +02:00
|
|
|
impl<'tcx> ToPredicate<'tcx> for ConstnessAnd<PolyTraitRef<'tcx>> {
|
2020-07-08 23:40:06 +02:00
|
|
|
fn to_predicate(self, tcx: TyCtxt<'tcx>) -> Predicate<'tcx> {
|
2020-06-18 20:41:43 +02:00
|
|
|
ConstnessAnd {
|
|
|
|
value: self.value.map_bound(|trait_ref| ty::TraitPredicate { trait_ref }),
|
|
|
|
constness: self.constness,
|
|
|
|
}
|
|
|
|
.to_predicate(tcx)
|
2020-01-13 20:30:32 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-18 20:41:43 +02:00
|
|
|
impl<'tcx> ToPredicate<'tcx> for ConstnessAnd<PolyTraitPredicate<'tcx>> {
|
2020-07-08 23:40:06 +02:00
|
|
|
fn to_predicate(self, tcx: TyCtxt<'tcx>) -> Predicate<'tcx> {
|
2020-07-21 15:42:18 +02:00
|
|
|
PredicateAtom::Trait(self.value.skip_binder(), self.constness)
|
|
|
|
.potentially_quantified(tcx, PredicateKind::ForAll)
|
2014-12-13 05:34:34 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-25 23:58:52 +03:00
|
|
|
impl<'tcx> ToPredicate<'tcx> for PolyRegionOutlivesPredicate<'tcx> {
|
2020-07-08 23:40:06 +02:00
|
|
|
fn to_predicate(self, tcx: TyCtxt<'tcx>) -> Predicate<'tcx> {
|
2020-07-21 15:42:18 +02:00
|
|
|
PredicateAtom::RegionOutlives(self.skip_binder())
|
|
|
|
.potentially_quantified(tcx, PredicateKind::ForAll)
|
2014-12-13 05:34:34 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-23 11:50:50 -07:00
|
|
|
impl<'tcx> ToPredicate<'tcx> for PolyTypeOutlivesPredicate<'tcx> {
|
2020-07-08 23:40:06 +02:00
|
|
|
fn to_predicate(self, tcx: TyCtxt<'tcx>) -> Predicate<'tcx> {
|
2020-07-21 15:42:18 +02:00
|
|
|
PredicateAtom::TypeOutlives(self.skip_binder())
|
|
|
|
.potentially_quantified(tcx, PredicateKind::ForAll)
|
2014-12-13 05:34:34 -05:00
|
|
|
}
|
2014-12-07 11:10:48 -05:00
|
|
|
}
|
|
|
|
|
2015-06-23 11:50:50 -07:00
|
|
|
impl<'tcx> ToPredicate<'tcx> for PolyProjectionPredicate<'tcx> {
|
2020-07-08 23:40:06 +02:00
|
|
|
fn to_predicate(self, tcx: TyCtxt<'tcx>) -> Predicate<'tcx> {
|
2020-07-21 15:42:18 +02:00
|
|
|
PredicateAtom::Projection(self.skip_binder())
|
|
|
|
.potentially_quantified(tcx, PredicateKind::ForAll)
|
2014-12-17 14:16:28 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-11 22:06:41 +02:00
|
|
|
impl<'tcx> Predicate<'tcx> {
|
2020-06-21 12:26:17 +02:00
|
|
|
pub fn to_opt_poly_trait_ref(self) -> Option<PolyTraitRef<'tcx>> {
|
2020-07-09 00:35:55 +02:00
|
|
|
match self.skip_binders() {
|
|
|
|
PredicateAtom::Trait(t, _) => Some(ty::Binder::bind(t.trait_ref)),
|
|
|
|
PredicateAtom::Projection(..)
|
|
|
|
| PredicateAtom::Subtype(..)
|
|
|
|
| PredicateAtom::RegionOutlives(..)
|
|
|
|
| PredicateAtom::WellFormed(..)
|
|
|
|
| PredicateAtom::ObjectSafe(..)
|
|
|
|
| PredicateAtom::ClosureKind(..)
|
|
|
|
| PredicateAtom::TypeOutlives(..)
|
|
|
|
| PredicateAtom::ConstEvaluatable(..)
|
|
|
|
| PredicateAtom::ConstEquate(..) => None,
|
|
|
|
}
|
2020-06-18 20:41:43 +02:00
|
|
|
}
|
|
|
|
|
2020-06-21 12:26:17 +02:00
|
|
|
pub fn to_opt_type_outlives(self) -> Option<PolyTypeOutlivesPredicate<'tcx>> {
|
2020-07-09 00:35:55 +02:00
|
|
|
match self.skip_binders() {
|
|
|
|
PredicateAtom::TypeOutlives(data) => Some(ty::Binder::bind(data)),
|
|
|
|
PredicateAtom::Trait(..)
|
|
|
|
| PredicateAtom::Projection(..)
|
|
|
|
| PredicateAtom::Subtype(..)
|
|
|
|
| PredicateAtom::RegionOutlives(..)
|
|
|
|
| PredicateAtom::WellFormed(..)
|
|
|
|
| PredicateAtom::ObjectSafe(..)
|
|
|
|
| PredicateAtom::ClosureKind(..)
|
|
|
|
| PredicateAtom::ConstEvaluatable(..)
|
|
|
|
| PredicateAtom::ConstEquate(..) => None,
|
|
|
|
}
|
2017-11-03 18:03:43 -04:00
|
|
|
}
|
2014-11-15 17:25:05 -05:00
|
|
|
}
|
|
|
|
|
2014-11-24 20:06:06 -05:00
|
|
|
/// Represents the bounds declared on a particular set of type
|
2019-02-08 14:53:55 +01:00
|
|
|
/// parameters. Should eventually be generalized into a flag list of
|
|
|
|
/// where-clauses. You can obtain a `InstantiatedPredicates` list from a
|
2015-02-11 06:54:05 -05:00
|
|
|
/// `GenericPredicates` by using the `instantiate` method. Note that this method
|
|
|
|
/// reflects an important semantic invariant of `InstantiatedPredicates`: while
|
|
|
|
/// the `GenericPredicates` are expressed in terms of the bound type
|
|
|
|
/// parameters of the impl/trait/whatever, an `InstantiatedPredicates` instance
|
2014-11-24 20:06:06 -05:00
|
|
|
/// represented a set of bounds for some particular instantiation,
|
|
|
|
/// meaning that the generic parameters have been substituted with
|
|
|
|
/// their values.
|
|
|
|
///
|
|
|
|
/// Example:
|
|
|
|
///
|
2019-02-28 22:43:53 +00:00
|
|
|
/// struct Foo<T, U: Bar<T>> { ... }
|
2014-11-24 20:06:06 -05:00
|
|
|
///
|
2015-02-11 06:54:05 -05:00
|
|
|
/// Here, the `GenericPredicates` for `Foo` would contain a list of bounds like
|
2019-02-08 14:53:55 +01:00
|
|
|
/// `[[], [U:Bar<T>]]`. Now if there were some particular reference
|
2015-03-25 17:06:52 -07:00
|
|
|
/// like `Foo<isize,usize>`, then the `InstantiatedPredicates` would be `[[],
|
|
|
|
/// [usize:Bar<isize>]]`.
|
2019-11-13 21:36:57 +01:00
|
|
|
#[derive(Clone, Debug, TypeFoldable)]
|
2015-02-11 06:54:05 -05:00
|
|
|
pub struct InstantiatedPredicates<'tcx> {
|
2016-06-13 20:10:32 +03:00
|
|
|
pub predicates: Vec<Predicate<'tcx>>,
|
2020-01-29 16:55:37 -08:00
|
|
|
pub spans: Vec<Span>,
|
2014-11-15 17:25:05 -05:00
|
|
|
}
|
|
|
|
|
2015-02-11 06:54:05 -05:00
|
|
|
impl<'tcx> InstantiatedPredicates<'tcx> {
|
|
|
|
pub fn empty() -> InstantiatedPredicates<'tcx> {
|
2020-01-29 16:55:37 -08:00
|
|
|
InstantiatedPredicates { predicates: vec![], spans: vec![] }
|
2014-11-15 17:25:05 -05:00
|
|
|
}
|
|
|
|
|
2014-12-07 11:10:48 -05:00
|
|
|
pub fn is_empty(&self) -> bool {
|
|
|
|
self.predicates.is_empty()
|
2014-11-15 17:25:05 -05:00
|
|
|
}
|
Cleanup substitutions and treatment of generics around traits in a number of ways.
- In a TraitRef, use the self type consistently to refer to the Self type:
- trait ref in `impl Trait<A,B,C> for S` has a self type of `S`.
- trait ref in `A:Trait` has the self type `A`
- trait ref associated with a trait decl has self type `Self`
- trait ref associated with a supertype has self type `Self`
- trait ref in an object type `@Trait` has no self type
- Rewrite `each_bound_traits_and_supertraits` to perform
substitutions as it goes, and thus yield a series of trait refs
that are always in the same 'namespace' as the type parameter
bound given as input. Before, we left this to the caller, but
this doesn't work because the caller lacks adequare information
to perform the type substitutions correctly.
- For provided methods, substitute the generics involved in the provided
method correctly.
- Introduce TypeParameterDef, which tracks the bounds declared on a type
parameter and brings them together with the def_id and (in the future)
other information (maybe even the parameter's name!).
- Introduce Subst trait, which helps to cleanup a lot of the
repetitive code involved with doing type substitution.
- Introduce Repr trait, which makes debug printouts far more convenient.
Fixes #4183. Needed for #5656.
2013-04-08 22:54:49 -07:00
|
|
|
}
|
|
|
|
|
2019-09-26 05:38:33 +00:00
|
|
|
rustc_index::newtype_index! {
|
2019-01-24 15:49:03 -05:00
|
|
|
/// "Universes" are used during type- and trait-checking in the
|
|
|
|
/// presence of `for<..>` binders to control what sets of names are
|
|
|
|
/// visible. Universes are arranged into a tree: the root universe
|
|
|
|
/// contains names that are always visible. Each child then adds a new
|
|
|
|
/// set of names that are visible, in addition to those of its parent.
|
|
|
|
/// We say that the child universe "extends" the parent universe with
|
|
|
|
/// new names.
|
|
|
|
///
|
|
|
|
/// To make this more concrete, consider this program:
|
|
|
|
///
|
|
|
|
/// ```
|
|
|
|
/// struct Foo { }
|
|
|
|
/// fn bar<T>(x: T) {
|
|
|
|
/// let y: for<'a> fn(&'a u8, Foo) = ...;
|
|
|
|
/// }
|
|
|
|
/// ```
|
|
|
|
///
|
|
|
|
/// The struct name `Foo` is in the root universe U0. But the type
|
|
|
|
/// parameter `T`, introduced on `bar`, is in an extended universe U1
|
|
|
|
/// -- i.e., within `bar`, we can name both `T` and `Foo`, but outside
|
|
|
|
/// of `bar`, we cannot name `T`. Then, within the type of `y`, the
|
|
|
|
/// region `'a` is in a universe U2 that extends U1, because we can
|
|
|
|
/// name it inside the fn type but not outside.
|
|
|
|
///
|
|
|
|
/// Universes are used to do type- and trait-checking around these
|
|
|
|
/// "forall" binders (also called **universal quantification**). The
|
|
|
|
/// idea is that when, in the body of `bar`, we refer to `T` as a
|
|
|
|
/// type, we aren't referring to any type in particular, but rather a
|
|
|
|
/// kind of "fresh" type that is distinct from all other types we have
|
|
|
|
/// actually declared. This is called a **placeholder** type, and we
|
|
|
|
/// use universes to talk about this. In other words, a type name in
|
|
|
|
/// universe 0 always corresponds to some "ground" type that the user
|
|
|
|
/// declared, but a type name in a non-zero universe is a placeholder
|
|
|
|
/// type -- an idealized representative of "types in general" that we
|
|
|
|
/// use for checking generic functions.
|
2018-09-26 13:55:54 -04:00
|
|
|
pub struct UniverseIndex {
|
2019-11-15 21:23:34 +01:00
|
|
|
derive [HashStable]
|
2018-09-26 13:55:54 -04:00
|
|
|
DEBUG_FORMAT = "U{}",
|
|
|
|
}
|
|
|
|
}
|
2018-09-26 12:27:01 -04:00
|
|
|
|
2017-07-15 06:41:19 -04:00
|
|
|
impl UniverseIndex {
|
2020-03-10 13:44:53 -07:00
|
|
|
pub const ROOT: UniverseIndex = UniverseIndex::from_u32(0);
|
2018-07-23 17:30:59 +03:00
|
|
|
|
2018-10-08 07:17:36 -04:00
|
|
|
/// Returns the "next" universe index in order -- this new index
|
|
|
|
/// is considered to extend all previous universes. This
|
2019-02-08 14:53:55 +01:00
|
|
|
/// corresponds to entering a `forall` quantifier. So, for
|
2018-10-08 07:17:36 -04:00
|
|
|
/// example, suppose we have this type in universe `U`:
|
2017-07-15 06:41:19 -04:00
|
|
|
///
|
|
|
|
/// ```
|
|
|
|
/// for<'a> fn(&'a u32)
|
|
|
|
/// ```
|
|
|
|
///
|
|
|
|
/// Once we "enter" into this `for<'a>` quantifier, we are in a
|
2018-10-08 07:17:36 -04:00
|
|
|
/// new universe that extends `U` -- in this new universe, we can
|
|
|
|
/// name the region `'a`, but that region was not nameable from
|
|
|
|
/// `U` because it was not in scope there.
|
|
|
|
pub fn next_universe(self) -> UniverseIndex {
|
2018-09-26 12:27:01 -04:00
|
|
|
UniverseIndex::from_u32(self.private.checked_add(1).unwrap())
|
2018-02-07 11:17:31 -07:00
|
|
|
}
|
|
|
|
|
2018-11-06 23:17:11 +00:00
|
|
|
/// Returns `true` if `self` can name a name from `other` -- in other words,
|
2018-10-08 07:17:36 -04:00
|
|
|
/// if the set of names in `self` is a superset of those in
|
2018-10-31 12:10:49 -04:00
|
|
|
/// `other` (`self >= other`).
|
2018-10-08 07:17:36 -04:00
|
|
|
pub fn can_name(self, other: UniverseIndex) -> bool {
|
|
|
|
self.private >= other.private
|
2018-07-23 17:30:59 +03:00
|
|
|
}
|
2018-10-31 12:10:49 -04:00
|
|
|
|
2018-11-06 23:17:11 +00:00
|
|
|
/// Returns `true` if `self` cannot name some names from `other` -- in other
|
2018-10-31 12:10:49 -04:00
|
|
|
/// words, if the set of names in `self` is a strict subset of
|
|
|
|
/// those in `other` (`self < other`).
|
|
|
|
pub fn cannot_name(self, other: UniverseIndex) -> bool {
|
|
|
|
self.private < other.private
|
|
|
|
}
|
2017-07-15 06:41:19 -04:00
|
|
|
}
|
|
|
|
|
2018-09-27 17:57:35 -04:00
|
|
|
/// The "placeholder index" fully defines a placeholder region.
|
|
|
|
/// Placeholder regions are identified by both a **universe** as well
|
|
|
|
/// as a "bound-region" within that universe. The `bound_region` is
|
|
|
|
/// basically a name -- distinct bound regions within the same
|
|
|
|
/// universe are just two regions with an unknown relationship to one
|
|
|
|
/// another.
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Copy, Clone, Debug, PartialEq, Eq, Hash, TyEncodable, TyDecodable, PartialOrd, Ord)]
|
2018-11-02 15:08:51 +01:00
|
|
|
pub struct Placeholder<T> {
|
2018-09-27 17:57:35 -04:00
|
|
|
pub universe: UniverseIndex,
|
2018-11-02 15:08:51 +01:00
|
|
|
pub name: T,
|
2018-09-27 17:57:35 -04:00
|
|
|
}
|
|
|
|
|
2019-06-11 12:21:38 +03:00
|
|
|
impl<'a, T> HashStable<StableHashingContext<'a>> for Placeholder<T>
|
2019-06-11 13:20:33 +03:00
|
|
|
where
|
|
|
|
T: HashStable<StableHashingContext<'a>>,
|
2018-11-02 15:08:51 +01:00
|
|
|
{
|
2019-09-26 18:54:39 -04:00
|
|
|
fn hash_stable(&self, hcx: &mut StableHashingContext<'a>, hasher: &mut StableHasher) {
|
2018-11-02 15:08:51 +01:00
|
|
|
self.universe.hash_stable(hcx, hasher);
|
|
|
|
self.name.hash_stable(hcx, hasher);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub type PlaceholderRegion = Placeholder<BoundRegion>;
|
|
|
|
|
|
|
|
pub type PlaceholderType = Placeholder<BoundVar>;
|
2018-09-27 09:43:22 -04:00
|
|
|
|
2019-03-12 20:26:16 +00:00
|
|
|
pub type PlaceholderConst = Placeholder<BoundVar>;
|
|
|
|
|
2020-07-08 11:42:59 +02:00
|
|
|
/// A `DefId` which is potentially bundled with its corresponding generic parameter
|
|
|
|
/// in case `did` is a const argument.
|
|
|
|
///
|
|
|
|
/// This is used to prevent cycle errors during typeck
|
2020-07-17 08:47:04 +00:00
|
|
|
/// as `type_of(const_arg)` depends on `typeck(owning_body)`
|
2020-07-08 11:42:59 +02:00
|
|
|
/// which once again requires the type of its generic arguments.
|
|
|
|
///
|
|
|
|
/// Luckily we only need to deal with const arguments once we
|
|
|
|
/// know their corresponding parameters. We (ab)use this by
|
|
|
|
/// calling `type_of(param_did)` for these arguments.
|
|
|
|
///
|
|
|
|
/// ```rust
|
|
|
|
/// #![feature(const_generics)]
|
|
|
|
///
|
|
|
|
/// struct A;
|
|
|
|
/// impl A {
|
|
|
|
/// fn foo<const N: usize>(&self) -> usize { N }
|
|
|
|
/// }
|
|
|
|
/// struct B;
|
|
|
|
/// impl B {
|
|
|
|
/// fn foo<const N: u8>(&self) -> usize { 42 }
|
|
|
|
/// }
|
|
|
|
///
|
|
|
|
/// fn main() {
|
|
|
|
/// let a = A;
|
|
|
|
/// a.foo::<7>();
|
|
|
|
/// }
|
|
|
|
/// ```
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Copy, Clone, Debug, TypeFoldable, Lift, TyEncodable, TyDecodable)]
|
2020-07-02 22:56:28 +02:00
|
|
|
#[derive(PartialEq, Eq, PartialOrd, Ord)]
|
|
|
|
#[derive(Hash, HashStable)]
|
2020-07-15 10:50:54 +02:00
|
|
|
pub struct WithOptConstParam<T> {
|
2020-07-02 22:56:28 +02:00
|
|
|
pub did: T,
|
2020-07-08 11:42:59 +02:00
|
|
|
/// The `DefId` of the corresponding generic paramter in case `did` is
|
|
|
|
/// a const argument.
|
|
|
|
///
|
|
|
|
/// Note that even if `did` is a const argument, this may still be `None`.
|
2020-07-15 10:50:54 +02:00
|
|
|
/// All queries taking `WithOptConstParam` start by calling `tcx.opt_const_param_of(def.did)`
|
2020-07-08 11:42:59 +02:00
|
|
|
/// to potentially update `param_did` in case it `None`.
|
2020-07-15 10:50:54 +02:00
|
|
|
pub const_param_did: Option<DefId>,
|
2020-07-02 22:56:28 +02:00
|
|
|
}
|
|
|
|
|
2020-07-15 10:50:54 +02:00
|
|
|
impl<T> WithOptConstParam<T> {
|
2020-07-15 10:55:41 +02:00
|
|
|
/// Creates a new `WithOptConstParam` setting `const_param_did` to `None`.
|
2020-07-16 19:36:18 +02:00
|
|
|
#[inline(always)]
|
2020-07-15 10:55:41 +02:00
|
|
|
pub fn unknown(did: T) -> WithOptConstParam<T> {
|
2020-07-15 10:50:54 +02:00
|
|
|
WithOptConstParam { did, const_param_did: None }
|
2020-07-02 22:56:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-15 10:50:54 +02:00
|
|
|
impl WithOptConstParam<LocalDefId> {
|
2020-07-16 19:36:18 +02:00
|
|
|
/// Returns `Some((did, param_did))` if `def_id` is a const argument,
|
|
|
|
/// `None` otherwise.
|
|
|
|
#[inline(always)]
|
2020-07-21 22:54:18 +02:00
|
|
|
pub fn try_lookup(did: LocalDefId, tcx: TyCtxt<'_>) -> Option<(LocalDefId, DefId)> {
|
2020-07-16 19:36:18 +02:00
|
|
|
tcx.opt_const_param_of(did).map(|param_did| (did, param_did))
|
|
|
|
}
|
|
|
|
|
|
|
|
/// In case `self` is unknown but `self.did` is a const argument, this returns
|
|
|
|
/// a `WithOptConstParam` with the correct `const_param_did`.
|
|
|
|
#[inline(always)]
|
2020-07-17 19:12:30 +02:00
|
|
|
pub fn try_upgrade(self, tcx: TyCtxt<'_>) -> Option<WithOptConstParam<LocalDefId>> {
|
2020-07-16 19:36:18 +02:00
|
|
|
if self.const_param_did.is_none() {
|
|
|
|
if let const_param_did @ Some(_) = tcx.opt_const_param_of(self.did) {
|
|
|
|
return Some(WithOptConstParam { did: self.did, const_param_did });
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
None
|
|
|
|
}
|
|
|
|
|
2020-07-15 10:50:54 +02:00
|
|
|
pub fn to_global(self) -> WithOptConstParam<DefId> {
|
|
|
|
WithOptConstParam { did: self.did.to_def_id(), const_param_did: self.const_param_did }
|
2020-07-02 23:13:32 +02:00
|
|
|
}
|
|
|
|
|
2020-07-15 10:53:11 +02:00
|
|
|
pub fn def_id_for_type_of(self) -> DefId {
|
2020-07-15 10:50:54 +02:00
|
|
|
if let Some(did) = self.const_param_did { did } else { self.did.to_def_id() }
|
2020-07-02 22:56:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-15 10:50:54 +02:00
|
|
|
impl WithOptConstParam<DefId> {
|
|
|
|
pub fn as_local(self) -> Option<WithOptConstParam<LocalDefId>> {
|
|
|
|
self.did
|
|
|
|
.as_local()
|
|
|
|
.map(|did| WithOptConstParam { did, const_param_did: self.const_param_did })
|
2020-07-02 23:13:32 +02:00
|
|
|
}
|
|
|
|
|
2020-07-08 01:03:19 +02:00
|
|
|
pub fn as_const_arg(self) -> Option<(LocalDefId, DefId)> {
|
2020-07-15 10:50:54 +02:00
|
|
|
if let Some(param_did) = self.const_param_did {
|
2020-07-08 01:03:19 +02:00
|
|
|
if let Some(did) = self.did.as_local() {
|
|
|
|
return Some((did, param_did));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
None
|
|
|
|
}
|
|
|
|
|
2020-07-15 10:50:54 +02:00
|
|
|
pub fn expect_local(self) -> WithOptConstParam<LocalDefId> {
|
2020-07-06 23:49:53 +02:00
|
|
|
self.as_local().unwrap()
|
|
|
|
}
|
|
|
|
|
2020-07-02 23:13:32 +02:00
|
|
|
pub fn is_local(self) -> bool {
|
|
|
|
self.did.is_local()
|
|
|
|
}
|
|
|
|
|
2020-07-15 10:53:11 +02:00
|
|
|
pub fn def_id_for_type_of(self) -> DefId {
|
2020-07-15 10:50:54 +02:00
|
|
|
self.const_param_did.unwrap_or(self.did)
|
2020-07-02 22:56:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-15 17:57:30 -04:00
|
|
|
/// When type checking, we use the `ParamEnv` to track
|
2017-05-10 10:28:06 -04:00
|
|
|
/// details about the set of where-clauses that are in scope at this
|
|
|
|
/// particular point.
|
2020-08-16 11:08:55 -04:00
|
|
|
#[derive(Copy, Clone, Hash, PartialEq, Eq)]
|
2017-05-15 17:57:30 -04:00
|
|
|
pub struct ParamEnv<'tcx> {
|
2020-08-16 11:08:55 -04:00
|
|
|
/// This packs both caller bounds and the reveal enum into one pointer.
|
|
|
|
///
|
|
|
|
/// Caller bounds are `Obligation`s that the caller must satisfy. This is
|
|
|
|
/// basically the set of bounds on the in-scope type parameters, translated
|
2019-06-17 23:40:24 +01:00
|
|
|
/// into `Obligation`s, and elaborated and normalized.
|
2020-07-02 20:52:40 -04:00
|
|
|
///
|
2020-08-16 11:08:55 -04:00
|
|
|
/// Use the `caller_bounds()` method to access.
|
|
|
|
///
|
2018-05-08 16:10:16 +03:00
|
|
|
/// Typically, this is `Reveal::UserFacing`, but during codegen we
|
2020-07-02 20:52:40 -04:00
|
|
|
/// want `Reveal::All`.
|
|
|
|
///
|
2020-08-16 11:08:55 -04:00
|
|
|
/// Note: This is packed, use the reveal() method to access it.
|
|
|
|
packed: CopyTaggedPtr<&'tcx List<Predicate<'tcx>>, traits::Reveal, true>,
|
2018-11-17 18:56:14 +01:00
|
|
|
|
|
|
|
/// If this `ParamEnv` comes from a call to `tcx.param_env(def_id)`,
|
|
|
|
/// register that `def_id` (useful for transitioning to the chalk trait
|
|
|
|
/// solver).
|
|
|
|
pub def_id: Option<DefId>,
|
2017-05-10 10:28:06 -04:00
|
|
|
}
|
2016-10-13 23:39:50 +03:00
|
|
|
|
2020-08-16 11:08:55 -04:00
|
|
|
unsafe impl rustc_data_structures::tagged_ptr::Tag for traits::Reveal {
|
|
|
|
const BITS: usize = 1;
|
|
|
|
fn into_usize(self) -> usize {
|
|
|
|
match self {
|
|
|
|
traits::Reveal::UserFacing => 0,
|
|
|
|
traits::Reveal::All => 1,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
unsafe fn from_usize(ptr: usize) -> Self {
|
|
|
|
match ptr {
|
|
|
|
0 => traits::Reveal::UserFacing,
|
|
|
|
1 => traits::Reveal::All,
|
|
|
|
_ => std::hint::unreachable_unchecked(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-02 20:52:40 -04:00
|
|
|
impl<'tcx> fmt::Debug for ParamEnv<'tcx> {
|
|
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
|
|
f.debug_struct("ParamEnv")
|
|
|
|
.field("caller_bounds", &self.caller_bounds())
|
|
|
|
.field("reveal", &self.reveal())
|
|
|
|
.field("def_id", &self.def_id)
|
|
|
|
.finish()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'a, 'tcx> HashStable<StableHashingContext<'a>> for ParamEnv<'tcx> {
|
|
|
|
fn hash_stable(&self, hcx: &mut StableHashingContext<'a>, hasher: &mut StableHasher) {
|
|
|
|
self.caller_bounds().hash_stable(hcx, hasher);
|
|
|
|
self.reveal().hash_stable(hcx, hasher);
|
|
|
|
self.def_id.hash_stable(hcx, hasher);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'tcx> TypeFoldable<'tcx> for ParamEnv<'tcx> {
|
|
|
|
fn super_fold_with<F: ty::fold::TypeFolder<'tcx>>(&self, folder: &mut F) -> Self {
|
|
|
|
ParamEnv::new(
|
|
|
|
self.caller_bounds().fold_with(folder),
|
|
|
|
self.reveal().fold_with(folder),
|
|
|
|
self.def_id.fold_with(folder),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn super_visit_with<V: TypeVisitor<'tcx>>(&self, visitor: &mut V) -> bool {
|
|
|
|
self.caller_bounds().visit_with(visitor)
|
|
|
|
|| self.reveal().visit_with(visitor)
|
|
|
|
|| self.def_id.visit_with(visitor)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-15 17:57:30 -04:00
|
|
|
impl<'tcx> ParamEnv<'tcx> {
|
2018-02-14 05:08:02 -05:00
|
|
|
/// Construct a trait environment suitable for contexts where
|
2019-02-08 14:53:55 +01:00
|
|
|
/// there are no where-clauses in scope. Hidden types (like `impl
|
2018-02-14 05:08:02 -05:00
|
|
|
/// Trait`) are left hidden, so this is suitable for ordinary
|
|
|
|
/// type-checking.
|
2018-11-29 21:13:04 +01:00
|
|
|
#[inline]
|
2018-02-14 05:08:02 -05:00
|
|
|
pub fn empty() -> Self {
|
2018-11-17 18:56:14 +01:00
|
|
|
Self::new(List::empty(), Reveal::UserFacing, None)
|
2018-02-14 05:08:02 -05:00
|
|
|
}
|
|
|
|
|
2020-07-02 20:52:40 -04:00
|
|
|
#[inline]
|
2020-07-21 15:42:18 +02:00
|
|
|
pub fn caller_bounds(self) -> &'tcx List<Predicate<'tcx>> {
|
2020-08-16 11:08:55 -04:00
|
|
|
self.packed.pointer()
|
2020-07-02 20:52:40 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#[inline]
|
|
|
|
pub fn reveal(self) -> traits::Reveal {
|
2020-08-16 11:08:55 -04:00
|
|
|
self.packed.tag()
|
2020-07-02 20:52:40 -04:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Construct a trait environment with no where-clauses in scope
|
2018-02-14 05:08:02 -05:00
|
|
|
/// where the values of all `impl Trait` and other hidden types
|
|
|
|
/// are revealed. This is suitable for monomorphized, post-typeck
|
2018-05-08 16:10:16 +03:00
|
|
|
/// environments like codegen or doing optimizations.
|
2018-02-14 05:08:02 -05:00
|
|
|
///
|
2019-02-08 14:53:55 +01:00
|
|
|
/// N.B., if you want to have predicates in scope, use `ParamEnv::new`,
|
2018-02-14 05:08:02 -05:00
|
|
|
/// or invoke `param_env.with_reveal_all()`.
|
2018-11-29 21:13:04 +01:00
|
|
|
#[inline]
|
2018-02-14 05:08:02 -05:00
|
|
|
pub fn reveal_all() -> Self {
|
2018-11-17 18:56:14 +01:00
|
|
|
Self::new(List::empty(), Reveal::All, None)
|
2018-02-14 05:08:02 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Construct a trait environment with the given set of predicates.
|
2018-11-29 21:13:04 +01:00
|
|
|
#[inline]
|
2018-11-17 18:56:14 +01:00
|
|
|
pub fn new(
|
2020-07-21 15:42:18 +02:00
|
|
|
caller_bounds: &'tcx List<Predicate<'tcx>>,
|
2018-11-17 18:56:14 +01:00
|
|
|
reveal: Reveal,
|
2019-12-22 17:42:04 -05:00
|
|
|
def_id: Option<DefId>,
|
2018-11-17 18:56:14 +01:00
|
|
|
) -> Self {
|
2020-08-16 11:08:55 -04:00
|
|
|
ty::ParamEnv { packed: CopyTaggedPtr::new(caller_bounds, reveal), def_id }
|
2020-07-02 20:52:40 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn with_user_facing(mut self) -> Self {
|
2020-08-16 11:08:55 -04:00
|
|
|
self.packed.set_tag(Reveal::UserFacing);
|
2020-07-02 20:52:40 -04:00
|
|
|
self
|
2018-02-14 05:08:02 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns a new parameter environment with the same clauses, but
|
|
|
|
/// which "reveals" the true results of projections in all cases
|
2019-02-08 14:53:55 +01:00
|
|
|
/// (even for associated types that are specializable). This is
|
2018-05-08 16:10:16 +03:00
|
|
|
/// the desired behavior during codegen and certain other special
|
2018-02-14 05:08:02 -05:00
|
|
|
/// contexts; normally though we want to use `Reveal::UserFacing`,
|
|
|
|
/// which is the default.
|
2020-04-11 00:50:02 -04:00
|
|
|
/// All opaque types in the caller_bounds of the `ParamEnv`
|
|
|
|
/// will be normalized to their underlying types.
|
|
|
|
/// See PR #65989 and issue #65918 for more details
|
2020-07-22 01:13:42 -04:00
|
|
|
pub fn with_reveal_all_normalized(self, tcx: TyCtxt<'tcx>) -> Self {
|
2020-08-16 11:08:55 -04:00
|
|
|
if self.packed.tag() == traits::Reveal::All {
|
2020-04-11 00:50:02 -04:00
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
ParamEnv::new(tcx.normalize_opaque_types(self.caller_bounds()), Reveal::All, self.def_id)
|
2018-02-14 05:08:02 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns this same environment but with no caller bounds.
|
|
|
|
pub fn without_caller_bounds(self) -> Self {
|
2020-07-02 20:52:40 -04:00
|
|
|
Self::new(List::empty(), self.reveal(), self.def_id)
|
2018-02-14 05:08:02 -05:00
|
|
|
}
|
|
|
|
|
2017-05-12 11:44:00 -04:00
|
|
|
/// Creates a suitable environment in which to perform trait
|
2018-02-20 10:37:35 -05:00
|
|
|
/// queries on the given value. When type-checking, this is simply
|
|
|
|
/// the pair of the environment plus value. But when reveal is set to
|
|
|
|
/// All, then if `value` does not reference any type parameters, we will
|
|
|
|
/// pair it with the empty environment. This improves caching and is generally
|
|
|
|
/// invisible.
|
2017-05-12 11:44:00 -04:00
|
|
|
///
|
2018-11-27 02:59:49 +00:00
|
|
|
/// N.B., we preserve the environment when type-checking because it
|
2018-02-20 10:37:35 -05:00
|
|
|
/// is possible for the user to have wacky where-clauses like
|
2017-05-12 11:44:00 -04:00
|
|
|
/// `where Box<u32>: Copy`, which are clearly never
|
2018-02-20 10:37:35 -05:00
|
|
|
/// satisfiable. We generally want to behave as if they were true,
|
|
|
|
/// although the surrounding function is never reachable.
|
2017-05-15 17:57:30 -04:00
|
|
|
pub fn and<T: TypeFoldable<'tcx>>(self, value: T) -> ParamEnvAnd<'tcx, T> {
|
2020-07-02 20:52:40 -04:00
|
|
|
match self.reveal() {
|
2019-12-22 17:42:04 -05:00
|
|
|
Reveal::UserFacing => ParamEnvAnd { param_env: self, value },
|
2018-02-20 10:37:35 -05:00
|
|
|
|
|
|
|
Reveal::All => {
|
2020-02-22 15:09:17 +00:00
|
|
|
if value.is_global() {
|
2019-12-22 17:42:04 -05:00
|
|
|
ParamEnvAnd { param_env: self.without_caller_bounds(), value }
|
2020-02-22 15:09:17 +00:00
|
|
|
} else {
|
|
|
|
ParamEnvAnd { param_env: self, value }
|
2018-02-20 10:37:35 -05:00
|
|
|
}
|
2017-05-12 11:44:00 -04:00
|
|
|
}
|
2017-05-10 10:28:06 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-04-17 21:18:56 +03:00
|
|
|
|
2020-01-13 20:30:32 -08:00
|
|
|
#[derive(Copy, Clone, Debug, PartialEq, Eq, Hash)]
|
|
|
|
pub struct ConstnessAnd<T> {
|
|
|
|
pub constness: Constness,
|
|
|
|
pub value: T,
|
|
|
|
}
|
|
|
|
|
2020-05-07 10:12:19 +00:00
|
|
|
// FIXME(ecstaticmorse): Audit all occurrences of `without_const().to_predicate(tcx)` to ensure that
|
2020-01-13 20:30:32 -08:00
|
|
|
// the constness of trait bounds is being propagated correctly.
|
|
|
|
pub trait WithConstness: Sized {
|
|
|
|
#[inline]
|
|
|
|
fn with_constness(self, constness: Constness) -> ConstnessAnd<Self> {
|
|
|
|
ConstnessAnd { constness, value: self }
|
|
|
|
}
|
|
|
|
|
|
|
|
#[inline]
|
|
|
|
fn with_const(self) -> ConstnessAnd<Self> {
|
|
|
|
self.with_constness(Constness::Const)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[inline]
|
|
|
|
fn without_const(self) -> ConstnessAnd<Self> {
|
|
|
|
self.with_constness(Constness::NotConst)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<T> WithConstness for T {}
|
|
|
|
|
2019-11-13 21:36:57 +01:00
|
|
|
#[derive(Copy, Clone, Debug, PartialEq, Eq, Hash, TypeFoldable)]
|
2017-05-15 17:57:30 -04:00
|
|
|
pub struct ParamEnvAnd<'tcx, T> {
|
|
|
|
pub param_env: ParamEnv<'tcx>,
|
2017-05-10 10:28:06 -04:00
|
|
|
pub value: T,
|
2013-10-29 06:03:32 -04:00
|
|
|
}
|
|
|
|
|
2017-05-15 17:57:30 -04:00
|
|
|
impl<'tcx, T> ParamEnvAnd<'tcx, T> {
|
|
|
|
pub fn into_parts(self) -> (ParamEnv<'tcx>, T) {
|
2017-05-10 10:28:06 -04:00
|
|
|
(self.param_env, self.value)
|
2015-01-26 14:20:38 -05:00
|
|
|
}
|
2014-08-11 17:12:01 -07:00
|
|
|
}
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
impl<'a, 'tcx, T> HashStable<StableHashingContext<'a>> for ParamEnvAnd<'tcx, T>
|
2019-06-14 01:32:15 +03:00
|
|
|
where
|
|
|
|
T: HashStable<StableHashingContext<'a>>,
|
2017-09-27 18:30:26 +02:00
|
|
|
{
|
2019-09-26 18:54:39 -04:00
|
|
|
fn hash_stable(&self, hcx: &mut StableHashingContext<'a>, hasher: &mut StableHasher) {
|
2019-12-22 17:42:04 -05:00
|
|
|
let ParamEnvAnd { ref param_env, ref value } = *self;
|
2017-09-27 18:30:26 +02:00
|
|
|
|
|
|
|
param_env.hash_stable(hcx, hasher);
|
|
|
|
value.hash_stable(hcx, hasher);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-03 01:14:35 +01:00
|
|
|
#[derive(Copy, Clone, Debug, HashStable)]
|
2017-03-01 18:42:26 +02:00
|
|
|
pub struct Destructor {
|
2019-02-08 14:53:55 +01:00
|
|
|
/// The `DefId` of the destructor method
|
2017-03-01 18:42:26 +02:00
|
|
|
pub did: DefId,
|
|
|
|
}
|
|
|
|
|
2015-07-20 22:13:36 +03:00
|
|
|
bitflags! {
|
2018-12-03 01:14:35 +01:00
|
|
|
#[derive(HashStable)]
|
2017-09-08 15:08:01 -04:00
|
|
|
pub struct AdtFlags: u32 {
|
|
|
|
const NO_ADT_FLAGS = 0;
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Indicates whether the ADT is an enum.
|
2017-09-08 15:08:01 -04:00
|
|
|
const IS_ENUM = 1 << 0;
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Indicates whether the ADT is a union.
|
2018-12-11 00:05:35 +00:00
|
|
|
const IS_UNION = 1 << 1;
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Indicates whether the ADT is a struct.
|
2018-12-11 00:05:35 +00:00
|
|
|
const IS_STRUCT = 1 << 2;
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Indicates whether the ADT is a struct and has a constructor.
|
2018-12-13 15:35:45 +00:00
|
|
|
const HAS_CTOR = 1 << 3;
|
2020-01-30 20:26:36 +00:00
|
|
|
/// Indicates whether the type is `PhantomData`.
|
2018-12-11 00:05:35 +00:00
|
|
|
const IS_PHANTOM_DATA = 1 << 4;
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Indicates whether the type has a `#[fundamental]` attribute.
|
2018-12-11 00:05:35 +00:00
|
|
|
const IS_FUNDAMENTAL = 1 << 5;
|
2020-01-30 20:26:36 +00:00
|
|
|
/// Indicates whether the type is `Box`.
|
2018-12-11 00:05:35 +00:00
|
|
|
const IS_BOX = 1 << 6;
|
2020-01-30 20:26:36 +00:00
|
|
|
/// Indicates whether the type is `ManuallyDrop`.
|
|
|
|
const IS_MANUALLY_DROP = 1 << 7;
|
2018-09-01 19:10:26 +03:00
|
|
|
/// Indicates whether the variant list of this ADT is `#[non_exhaustive]`.
|
|
|
|
/// (i.e., this flag is never set unless this ADT is an enum).
|
2020-04-08 04:26:48 +03:00
|
|
|
const IS_VARIANT_LIST_NON_EXHAUSTIVE = 1 << 8;
|
2018-09-01 19:10:26 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bitflags! {
|
2018-12-03 01:14:35 +01:00
|
|
|
#[derive(HashStable)]
|
2018-09-01 19:10:26 +03:00
|
|
|
pub struct VariantFlags: u32 {
|
|
|
|
const NO_VARIANT_FLAGS = 0;
|
|
|
|
/// Indicates whether the field list of this variant is `#[non_exhaustive]`.
|
|
|
|
const IS_FIELD_LIST_NON_EXHAUSTIVE = 1 << 0;
|
2020-08-25 11:50:36 +02:00
|
|
|
/// Indicates whether this variant was obtained as part of recovering from
|
|
|
|
/// a syntactic error. May be incomplete or bogus.
|
|
|
|
const IS_RECOVERED = 1 << 1;
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Definition of a variant -- a struct's fields or a enum variant.
|
2019-11-10 18:41:09 +01:00
|
|
|
#[derive(Debug, HashStable)]
|
2016-11-25 01:33:29 +02:00
|
|
|
pub struct VariantDef {
|
2019-03-24 12:09:44 +03:00
|
|
|
/// `DefId` that identifies the variant itself.
|
|
|
|
/// If this variant belongs to a struct or union, then this is a copy of its `DefId`.
|
|
|
|
pub def_id: DefId,
|
|
|
|
/// `DefId` that identifies the variant's constructor.
|
|
|
|
/// If this variant is a struct variant, then this is `None`.
|
|
|
|
pub ctor_def_id: Option<DefId>,
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Variant or struct name.
|
2019-11-11 09:39:23 +01:00
|
|
|
#[stable_hasher(project(name))]
|
2019-03-21 23:38:50 +01:00
|
|
|
pub ident: Ident,
|
|
|
|
/// Discriminant of this variant.
|
2017-02-05 07:01:48 +02:00
|
|
|
pub discr: VariantDiscr,
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Fields of this variant.
|
2016-11-25 01:33:29 +02:00
|
|
|
pub fields: Vec<FieldDef>,
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Type of constructor of variant.
|
2016-09-15 00:51:46 +03:00
|
|
|
pub ctor_kind: CtorKind,
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Flags of the variant (e.g. is field list non-exhaustive)?
|
2018-09-01 19:10:26 +03:00
|
|
|
flags: VariantFlags,
|
2015-07-22 20:10:18 +03:00
|
|
|
}
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
impl<'tcx> VariantDef {
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Creates a new `VariantDef`.
|
2018-09-01 19:10:26 +03:00
|
|
|
///
|
2019-03-21 23:38:50 +01:00
|
|
|
/// `variant_did` is the `DefId` that identifies the enum variant (if this `VariantDef`
|
|
|
|
/// represents an enum variant).
|
2018-09-22 21:53:58 +03:00
|
|
|
///
|
2019-03-21 23:38:50 +01:00
|
|
|
/// `ctor_did` is the `DefId` that identifies the constructor of unit or
|
|
|
|
/// tuple-variants/structs. If this is a `struct`-variant then this should be `None`.
|
|
|
|
///
|
|
|
|
/// `parent_did` is the `DefId` of the `AdtDef` representing the enum or struct that
|
|
|
|
/// owns this variant. It is used for checking if a struct has `#[non_exhaustive]` w/out having
|
|
|
|
/// to go through the redirect of checking the ctor's attributes - but compiling a small crate
|
|
|
|
/// requires loading the `AdtDef`s for all the structs in the universe (e.g., coherence for any
|
2018-09-22 21:53:58 +03:00
|
|
|
/// built-in trait), and we do not want to load attributes twice.
|
|
|
|
///
|
|
|
|
/// If someone speeds up attribute loading to not be a performance concern, they can
|
2019-02-08 14:53:55 +01:00
|
|
|
/// remove this hack and use the constructor `DefId` everywhere.
|
2019-03-17 20:09:53 -07:00
|
|
|
pub fn new(
|
|
|
|
ident: Ident,
|
2019-03-21 23:38:50 +01:00
|
|
|
variant_did: Option<DefId>,
|
2019-03-24 12:09:44 +03:00
|
|
|
ctor_def_id: Option<DefId>,
|
2019-03-17 20:09:53 -07:00
|
|
|
discr: VariantDiscr,
|
|
|
|
fields: Vec<FieldDef>,
|
|
|
|
ctor_kind: CtorKind,
|
2019-03-21 23:38:50 +01:00
|
|
|
adt_kind: AdtKind,
|
|
|
|
parent_did: DefId,
|
2019-03-17 20:09:53 -07:00
|
|
|
recovered: bool,
|
2020-07-28 13:31:48 -04:00
|
|
|
is_field_list_non_exhaustive: bool,
|
2019-03-17 20:09:53 -07:00
|
|
|
) -> Self {
|
2019-03-21 23:38:50 +01:00
|
|
|
debug!(
|
2019-03-24 12:09:44 +03:00
|
|
|
"VariantDef::new(ident = {:?}, variant_did = {:?}, ctor_def_id = {:?}, discr = {:?},
|
2019-03-21 23:38:50 +01:00
|
|
|
fields = {:?}, ctor_kind = {:?}, adt_kind = {:?}, parent_did = {:?})",
|
2019-12-22 17:42:04 -05:00
|
|
|
ident, variant_did, ctor_def_id, discr, fields, ctor_kind, adt_kind, parent_did,
|
2019-03-21 23:38:50 +01:00
|
|
|
);
|
|
|
|
|
2018-09-01 19:10:26 +03:00
|
|
|
let mut flags = VariantFlags::NO_VARIANT_FLAGS;
|
2020-07-28 13:31:48 -04:00
|
|
|
if is_field_list_non_exhaustive {
|
|
|
|
flags |= VariantFlags::IS_FIELD_LIST_NON_EXHAUSTIVE;
|
2018-09-01 19:10:26 +03:00
|
|
|
}
|
2019-03-21 23:38:50 +01:00
|
|
|
|
2020-08-25 11:50:36 +02:00
|
|
|
if recovered {
|
|
|
|
flags |= VariantFlags::IS_RECOVERED;
|
|
|
|
}
|
|
|
|
|
2018-09-01 19:10:26 +03:00
|
|
|
VariantDef {
|
2019-03-24 12:09:44 +03:00
|
|
|
def_id: variant_did.unwrap_or(parent_did),
|
|
|
|
ctor_def_id,
|
2018-12-01 02:47:08 +00:00
|
|
|
ident,
|
2018-09-01 19:10:26 +03:00
|
|
|
discr,
|
|
|
|
fields,
|
|
|
|
ctor_kind,
|
2019-03-17 20:09:53 -07:00
|
|
|
flags,
|
2018-09-01 19:10:26 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Is this field list non-exhaustive?
|
2018-09-01 19:10:26 +03:00
|
|
|
#[inline]
|
|
|
|
pub fn is_field_list_non_exhaustive(&self) -> bool {
|
|
|
|
self.flags.intersects(VariantFlags::IS_FIELD_LIST_NON_EXHAUSTIVE)
|
|
|
|
}
|
2020-06-12 14:11:45 +01:00
|
|
|
|
2020-08-25 11:50:36 +02:00
|
|
|
/// Was this variant obtained as part of recovering from a syntactic error?
|
|
|
|
#[inline]
|
|
|
|
pub fn is_recovered(&self) -> bool {
|
|
|
|
self.flags.intersects(VariantFlags::IS_RECOVERED)
|
|
|
|
}
|
|
|
|
|
2020-06-12 14:11:45 +01:00
|
|
|
/// `repr(transparent)` structs can have a single non-ZST field, this function returns that
|
|
|
|
/// field.
|
2020-06-12 16:14:05 +01:00
|
|
|
pub fn transparent_newtype_field(&self, tcx: TyCtxt<'tcx>) -> Option<&FieldDef> {
|
2020-06-12 14:11:45 +01:00
|
|
|
for field in &self.fields {
|
|
|
|
let field_ty = field.ty(tcx, InternalSubsts::identity_for_item(tcx, self.def_id));
|
|
|
|
if !field_ty.is_zst(tcx, self.def_id) {
|
|
|
|
return Some(field);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
None
|
|
|
|
}
|
2015-07-22 20:10:18 +03:00
|
|
|
}
|
|
|
|
|
2020-06-29 21:09:54 +01:00
|
|
|
#[derive(Copy, Clone, Debug, PartialEq, Eq, TyEncodable, TyDecodable, HashStable)]
|
2017-02-05 07:01:48 +02:00
|
|
|
pub enum VariantDiscr {
|
2018-11-27 02:59:49 +00:00
|
|
|
/// Explicit value for this variant, i.e., `X = 123`.
|
2017-02-05 07:01:48 +02:00
|
|
|
/// The `DefId` corresponds to the embedded constant.
|
|
|
|
Explicit(DefId),
|
|
|
|
|
|
|
|
/// The previous variant's discriminant plus one.
|
|
|
|
/// For efficiency reasons, the distance from the
|
|
|
|
/// last `Explicit` discriminant is being stored,
|
|
|
|
/// or `0` for the first variant, if it has none.
|
2018-11-01 16:01:24 +01:00
|
|
|
Relative(u32),
|
2017-02-05 07:01:48 +02:00
|
|
|
}
|
|
|
|
|
2018-12-03 01:14:35 +01:00
|
|
|
#[derive(Debug, HashStable)]
|
2016-11-25 01:33:29 +02:00
|
|
|
pub struct FieldDef {
|
2015-07-22 20:10:18 +03:00
|
|
|
pub did: DefId,
|
2018-12-03 01:14:35 +01:00
|
|
|
#[stable_hasher(project(name))]
|
2018-05-26 02:50:15 +03:00
|
|
|
pub ident: Ident,
|
2016-03-25 06:08:11 +00:00
|
|
|
pub vis: Visibility,
|
2015-07-22 20:10:18 +03:00
|
|
|
}
|
|
|
|
|
2019-09-10 18:59:14 +02:00
|
|
|
/// The definition of a user-defined type, e.g., a `struct`, `enum`, or `union`.
|
2015-08-07 13:48:29 +03:00
|
|
|
///
|
2020-06-03 19:24:58 +02:00
|
|
|
/// These are all interned (by `alloc_adt_def`) into the global arena.
|
2019-09-10 18:59:14 +02:00
|
|
|
///
|
2019-05-17 02:20:14 +01:00
|
|
|
/// The initialism *ADT* stands for an [*algebraic data type (ADT)*][adt].
|
2019-09-10 18:59:14 +02:00
|
|
|
/// This is slightly wrong because `union`s are not ADTs.
|
|
|
|
/// Moreover, Rust only allows recursive data types through indirection.
|
|
|
|
///
|
|
|
|
/// [adt]: https://en.wikipedia.org/wiki/Algebraic_data_type
|
2016-11-25 01:33:29 +02:00
|
|
|
pub struct AdtDef {
|
2019-05-17 02:20:14 +01:00
|
|
|
/// The `DefId` of the struct, enum or union item.
|
2015-07-20 22:13:36 +03:00
|
|
|
pub did: DefId,
|
2019-08-07 08:43:42 +02:00
|
|
|
/// Variants of the ADT. If this is a struct or union, then there will be a single variant.
|
2020-03-31 18:16:47 +02:00
|
|
|
pub variants: IndexVec<VariantIdx, VariantDef>,
|
2019-05-17 02:20:14 +01:00
|
|
|
/// Flags of the ADT (e.g., is this a struct? is this non-exhaustive?).
|
2017-03-01 18:42:26 +02:00
|
|
|
flags: AdtFlags,
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Repr options provided by the user.
|
2017-02-06 15:26:32 -05:00
|
|
|
pub repr: ReprOptions,
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
|
|
|
|
2018-05-17 17:42:02 -04:00
|
|
|
impl PartialOrd for AdtDef {
|
|
|
|
fn partial_cmp(&self, other: &AdtDef) -> Option<Ordering> {
|
|
|
|
Some(self.cmp(&other))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// There should be only one AdtDef for each `did`, therefore
|
|
|
|
/// it is fine to implement `Ord` only based on `did`.
|
|
|
|
impl Ord for AdtDef {
|
|
|
|
fn cmp(&self, other: &AdtDef) -> Ordering {
|
|
|
|
self.did.cmp(&other.did)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-25 01:33:29 +02:00
|
|
|
impl PartialEq for AdtDef {
|
2019-05-17 02:20:14 +01:00
|
|
|
// `AdtDef`s are always interned, and this is part of `TyS` equality.
|
2015-07-20 22:13:36 +03:00
|
|
|
#[inline]
|
2019-12-22 17:42:04 -05:00
|
|
|
fn eq(&self, other: &Self) -> bool {
|
|
|
|
ptr::eq(self, other)
|
|
|
|
}
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
|
|
|
|
2016-11-25 01:33:29 +02:00
|
|
|
impl Eq for AdtDef {}
|
2015-07-20 22:13:36 +03:00
|
|
|
|
2016-11-25 01:33:29 +02:00
|
|
|
impl Hash for AdtDef {
|
2015-07-20 22:13:36 +03:00
|
|
|
#[inline]
|
|
|
|
fn hash<H: Hasher>(&self, s: &mut H) {
|
2016-11-25 01:33:29 +02:00
|
|
|
(self as *const AdtDef).hash(s)
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
impl<S: Encoder> Encodable<S> for AdtDef {
|
|
|
|
fn encode(&self, s: &mut S) -> Result<(), S::Error> {
|
2015-12-01 16:07:15 +01:00
|
|
|
self.did.encode(s)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-16 10:16:38 +01:00
|
|
|
impl<'a> HashStable<StableHashingContext<'a>> for AdtDef {
|
2019-09-26 18:54:39 -04:00
|
|
|
fn hash_stable(&self, hcx: &mut StableHashingContext<'a>, hasher: &mut StableHasher) {
|
2018-01-10 19:20:01 -05:00
|
|
|
thread_local! {
|
2018-10-16 16:57:53 +02:00
|
|
|
static CACHE: RefCell<FxHashMap<usize, Fingerprint>> = Default::default();
|
2018-01-10 19:20:01 -05:00
|
|
|
}
|
2017-03-30 15:27:27 +02:00
|
|
|
|
2018-01-10 19:20:01 -05:00
|
|
|
let hash: Fingerprint = CACHE.with(|cache| {
|
|
|
|
let addr = self as *const AdtDef as usize;
|
|
|
|
*cache.borrow_mut().entry(addr).or_insert_with(|| {
|
2019-12-22 17:42:04 -05:00
|
|
|
let ty::AdtDef { did, ref variants, ref flags, ref repr } = *self;
|
2018-01-10 19:20:01 -05:00
|
|
|
|
|
|
|
let mut hasher = StableHasher::new();
|
|
|
|
did.hash_stable(hcx, &mut hasher);
|
|
|
|
variants.hash_stable(hcx, &mut hasher);
|
|
|
|
flags.hash_stable(hcx, &mut hasher);
|
|
|
|
repr.hash_stable(hcx, &mut hasher);
|
|
|
|
|
|
|
|
hasher.finish()
|
2019-12-22 17:42:04 -05:00
|
|
|
})
|
2018-01-10 19:20:01 -05:00
|
|
|
});
|
|
|
|
|
|
|
|
hash.hash_stable(hcx, hasher);
|
2017-03-30 15:27:27 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-18 21:23:20 +09:00
|
|
|
#[derive(Copy, Clone, Debug, Eq, PartialEq, Hash)]
|
2019-12-22 17:42:04 -05:00
|
|
|
pub enum AdtKind {
|
|
|
|
Struct,
|
|
|
|
Union,
|
|
|
|
Enum,
|
|
|
|
}
|
2015-07-22 20:10:18 +03:00
|
|
|
|
2018-08-03 16:10:33 -06:00
|
|
|
impl Into<DataTypeKind> for AdtKind {
|
|
|
|
fn into(self) -> DataTypeKind {
|
|
|
|
match self {
|
|
|
|
AdtKind::Struct => DataTypeKind::Struct,
|
|
|
|
AdtKind::Union => DataTypeKind::Union,
|
|
|
|
AdtKind::Enum => DataTypeKind::Enum,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-16 16:17:13 +03:00
|
|
|
bitflags! {
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(TyEncodable, TyDecodable, Default, HashStable)]
|
2017-09-08 15:08:01 -04:00
|
|
|
pub struct ReprFlags: u8 {
|
|
|
|
const IS_C = 1 << 0;
|
2018-02-04 22:10:28 +11:00
|
|
|
const IS_SIMD = 1 << 1;
|
|
|
|
const IS_TRANSPARENT = 1 << 2;
|
2017-04-16 16:17:13 +03:00
|
|
|
// Internal only for now. If true, don't reorder fields.
|
2018-02-04 22:10:28 +11:00
|
|
|
const IS_LINEAR = 1 << 3;
|
2020-01-22 18:54:04 -05:00
|
|
|
// If true, don't expose any niche to type's context.
|
|
|
|
const HIDE_NICHE = 1 << 4;
|
2017-04-16 16:17:13 +03:00
|
|
|
// Any of these flags being set prevent field reordering optimisation.
|
|
|
|
const IS_UNOPTIMISABLE = ReprFlags::IS_C.bits |
|
|
|
|
ReprFlags::IS_SIMD.bits |
|
2017-09-08 15:08:01 -04:00
|
|
|
ReprFlags::IS_LINEAR.bits;
|
2017-04-16 16:17:13 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-06 15:26:32 -05:00
|
|
|
/// Represents the repr options provided by the user,
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Copy, Clone, Debug, Eq, PartialEq, TyEncodable, TyDecodable, Default, HashStable)]
|
2017-02-06 15:26:32 -05:00
|
|
|
pub struct ReprOptions {
|
|
|
|
pub int: Option<attr::IntType>,
|
2019-08-26 13:14:30 +00:00
|
|
|
pub align: Option<Align>,
|
|
|
|
pub pack: Option<Align>,
|
2017-04-16 16:17:13 +03:00
|
|
|
pub flags: ReprFlags,
|
2017-02-06 15:26:32 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
impl ReprOptions {
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn new(tcx: TyCtxt<'_>, did: DefId) -> ReprOptions {
|
2017-04-16 16:17:13 +03:00
|
|
|
let mut flags = ReprFlags::empty();
|
|
|
|
let mut size = None;
|
2019-08-26 13:14:30 +00:00
|
|
|
let mut max_align: Option<Align> = None;
|
|
|
|
let mut min_pack: Option<Align> = None;
|
2017-02-14 11:32:00 +02:00
|
|
|
for attr in tcx.get_attrs(did).iter() {
|
2020-07-30 11:27:50 +10:00
|
|
|
for r in attr::find_repr_attrs(&tcx.sess, attr) {
|
2017-04-16 16:17:13 +03:00
|
|
|
flags.insert(match r {
|
2018-01-07 22:05:32 +01:00
|
|
|
attr::ReprC => ReprFlags::IS_C,
|
2018-02-04 22:10:28 +11:00
|
|
|
attr::ReprPacked(pack) => {
|
2019-08-26 13:14:30 +00:00
|
|
|
let pack = Align::from_bytes(pack as u64).unwrap();
|
|
|
|
min_pack = Some(if let Some(min_pack) = min_pack {
|
|
|
|
min_pack.min(pack)
|
2018-02-04 22:10:28 +11:00
|
|
|
} else {
|
|
|
|
pack
|
2019-08-26 13:14:30 +00:00
|
|
|
});
|
2018-02-04 22:10:28 +11:00
|
|
|
ReprFlags::empty()
|
2019-12-22 17:42:04 -05:00
|
|
|
}
|
2018-01-03 17:43:30 +01:00
|
|
|
attr::ReprTransparent => ReprFlags::IS_TRANSPARENT,
|
2020-01-22 18:54:04 -05:00
|
|
|
attr::ReprNoNiche => ReprFlags::HIDE_NICHE,
|
2017-04-16 16:17:13 +03:00
|
|
|
attr::ReprSimd => ReprFlags::IS_SIMD,
|
|
|
|
attr::ReprInt(i) => {
|
|
|
|
size = Some(i);
|
|
|
|
ReprFlags::empty()
|
2019-12-22 17:42:04 -05:00
|
|
|
}
|
2017-01-15 09:49:29 +11:00
|
|
|
attr::ReprAlign(align) => {
|
2019-08-26 13:14:30 +00:00
|
|
|
max_align = max_align.max(Some(Align::from_bytes(align as u64).unwrap()));
|
2017-01-15 09:49:29 +11:00
|
|
|
ReprFlags::empty()
|
2019-12-22 17:42:04 -05:00
|
|
|
}
|
2017-04-16 16:17:13 +03:00
|
|
|
});
|
2017-02-06 15:26:32 -05:00
|
|
|
}
|
|
|
|
}
|
2017-02-14 11:32:00 +02:00
|
|
|
|
2017-03-08 16:28:47 -05:00
|
|
|
// This is here instead of layout because the choice must make it into metadata.
|
2018-12-19 12:31:35 +02:00
|
|
|
if !tcx.consider_optimizing(|| format!("Reorder fields of {:?}", tcx.def_path_str(did))) {
|
2017-04-16 16:17:13 +03:00
|
|
|
flags.insert(ReprFlags::IS_LINEAR);
|
|
|
|
}
|
2020-03-06 19:28:44 +01:00
|
|
|
ReprOptions { int: size, align: max_align, pack: min_pack, flags }
|
2017-02-06 15:26:32 -05:00
|
|
|
}
|
2017-02-14 11:32:00 +02:00
|
|
|
|
2017-04-16 16:17:13 +03:00
|
|
|
#[inline]
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn simd(&self) -> bool {
|
|
|
|
self.flags.contains(ReprFlags::IS_SIMD)
|
|
|
|
}
|
2017-04-16 16:17:13 +03:00
|
|
|
#[inline]
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn c(&self) -> bool {
|
|
|
|
self.flags.contains(ReprFlags::IS_C)
|
|
|
|
}
|
2017-04-16 16:17:13 +03:00
|
|
|
#[inline]
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn packed(&self) -> bool {
|
|
|
|
self.pack.is_some()
|
|
|
|
}
|
2017-04-16 16:17:13 +03:00
|
|
|
#[inline]
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn transparent(&self) -> bool {
|
|
|
|
self.flags.contains(ReprFlags::IS_TRANSPARENT)
|
|
|
|
}
|
2018-01-03 17:43:30 +01:00
|
|
|
#[inline]
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn linear(&self) -> bool {
|
|
|
|
self.flags.contains(ReprFlags::IS_LINEAR)
|
|
|
|
}
|
2020-01-22 18:54:04 -05:00
|
|
|
#[inline]
|
|
|
|
pub fn hide_niche(&self) -> bool {
|
|
|
|
self.flags.contains(ReprFlags::HIDE_NICHE)
|
|
|
|
}
|
2017-04-16 16:17:13 +03:00
|
|
|
|
2020-05-23 17:24:33 +02:00
|
|
|
/// Returns the discriminant type, given these `repr` options.
|
|
|
|
/// This must only be called on enums!
|
2017-02-14 11:32:00 +02:00
|
|
|
pub fn discr_type(&self) -> attr::IntType {
|
2018-01-04 03:12:04 +02:00
|
|
|
self.int.unwrap_or(attr::SignedInt(ast::IntTy::Isize))
|
2017-02-14 11:32:00 +02:00
|
|
|
}
|
2017-03-01 15:22:12 -05:00
|
|
|
|
2018-11-01 19:43:38 +00:00
|
|
|
/// Returns `true` if this `#[repr()]` should inhabit "smart enum
|
2017-03-01 15:22:12 -05:00
|
|
|
/// layout" optimizations, such as representing `Foo<&T>` as a
|
|
|
|
/// single pointer.
|
|
|
|
pub fn inhibit_enum_layout_opt(&self) -> bool {
|
2017-04-16 16:17:13 +03:00
|
|
|
self.c() || self.int.is_some()
|
2017-03-01 15:22:12 -05:00
|
|
|
}
|
2018-02-04 22:10:28 +11:00
|
|
|
|
2018-11-01 19:43:38 +00:00
|
|
|
/// Returns `true` if this `#[repr()]` should inhibit struct field reordering
|
2019-02-08 14:53:55 +01:00
|
|
|
/// optimizations, such as with `repr(C)`, `repr(packed(1))`, or `repr(<int>)`.
|
2018-02-04 22:10:28 +11:00
|
|
|
pub fn inhibit_struct_field_reordering_opt(&self) -> bool {
|
2019-08-26 13:14:30 +00:00
|
|
|
if let Some(pack) = self.pack {
|
|
|
|
if pack.bytes() == 1 {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
self.flags.intersects(ReprFlags::IS_UNOPTIMISABLE) || self.int.is_some()
|
2018-02-04 22:10:28 +11:00
|
|
|
}
|
2018-11-08 20:12:05 +01:00
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Returns `true` if this `#[repr()]` should inhibit union ABI optimisations.
|
2018-11-08 20:12:05 +01:00
|
|
|
pub fn inhibit_union_abi_opt(&self) -> bool {
|
|
|
|
self.c()
|
|
|
|
}
|
2017-02-06 15:26:32 -05:00
|
|
|
}
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
impl<'tcx> AdtDef {
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Creates a new `AdtDef`.
|
|
|
|
fn new(
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'_>,
|
2019-03-21 23:38:50 +01:00
|
|
|
did: DefId,
|
|
|
|
kind: AdtKind,
|
|
|
|
variants: IndexVec<VariantIdx, VariantDef>,
|
2019-06-12 00:11:55 +03:00
|
|
|
repr: ReprOptions,
|
2019-03-21 23:38:50 +01:00
|
|
|
) -> Self {
|
2018-09-01 19:10:26 +03:00
|
|
|
debug!("AdtDef::new({:?}, {:?}, {:?}, {:?})", did, kind, variants, repr);
|
2015-08-07 14:41:33 +03:00
|
|
|
let mut flags = AdtFlags::NO_ADT_FLAGS;
|
2018-12-11 00:05:35 +00:00
|
|
|
|
2019-05-08 13:21:18 +10:00
|
|
|
if kind == AdtKind::Enum && tcx.has_attr(did, sym::non_exhaustive) {
|
2018-12-11 00:05:35 +00:00
|
|
|
debug!("found non-exhaustive variant list for {:?}", did);
|
|
|
|
flags = flags | AdtFlags::IS_VARIANT_LIST_NON_EXHAUSTIVE;
|
|
|
|
}
|
2019-03-22 17:20:25 +01:00
|
|
|
|
2018-12-11 00:05:35 +00:00
|
|
|
flags |= match kind {
|
|
|
|
AdtKind::Enum => AdtFlags::IS_ENUM,
|
|
|
|
AdtKind::Union => AdtFlags::IS_UNION,
|
|
|
|
AdtKind::Struct => AdtFlags::IS_STRUCT,
|
|
|
|
};
|
|
|
|
|
2019-03-24 12:09:44 +03:00
|
|
|
if kind == AdtKind::Struct && variants[VariantIdx::new(0)].ctor_def_id.is_some() {
|
2019-03-21 23:38:50 +01:00
|
|
|
flags |= AdtFlags::HAS_CTOR;
|
2018-12-11 00:05:35 +00:00
|
|
|
}
|
|
|
|
|
2015-08-06 18:25:15 +03:00
|
|
|
let attrs = tcx.get_attrs(did);
|
2020-07-30 11:27:50 +10:00
|
|
|
if tcx.sess.contains_name(&attrs, sym::fundamental) {
|
2018-12-11 00:05:35 +00:00
|
|
|
flags |= AdtFlags::IS_FUNDAMENTAL;
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
2017-08-31 08:57:41 -07:00
|
|
|
if Some(did) == tcx.lang_items().phantom_data() {
|
2018-12-11 00:05:35 +00:00
|
|
|
flags |= AdtFlags::IS_PHANTOM_DATA;
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
2017-08-31 08:57:41 -07:00
|
|
|
if Some(did) == tcx.lang_items().owned_box() {
|
2018-12-11 00:05:35 +00:00
|
|
|
flags |= AdtFlags::IS_BOX;
|
2017-01-21 17:40:31 +03:00
|
|
|
}
|
2020-01-30 20:26:36 +00:00
|
|
|
if Some(did) == tcx.lang_items().manually_drop() {
|
|
|
|
flags |= AdtFlags::IS_MANUALLY_DROP;
|
|
|
|
}
|
2018-12-11 00:05:35 +00:00
|
|
|
|
2019-12-22 17:42:04 -05:00
|
|
|
AdtDef { did, variants, flags, repr }
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
|
|
|
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Returns `true` if this is a struct.
|
2016-09-06 01:26:02 +03:00
|
|
|
#[inline]
|
|
|
|
pub fn is_struct(&self) -> bool {
|
2018-12-11 00:05:35 +00:00
|
|
|
self.flags.contains(AdtFlags::IS_STRUCT)
|
|
|
|
}
|
|
|
|
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Returns `true` if this is a union.
|
2016-09-06 01:26:02 +03:00
|
|
|
#[inline]
|
|
|
|
pub fn is_union(&self) -> bool {
|
2018-12-11 00:05:35 +00:00
|
|
|
self.flags.contains(AdtFlags::IS_UNION)
|
2016-09-06 01:26:02 +03:00
|
|
|
}
|
|
|
|
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Returns `true` if this is a enum.
|
2016-09-06 01:26:02 +03:00
|
|
|
#[inline]
|
|
|
|
pub fn is_enum(&self) -> bool {
|
2018-12-11 00:05:35 +00:00
|
|
|
self.flags.contains(AdtFlags::IS_ENUM)
|
2016-09-06 01:26:02 +03:00
|
|
|
}
|
|
|
|
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Returns `true` if the variant list of this ADT is `#[non_exhaustive]`.
|
2017-11-03 19:17:54 +00:00
|
|
|
#[inline]
|
2018-09-01 19:10:26 +03:00
|
|
|
pub fn is_variant_list_non_exhaustive(&self) -> bool {
|
2018-12-11 00:05:35 +00:00
|
|
|
self.flags.contains(AdtFlags::IS_VARIANT_LIST_NON_EXHAUSTIVE)
|
2017-11-03 19:17:54 +00:00
|
|
|
}
|
|
|
|
|
2018-12-11 00:05:35 +00:00
|
|
|
/// Returns the kind of the ADT.
|
2015-07-22 20:10:18 +03:00
|
|
|
#[inline]
|
2015-08-07 14:41:33 +03:00
|
|
|
pub fn adt_kind(&self) -> AdtKind {
|
2016-09-06 01:26:02 +03:00
|
|
|
if self.is_enum() {
|
2015-08-07 14:41:33 +03:00
|
|
|
AdtKind::Enum
|
2016-09-06 01:26:02 +03:00
|
|
|
} else if self.is_union() {
|
2016-08-09 01:18:47 +03:00
|
|
|
AdtKind::Union
|
2015-07-22 20:10:18 +03:00
|
|
|
} else {
|
2015-08-07 14:41:33 +03:00
|
|
|
AdtKind::Struct
|
2015-07-22 20:10:18 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Returns a description of this abstract data type.
|
2016-09-06 01:26:02 +03:00
|
|
|
pub fn descr(&self) -> &'static str {
|
|
|
|
match self.adt_kind() {
|
|
|
|
AdtKind::Struct => "struct",
|
|
|
|
AdtKind::Union => "union",
|
|
|
|
AdtKind::Enum => "enum",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-21 23:38:50 +01:00
|
|
|
/// Returns a description of a variant of this abstract data type.
|
2018-11-29 21:13:04 +01:00
|
|
|
#[inline]
|
2016-09-06 01:26:02 +03:00
|
|
|
pub fn variant_descr(&self) -> &'static str {
|
|
|
|
match self.adt_kind() {
|
|
|
|
AdtKind::Struct => "struct",
|
|
|
|
AdtKind::Union => "union",
|
|
|
|
AdtKind::Enum => "variant",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-13 15:35:45 +00:00
|
|
|
/// If this function returns `true`, it implies that `is_struct` must return `true`.
|
|
|
|
#[inline]
|
|
|
|
pub fn has_ctor(&self) -> bool {
|
|
|
|
self.flags.contains(AdtFlags::HAS_CTOR)
|
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Returns `true` if this type is `#[fundamental]` for the purposes
|
2015-08-07 13:48:29 +03:00
|
|
|
/// of coherence checking.
|
2015-07-20 22:13:36 +03:00
|
|
|
#[inline]
|
|
|
|
pub fn is_fundamental(&self) -> bool {
|
2018-12-11 00:05:35 +00:00
|
|
|
self.flags.contains(AdtFlags::IS_FUNDAMENTAL)
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Returns `true` if this is `PhantomData<T>`.
|
2015-07-20 22:13:36 +03:00
|
|
|
#[inline]
|
|
|
|
pub fn is_phantom_data(&self) -> bool {
|
2018-12-11 00:05:35 +00:00
|
|
|
self.flags.contains(AdtFlags::IS_PHANTOM_DATA)
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
|
|
|
|
2018-11-01 19:43:38 +00:00
|
|
|
/// Returns `true` if this is Box<T>.
|
2017-01-21 17:40:31 +03:00
|
|
|
#[inline]
|
|
|
|
pub fn is_box(&self) -> bool {
|
2018-12-11 00:05:35 +00:00
|
|
|
self.flags.contains(AdtFlags::IS_BOX)
|
2017-01-21 17:40:31 +03:00
|
|
|
}
|
|
|
|
|
2020-02-09 10:16:57 +00:00
|
|
|
/// Returns `true` if this is `ManuallyDrop<T>`.
|
2020-01-30 20:26:36 +00:00
|
|
|
#[inline]
|
|
|
|
pub fn is_manually_drop(&self) -> bool {
|
|
|
|
self.flags.contains(AdtFlags::IS_MANUALLY_DROP)
|
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Returns `true` if this type has a destructor.
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn has_dtor(&self, tcx: TyCtxt<'tcx>) -> bool {
|
2017-02-19 14:46:29 +02:00
|
|
|
self.destructor(tcx).is_some()
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
|
|
|
|
2018-01-07 22:41:41 +01:00
|
|
|
/// Asserts this is a struct or union and returns its unique variant.
|
|
|
|
pub fn non_enum_variant(&self) -> &VariantDef {
|
|
|
|
assert!(self.is_struct() || self.is_union());
|
2018-11-01 16:01:24 +01:00
|
|
|
&self.variants[VariantIdx::new(0)]
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
#[inline]
|
2019-10-18 03:14:57 +03:00
|
|
|
pub fn predicates(&self, tcx: TyCtxt<'tcx>) -> GenericPredicates<'tcx> {
|
2017-04-24 15:20:46 +03:00
|
|
|
tcx.predicates_of(self.did)
|
2015-07-20 22:13:36 +03:00
|
|
|
}
|
2015-07-22 21:53:52 +03:00
|
|
|
|
2015-08-07 13:48:29 +03:00
|
|
|
/// Returns an iterator over all fields contained
|
|
|
|
/// by this ADT.
|
2015-07-22 21:53:52 +03:00
|
|
|
#[inline]
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn all_fields(&self) -> impl Iterator<Item = &FieldDef> + Clone {
|
2016-11-25 01:33:29 +02:00
|
|
|
self.variants.iter().flat_map(|v| v.fields.iter())
|
2015-07-22 21:53:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn is_payloadfree(&self) -> bool {
|
2019-12-22 17:42:04 -05:00
|
|
|
!self.variants.is_empty() && self.variants.iter().all(|v| v.fields.is_empty())
|
2015-07-22 21:53:52 +03:00
|
|
|
}
|
|
|
|
|
2019-03-22 17:20:25 +01:00
|
|
|
/// Return a `VariantDef` given a variant id.
|
2019-03-24 12:09:44 +03:00
|
|
|
pub fn variant_with_id(&self, vid: DefId) -> &VariantDef {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.variants.iter().find(|v| v.def_id == vid).expect("variant_with_id: unknown variant")
|
2015-07-22 21:53:52 +03:00
|
|
|
}
|
|
|
|
|
2019-03-22 17:20:25 +01:00
|
|
|
/// Return a `VariantDef` given a constructor id.
|
2019-03-21 23:38:50 +01:00
|
|
|
pub fn variant_with_ctor_id(&self, cid: DefId) -> &VariantDef {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.variants
|
|
|
|
.iter()
|
|
|
|
.find(|v| v.ctor_def_id == Some(cid))
|
2019-03-21 23:38:50 +01:00
|
|
|
.expect("variant_with_ctor_id: unknown variant")
|
|
|
|
}
|
|
|
|
|
2019-03-22 17:20:25 +01:00
|
|
|
/// Return the index of `VariantDef` given a variant id.
|
2019-03-24 12:09:44 +03:00
|
|
|
pub fn variant_index_with_id(&self, vid: DefId) -> VariantIdx {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.variants
|
|
|
|
.iter_enumerated()
|
|
|
|
.find(|(_, v)| v.def_id == vid)
|
|
|
|
.expect("variant_index_with_id: unknown variant")
|
|
|
|
.0
|
2019-03-21 23:38:50 +01:00
|
|
|
}
|
|
|
|
|
2019-03-22 17:20:25 +01:00
|
|
|
/// Return the index of `VariantDef` given a constructor id.
|
2019-03-21 23:38:50 +01:00
|
|
|
pub fn variant_index_with_ctor_id(&self, cid: DefId) -> VariantIdx {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.variants
|
|
|
|
.iter_enumerated()
|
|
|
|
.find(|(_, v)| v.ctor_def_id == Some(cid))
|
|
|
|
.expect("variant_index_with_ctor_id: unknown variant")
|
|
|
|
.0
|
2015-08-18 17:59:21 -04:00
|
|
|
}
|
|
|
|
|
2019-04-20 19:36:05 +03:00
|
|
|
pub fn variant_of_res(&self, res: Res) -> &VariantDef {
|
|
|
|
match res {
|
|
|
|
Res::Def(DefKind::Variant, vid) => self.variant_with_id(vid),
|
|
|
|
Res::Def(DefKind::Ctor(..), cid) => self.variant_with_ctor_id(cid),
|
2019-12-22 17:42:04 -05:00
|
|
|
Res::Def(DefKind::Struct, _)
|
|
|
|
| Res::Def(DefKind::Union, _)
|
|
|
|
| Res::Def(DefKind::TyAlias, _)
|
|
|
|
| Res::Def(DefKind::AssocTy, _)
|
|
|
|
| Res::SelfTy(..)
|
|
|
|
| Res::SelfCtor(..) => self.non_enum_variant(),
|
|
|
|
_ => bug!("unexpected res {:?} in variant_of_res", res),
|
2015-07-22 21:53:52 +03:00
|
|
|
}
|
|
|
|
}
|
2015-08-25 21:52:15 +03:00
|
|
|
|
2018-02-22 09:37:20 +01:00
|
|
|
#[inline]
|
2019-06-14 01:32:15 +03:00
|
|
|
pub fn eval_explicit_discr(&self, tcx: TyCtxt<'tcx>, expr_did: DefId) -> Option<Discr<'tcx>> {
|
2020-05-23 17:24:33 +02:00
|
|
|
assert!(self.is_enum());
|
2019-03-31 18:35:39 +02:00
|
|
|
let param_env = tcx.param_env(expr_did);
|
2018-02-22 09:37:20 +01:00
|
|
|
let repr_type = self.repr.discr_type();
|
2019-11-30 08:42:56 +13:00
|
|
|
match tcx.const_eval_poly(expr_did) {
|
2018-04-26 09:18:19 +02:00
|
|
|
Ok(val) => {
|
2020-02-15 11:56:23 +13:00
|
|
|
let ty = repr_type.to_ty(tcx);
|
|
|
|
if let Some(b) = val.try_to_bits_for_ty(tcx, param_env, ty) {
|
2018-04-26 09:18:19 +02:00
|
|
|
trace!("discriminants: {} ({:?})", b, repr_type);
|
2020-02-15 11:56:23 +13:00
|
|
|
Some(Discr { val: b, ty })
|
2018-04-26 09:18:19 +02:00
|
|
|
} else {
|
|
|
|
info!("invalid enum discriminant: {:#?}", val);
|
2019-02-05 11:20:45 -06:00
|
|
|
crate::mir::interpret::struct_error(
|
2018-06-02 23:38:57 +02:00
|
|
|
tcx.at(tcx.def_span(expr_did)),
|
2018-04-26 09:18:19 +02:00
|
|
|
"constant evaluation of enum discriminant resulted in non-integer",
|
2019-12-22 17:42:04 -05:00
|
|
|
)
|
|
|
|
.emit();
|
2018-04-26 09:18:19 +02:00
|
|
|
None
|
|
|
|
}
|
2018-02-22 09:37:20 +01:00
|
|
|
}
|
2020-04-06 00:12:58 +03:00
|
|
|
Err(err) => {
|
|
|
|
let msg = match err {
|
|
|
|
ErrorHandled::Reported(ErrorReported) | ErrorHandled::Linted => {
|
|
|
|
"enum discriminant evaluation failed"
|
|
|
|
}
|
|
|
|
ErrorHandled::TooGeneric => "enum discriminant depends on generics",
|
|
|
|
};
|
|
|
|
tcx.sess.delay_span_bug(tcx.def_span(expr_did), msg);
|
2020-03-10 16:24:34 -07:00
|
|
|
None
|
2019-12-22 17:42:04 -05:00
|
|
|
}
|
2018-02-22 09:37:20 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-19 15:16:19 +03:00
|
|
|
#[inline]
|
2018-03-15 16:17:27 -04:00
|
|
|
pub fn discriminants(
|
2019-06-11 22:03:44 +03:00
|
|
|
&'tcx self,
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
|
|
|
) -> impl Iterator<Item = (VariantIdx, Discr<'tcx>)> + Captures<'tcx> {
|
2020-05-23 17:24:33 +02:00
|
|
|
assert!(self.is_enum());
|
2017-02-14 11:32:00 +02:00
|
|
|
let repr_type = self.repr.discr_type();
|
2019-09-25 15:36:14 -04:00
|
|
|
let initial = repr_type.initial_discriminant(tcx);
|
2018-01-25 16:44:45 +01:00
|
|
|
let mut prev_discr = None::<Discr<'tcx>>;
|
2018-11-01 16:01:24 +01:00
|
|
|
self.variants.iter_enumerated().map(move |(i, v)| {
|
2018-01-25 16:44:45 +01:00
|
|
|
let mut discr = prev_discr.map_or(initial, |d| d.wrap_incr(tcx));
|
2017-02-05 07:01:48 +02:00
|
|
|
if let VariantDiscr::Explicit(expr_did) = v.discr {
|
2018-02-22 09:37:20 +01:00
|
|
|
if let Some(new_discr) = self.eval_explicit_discr(tcx, expr_did) {
|
|
|
|
discr = new_discr;
|
2017-02-05 07:01:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
prev_discr = Some(discr);
|
|
|
|
|
2018-11-01 16:01:24 +01:00
|
|
|
(i, discr)
|
2017-02-05 07:01:48 +02:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-04-18 14:39:03 -07:00
|
|
|
#[inline]
|
|
|
|
pub fn variant_range(&self) -> Range<VariantIdx> {
|
2020-01-23 00:42:35 -05:00
|
|
|
VariantIdx::new(0)..VariantIdx::new(self.variants.len())
|
2019-04-18 14:39:03 -07:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Computes the discriminant value used by a specific variant.
|
2017-04-15 04:14:44 +03:00
|
|
|
/// Unlike `discriminants`, this is (amortized) constant-time,
|
|
|
|
/// only doing at most one query for evaluating an explicit
|
|
|
|
/// discriminant (the last one before the requested variant),
|
|
|
|
/// assuming there are no constant-evaluation errors there.
|
2019-04-18 14:39:03 -07:00
|
|
|
#[inline]
|
2019-06-12 00:11:55 +03:00
|
|
|
pub fn discriminant_for_variant(
|
|
|
|
&self,
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
variant_index: VariantIdx,
|
|
|
|
) -> Discr<'tcx> {
|
2020-05-23 17:24:33 +02:00
|
|
|
assert!(self.is_enum());
|
2018-04-19 13:17:09 +02:00
|
|
|
let (val, offset) = self.discriminant_def_for_variant(variant_index);
|
|
|
|
let explicit_value = val
|
|
|
|
.and_then(|expr_did| self.eval_explicit_discr(tcx, expr_did))
|
2019-09-25 15:36:14 -04:00
|
|
|
.unwrap_or_else(|| self.repr.discr_type().initial_discriminant(tcx));
|
2018-04-19 13:17:09 +02:00
|
|
|
explicit_value.checked_add(tcx, offset as u128).0
|
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Yields a `DefId` for the discriminant and an offset to add to it
|
2018-04-19 13:17:09 +02:00
|
|
|
/// Alternatively, if there is no explicit discriminant, returns the
|
2019-02-08 14:53:55 +01:00
|
|
|
/// inferred discriminant directly.
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn discriminant_def_for_variant(&self, variant_index: VariantIdx) -> (Option<DefId>, u32) {
|
2020-06-18 10:37:59 +01:00
|
|
|
assert!(!self.variants.is_empty());
|
2018-11-01 16:01:24 +01:00
|
|
|
let mut explicit_index = variant_index.as_u32();
|
2018-04-19 13:17:09 +02:00
|
|
|
let expr_did;
|
2017-04-15 04:14:44 +03:00
|
|
|
loop {
|
2018-11-01 16:01:24 +01:00
|
|
|
match self.variants[VariantIdx::from_u32(explicit_index)].discr {
|
2018-04-19 13:17:09 +02:00
|
|
|
ty::VariantDiscr::Relative(0) => {
|
|
|
|
expr_did = None;
|
|
|
|
break;
|
2019-12-22 17:42:04 -05:00
|
|
|
}
|
2017-04-15 04:14:44 +03:00
|
|
|
ty::VariantDiscr::Relative(distance) => {
|
|
|
|
explicit_index -= distance;
|
|
|
|
}
|
2018-04-19 13:17:09 +02:00
|
|
|
ty::VariantDiscr::Explicit(did) => {
|
|
|
|
expr_did = Some(did);
|
|
|
|
break;
|
2017-04-15 04:14:44 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-11-01 16:01:24 +01:00
|
|
|
(expr_did, variant_index.as_u32() - explicit_index)
|
2017-04-15 04:14:44 +03:00
|
|
|
}
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn destructor(&self, tcx: TyCtxt<'tcx>) -> Option<Destructor> {
|
2017-04-24 17:23:36 +03:00
|
|
|
tcx.adt_destructor(self.did)
|
2017-03-01 18:42:26 +02:00
|
|
|
}
|
|
|
|
|
2017-04-21 20:24:32 +03:00
|
|
|
/// Returns a list of types such that `Self: Sized` if and only
|
2019-02-08 14:53:55 +01:00
|
|
|
/// if that type is `Sized`, or `TyErr` if this type is recursive.
|
2016-04-16 15:16:36 +03:00
|
|
|
///
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Oddly enough, checking that the sized-constraint is `Sized` is
|
2016-04-16 15:16:36 +03:00
|
|
|
/// actually more expressive than checking all members:
|
2019-02-08 14:53:55 +01:00
|
|
|
/// the `Sized` trait is inductive, so an associated type that references
|
|
|
|
/// `Self` would prevent its containing ADT from being `Sized`.
|
2016-04-16 15:16:36 +03:00
|
|
|
///
|
|
|
|
/// Due to normalization being eager, this applies even if
|
2019-02-08 14:53:55 +01:00
|
|
|
/// the associated type is behind a pointer (e.g., issue #31299).
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn sized_constraint(&self, tcx: TyCtxt<'tcx>) -> &'tcx [Ty<'tcx>] {
|
2019-01-24 20:05:19 +01:00
|
|
|
tcx.adt_sized_constraint(self.did).0
|
2016-04-14 15:49:39 +03:00
|
|
|
}
|
2015-07-22 21:53:52 +03:00
|
|
|
}
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
impl<'tcx> FieldDef {
|
2019-08-07 09:01:53 +02:00
|
|
|
/// Returns the type of this field. The `subst` is typically obtained
|
|
|
|
/// via the second field of `TyKind::AdtDef`.
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn ty(&self, tcx: TyCtxt<'tcx>, subst: SubstsRef<'tcx>) -> Ty<'tcx> {
|
2017-04-24 15:20:46 +03:00
|
|
|
tcx.type_of(self.did).subst(tcx, subst)
|
2015-07-22 21:53:52 +03:00
|
|
|
}
|
2016-09-14 23:58:58 +08:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Represents the various closure traits in the language. This
|
2017-11-21 11:18:40 -05:00
|
|
|
/// will determine the type of the environment (`self`, in the
|
2018-11-12 13:05:20 -05:00
|
|
|
/// desugaring) argument that the closure expects.
|
2017-11-21 11:18:40 -05:00
|
|
|
///
|
|
|
|
/// You can get the environment type of a closure using
|
|
|
|
/// `tcx.closure_env_ty()`.
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Copy, PartialOrd, Ord, PartialEq, Eq, Hash, Debug, TyEncodable, TyDecodable)]
|
2020-03-23 14:48:59 +00:00
|
|
|
#[derive(HashStable)]
|
2015-01-24 22:00:03 +02:00
|
|
|
pub enum ClosureKind {
|
2015-02-15 15:09:26 -05:00
|
|
|
// Warning: Ordering is significant here! The ordering is chosen
|
|
|
|
// because the trait Fn is a subtrait of FnMut and so in turn, and
|
|
|
|
// hence we order it so that Fn < FnMut < FnOnce.
|
2016-02-12 16:44:27 +01:00
|
|
|
Fn,
|
|
|
|
FnMut,
|
|
|
|
FnOnce,
|
2014-07-29 22:08:39 -07:00
|
|
|
}
|
|
|
|
|
2019-06-11 23:35:39 +03:00
|
|
|
impl<'tcx> ClosureKind {
|
2017-11-08 12:36:28 -05:00
|
|
|
// This is the initial value used when doing upvar inference.
|
|
|
|
pub const LATTICE_BOTTOM: ClosureKind = ClosureKind::Fn;
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn trait_did(&self, tcx: TyCtxt<'tcx>) -> DefId {
|
2016-11-25 21:21:03 -07:00
|
|
|
match *self {
|
2020-08-18 11:47:27 +01:00
|
|
|
ClosureKind::Fn => tcx.require_lang_item(LangItem::Fn, None),
|
|
|
|
ClosureKind::FnMut => tcx.require_lang_item(LangItem::FnMut, None),
|
|
|
|
ClosureKind::FnOnce => tcx.require_lang_item(LangItem::FnOnce, None),
|
2014-08-20 09:12:16 -07:00
|
|
|
}
|
|
|
|
}
|
2015-02-15 15:09:26 -05:00
|
|
|
|
2018-11-01 19:43:38 +00:00
|
|
|
/// Returns `true` if this a type that impls this closure kind
|
2015-02-15 15:09:26 -05:00
|
|
|
/// must also implement `other`.
|
|
|
|
pub fn extends(self, other: ty::ClosureKind) -> bool {
|
|
|
|
match (self, other) {
|
2016-02-12 16:44:27 +01:00
|
|
|
(ClosureKind::Fn, ClosureKind::Fn) => true,
|
|
|
|
(ClosureKind::Fn, ClosureKind::FnMut) => true,
|
|
|
|
(ClosureKind::Fn, ClosureKind::FnOnce) => true,
|
|
|
|
(ClosureKind::FnMut, ClosureKind::FnMut) => true,
|
|
|
|
(ClosureKind::FnMut, ClosureKind::FnOnce) => true,
|
|
|
|
(ClosureKind::FnOnce, ClosureKind::FnOnce) => true,
|
2015-02-15 15:09:26 -05:00
|
|
|
_ => false,
|
|
|
|
}
|
|
|
|
}
|
2017-11-08 05:45:20 -05:00
|
|
|
|
|
|
|
/// Returns the representative scalar type for this closure kind.
|
|
|
|
/// See `TyS::to_opt_closure_kind` for more details.
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn to_ty(self, tcx: TyCtxt<'tcx>) -> Ty<'tcx> {
|
2017-11-08 05:45:20 -05:00
|
|
|
match self {
|
|
|
|
ty::ClosureKind::Fn => tcx.types.i8,
|
|
|
|
ty::ClosureKind::FnMut => tcx.types.i16,
|
|
|
|
ty::ClosureKind::FnOnce => tcx.types.i32,
|
|
|
|
}
|
2015-02-15 15:09:26 -05:00
|
|
|
}
|
2014-08-20 09:12:16 -07:00
|
|
|
}
|
|
|
|
|
2015-06-25 23:42:17 +03:00
|
|
|
impl BorrowKind {
|
2015-07-31 00:04:06 -07:00
|
|
|
pub fn from_mutbl(m: hir::Mutability) -> BorrowKind {
|
2015-06-25 23:42:17 +03:00
|
|
|
match m {
|
2019-12-16 17:28:40 +01:00
|
|
|
hir::Mutability::Mut => MutBorrow,
|
|
|
|
hir::Mutability::Not => ImmBorrow,
|
2014-08-05 19:44:21 -07:00
|
|
|
}
|
|
|
|
}
|
2013-03-27 10:26:57 -04:00
|
|
|
|
2015-06-25 23:42:17 +03:00
|
|
|
/// Returns a mutability `m` such that an `&m T` pointer could be used to obtain this borrow
|
|
|
|
/// kind. Because borrow kinds are richer than mutabilities, we sometimes have to pick a
|
|
|
|
/// mutability that is stronger than necessary so that it at least *would permit* the borrow in
|
|
|
|
/// question.
|
2015-07-31 00:04:06 -07:00
|
|
|
pub fn to_mutbl_lossy(self) -> hir::Mutability {
|
2015-06-25 23:42:17 +03:00
|
|
|
match self {
|
2019-12-16 17:28:40 +01:00
|
|
|
MutBorrow => hir::Mutability::Mut,
|
|
|
|
ImmBorrow => hir::Mutability::Not,
|
2015-06-25 23:42:17 +03:00
|
|
|
|
|
|
|
// We have no type corresponding to a unique imm borrow, so
|
|
|
|
// use `&mut`. It gives all the capabilities of an `&uniq`
|
|
|
|
// and hence is a safe "over approximation".
|
2019-12-16 17:28:40 +01:00
|
|
|
UniqueImmBorrow => hir::Mutability::Mut,
|
2012-03-07 12:54:00 +01:00
|
|
|
}
|
2015-05-26 00:41:27 +03:00
|
|
|
}
|
2012-01-05 10:57:19 +01:00
|
|
|
|
2015-06-25 23:42:17 +03:00
|
|
|
pub fn to_user_str(&self) -> &'static str {
|
|
|
|
match *self {
|
|
|
|
MutBorrow => "mutable",
|
|
|
|
ImmBorrow => "immutable",
|
|
|
|
UniqueImmBorrow => "uniquely immutable",
|
|
|
|
}
|
2012-03-08 16:10:25 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-14 17:43:27 +01:00
|
|
|
pub type Attributes<'tcx> = &'tcx [ast::Attribute];
|
2017-04-20 15:08:41 +03:00
|
|
|
|
2019-01-03 23:46:46 +02:00
|
|
|
#[derive(Debug, PartialEq, Eq)]
|
|
|
|
pub enum ImplOverlapKind {
|
|
|
|
/// These impls are always allowed to overlap.
|
2020-01-09 10:01:20 -05:00
|
|
|
Permitted {
|
2020-01-25 15:30:19 -05:00
|
|
|
/// Whether or not the impl is permitted due to the trait being a `#[marker]` trait
|
2020-01-09 10:01:20 -05:00
|
|
|
marker: bool,
|
|
|
|
},
|
2019-01-03 23:46:46 +02:00
|
|
|
/// These impls are allowed to overlap, but that raises
|
|
|
|
/// an issue #33140 future-compatibility warning.
|
|
|
|
///
|
|
|
|
/// Some background: in Rust 1.0, the trait-object types `Send + Sync` (today's
|
|
|
|
/// `dyn Send + Sync`) and `Sync + Send` (now `dyn Sync + Send`) were different.
|
|
|
|
///
|
|
|
|
/// The widely-used version 0.1.0 of the crate `traitobject` had accidentally relied
|
|
|
|
/// that difference, making what reduces to the following set of impls:
|
|
|
|
///
|
|
|
|
/// ```
|
|
|
|
/// trait Trait {}
|
|
|
|
/// impl Trait for dyn Send + Sync {}
|
|
|
|
/// impl Trait for dyn Sync + Send {}
|
|
|
|
/// ```
|
|
|
|
///
|
|
|
|
/// Obviously, once we made these types be identical, that code causes a coherence
|
|
|
|
/// error and a fairly big headache for us. However, luckily for us, the trait
|
|
|
|
/// `Trait` used in this case is basically a marker trait, and therefore having
|
|
|
|
/// overlapping impls for it is sound.
|
|
|
|
///
|
|
|
|
/// To handle this, we basically regard the trait as a marker trait, with an additional
|
|
|
|
/// future-compatibility warning. To avoid accidentally "stabilizing" this feature,
|
|
|
|
/// it has the following restrictions:
|
|
|
|
///
|
|
|
|
/// 1. The trait must indeed be a marker-like trait (i.e., no items), and must be
|
|
|
|
/// positive impls.
|
|
|
|
/// 2. The trait-ref of both impls must be equal.
|
|
|
|
/// 3. The trait-ref of both impls must be a trait object type consisting only of
|
|
|
|
/// marker traits.
|
|
|
|
/// 4. Neither of the impls can have any where-clauses.
|
|
|
|
///
|
|
|
|
/// Once `traitobject` 0.1.0 is no longer an active concern, this hack can be removed.
|
2019-12-22 17:42:04 -05:00
|
|
|
Issue33140,
|
2019-01-03 23:46:46 +02:00
|
|
|
}
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
impl<'tcx> TyCtxt<'tcx> {
|
2020-07-17 08:47:04 +00:00
|
|
|
pub fn typeck_body(self, body: hir::BodyId) -> &'tcx TypeckResults<'tcx> {
|
|
|
|
self.typeck(self.hir().body_owner_def_id(body))
|
2017-01-06 21:54:24 +02:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Returns an iterator of the `DefId`s for all body-owners in this
|
2017-04-25 15:56:02 -04:00
|
|
|
/// crate. If you would prefer to iterate over the bodies
|
2018-12-04 13:45:36 +01:00
|
|
|
/// themselves, you can do `self.hir().krate().body_ids.iter()`.
|
2020-04-08 14:53:06 +01:00
|
|
|
pub fn body_owners(self) -> impl Iterator<Item = LocalDefId> + Captures<'tcx> + 'tcx {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.hir()
|
|
|
|
.krate()
|
|
|
|
.body_ids
|
|
|
|
.iter()
|
|
|
|
.map(move |&body_id| self.hir().body_owner_def_id(body_id))
|
2017-04-25 15:56:02 -04:00
|
|
|
}
|
|
|
|
|
2020-04-08 14:53:06 +01:00
|
|
|
pub fn par_body_owners<F: Fn(LocalDefId) + sync::Sync + sync::Send>(self, f: F) {
|
2019-12-22 17:42:04 -05:00
|
|
|
par_iter(&self.hir().krate().body_ids)
|
|
|
|
.for_each(|&body_id| f(self.hir().body_owner_def_id(body_id)));
|
2018-03-15 10:05:33 +01:00
|
|
|
}
|
|
|
|
|
2020-02-17 13:09:01 -08:00
|
|
|
pub fn provided_trait_methods(self, id: DefId) -> impl 'tcx + Iterator<Item = &'tcx AssocItem> {
|
2016-11-10 02:06:34 +02:00
|
|
|
self.associated_items(id)
|
2020-02-17 13:09:01 -08:00
|
|
|
.in_definition_order()
|
2020-04-01 10:09:50 +08:00
|
|
|
.filter(|item| item.kind == AssocKind::Fn && item.defaultness.has_value())
|
2015-06-25 23:42:17 +03:00
|
|
|
}
|
|
|
|
|
2019-09-04 10:17:59 -07:00
|
|
|
pub fn opt_item_name(self, def_id: DefId) -> Option<Ident> {
|
2020-04-12 13:45:41 +01:00
|
|
|
def_id
|
|
|
|
.as_local()
|
2020-08-12 12:22:56 +02:00
|
|
|
.and_then(|def_id| self.hir().get(self.hir().local_def_id_to_hir_id(def_id)).ident())
|
2019-09-04 10:17:59 -07:00
|
|
|
}
|
|
|
|
|
2020-04-15 00:07:31 +02:00
|
|
|
pub fn opt_associated_item(self, def_id: DefId) -> Option<&'tcx AssocItem> {
|
2020-04-12 13:45:41 +01:00
|
|
|
let is_associated_item = if let Some(def_id) = def_id.as_local() {
|
2020-08-12 12:22:56 +02:00
|
|
|
match self.hir().get(self.hir().local_def_id_to_hir_id(def_id)) {
|
2018-08-25 15:56:16 +01:00
|
|
|
Node::TraitItem(_) | Node::ImplItem(_) => true,
|
2017-04-18 10:54:47 -04:00
|
|
|
_ => false,
|
|
|
|
}
|
|
|
|
} else {
|
2020-02-17 15:36:36 -08:00
|
|
|
match self.def_kind(def_id) {
|
2020-04-17 21:55:17 +03:00
|
|
|
DefKind::AssocConst | DefKind::AssocFn | DefKind::AssocTy => true,
|
2017-04-18 10:54:47 -04:00
|
|
|
_ => false,
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-12-06 12:18:32 +00:00
|
|
|
is_associated_item.then(|| self.associated_item(def_id))
|
2017-04-18 10:54:47 -04:00
|
|
|
}
|
|
|
|
|
2020-07-17 08:47:04 +00:00
|
|
|
pub fn field_index(self, hir_id: hir::HirId, typeck_results: &TypeckResults<'_>) -> usize {
|
|
|
|
typeck_results.field_indices().get(hir_id).cloned().expect("no index for a field")
|
2018-04-05 03:20:21 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn find_field_index(self, ident: Ident, variant: &VariantDef) -> Option<usize> {
|
2019-12-22 17:42:04 -05:00
|
|
|
variant.fields.iter().position(|field| self.hygienic_eq(ident, field.ident, variant.def_id))
|
2018-04-05 03:20:21 +03:00
|
|
|
}
|
|
|
|
|
2018-11-01 19:43:38 +00:00
|
|
|
/// Returns `true` if the impls are the same polarity and the trait either
|
2020-05-01 22:28:15 +02:00
|
|
|
/// has no items or is annotated `#[marker]` and prevents item overrides.
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn impls_are_allowed_to_overlap(
|
|
|
|
self,
|
|
|
|
def_id1: DefId,
|
|
|
|
def_id2: DefId,
|
|
|
|
) -> Option<ImplOverlapKind> {
|
2019-09-14 19:26:49 -04:00
|
|
|
// If either trait impl references an error, they're allowed to overlap,
|
|
|
|
// as one of them essentially doesn't exist.
|
2019-12-22 17:42:04 -05:00
|
|
|
if self.impl_trait_ref(def_id1).map_or(false, |tr| tr.references_error())
|
|
|
|
|| self.impl_trait_ref(def_id2).map_or(false, |tr| tr.references_error())
|
|
|
|
{
|
2020-01-09 10:01:20 -05:00
|
|
|
return Some(ImplOverlapKind::Permitted { marker: false });
|
2019-09-14 19:26:49 -04:00
|
|
|
}
|
|
|
|
|
2019-07-14 00:09:46 +03:00
|
|
|
match (self.impl_polarity(def_id1), self.impl_polarity(def_id2)) {
|
2019-12-22 17:42:04 -05:00
|
|
|
(ImplPolarity::Reservation, _) | (_, ImplPolarity::Reservation) => {
|
2019-07-14 00:09:46 +03:00
|
|
|
// `#[rustc_reservation_impl]` impls don't overlap with anything
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"impls_are_allowed_to_overlap({:?}, {:?}) = Some(Permitted) (reservations)",
|
|
|
|
def_id1, def_id2
|
|
|
|
);
|
2020-01-09 10:01:20 -05:00
|
|
|
return Some(ImplOverlapKind::Permitted { marker: false });
|
2019-07-14 00:09:46 +03:00
|
|
|
}
|
2019-12-22 17:42:04 -05:00
|
|
|
(ImplPolarity::Positive, ImplPolarity::Negative)
|
|
|
|
| (ImplPolarity::Negative, ImplPolarity::Positive) => {
|
2019-07-27 20:44:14 +03:00
|
|
|
// `impl AutoTrait for Type` + `impl !AutoTrait for Type`
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"impls_are_allowed_to_overlap({:?}, {:?}) - None (differing polarities)",
|
|
|
|
def_id1, def_id2
|
|
|
|
);
|
2019-07-14 00:09:46 +03:00
|
|
|
return None;
|
|
|
|
}
|
2019-12-22 17:42:04 -05:00
|
|
|
(ImplPolarity::Positive, ImplPolarity::Positive)
|
|
|
|
| (ImplPolarity::Negative, ImplPolarity::Negative) => {}
|
2019-07-14 00:09:46 +03:00
|
|
|
};
|
2019-07-13 18:02:00 +03:00
|
|
|
|
2020-01-25 15:30:19 -05:00
|
|
|
let is_marker_overlap = {
|
2018-08-25 04:33:58 -07:00
|
|
|
let is_marker_impl = |def_id: DefId| -> bool {
|
|
|
|
let trait_ref = self.impl_trait_ref(def_id);
|
|
|
|
trait_ref.map_or(false, |tr| self.trait_def(tr.def_id).is_marker)
|
|
|
|
};
|
2019-07-13 18:02:00 +03:00
|
|
|
is_marker_impl(def_id1) && is_marker_impl(def_id2)
|
2019-01-03 23:46:46 +02:00
|
|
|
};
|
|
|
|
|
2019-07-14 00:09:46 +03:00
|
|
|
if is_marker_overlap {
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"impls_are_allowed_to_overlap({:?}, {:?}) = Some(Permitted) (marker overlap)",
|
|
|
|
def_id1, def_id2
|
|
|
|
);
|
2020-01-09 10:01:20 -05:00
|
|
|
Some(ImplOverlapKind::Permitted { marker: true })
|
2019-01-03 23:46:46 +02:00
|
|
|
} else {
|
|
|
|
if let Some(self_ty1) = self.issue33140_self_ty(def_id1) {
|
|
|
|
if let Some(self_ty2) = self.issue33140_self_ty(def_id2) {
|
|
|
|
if self_ty1 == self_ty2 {
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"impls_are_allowed_to_overlap({:?}, {:?}) - issue #33140 HACK",
|
|
|
|
def_id1, def_id2
|
|
|
|
);
|
2019-01-03 23:46:46 +02:00
|
|
|
return Some(ImplOverlapKind::Issue33140);
|
|
|
|
} else {
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!(
|
|
|
|
"impls_are_allowed_to_overlap({:?}, {:?}) - found {:?} != {:?}",
|
|
|
|
def_id1, def_id2, self_ty1, self_ty2
|
|
|
|
);
|
2019-01-03 23:46:46 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-22 17:42:04 -05:00
|
|
|
debug!("impls_are_allowed_to_overlap({:?}, {:?}) = None", def_id1, def_id2);
|
2019-01-03 23:46:46 +02:00
|
|
|
None
|
2017-03-17 14:16:29 -04:00
|
|
|
}
|
2017-02-25 16:16:27 -05:00
|
|
|
}
|
|
|
|
|
2019-04-20 19:36:05 +03:00
|
|
|
/// Returns `ty::VariantDef` if `res` refers to a struct,
|
2019-03-22 17:19:12 +01:00
|
|
|
/// or variant or their constructors, panics otherwise.
|
2019-04-20 19:36:05 +03:00
|
|
|
pub fn expect_variant_res(self, res: Res) -> &'tcx VariantDef {
|
|
|
|
match res {
|
|
|
|
Res::Def(DefKind::Variant, did) => {
|
2018-12-19 12:20:59 +02:00
|
|
|
let enum_did = self.parent(did).unwrap();
|
2019-03-24 12:09:44 +03:00
|
|
|
self.adt_def(enum_did).variant_with_id(did)
|
2016-06-11 18:47:47 +03:00
|
|
|
}
|
2020-04-16 17:38:52 -07:00
|
|
|
Res::Def(DefKind::Struct | DefKind::Union, did) => self.adt_def(did).non_enum_variant(),
|
2019-04-20 19:36:05 +03:00
|
|
|
Res::Def(DefKind::Ctor(CtorOf::Variant, ..), variant_ctor_did) => {
|
2019-03-21 23:38:50 +01:00
|
|
|
let variant_did = self.parent(variant_ctor_did).unwrap();
|
|
|
|
let enum_did = self.parent(variant_did).unwrap();
|
|
|
|
self.adt_def(enum_did).variant_with_ctor_id(variant_ctor_did)
|
|
|
|
}
|
2019-04-20 19:36:05 +03:00
|
|
|
Res::Def(DefKind::Ctor(CtorOf::Struct, ..), ctor_did) => {
|
2019-03-21 23:38:50 +01:00
|
|
|
let struct_did = self.parent(ctor_did).expect("struct ctor has no parent");
|
|
|
|
self.adt_def(struct_did).non_enum_variant()
|
2016-06-11 18:47:47 +03:00
|
|
|
}
|
2019-12-22 17:42:04 -05:00
|
|
|
_ => bug!("expect_variant_res used with unexpected res {:?}", res),
|
2016-06-11 18:47:47 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-15 06:32:44 +10:00
|
|
|
pub fn item_name(self, id: DefId) -> Symbol {
|
2017-11-29 15:24:18 +01:00
|
|
|
if id.index == CRATE_DEF_INDEX {
|
2019-05-15 06:32:44 +10:00
|
|
|
self.original_crate_name(id.krate)
|
2015-08-12 20:22:25 +02:00
|
|
|
} else {
|
2017-09-07 13:21:46 -07:00
|
|
|
let def_key = self.def_key(id);
|
2019-03-21 23:38:50 +01:00
|
|
|
match def_key.disambiguated_data.data {
|
2019-03-24 17:49:58 +03:00
|
|
|
// The name of a constructor is that of its parent.
|
2020-03-24 09:09:42 +01:00
|
|
|
rustc_hir::definitions::DefPathData::Ctor => {
|
2019-12-22 17:42:04 -05:00
|
|
|
self.item_name(DefId { krate: id.krate, index: def_key.parent.unwrap() })
|
|
|
|
}
|
2019-03-21 23:38:50 +01:00
|
|
|
_ => def_key.disambiguated_data.data.get_opt_name().unwrap_or_else(|| {
|
2016-09-17 13:34:55 +03:00
|
|
|
bug!("item_name: no name for {:?}", self.def_path(id));
|
2019-10-21 14:25:08 +11:00
|
|
|
}),
|
2016-09-17 13:34:55 +03:00
|
|
|
}
|
2015-08-12 20:22:25 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Returns the possibly-auto-generated MIR of a `(DefId, Subst)` pair.
|
2020-04-12 10:31:00 -07:00
|
|
|
pub fn instance_mir(self, instance: ty::InstanceDef<'tcx>) -> &'tcx Body<'tcx> {
|
2017-02-08 18:31:03 +01:00
|
|
|
match instance {
|
2020-07-03 20:38:31 +02:00
|
|
|
ty::InstanceDef::Item(def) => {
|
2020-07-08 01:03:19 +02:00
|
|
|
if let Some((did, param_did)) = def.as_const_arg() {
|
|
|
|
self.optimized_mir_of_const_arg((did, param_did))
|
2020-07-03 20:38:31 +02:00
|
|
|
} else {
|
|
|
|
self.optimized_mir(def.did)
|
|
|
|
}
|
|
|
|
}
|
2019-12-22 17:42:04 -05:00
|
|
|
ty::InstanceDef::VtableShim(..)
|
|
|
|
| ty::InstanceDef::ReifyShim(..)
|
|
|
|
| ty::InstanceDef::Intrinsic(..)
|
|
|
|
| ty::InstanceDef::FnPtrShim(..)
|
|
|
|
| ty::InstanceDef::Virtual(..)
|
|
|
|
| ty::InstanceDef::ClosureOnceShim { .. }
|
|
|
|
| ty::InstanceDef::DropGlue(..)
|
2020-04-12 10:31:00 -07:00
|
|
|
| ty::InstanceDef::CloneShim(..) => self.mir_shims(instance),
|
2017-02-08 18:31:03 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Gets the attributes of a definition.
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn get_attrs(self, did: DefId) -> Attributes<'tcx> {
|
2020-04-12 13:45:41 +01:00
|
|
|
if let Some(did) = did.as_local() {
|
2020-08-12 12:22:56 +02:00
|
|
|
self.hir().attrs(self.hir().local_def_id_to_hir_id(did))
|
2015-06-25 23:42:17 +03:00
|
|
|
} else {
|
2020-03-14 17:43:27 +01:00
|
|
|
self.item_attrs(did)
|
2015-06-25 23:42:17 +03:00
|
|
|
}
|
2013-04-10 22:47:22 +10:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Determines whether an item is annotated with an attribute.
|
2019-05-08 13:21:18 +10:00
|
|
|
pub fn has_attr(self, did: DefId, attr: Symbol) -> bool {
|
2020-07-30 11:27:50 +10:00
|
|
|
self.sess.contains_name(&self.get_attrs(did), attr)
|
2015-06-25 23:42:17 +03:00
|
|
|
}
|
2013-05-24 18:08:45 -04:00
|
|
|
|
2018-11-01 19:43:38 +00:00
|
|
|
/// Returns `true` if this is an `auto trait`.
|
2017-10-16 17:33:45 -02:00
|
|
|
pub fn trait_is_auto(self, trait_def_id: DefId) -> bool {
|
2017-10-09 13:59:20 -03:00
|
|
|
self.trait_def(trait_def_id).has_auto_impl
|
2015-06-25 23:42:17 +03:00
|
|
|
}
|
2014-02-05 17:31:33 +13:00
|
|
|
|
2016-12-26 14:34:03 +01:00
|
|
|
pub fn generator_layout(self, def_id: DefId) -> &'tcx GeneratorLayout<'tcx> {
|
2019-11-06 00:04:53 -05:00
|
|
|
self.optimized_mir(def_id).generator_layout.as_ref().unwrap()
|
2016-12-26 14:34:03 +01:00
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Given the `DefId` of an impl, returns the `DefId` of the trait it implements.
|
|
|
|
/// If it implements no trait, returns `None`.
|
2016-05-03 04:56:42 +03:00
|
|
|
pub fn trait_id_of_impl(self, def_id: DefId) -> Option<DefId> {
|
2015-06-25 23:42:17 +03:00
|
|
|
self.impl_trait_ref(def_id).map(|tr| tr.def_id)
|
2014-02-05 17:31:33 +13:00
|
|
|
}
|
2015-06-25 23:42:17 +03:00
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// If the given defid describes a method belonging to an impl, returns the
|
|
|
|
/// `DefId` of the impl that the method belongs to; otherwise, returns `None`.
|
2016-05-03 04:56:42 +03:00
|
|
|
pub fn impl_of_method(self, def_id: DefId) -> Option<DefId> {
|
2020-03-22 16:59:02 -07:00
|
|
|
self.opt_associated_item(def_id).and_then(|trait_item| match trait_item.container {
|
2019-12-22 17:42:04 -05:00
|
|
|
TraitContainer(_) => None,
|
|
|
|
ImplContainer(def_id) => Some(def_id),
|
|
|
|
})
|
2013-08-23 14:34:00 -07:00
|
|
|
}
|
|
|
|
|
2015-12-29 10:55:34 -08:00
|
|
|
/// Looks up the span of `impl_did` if the impl is local; otherwise returns `Err`
|
|
|
|
/// with the name of the crate containing the impl.
|
2016-11-16 10:52:37 +00:00
|
|
|
pub fn span_of_impl(self, impl_did: DefId) -> Result<Span, Symbol> {
|
2020-04-12 13:45:41 +01:00
|
|
|
if let Some(impl_did) = impl_did.as_local() {
|
2020-08-12 12:22:56 +02:00
|
|
|
let hir_id = self.hir().local_def_id_to_hir_id(impl_did);
|
2019-06-14 18:58:55 +02:00
|
|
|
Ok(self.hir().span(hir_id))
|
2015-12-29 10:55:34 -08:00
|
|
|
} else {
|
2017-08-31 08:07:39 -07:00
|
|
|
Err(self.crate_name(impl_did.krate))
|
2015-12-29 10:55:34 -08:00
|
|
|
}
|
|
|
|
}
|
2017-03-24 23:03:15 +00:00
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// Hygienically compares a use-site name (`use_name`) for a field or an associated item with
|
|
|
|
/// its supposed definition name (`def_name`). The method also needs `DefId` of the supposed
|
|
|
|
/// definition's parent/scope to perform comparison.
|
2018-06-10 15:55:48 +03:00
|
|
|
pub fn hygienic_eq(self, use_name: Ident, def_name: Ident, def_parent_def_id: DefId) -> bool {
|
2019-05-28 06:19:23 +10:00
|
|
|
// We could use `Ident::eq` here, but we deliberately don't. The name
|
|
|
|
// comparison fails frequently, and we want to avoid the expensive
|
2020-03-14 01:36:46 +03:00
|
|
|
// `normalize_to_macros_2_0()` calls required for the span comparison whenever possible.
|
2019-12-22 17:42:04 -05:00
|
|
|
use_name.name == def_name.name
|
|
|
|
&& use_name
|
|
|
|
.span
|
|
|
|
.ctxt()
|
|
|
|
.hygienic_eq(def_name.span.ctxt(), self.expansion_that_defined(def_parent_def_id))
|
2017-03-24 23:03:15 +00:00
|
|
|
}
|
|
|
|
|
2019-07-16 01:04:05 +03:00
|
|
|
fn expansion_that_defined(self, scope: DefId) -> ExpnId {
|
2019-11-03 14:36:59 +02:00
|
|
|
match scope.as_local() {
|
|
|
|
Some(scope) => self.hir().definitions().expansion_that_defined(scope),
|
|
|
|
None => ExpnId::root(),
|
2019-05-28 07:43:05 +10:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn adjust_ident(self, mut ident: Ident, scope: DefId) -> Ident {
|
2020-03-14 01:36:46 +03:00
|
|
|
ident.span.normalize_to_macros_2_0_and_adjust(self.expansion_that_defined(scope));
|
2019-05-28 07:43:05 +10:00
|
|
|
ident
|
|
|
|
}
|
|
|
|
|
2019-12-22 17:42:04 -05:00
|
|
|
pub fn adjust_ident_and_get_scope(
|
|
|
|
self,
|
|
|
|
mut ident: Ident,
|
|
|
|
scope: DefId,
|
|
|
|
block: hir::HirId,
|
|
|
|
) -> (Ident, DefId) {
|
2020-03-14 01:36:46 +03:00
|
|
|
let scope =
|
|
|
|
match ident.span.normalize_to_macros_2_0_and_adjust(self.expansion_that_defined(scope))
|
|
|
|
{
|
|
|
|
Some(actual_expansion) => {
|
|
|
|
self.hir().definitions().parent_module_of_macro_def(actual_expansion)
|
|
|
|
}
|
2020-03-18 20:27:59 +02:00
|
|
|
None => self.parent_module(block).to_def_id(),
|
2020-03-14 01:36:46 +03:00
|
|
|
};
|
2017-03-24 23:03:15 +00:00
|
|
|
(ident, scope)
|
|
|
|
}
|
2020-02-19 17:59:24 +01:00
|
|
|
|
|
|
|
pub fn is_object_safe(self, key: DefId) -> bool {
|
|
|
|
self.object_safety_violations(key).is_empty()
|
|
|
|
}
|
2015-01-02 04:09:35 -05:00
|
|
|
}
|
2014-04-21 19:21:53 -04:00
|
|
|
|
2018-12-03 01:14:35 +01:00
|
|
|
#[derive(Clone, HashStable)]
|
2019-01-24 20:05:19 +01:00
|
|
|
pub struct AdtSizedConstraint<'tcx>(pub &'tcx [Ty<'tcx>]);
|
|
|
|
|
2018-10-12 01:50:03 +01:00
|
|
|
/// Yields the parent function's `DefId` if `def_id` is an `impl Trait` definition.
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn is_impl_trait_defn(tcx: TyCtxt<'_>, def_id: DefId) -> Option<DefId> {
|
2020-04-12 13:45:41 +01:00
|
|
|
if let Some(def_id) = def_id.as_local() {
|
2020-08-12 12:22:56 +02:00
|
|
|
if let Node::Item(item) = tcx.hir().get(tcx.hir().local_def_id_to_hir_id(def_id)) {
|
2019-09-26 17:51:36 +01:00
|
|
|
if let hir::ItemKind::OpaqueTy(ref opaque_ty) = item.kind {
|
2019-08-02 00:08:05 +01:00
|
|
|
return opaque_ty.impl_trait_fn;
|
2018-07-17 13:44:42 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None
|
|
|
|
}
|
|
|
|
|
2020-07-05 23:00:14 +03:00
|
|
|
pub fn provide(providers: &mut ty::query::Providers) {
|
2017-08-29 11:10:22 -07:00
|
|
|
context::provide(providers);
|
2017-10-17 11:24:46 -04:00
|
|
|
erase_regions::provide(providers);
|
2017-09-13 02:19:11 +03:00
|
|
|
layout::provide(providers);
|
2020-04-11 00:50:02 -04:00
|
|
|
util::provide(providers);
|
2020-09-02 10:40:56 +03:00
|
|
|
print::provide(providers);
|
2020-03-12 18:07:58 -05:00
|
|
|
super::util::bug::provide(providers);
|
2020-02-08 04:14:29 +01:00
|
|
|
*providers = ty::query::Providers {
|
|
|
|
trait_impls_of: trait_def::trait_impls_of_provider,
|
|
|
|
all_local_trait_impls: trait_def::all_local_trait_impls,
|
|
|
|
..*providers
|
|
|
|
};
|
2017-04-15 15:40:38 +03:00
|
|
|
}
|
|
|
|
|
2017-03-20 18:35:16 -04:00
|
|
|
/// A map for the local crate mapping each type to a vector of its
|
|
|
|
/// inherent impls. This is not meant to be used outside of coherence;
|
|
|
|
/// rather, you should request the vector for a specific type via
|
2017-04-24 18:06:39 +03:00
|
|
|
/// `tcx.inherent_impls(def_id)` so as to minimize your dependencies
|
|
|
|
/// (constructing this map requires touching the entire crate).
|
2018-12-03 01:14:35 +01:00
|
|
|
#[derive(Clone, Debug, Default, HashStable)]
|
2017-03-20 18:35:16 -04:00
|
|
|
pub struct CrateInherentImpls {
|
2018-11-30 15:19:12 +01:00
|
|
|
pub inherent_impls: DefIdMap<Vec<DefId>>,
|
2017-03-20 18:35:16 -04:00
|
|
|
}
|
2017-04-23 17:43:23 +03:00
|
|
|
|
2020-06-11 15:49:57 +01:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash, TyEncodable, HashStable)]
|
2020-07-10 15:45:05 +10:00
|
|
|
pub struct SymbolName<'tcx> {
|
|
|
|
/// `&str` gives a consistent ordering, which ensures reproducible builds.
|
|
|
|
pub name: &'tcx str,
|
2017-04-24 19:35:47 +03:00
|
|
|
}
|
|
|
|
|
2020-07-10 15:45:05 +10:00
|
|
|
impl<'tcx> SymbolName<'tcx> {
|
|
|
|
pub fn new(tcx: TyCtxt<'tcx>, name: &str) -> SymbolName<'tcx> {
|
|
|
|
SymbolName {
|
|
|
|
name: unsafe { str::from_utf8_unchecked(tcx.arena.alloc_slice(name.as_bytes())) },
|
|
|
|
}
|
2019-10-21 15:53:37 +11:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-10 15:45:05 +10:00
|
|
|
impl<'tcx> fmt::Display for SymbolName<'tcx> {
|
|
|
|
fn fmt(&self, fmt: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
|
|
fmt::Display::fmt(&self.name, fmt)
|
2019-10-21 15:53:37 +11:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-10 15:45:05 +10:00
|
|
|
impl<'tcx> fmt::Debug for SymbolName<'tcx> {
|
2018-08-29 22:02:42 -07:00
|
|
|
fn fmt(&self, fmt: &mut fmt::Formatter<'_>) -> fmt::Result {
|
2017-04-24 19:35:47 +03:00
|
|
|
fmt::Display::fmt(&self.name, fmt)
|
|
|
|
}
|
|
|
|
}
|