2020-03-05 18:07:42 -03:00
|
|
|
//! Trait Resolution. See the [rustc dev guide] for more information on how this works.
|
2018-02-25 15:24:14 -06:00
|
|
|
//!
|
2020-03-09 18:33:04 -03:00
|
|
|
//! [rustc dev guide]: https://rustc-dev-guide.rust-lang.org/traits/resolution.html
|
2014-09-12 10:53:35 -04:00
|
|
|
|
2018-11-27 02:59:49 +00:00
|
|
|
#[allow(dead_code)]
|
|
|
|
pub mod auto_trait;
|
2020-03-03 11:25:03 -05:00
|
|
|
mod chalk_fulfill;
|
2019-12-24 17:38:22 -05:00
|
|
|
pub mod codegen;
|
2018-11-27 02:59:49 +00:00
|
|
|
mod coherence;
|
|
|
|
mod engine;
|
2019-12-24 17:38:22 -05:00
|
|
|
pub mod error_reporting;
|
2018-11-27 02:59:49 +00:00
|
|
|
mod fulfill;
|
2020-01-07 19:36:50 +01:00
|
|
|
pub mod misc;
|
2018-11-27 02:59:49 +00:00
|
|
|
mod object_safety;
|
|
|
|
mod on_unimplemented;
|
2019-12-24 17:38:22 -05:00
|
|
|
mod project;
|
|
|
|
pub mod query;
|
2018-11-27 02:59:49 +00:00
|
|
|
mod select;
|
|
|
|
mod specialize;
|
2020-01-05 23:02:07 +01:00
|
|
|
mod structural_match;
|
2018-11-27 02:59:49 +00:00
|
|
|
mod util;
|
2020-01-05 20:52:34 +01:00
|
|
|
pub mod wf;
|
2014-11-06 00:05:53 -08:00
|
|
|
|
2019-02-05 11:20:45 -06:00
|
|
|
use crate::infer::outlives::env::OutlivesEnvironment;
|
2020-02-15 12:11:59 +00:00
|
|
|
use crate::infer::{InferCtxt, RegionckMode, TyCtxtInferExt};
|
2020-02-22 11:44:18 +01:00
|
|
|
use crate::traits::error_reporting::InferCtxtExt as _;
|
|
|
|
use crate::traits::query::evaluate_obligation::InferCtxtExt as _;
|
2020-03-31 21:18:30 +02:00
|
|
|
use rustc_errors::ErrorReported;
|
2020-03-29 17:19:48 +02:00
|
|
|
use rustc_hir as hir;
|
|
|
|
use rustc_hir::def_id::DefId;
|
2020-03-29 16:41:09 +02:00
|
|
|
use rustc_middle::ty::fold::TypeFoldable;
|
|
|
|
use rustc_middle::ty::subst::{InternalSubsts, SubstsRef};
|
2020-05-14 23:07:46 +08:00
|
|
|
use rustc_middle::ty::{
|
|
|
|
self, GenericParamDefKind, ParamEnv, ToPredicate, Ty, TyCtxt, WithConstness,
|
|
|
|
};
|
2020-04-12 18:42:45 +01:00
|
|
|
use rustc_span::Span;
|
2015-09-24 19:58:00 +03:00
|
|
|
|
2018-12-07 01:40:42 +00:00
|
|
|
use std::fmt::Debug;
|
|
|
|
|
2018-11-27 02:59:49 +00:00
|
|
|
pub use self::FulfillmentErrorCode::*;
|
2020-05-11 15:25:33 +00:00
|
|
|
pub use self::ImplSource::*;
|
2020-01-06 20:13:24 +01:00
|
|
|
pub use self::ObligationCauseCode::*;
|
|
|
|
pub use self::SelectionError::*;
|
2014-09-12 10:53:35 -04:00
|
|
|
|
2018-11-20 11:20:05 -05:00
|
|
|
pub use self::coherence::{add_placeholder_note, orphan_check, overlapping_impls};
|
|
|
|
pub use self::coherence::{OrphanCheckErr, OverlapResult};
|
2020-02-22 11:44:18 +01:00
|
|
|
pub use self::engine::TraitEngineExt;
|
2018-03-11 10:29:22 +08:00
|
|
|
pub use self::fulfill::{FulfillmentContext, PendingPredicateObligation};
|
2020-01-05 18:07:29 +01:00
|
|
|
pub use self::object_safety::astconv_object_safety_violations;
|
|
|
|
pub use self::object_safety::is_vtable_safe_method;
|
2014-12-15 21:11:09 -05:00
|
|
|
pub use self::object_safety::MethodViolationCode;
|
2019-12-24 17:38:22 -05:00
|
|
|
pub use self::object_safety::ObjectSafetyViolation;
|
2017-08-30 23:40:43 +03:00
|
|
|
pub use self::on_unimplemented::{OnUnimplementedDirective, OnUnimplementedNote};
|
2020-08-13 20:45:08 +01:00
|
|
|
pub use self::project::{normalize, normalize_projection_type, normalize_to};
|
2020-01-06 20:13:24 +01:00
|
|
|
pub use self::select::{EvaluationCache, SelectionCache, SelectionContext};
|
|
|
|
pub use self::select::{EvaluationResult, IntercrateAmbiguityCause, OverflowError};
|
2018-12-03 23:27:25 +02:00
|
|
|
pub use self::specialize::specialization_graph::FutureCompatOverlapError;
|
|
|
|
pub use self::specialize::specialization_graph::FutureCompatOverlapErrorKind;
|
2019-12-24 17:38:22 -05:00
|
|
|
pub use self::specialize::{specialization_graph, translate_substs, OverlapError};
|
2020-01-05 23:02:07 +01:00
|
|
|
pub use self::structural_match::search_for_structural_match_violation;
|
|
|
|
pub use self::structural_match::NonStructuralMatchTy;
|
2018-11-05 02:02:43 +00:00
|
|
|
pub use self::util::{elaborate_predicates, elaborate_trait_ref, elaborate_trait_refs};
|
2019-12-24 17:38:22 -05:00
|
|
|
pub use self::util::{expand_trait_aliases, TraitAliasExpander};
|
2020-01-05 20:27:00 +01:00
|
|
|
pub use self::util::{
|
2020-03-29 00:57:49 +01:00
|
|
|
get_vtable_index_of_object_method, impl_item_is_final, predicate_for_trait_def, upcast_choices,
|
2020-01-05 20:27:00 +01:00
|
|
|
};
|
2019-04-29 03:58:24 +01:00
|
|
|
pub use self::util::{
|
2019-12-24 17:38:22 -05:00
|
|
|
supertrait_def_ids, supertraits, transitive_bounds, SupertraitDefIds, Supertraits,
|
2019-04-29 03:58:24 +01:00
|
|
|
};
|
2014-09-12 10:53:35 -04:00
|
|
|
|
2020-03-03 11:25:03 -05:00
|
|
|
pub use self::chalk_fulfill::FulfillmentContext as ChalkFulfillmentContext;
|
|
|
|
|
2020-02-22 11:44:18 +01:00
|
|
|
pub use rustc_infer::traits::*;
|
2018-02-25 10:58:54 -05:00
|
|
|
|
2020-01-24 15:57:01 -05:00
|
|
|
/// Whether to skip the leak check, as part of a future compatibility warning step.
|
|
|
|
#[derive(Copy, Clone, PartialEq, Eq, Debug)]
|
|
|
|
pub enum SkipLeakCheck {
|
|
|
|
Yes,
|
|
|
|
No,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl SkipLeakCheck {
|
|
|
|
fn is_yes(self) -> bool {
|
|
|
|
self == SkipLeakCheck::Yes
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// The "default" for skip-leak-check corresponds to the current
|
|
|
|
/// behavior (do not skip the leak check) -- not the behavior we are
|
|
|
|
/// transitioning into.
|
|
|
|
impl Default for SkipLeakCheck {
|
|
|
|
fn default() -> Self {
|
|
|
|
SkipLeakCheck::No
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// The mode that trait queries run in.
|
2020-01-16 18:47:52 -05:00
|
|
|
#[derive(Copy, Clone, PartialEq, Eq, Debug)]
|
2018-04-19 02:28:03 -05:00
|
|
|
pub enum TraitQueryMode {
|
|
|
|
// Standard/un-canonicalized queries get accurate
|
|
|
|
// spans etc. passed in and hence can do reasonable
|
|
|
|
// error reporting on their own.
|
|
|
|
Standard,
|
|
|
|
// Canonicalized queries get dummy spans and hence
|
|
|
|
// must generally propagate errors to
|
|
|
|
// pre-canonicalization callsites.
|
|
|
|
Canonical,
|
|
|
|
}
|
|
|
|
|
2014-12-07 11:10:48 -05:00
|
|
|
/// Creates predicate obligations from the generic bounds.
|
2019-08-25 21:58:59 -07:00
|
|
|
pub fn predicates_for_generics<'tcx>(
|
|
|
|
cause: ObligationCause<'tcx>,
|
|
|
|
param_env: ty::ParamEnv<'tcx>,
|
2020-04-18 15:09:28 -07:00
|
|
|
generic_bounds: ty::InstantiatedPredicates<'tcx>,
|
|
|
|
) -> impl Iterator<Item = PredicateObligation<'tcx>> {
|
2017-05-23 04:19:47 -04:00
|
|
|
util::predicates_for_generics(cause, 0, param_env, generic_bounds)
|
2014-09-12 10:53:35 -04:00
|
|
|
}
|
|
|
|
|
2014-12-18 09:26:10 -05:00
|
|
|
/// Determines whether the type `ty` is known to meet `bound` and
|
|
|
|
/// returns true if so. Returns false if `ty` either does not meet
|
|
|
|
/// `bound` or is not known to meet bound (note that this is
|
|
|
|
/// conservative towards *no impl*, which is the opposite of the
|
|
|
|
/// `evaluate` methods).
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn type_known_to_meet_bound_modulo_regions<'a, 'tcx>(
|
|
|
|
infcx: &InferCtxt<'a, 'tcx>,
|
2018-09-20 13:56:11 -04:00
|
|
|
param_env: ty::ParamEnv<'tcx>,
|
|
|
|
ty: Ty<'tcx>,
|
|
|
|
def_id: DefId,
|
|
|
|
span: Span,
|
|
|
|
) -> bool {
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!(
|
|
|
|
"type_known_to_meet_bound_modulo_regions(ty={:?}, bound={:?})",
|
|
|
|
ty,
|
|
|
|
infcx.tcx.def_path_str(def_id)
|
|
|
|
);
|
2016-11-13 19:42:15 -07:00
|
|
|
|
2019-12-24 17:38:22 -05:00
|
|
|
let trait_ref = ty::TraitRef { def_id, substs: infcx.tcx.mk_substs_trait(ty, &[]) };
|
2016-11-13 19:42:15 -07:00
|
|
|
let obligation = Obligation {
|
2017-05-23 04:19:47 -04:00
|
|
|
param_env,
|
2020-04-12 18:42:45 +01:00
|
|
|
cause: ObligationCause::misc(span, hir::CRATE_HIR_ID),
|
2016-11-13 19:42:15 -07:00
|
|
|
recursion_depth: 0,
|
2020-05-07 10:12:19 +00:00
|
|
|
predicate: trait_ref.without_const().to_predicate(infcx.tcx),
|
2016-11-13 19:42:15 -07:00
|
|
|
};
|
|
|
|
|
2018-09-20 13:56:11 -04:00
|
|
|
let result = infcx.predicate_must_hold_modulo_regions(&obligation);
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!(
|
|
|
|
"type_known_to_meet_ty={:?} bound={} => {:?}",
|
|
|
|
ty,
|
|
|
|
infcx.tcx.def_path_str(def_id),
|
|
|
|
result
|
|
|
|
);
|
2015-10-21 19:01:58 +03:00
|
|
|
|
2020-02-22 14:10:17 +00:00
|
|
|
if result && ty.has_infer_types_or_consts() {
|
2015-10-21 19:01:58 +03:00
|
|
|
// Because of inference "guessing", selection can sometimes claim
|
|
|
|
// to succeed while the success requires a guess. To ensure
|
|
|
|
// this function's result remains infallible, we must confirm
|
|
|
|
// that guess. While imperfect, I believe this is sound.
|
|
|
|
|
2017-11-23 23:21:56 +02:00
|
|
|
// The handling of regions in this area of the code is terrible,
|
|
|
|
// see issue #29149. We should be able to improve on this with
|
|
|
|
// NLL.
|
2017-11-23 23:03:47 +02:00
|
|
|
let mut fulfill_cx = FulfillmentContext::new_ignoring_regions();
|
2015-10-21 19:01:58 +03:00
|
|
|
|
|
|
|
// We can use a dummy node-id here because we won't pay any mind
|
|
|
|
// to region obligations that arise (there shouldn't really be any
|
|
|
|
// anyhow).
|
2020-04-12 18:42:45 +01:00
|
|
|
let cause = ObligationCause::misc(span, hir::CRATE_HIR_ID);
|
2014-12-18 09:26:10 -05:00
|
|
|
|
2017-05-23 04:19:47 -04:00
|
|
|
fulfill_cx.register_bound(infcx, param_env, ty, def_id, cause);
|
2015-10-21 19:01:58 +03:00
|
|
|
|
|
|
|
// Note: we only assume something is `Copy` if we can
|
|
|
|
// *definitively* show that it implements `Copy`. Otherwise,
|
|
|
|
// assume it is move; linear is always ok.
|
|
|
|
match fulfill_cx.select_all_or_error(infcx) {
|
|
|
|
Ok(()) => {
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!(
|
|
|
|
"type_known_to_meet_bound_modulo_regions: ty={:?} bound={} success",
|
|
|
|
ty,
|
|
|
|
infcx.tcx.def_path_str(def_id)
|
|
|
|
);
|
2015-10-21 19:01:58 +03:00
|
|
|
true
|
|
|
|
}
|
|
|
|
Err(e) => {
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!(
|
|
|
|
"type_known_to_meet_bound_modulo_regions: ty={:?} bound={} errors={:?}",
|
|
|
|
ty,
|
|
|
|
infcx.tcx.def_path_str(def_id),
|
|
|
|
e
|
|
|
|
);
|
2015-10-21 19:01:58 +03:00
|
|
|
false
|
|
|
|
}
|
2015-01-02 04:01:30 -05:00
|
|
|
}
|
2015-10-21 19:01:58 +03:00
|
|
|
} else {
|
|
|
|
result
|
2015-01-02 04:01:30 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-12 00:11:55 +03:00
|
|
|
fn do_normalize_predicates<'tcx>(
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
region_context: DefId,
|
|
|
|
cause: ObligationCause<'tcx>,
|
|
|
|
elaborated_env: ty::ParamEnv<'tcx>,
|
|
|
|
predicates: Vec<ty::Predicate<'tcx>>,
|
|
|
|
) -> Result<Vec<ty::Predicate<'tcx>>, ErrorReported> {
|
2018-11-16 08:25:46 -05:00
|
|
|
debug!(
|
|
|
|
"do_normalize_predicates(predicates={:?}, region_context={:?}, cause={:?})",
|
2019-12-24 17:38:22 -05:00
|
|
|
predicates, region_context, cause,
|
2018-11-16 08:25:46 -05:00
|
|
|
);
|
2015-02-20 06:21:46 -05:00
|
|
|
let span = cause.span;
|
2017-06-09 10:55:16 +03:00
|
|
|
tcx.infer_ctxt().enter(|infcx| {
|
2017-11-23 23:21:56 +02:00
|
|
|
// FIXME. We should really... do something with these region
|
|
|
|
// obligations. But this call just continues the older
|
|
|
|
// behavior (i.e., doesn't cause any new bugs), and it would
|
|
|
|
// take some further refactoring to actually solve them. In
|
|
|
|
// particular, we would have to handle implied bounds
|
|
|
|
// properly, and that code is currently largely confined to
|
|
|
|
// regionck (though I made some efforts to extract it
|
|
|
|
// out). -nmatsakis
|
|
|
|
//
|
|
|
|
// @arielby: In any case, these obligations are checked
|
|
|
|
// by wfcheck anyway, so I'm not sure we have to check
|
|
|
|
// them here too, and we will remove this function when
|
|
|
|
// we move over to lazy normalization *anyway*.
|
|
|
|
let fulfill_cx = FulfillmentContext::new_ignoring_regions();
|
2019-12-24 17:38:22 -05:00
|
|
|
let predicates =
|
|
|
|
match fully_normalize(&infcx, fulfill_cx, cause, elaborated_env, &predicates) {
|
|
|
|
Ok(predicates) => predicates,
|
|
|
|
Err(errors) => {
|
|
|
|
infcx.report_fulfillment_errors(&errors, None, false);
|
|
|
|
return Err(ErrorReported);
|
|
|
|
}
|
|
|
|
};
|
2016-03-25 05:22:44 +02:00
|
|
|
|
2018-09-30 20:09:05 +03:00
|
|
|
debug!("do_normalize_predictes: normalized predicates = {:?}", predicates);
|
2016-03-25 05:22:44 +02:00
|
|
|
|
2017-12-01 05:07:52 -05:00
|
|
|
// We can use the `elaborated_env` here; the region code only
|
|
|
|
// cares about declarations like `'a: 'b`.
|
2020-06-21 12:26:17 +02:00
|
|
|
let outlives_env = OutlivesEnvironment::new(elaborated_env);
|
2017-12-01 05:07:52 -05:00
|
|
|
|
2018-09-12 15:43:26 -04:00
|
|
|
infcx.resolve_regions_and_report_errors(
|
|
|
|
region_context,
|
|
|
|
&outlives_env,
|
2020-02-15 12:11:59 +00:00
|
|
|
RegionckMode::default(),
|
2018-09-12 15:43:26 -04:00
|
|
|
);
|
2017-12-01 05:07:52 -05:00
|
|
|
|
2016-03-25 05:22:44 +02:00
|
|
|
let predicates = match infcx.fully_resolve(&predicates) {
|
|
|
|
Ok(predicates) => predicates,
|
|
|
|
Err(fixup_err) => {
|
|
|
|
// If we encounter a fixup error, it means that some type
|
|
|
|
// variable wound up unconstrained. I actually don't know
|
|
|
|
// if this can happen, and I certainly don't expect it to
|
|
|
|
// happen often, but if it did happen it probably
|
|
|
|
// represents a legitimate failure due to some kind of
|
|
|
|
// unconstrained variable, and it seems better not to ICE,
|
|
|
|
// all things considered.
|
|
|
|
tcx.sess.span_err(span, &fixup_err.to_string());
|
2019-12-24 17:38:22 -05:00
|
|
|
return Err(ErrorReported);
|
2016-03-25 05:22:44 +02:00
|
|
|
}
|
|
|
|
};
|
2020-04-06 22:29:18 +02:00
|
|
|
if predicates.needs_infer() {
|
2020-04-07 00:19:36 +02:00
|
|
|
tcx.sess.delay_span_bug(span, "encountered inference variables after `fully_resolve`");
|
2019-05-31 10:23:22 +02:00
|
|
|
Err(ErrorReported)
|
|
|
|
} else {
|
|
|
|
Ok(predicates)
|
2018-09-30 20:09:05 +03:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// FIXME: this is gonna need to be removed ...
|
|
|
|
/// Normalizes the parameter environment, reporting errors if they occur.
|
2019-06-12 00:11:55 +03:00
|
|
|
pub fn normalize_param_env_or_error<'tcx>(
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
region_context: DefId,
|
|
|
|
unnormalized_env: ty::ParamEnv<'tcx>,
|
|
|
|
cause: ObligationCause<'tcx>,
|
|
|
|
) -> ty::ParamEnv<'tcx> {
|
2018-09-30 20:09:05 +03:00
|
|
|
// I'm not wild about reporting errors here; I'd prefer to
|
|
|
|
// have the errors get reported at a defined place (e.g.,
|
|
|
|
// during typeck). Instead I have all parameter
|
|
|
|
// environments, in effect, going through this function
|
|
|
|
// and hence potentially reporting errors. This ensures of
|
|
|
|
// course that we never forget to normalize (the
|
|
|
|
// alternative seemed like it would involve a lot of
|
|
|
|
// manual invocations of this fn -- and then we'd have to
|
|
|
|
// deal with the errors at each of those sites).
|
|
|
|
//
|
|
|
|
// In any case, in practice, typeck constructs all the
|
|
|
|
// parameter environments once for every fn as it goes,
|
|
|
|
// and errors will get reported then; so after typeck we
|
|
|
|
// can be sure that no errors should occur.
|
|
|
|
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!(
|
|
|
|
"normalize_param_env_or_error(region_context={:?}, unnormalized_env={:?}, cause={:?})",
|
|
|
|
region_context, unnormalized_env, cause
|
|
|
|
);
|
2018-09-30 20:09:05 +03:00
|
|
|
|
|
|
|
let mut predicates: Vec<_> =
|
2020-07-02 20:52:40 -04:00
|
|
|
util::elaborate_predicates(tcx, unnormalized_env.caller_bounds().into_iter())
|
2020-03-03 15:07:04 -08:00
|
|
|
.map(|obligation| obligation.predicate)
|
|
|
|
.collect();
|
2018-09-30 20:09:05 +03:00
|
|
|
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!("normalize_param_env_or_error: elaborated-predicates={:?}", predicates);
|
2018-09-30 20:09:05 +03:00
|
|
|
|
2018-11-17 18:56:14 +01:00
|
|
|
let elaborated_env = ty::ParamEnv::new(
|
|
|
|
tcx.intern_predicates(&predicates),
|
2020-07-02 20:52:40 -04:00
|
|
|
unnormalized_env.reveal(),
|
2019-12-24 17:38:22 -05:00
|
|
|
unnormalized_env.def_id,
|
2018-11-17 18:56:14 +01:00
|
|
|
);
|
2018-09-30 20:09:05 +03:00
|
|
|
|
|
|
|
// HACK: we are trying to normalize the param-env inside *itself*. The problem is that
|
|
|
|
// normalization expects its param-env to be already normalized, which means we have
|
|
|
|
// a circularity.
|
|
|
|
//
|
|
|
|
// The way we handle this is by normalizing the param-env inside an unnormalized version
|
|
|
|
// of the param-env, which means that if the param-env contains unnormalized projections,
|
|
|
|
// we'll have some normalization failures. This is unfortunate.
|
|
|
|
//
|
|
|
|
// Lazy normalization would basically handle this by treating just the
|
|
|
|
// normalizing-a-trait-ref-requires-itself cycles as evaluation failures.
|
|
|
|
//
|
|
|
|
// Inferred outlives bounds can create a lot of `TypeOutlives` predicates for associated
|
|
|
|
// types, so to make the situation less bad, we normalize all the predicates *but*
|
|
|
|
// the `TypeOutlives` predicates first inside the unnormalized parameter environment, and
|
|
|
|
// then we normalize the `TypeOutlives` bounds inside the normalized parameter environment.
|
|
|
|
//
|
|
|
|
// This works fairly well because trait matching does not actually care about param-env
|
|
|
|
// TypeOutlives predicates - these are normally used by regionck.
|
2019-12-24 17:38:22 -05:00
|
|
|
let outlives_predicates: Vec<_> = predicates
|
2020-07-09 00:35:55 +02:00
|
|
|
.drain_filter(|predicate| match predicate.skip_binders() {
|
|
|
|
ty::PredicateAtom::TypeOutlives(..) => true,
|
2019-12-24 17:38:22 -05:00
|
|
|
_ => false,
|
|
|
|
})
|
|
|
|
.collect();
|
2018-09-30 20:09:05 +03:00
|
|
|
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!(
|
|
|
|
"normalize_param_env_or_error: predicates=(non-outlives={:?}, outlives={:?})",
|
|
|
|
predicates, outlives_predicates
|
|
|
|
);
|
|
|
|
let non_outlives_predicates = match do_normalize_predicates(
|
|
|
|
tcx,
|
|
|
|
region_context,
|
|
|
|
cause.clone(),
|
|
|
|
elaborated_env,
|
|
|
|
predicates,
|
|
|
|
) {
|
|
|
|
Ok(predicates) => predicates,
|
|
|
|
// An unnormalized env is better than nothing.
|
|
|
|
Err(ErrorReported) => {
|
|
|
|
debug!("normalize_param_env_or_error: errored resolving non-outlives predicates");
|
|
|
|
return elaborated_env;
|
|
|
|
}
|
|
|
|
};
|
2016-05-11 04:14:41 +03:00
|
|
|
|
2018-09-30 20:09:05 +03:00
|
|
|
debug!("normalize_param_env_or_error: non-outlives predicates={:?}", non_outlives_predicates);
|
|
|
|
|
|
|
|
// Not sure whether it is better to include the unnormalized TypeOutlives predicates
|
|
|
|
// here. I believe they should not matter, because we are ignoring TypeOutlives param-env
|
|
|
|
// predicates here anyway. Keeping them here anyway because it seems safer.
|
|
|
|
let outlives_env: Vec<_> =
|
|
|
|
non_outlives_predicates.iter().chain(&outlives_predicates).cloned().collect();
|
2019-12-24 17:38:22 -05:00
|
|
|
let outlives_env =
|
2020-07-02 20:52:40 -04:00
|
|
|
ty::ParamEnv::new(tcx.intern_predicates(&outlives_env), unnormalized_env.reveal(), None);
|
2019-12-24 17:38:22 -05:00
|
|
|
let outlives_predicates = match do_normalize_predicates(
|
|
|
|
tcx,
|
|
|
|
region_context,
|
|
|
|
cause,
|
|
|
|
outlives_env,
|
|
|
|
outlives_predicates,
|
|
|
|
) {
|
|
|
|
Ok(predicates) => predicates,
|
|
|
|
// An unnormalized env is better than nothing.
|
|
|
|
Err(ErrorReported) => {
|
|
|
|
debug!("normalize_param_env_or_error: errored resolving outlives predicates");
|
|
|
|
return elaborated_env;
|
|
|
|
}
|
|
|
|
};
|
2018-09-30 20:09:05 +03:00
|
|
|
debug!("normalize_param_env_or_error: outlives predicates={:?}", outlives_predicates);
|
2015-12-22 19:51:29 -05:00
|
|
|
|
2018-09-30 20:09:05 +03:00
|
|
|
let mut predicates = non_outlives_predicates;
|
|
|
|
predicates.extend(outlives_predicates);
|
|
|
|
debug!("normalize_param_env_or_error: final predicates={:?}", predicates);
|
2018-11-17 18:56:14 +01:00
|
|
|
ty::ParamEnv::new(
|
|
|
|
tcx.intern_predicates(&predicates),
|
2020-07-02 20:52:40 -04:00
|
|
|
unnormalized_env.reveal(),
|
2019-12-24 17:38:22 -05:00
|
|
|
unnormalized_env.def_id,
|
2018-11-17 18:56:14 +01:00
|
|
|
)
|
2015-01-26 14:20:38 -05:00
|
|
|
}
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
pub fn fully_normalize<'a, 'tcx, T>(
|
|
|
|
infcx: &InferCtxt<'a, 'tcx>,
|
2017-11-23 23:03:47 +02:00
|
|
|
mut fulfill_cx: FulfillmentContext<'tcx>,
|
|
|
|
cause: ObligationCause<'tcx>,
|
|
|
|
param_env: ty::ParamEnv<'tcx>,
|
2019-06-14 01:32:15 +03:00
|
|
|
value: &T,
|
|
|
|
) -> Result<T, Vec<FulfillmentError<'tcx>>>
|
|
|
|
where
|
|
|
|
T: TypeFoldable<'tcx>,
|
2017-11-23 23:03:47 +02:00
|
|
|
{
|
|
|
|
debug!("fully_normalize_with_fulfillcx(value={:?})", value);
|
|
|
|
let selcx = &mut SelectionContext::new(infcx);
|
2015-02-13 19:51:43 -05:00
|
|
|
let Normalized { value: normalized_value, obligations } =
|
2017-05-23 04:19:47 -04:00
|
|
|
project::normalize(selcx, param_env, cause, value);
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!(
|
|
|
|
"fully_normalize: normalized_value={:?} obligations={:?}",
|
|
|
|
normalized_value, obligations
|
|
|
|
);
|
2015-02-13 19:51:43 -05:00
|
|
|
for obligation in obligations {
|
|
|
|
fulfill_cx.register_predicate_obligation(selcx.infcx(), obligation);
|
|
|
|
}
|
2015-07-01 13:08:25 -07:00
|
|
|
|
2015-12-22 19:51:29 -05:00
|
|
|
debug!("fully_normalize: select_all_or_error start");
|
2018-05-08 11:38:35 -03:00
|
|
|
fulfill_cx.select_all_or_error(infcx)?;
|
2015-12-22 19:51:29 -05:00
|
|
|
debug!("fully_normalize: select_all_or_error complete");
|
2019-05-11 19:08:26 +01:00
|
|
|
let resolved_value = infcx.resolve_vars_if_possible(&normalized_value);
|
2015-12-22 19:51:29 -05:00
|
|
|
debug!("fully_normalize: resolved_value={:?}", resolved_value);
|
2015-02-13 19:51:43 -05:00
|
|
|
Ok(resolved_value)
|
|
|
|
}
|
|
|
|
|
2020-06-22 13:22:45 +01:00
|
|
|
/// Normalizes the predicates and checks whether they hold in an empty environment. If this
|
|
|
|
/// returns true, then either normalize encountered an error or one of the predicates did not
|
|
|
|
/// hold. Used when creating vtables to check for unsatisfiable methods.
|
|
|
|
pub fn impossible_predicates<'tcx>(
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
predicates: Vec<ty::Predicate<'tcx>>,
|
|
|
|
) -> bool {
|
2020-06-22 13:22:45 +01:00
|
|
|
debug!("impossible_predicates(predicates={:?})", predicates);
|
2016-09-19 12:47:47 +03:00
|
|
|
|
2017-06-21 14:50:43 +03:00
|
|
|
let result = tcx.infer_ctxt().enter(|infcx| {
|
2018-02-10 13:18:02 -05:00
|
|
|
let param_env = ty::ParamEnv::reveal_all();
|
2020-01-16 18:47:52 -05:00
|
|
|
let mut selcx = SelectionContext::new(&infcx);
|
|
|
|
let mut fulfill_cx = FulfillmentContext::new();
|
2016-09-19 12:47:47 +03:00
|
|
|
let cause = ObligationCause::dummy();
|
|
|
|
let Normalized { value: predicates, obligations } =
|
2017-05-23 04:19:47 -04:00
|
|
|
normalize(&mut selcx, param_env, cause.clone(), &predicates);
|
2016-09-19 12:47:47 +03:00
|
|
|
for obligation in obligations {
|
|
|
|
fulfill_cx.register_predicate_obligation(&infcx, obligation);
|
|
|
|
}
|
|
|
|
for predicate in predicates {
|
2017-05-23 04:19:47 -04:00
|
|
|
let obligation = Obligation::new(cause.clone(), param_env, predicate);
|
2016-09-19 12:47:47 +03:00
|
|
|
fulfill_cx.register_predicate_obligation(&infcx, obligation);
|
|
|
|
}
|
|
|
|
|
2020-06-22 13:22:45 +01:00
|
|
|
fulfill_cx.select_all_or_error(&infcx).is_err()
|
2017-06-21 14:50:43 +03:00
|
|
|
});
|
2020-06-22 13:22:45 +01:00
|
|
|
debug!("impossible_predicates(predicates={:?}) = {:?}", predicates, result);
|
2017-06-21 14:50:43 +03:00
|
|
|
result
|
2016-09-19 12:47:47 +03:00
|
|
|
}
|
|
|
|
|
2020-06-22 13:22:45 +01:00
|
|
|
fn subst_and_check_impossible_predicates<'tcx>(
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2020-01-16 18:47:52 -05:00
|
|
|
key: (DefId, SubstsRef<'tcx>),
|
2019-06-12 00:11:55 +03:00
|
|
|
) -> bool {
|
2020-06-22 13:22:45 +01:00
|
|
|
debug!("subst_and_check_impossible_predicates(key={:?})", key);
|
2017-12-27 12:32:44 -05:00
|
|
|
|
2020-06-22 13:22:45 +01:00
|
|
|
let mut predicates = tcx.predicates_of(key.0).instantiate(tcx, key.1).predicates;
|
|
|
|
predicates.retain(|predicate| !predicate.needs_subst());
|
|
|
|
let result = impossible_predicates(tcx, predicates);
|
2017-12-27 12:32:44 -05:00
|
|
|
|
2020-06-22 13:22:45 +01:00
|
|
|
debug!("subst_and_check_impossible_predicates(key={:?}) = {:?}", key, result);
|
2017-12-27 12:32:44 -05:00
|
|
|
result
|
|
|
|
}
|
|
|
|
|
2016-09-19 12:47:47 +03:00
|
|
|
/// Given a trait `trait_ref`, iterates the vtable entries
|
|
|
|
/// that come from `trait_ref`, including its supertraits.
|
2018-11-27 02:59:49 +00:00
|
|
|
#[inline] // FIXME(#35870): avoid closures being unexported due to `impl Trait`.
|
2019-06-11 23:35:39 +03:00
|
|
|
fn vtable_methods<'tcx>(
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
trait_ref: ty::PolyTraitRef<'tcx>,
|
|
|
|
) -> &'tcx [Option<(DefId, SubstsRef<'tcx>)>] {
|
2017-10-07 16:55:09 -05:00
|
|
|
debug!("vtable_methods({:?})", trait_ref);
|
2016-09-19 12:47:47 +03:00
|
|
|
|
2019-12-24 17:38:22 -05:00
|
|
|
tcx.arena.alloc_from_iter(supertraits(tcx, trait_ref).flat_map(move |trait_ref| {
|
|
|
|
let trait_methods = tcx
|
|
|
|
.associated_items(trait_ref.def_id())
|
2020-02-17 13:09:01 -08:00
|
|
|
.in_definition_order()
|
2020-04-01 10:09:50 +08:00
|
|
|
.filter(|item| item.kind == ty::AssocKind::Fn);
|
2019-12-24 17:38:22 -05:00
|
|
|
|
|
|
|
// Now list each method's DefId and InternalSubsts (for within its trait).
|
|
|
|
// If the method can never be called from this object, produce None.
|
|
|
|
trait_methods.map(move |trait_method| {
|
|
|
|
debug!("vtable_methods: trait_method={:?}", trait_method);
|
|
|
|
let def_id = trait_method.def_id;
|
|
|
|
|
|
|
|
// Some methods cannot be called on an object; skip those.
|
2020-01-05 18:07:29 +01:00
|
|
|
if !is_vtable_safe_method(tcx, trait_ref.def_id(), &trait_method) {
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!("vtable_methods: not vtable safe");
|
|
|
|
return None;
|
|
|
|
}
|
2017-10-09 10:39:53 -05:00
|
|
|
|
2019-12-24 17:38:22 -05:00
|
|
|
// The method may have some early-bound lifetimes; add regions for those.
|
|
|
|
let substs = trait_ref.map_bound(|trait_ref| {
|
|
|
|
InternalSubsts::for_item(tcx, def_id, |param, _| match param.kind {
|
|
|
|
GenericParamDefKind::Lifetime => tcx.lifetimes.re_erased.into(),
|
|
|
|
GenericParamDefKind::Type { .. } | GenericParamDefKind::Const => {
|
|
|
|
trait_ref.substs[param.index as usize]
|
|
|
|
}
|
|
|
|
})
|
|
|
|
});
|
|
|
|
|
|
|
|
// The trait type may have higher-ranked lifetimes in it;
|
|
|
|
// erase them if they appear, so that we get the type
|
|
|
|
// at some particular call site.
|
|
|
|
let substs =
|
|
|
|
tcx.normalize_erasing_late_bound_regions(ty::ParamEnv::reveal_all(), &substs);
|
|
|
|
|
|
|
|
// It's possible that the method relies on where-clauses that
|
|
|
|
// do not hold for this particular set of type parameters.
|
|
|
|
// Note that this method could then never be called, so we
|
|
|
|
// do not want to try and codegen it, in that case (see #23435).
|
|
|
|
let predicates = tcx.predicates_of(def_id).instantiate_own(tcx, substs);
|
2020-06-22 13:22:45 +01:00
|
|
|
if impossible_predicates(tcx, predicates.predicates) {
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!("vtable_methods: predicates do not hold");
|
|
|
|
return None;
|
|
|
|
}
|
2017-10-09 10:39:53 -05:00
|
|
|
|
2019-12-24 17:38:22 -05:00
|
|
|
Some((def_id, substs))
|
2019-03-29 17:49:11 +01:00
|
|
|
})
|
2019-12-24 17:38:22 -05:00
|
|
|
}))
|
2016-09-19 12:47:47 +03:00
|
|
|
}
|
|
|
|
|
2020-05-14 23:07:46 +08:00
|
|
|
/// Check whether a `ty` implements given trait(trait_def_id).
|
|
|
|
///
|
|
|
|
/// NOTE: Always return `false` for a type which needs inference.
|
|
|
|
fn type_implements_trait<'tcx>(
|
|
|
|
tcx: TyCtxt<'tcx>,
|
|
|
|
key: (
|
|
|
|
DefId, // trait_def_id,
|
|
|
|
Ty<'tcx>, // type
|
|
|
|
SubstsRef<'tcx>,
|
|
|
|
ParamEnv<'tcx>,
|
|
|
|
),
|
|
|
|
) -> bool {
|
|
|
|
let (trait_def_id, ty, params, param_env) = key;
|
|
|
|
|
|
|
|
debug!(
|
|
|
|
"type_implements_trait: trait_def_id={:?}, type={:?}, params={:?}, param_env={:?}",
|
|
|
|
trait_def_id, ty, params, param_env
|
|
|
|
);
|
|
|
|
|
|
|
|
let trait_ref = ty::TraitRef { def_id: trait_def_id, substs: tcx.mk_substs_trait(ty, params) };
|
|
|
|
|
|
|
|
let obligation = Obligation {
|
|
|
|
cause: ObligationCause::dummy(),
|
|
|
|
param_env,
|
|
|
|
recursion_depth: 0,
|
2020-05-07 10:12:19 +00:00
|
|
|
predicate: trait_ref.without_const().to_predicate(tcx),
|
2020-05-14 23:07:46 +08:00
|
|
|
};
|
|
|
|
tcx.infer_ctxt().enter(|infcx| infcx.predicate_must_hold_modulo_regions(&obligation))
|
|
|
|
}
|
|
|
|
|
2020-07-05 23:00:14 +03:00
|
|
|
pub fn provide(providers: &mut ty::query::Providers) {
|
2020-02-10 19:55:49 +01:00
|
|
|
object_safety::provide(providers);
|
2020-05-13 13:40:22 -07:00
|
|
|
structural_match::provide(providers);
|
2018-06-13 16:44:43 +03:00
|
|
|
*providers = ty::query::Providers {
|
2017-05-11 16:01:19 +02:00
|
|
|
specialization_graph_of: specialize::specialization_graph_provider,
|
2017-08-29 09:25:25 -07:00
|
|
|
specializes: specialize::specializes,
|
2018-05-08 16:10:16 +03:00
|
|
|
codegen_fulfill_obligation: codegen::codegen_fulfill_obligation,
|
2017-10-07 16:55:09 -05:00
|
|
|
vtable_methods,
|
2020-05-14 23:07:46 +08:00
|
|
|
type_implements_trait,
|
2020-06-22 13:22:45 +01:00
|
|
|
subst_and_check_impossible_predicates,
|
2017-05-11 16:01:19 +02:00
|
|
|
..*providers
|
|
|
|
};
|
|
|
|
}
|