2020-03-05 18:07:42 -03:00
|
|
|
//! Trait Resolution. See the [rustc dev guide] for more information on how this works.
|
2018-02-25 15:24:14 -06:00
|
|
|
//!
|
2020-03-09 18:33:04 -03:00
|
|
|
//! [rustc dev guide]: https://rustc-dev-guide.rust-lang.org/traits/resolution.html
|
2014-09-12 10:53:35 -04:00
|
|
|
|
2018-11-27 02:59:49 +00:00
|
|
|
pub mod auto_trait;
|
2020-03-03 11:25:03 -05:00
|
|
|
mod chalk_fulfill;
|
2018-11-27 02:59:49 +00:00
|
|
|
mod coherence;
|
2020-11-22 09:37:37 +00:00
|
|
|
pub mod const_evaluatable;
|
2018-11-27 02:59:49 +00:00
|
|
|
mod engine;
|
2019-12-24 17:38:22 -05:00
|
|
|
pub mod error_reporting;
|
2018-11-27 02:59:49 +00:00
|
|
|
mod fulfill;
|
2020-01-07 19:36:50 +01:00
|
|
|
pub mod misc;
|
2018-11-27 02:59:49 +00:00
|
|
|
mod object_safety;
|
2022-08-22 16:53:34 -03:00
|
|
|
pub mod outlives_bounds;
|
2019-12-24 17:38:22 -05:00
|
|
|
mod project;
|
|
|
|
pub mod query;
|
2018-11-27 02:59:49 +00:00
|
|
|
mod select;
|
|
|
|
mod specialize;
|
2020-01-05 23:02:07 +01:00
|
|
|
mod structural_match;
|
2018-11-27 02:59:49 +00:00
|
|
|
mod util;
|
2022-12-08 04:51:46 +00:00
|
|
|
mod vtable;
|
2020-01-05 20:52:34 +01:00
|
|
|
pub mod wf;
|
2014-11-06 00:05:53 -08:00
|
|
|
|
2019-02-05 11:20:45 -06:00
|
|
|
use crate::infer::outlives::env::OutlivesEnvironment;
|
2022-06-13 01:11:16 -04:00
|
|
|
use crate::infer::{InferCtxt, TyCtxtInferExt};
|
2022-09-09 15:08:06 -05:00
|
|
|
use crate::traits::error_reporting::TypeErrCtxtExt as _;
|
2020-02-22 11:44:18 +01:00
|
|
|
use crate::traits::query::evaluate_obligation::InferCtxtExt as _;
|
2022-01-23 12:34:26 -06:00
|
|
|
use rustc_errors::ErrorGuaranteed;
|
2020-03-29 16:41:09 +02:00
|
|
|
use rustc_middle::ty::fold::TypeFoldable;
|
2022-06-17 13:15:00 +01:00
|
|
|
use rustc_middle::ty::visit::TypeVisitable;
|
2022-12-08 04:51:46 +00:00
|
|
|
use rustc_middle::ty::{self, DefIdTree, ToPredicate, Ty, TyCtxt, TypeSuperVisitable};
|
2022-09-16 15:31:10 +02:00
|
|
|
use rustc_middle::ty::{InternalSubsts, SubstsRef};
|
2023-01-15 12:58:46 +01:00
|
|
|
use rustc_span::def_id::{DefId, CRATE_DEF_ID};
|
2022-12-08 04:51:46 +00:00
|
|
|
use rustc_span::Span;
|
2015-09-24 19:58:00 +03:00
|
|
|
|
2018-12-07 01:40:42 +00:00
|
|
|
use std::fmt::Debug;
|
2021-06-17 12:20:18 +08:00
|
|
|
use std::ops::ControlFlow;
|
2018-12-07 01:40:42 +00:00
|
|
|
|
2018-11-27 02:59:49 +00:00
|
|
|
pub use self::FulfillmentErrorCode::*;
|
2020-05-11 15:25:33 +00:00
|
|
|
pub use self::ImplSource::*;
|
2020-01-06 20:13:24 +01:00
|
|
|
pub use self::ObligationCauseCode::*;
|
|
|
|
pub use self::SelectionError::*;
|
2014-09-12 10:53:35 -04:00
|
|
|
|
2018-11-20 11:20:05 -05:00
|
|
|
pub use self::coherence::{add_placeholder_note, orphan_check, overlapping_impls};
|
|
|
|
pub use self::coherence::{OrphanCheckErr, OverlapResult};
|
2022-07-07 15:12:32 +02:00
|
|
|
pub use self::engine::{ObligationCtxt, TraitEngineExt};
|
2018-03-11 10:29:22 +08:00
|
|
|
pub use self::fulfill::{FulfillmentContext, PendingPredicateObligation};
|
2020-01-05 18:07:29 +01:00
|
|
|
pub use self::object_safety::astconv_object_safety_violations;
|
|
|
|
pub use self::object_safety::is_vtable_safe_method;
|
2014-12-15 21:11:09 -05:00
|
|
|
pub use self::object_safety::MethodViolationCode;
|
2019-12-24 17:38:22 -05:00
|
|
|
pub use self::object_safety::ObjectSafetyViolation;
|
2022-11-25 18:40:52 +00:00
|
|
|
pub use self::project::{normalize_projection_type, NormalizeExt};
|
2020-01-06 20:13:24 +01:00
|
|
|
pub use self::select::{EvaluationCache, SelectionCache, SelectionContext};
|
|
|
|
pub use self::select::{EvaluationResult, IntercrateAmbiguityCause, OverflowError};
|
2018-12-03 23:27:25 +02:00
|
|
|
pub use self::specialize::specialization_graph::FutureCompatOverlapError;
|
|
|
|
pub use self::specialize::specialization_graph::FutureCompatOverlapErrorKind;
|
2019-12-24 17:38:22 -05:00
|
|
|
pub use self::specialize::{specialization_graph, translate_substs, OverlapError};
|
2022-07-24 20:44:19 +00:00
|
|
|
pub use self::structural_match::{
|
|
|
|
search_for_adt_const_param_violation, search_for_structural_match_violation,
|
|
|
|
};
|
2021-09-30 21:42:09 +01:00
|
|
|
pub use self::util::{
|
2021-11-13 23:56:22 +01:00
|
|
|
elaborate_obligations, elaborate_predicates, elaborate_predicates_with_span,
|
|
|
|
elaborate_trait_ref, elaborate_trait_refs,
|
2021-09-30 21:42:09 +01:00
|
|
|
};
|
2019-12-24 17:38:22 -05:00
|
|
|
pub use self::util::{expand_trait_aliases, TraitAliasExpander};
|
2020-01-05 20:27:00 +01:00
|
|
|
pub use self::util::{
|
2020-03-29 00:57:49 +01:00
|
|
|
get_vtable_index_of_object_method, impl_item_is_final, predicate_for_trait_def, upcast_choices,
|
2020-01-05 20:27:00 +01:00
|
|
|
};
|
2019-04-29 03:58:24 +01:00
|
|
|
pub use self::util::{
|
2020-12-03 20:10:55 -03:00
|
|
|
supertrait_def_ids, supertraits, transitive_bounds, transitive_bounds_that_define_assoc_type,
|
|
|
|
SupertraitDefIds, Supertraits,
|
2019-04-29 03:58:24 +01:00
|
|
|
};
|
2014-09-12 10:53:35 -04:00
|
|
|
|
2020-03-03 11:25:03 -05:00
|
|
|
pub use self::chalk_fulfill::FulfillmentContext as ChalkFulfillmentContext;
|
|
|
|
|
2020-02-22 11:44:18 +01:00
|
|
|
pub use rustc_infer::traits::*;
|
2018-02-25 10:58:54 -05:00
|
|
|
|
2020-01-24 15:57:01 -05:00
|
|
|
/// Whether to skip the leak check, as part of a future compatibility warning step.
|
2021-11-22 20:17:53 -05:00
|
|
|
///
|
|
|
|
/// The "default" for skip-leak-check corresponds to the current
|
|
|
|
/// behavior (do not skip the leak check) -- not the behavior we are
|
|
|
|
/// transitioning into.
|
|
|
|
#[derive(Copy, Clone, PartialEq, Eq, Debug, Default)]
|
2020-01-24 15:57:01 -05:00
|
|
|
pub enum SkipLeakCheck {
|
|
|
|
Yes,
|
2021-11-22 20:17:53 -05:00
|
|
|
#[default]
|
2020-01-24 15:57:01 -05:00
|
|
|
No,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl SkipLeakCheck {
|
|
|
|
fn is_yes(self) -> bool {
|
|
|
|
self == SkipLeakCheck::Yes
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-08 14:53:55 +01:00
|
|
|
/// The mode that trait queries run in.
|
2020-01-16 18:47:52 -05:00
|
|
|
#[derive(Copy, Clone, PartialEq, Eq, Debug)]
|
2018-04-19 02:28:03 -05:00
|
|
|
pub enum TraitQueryMode {
|
2020-11-27 14:17:25 -05:00
|
|
|
/// Standard/un-canonicalized queries get accurate
|
|
|
|
/// spans etc. passed in and hence can do reasonable
|
|
|
|
/// error reporting on their own.
|
2018-04-19 02:28:03 -05:00
|
|
|
Standard,
|
2023-01-03 01:16:10 +00:00
|
|
|
/// Canonical queries get dummy spans and hence
|
2020-11-27 14:17:25 -05:00
|
|
|
/// must generally propagate errors to
|
|
|
|
/// pre-canonicalization callsites.
|
2018-04-19 02:28:03 -05:00
|
|
|
Canonical,
|
|
|
|
}
|
|
|
|
|
2014-12-07 11:10:48 -05:00
|
|
|
/// Creates predicate obligations from the generic bounds.
|
2022-10-20 09:39:09 +00:00
|
|
|
#[instrument(level = "debug", skip(cause, param_env))]
|
2019-08-25 21:58:59 -07:00
|
|
|
pub fn predicates_for_generics<'tcx>(
|
2022-08-16 06:27:22 +00:00
|
|
|
cause: impl Fn(usize, Span) -> ObligationCause<'tcx>,
|
2019-08-25 21:58:59 -07:00
|
|
|
param_env: ty::ParamEnv<'tcx>,
|
2020-04-18 15:09:28 -07:00
|
|
|
generic_bounds: ty::InstantiatedPredicates<'tcx>,
|
|
|
|
) -> impl Iterator<Item = PredicateObligation<'tcx>> {
|
2023-01-03 03:32:59 +00:00
|
|
|
generic_bounds.into_iter().enumerate().map(move |(idx, (predicate, span))| Obligation {
|
|
|
|
cause: cause(idx, span),
|
|
|
|
recursion_depth: 0,
|
|
|
|
param_env,
|
|
|
|
predicate,
|
|
|
|
})
|
2014-09-12 10:53:35 -04:00
|
|
|
}
|
|
|
|
|
2014-12-18 09:26:10 -05:00
|
|
|
/// Determines whether the type `ty` is known to meet `bound` and
|
|
|
|
/// returns true if so. Returns false if `ty` either does not meet
|
|
|
|
/// `bound` or is not known to meet bound (note that this is
|
|
|
|
/// conservative towards *no impl*, which is the opposite of the
|
|
|
|
/// `evaluate` methods).
|
2022-09-09 13:01:06 -05:00
|
|
|
pub fn type_known_to_meet_bound_modulo_regions<'tcx>(
|
|
|
|
infcx: &InferCtxt<'tcx>,
|
2018-09-20 13:56:11 -04:00
|
|
|
param_env: ty::ParamEnv<'tcx>,
|
|
|
|
ty: Ty<'tcx>,
|
|
|
|
def_id: DefId,
|
|
|
|
span: Span,
|
|
|
|
) -> bool {
|
2022-11-21 12:24:53 +00:00
|
|
|
let trait_ref = ty::Binder::dummy(infcx.tcx.mk_trait_ref(def_id, [ty]));
|
2022-11-17 10:36:18 +00:00
|
|
|
pred_known_to_hold_modulo_regions(infcx, param_env, trait_ref.without_const(), span)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[instrument(level = "debug", skip(infcx, param_env, span, pred), ret)]
|
|
|
|
fn pred_known_to_hold_modulo_regions<'tcx>(
|
|
|
|
infcx: &InferCtxt<'tcx>,
|
|
|
|
param_env: ty::ParamEnv<'tcx>,
|
2022-12-06 00:00:01 +00:00
|
|
|
pred: impl ToPredicate<'tcx> + TypeVisitable<'tcx>,
|
2022-11-17 10:36:18 +00:00
|
|
|
span: Span,
|
|
|
|
) -> bool {
|
|
|
|
let has_non_region_infer = pred.has_non_region_infer();
|
2016-11-13 19:42:15 -07:00
|
|
|
let obligation = Obligation {
|
2017-05-23 04:19:47 -04:00
|
|
|
param_env,
|
2022-11-17 10:36:18 +00:00
|
|
|
// We can use a dummy node-id here because we won't pay any mind
|
|
|
|
// to region obligations that arise (there shouldn't really be any
|
|
|
|
// anyhow).
|
2023-01-15 12:58:46 +01:00
|
|
|
cause: ObligationCause::misc(span, CRATE_DEF_ID),
|
2016-11-13 19:42:15 -07:00
|
|
|
recursion_depth: 0,
|
2022-11-17 10:36:18 +00:00
|
|
|
predicate: pred.to_predicate(infcx.tcx),
|
2016-11-13 19:42:15 -07:00
|
|
|
};
|
|
|
|
|
2018-09-20 13:56:11 -04:00
|
|
|
let result = infcx.predicate_must_hold_modulo_regions(&obligation);
|
2022-10-20 09:39:09 +00:00
|
|
|
debug!(?result);
|
2015-10-21 19:01:58 +03:00
|
|
|
|
2022-11-17 10:36:18 +00:00
|
|
|
if result && has_non_region_infer {
|
2015-10-21 19:01:58 +03:00
|
|
|
// Because of inference "guessing", selection can sometimes claim
|
|
|
|
// to succeed while the success requires a guess. To ensure
|
|
|
|
// this function's result remains infallible, we must confirm
|
|
|
|
// that guess. While imperfect, I believe this is sound.
|
|
|
|
|
2022-11-17 15:23:07 +00:00
|
|
|
// FIXME(@lcnr): this function doesn't seem right.
|
2023-01-15 12:58:46 +01:00
|
|
|
//
|
2022-08-02 06:02:04 +00:00
|
|
|
// The handling of regions in this area of the code is terrible,
|
|
|
|
// see issue #29149. We should be able to improve on this with
|
|
|
|
// NLL.
|
2022-11-17 10:36:18 +00:00
|
|
|
let errors = fully_solve_obligation(infcx, obligation);
|
2015-10-21 19:01:58 +03:00
|
|
|
|
2022-08-02 06:02:04 +00:00
|
|
|
match &errors[..] {
|
2022-10-20 09:39:09 +00:00
|
|
|
[] => true,
|
2021-11-08 23:35:23 +08:00
|
|
|
errors => {
|
2022-10-20 09:39:09 +00:00
|
|
|
debug!(?errors);
|
2015-10-21 19:01:58 +03:00
|
|
|
false
|
|
|
|
}
|
2015-01-02 04:01:30 -05:00
|
|
|
}
|
2015-10-21 19:01:58 +03:00
|
|
|
} else {
|
|
|
|
result
|
2015-01-02 04:01:30 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-27 17:18:49 +02:00
|
|
|
#[instrument(level = "debug", skip(tcx, elaborated_env))]
|
2019-06-12 00:11:55 +03:00
|
|
|
fn do_normalize_predicates<'tcx>(
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
cause: ObligationCause<'tcx>,
|
|
|
|
elaborated_env: ty::ParamEnv<'tcx>,
|
|
|
|
predicates: Vec<ty::Predicate<'tcx>>,
|
2022-01-23 12:34:26 -06:00
|
|
|
) -> Result<Vec<ty::Predicate<'tcx>>, ErrorGuaranteed> {
|
2015-02-20 06:21:46 -05:00
|
|
|
let span = cause.span;
|
2022-07-20 11:40:15 +02:00
|
|
|
// FIXME. We should really... do something with these region
|
|
|
|
// obligations. But this call just continues the older
|
|
|
|
// behavior (i.e., doesn't cause any new bugs), and it would
|
|
|
|
// take some further refactoring to actually solve them. In
|
|
|
|
// particular, we would have to handle implied bounds
|
|
|
|
// properly, and that code is currently largely confined to
|
|
|
|
// regionck (though I made some efforts to extract it
|
|
|
|
// out). -nmatsakis
|
|
|
|
//
|
|
|
|
// @arielby: In any case, these obligations are checked
|
|
|
|
// by wfcheck anyway, so I'm not sure we have to check
|
|
|
|
// them here too, and we will remove this function when
|
|
|
|
// we move over to lazy normalization *anyway*.
|
|
|
|
let infcx = tcx.infer_ctxt().ignoring_regions().build();
|
2022-07-26 03:24:16 +00:00
|
|
|
let predicates = match fully_normalize(&infcx, cause, elaborated_env, predicates) {
|
|
|
|
Ok(predicates) => predicates,
|
|
|
|
Err(errors) => {
|
2022-11-02 01:34:17 +00:00
|
|
|
let reported = infcx.err_ctxt().report_fulfillment_errors(&errors, None);
|
2022-07-26 03:24:16 +00:00
|
|
|
return Err(reported);
|
|
|
|
}
|
|
|
|
};
|
2016-03-25 05:22:44 +02:00
|
|
|
|
2018-09-30 20:09:05 +03:00
|
|
|
debug!("do_normalize_predictes: normalized predicates = {:?}", predicates);
|
2016-03-25 05:22:44 +02:00
|
|
|
|
2017-12-01 05:07:52 -05:00
|
|
|
// We can use the `elaborated_env` here; the region code only
|
|
|
|
// cares about declarations like `'a: 'b`.
|
2020-06-21 12:26:17 +02:00
|
|
|
let outlives_env = OutlivesEnvironment::new(elaborated_env);
|
2022-09-19 22:03:59 -05:00
|
|
|
|
2022-07-08 10:59:35 +02:00
|
|
|
// FIXME: It's very weird that we ignore region obligations but apparently
|
|
|
|
// still need to use `resolve_regions` as we need the resolved regions in
|
|
|
|
// the normalized predicates.
|
|
|
|
let errors = infcx.resolve_regions(&outlives_env);
|
|
|
|
if !errors.is_empty() {
|
|
|
|
tcx.sess.delay_span_bug(
|
2022-09-19 22:03:59 -05:00
|
|
|
span,
|
2022-07-08 10:59:35 +02:00
|
|
|
format!("failed region resolution while normalizing {elaborated_env:?}: {errors:?}"),
|
2022-09-19 22:03:59 -05:00
|
|
|
);
|
|
|
|
}
|
2017-12-01 05:07:52 -05:00
|
|
|
|
2022-07-08 10:59:35 +02:00
|
|
|
match infcx.fully_resolve(predicates) {
|
|
|
|
Ok(predicates) => Ok(predicates),
|
2016-03-25 05:22:44 +02:00
|
|
|
Err(fixup_err) => {
|
2022-07-08 10:59:35 +02:00
|
|
|
// If we encounter a fixup error, it means that some type
|
|
|
|
// variable wound up unconstrained. I actually don't know
|
|
|
|
// if this can happen, and I certainly don't expect it to
|
|
|
|
// happen often, but if it did happen it probably
|
|
|
|
// represents a legitimate failure due to some kind of
|
|
|
|
// unconstrained variable.
|
2022-09-19 22:03:59 -05:00
|
|
|
//
|
2022-07-08 10:59:35 +02:00
|
|
|
// @lcnr: Let's still ICE here for now. I want a test case
|
|
|
|
// for that.
|
|
|
|
span_bug!(
|
|
|
|
span,
|
|
|
|
"inference variables in normalized parameter environment: {}",
|
|
|
|
fixup_err
|
|
|
|
);
|
|
|
|
}
|
2016-03-25 05:22:44 +02:00
|
|
|
}
|
2018-09-30 20:09:05 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// FIXME: this is gonna need to be removed ...
|
|
|
|
/// Normalizes the parameter environment, reporting errors if they occur.
|
2022-06-27 17:18:49 +02:00
|
|
|
#[instrument(level = "debug", skip(tcx))]
|
2019-06-12 00:11:55 +03:00
|
|
|
pub fn normalize_param_env_or_error<'tcx>(
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
unnormalized_env: ty::ParamEnv<'tcx>,
|
|
|
|
cause: ObligationCause<'tcx>,
|
|
|
|
) -> ty::ParamEnv<'tcx> {
|
2018-09-30 20:09:05 +03:00
|
|
|
// I'm not wild about reporting errors here; I'd prefer to
|
|
|
|
// have the errors get reported at a defined place (e.g.,
|
|
|
|
// during typeck). Instead I have all parameter
|
|
|
|
// environments, in effect, going through this function
|
|
|
|
// and hence potentially reporting errors. This ensures of
|
|
|
|
// course that we never forget to normalize (the
|
|
|
|
// alternative seemed like it would involve a lot of
|
|
|
|
// manual invocations of this fn -- and then we'd have to
|
|
|
|
// deal with the errors at each of those sites).
|
|
|
|
//
|
|
|
|
// In any case, in practice, typeck constructs all the
|
|
|
|
// parameter environments once for every fn as it goes,
|
2021-10-25 15:43:07 -05:00
|
|
|
// and errors will get reported then; so outside of type inference we
|
2018-09-30 20:09:05 +03:00
|
|
|
// can be sure that no errors should occur.
|
|
|
|
let mut predicates: Vec<_> =
|
2020-07-02 20:52:40 -04:00
|
|
|
util::elaborate_predicates(tcx, unnormalized_env.caller_bounds().into_iter())
|
2020-03-03 15:07:04 -08:00
|
|
|
.map(|obligation| obligation.predicate)
|
|
|
|
.collect();
|
2018-09-30 20:09:05 +03:00
|
|
|
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!("normalize_param_env_or_error: elaborated-predicates={:?}", predicates);
|
2018-09-30 20:09:05 +03:00
|
|
|
|
2021-12-12 12:34:46 +08:00
|
|
|
let elaborated_env = ty::ParamEnv::new(
|
|
|
|
tcx.intern_predicates(&predicates),
|
|
|
|
unnormalized_env.reveal(),
|
|
|
|
unnormalized_env.constness(),
|
|
|
|
);
|
2018-09-30 20:09:05 +03:00
|
|
|
|
|
|
|
// HACK: we are trying to normalize the param-env inside *itself*. The problem is that
|
|
|
|
// normalization expects its param-env to be already normalized, which means we have
|
|
|
|
// a circularity.
|
|
|
|
//
|
|
|
|
// The way we handle this is by normalizing the param-env inside an unnormalized version
|
|
|
|
// of the param-env, which means that if the param-env contains unnormalized projections,
|
|
|
|
// we'll have some normalization failures. This is unfortunate.
|
|
|
|
//
|
|
|
|
// Lazy normalization would basically handle this by treating just the
|
|
|
|
// normalizing-a-trait-ref-requires-itself cycles as evaluation failures.
|
|
|
|
//
|
|
|
|
// Inferred outlives bounds can create a lot of `TypeOutlives` predicates for associated
|
|
|
|
// types, so to make the situation less bad, we normalize all the predicates *but*
|
|
|
|
// the `TypeOutlives` predicates first inside the unnormalized parameter environment, and
|
|
|
|
// then we normalize the `TypeOutlives` bounds inside the normalized parameter environment.
|
|
|
|
//
|
2023-01-14 17:34:59 +01:00
|
|
|
// This works fairly well because trait matching does not actually care about param-env
|
2018-09-30 20:09:05 +03:00
|
|
|
// TypeOutlives predicates - these are normally used by regionck.
|
2019-12-24 17:38:22 -05:00
|
|
|
let outlives_predicates: Vec<_> = predicates
|
2020-12-24 02:55:21 +01:00
|
|
|
.drain_filter(|predicate| {
|
2022-11-24 18:14:58 -03:00
|
|
|
matches!(
|
|
|
|
predicate.kind().skip_binder(),
|
|
|
|
ty::PredicateKind::Clause(ty::Clause::TypeOutlives(..))
|
|
|
|
)
|
2019-12-24 17:38:22 -05:00
|
|
|
})
|
|
|
|
.collect();
|
2018-09-30 20:09:05 +03:00
|
|
|
|
2019-12-24 17:38:22 -05:00
|
|
|
debug!(
|
|
|
|
"normalize_param_env_or_error: predicates=(non-outlives={:?}, outlives={:?})",
|
|
|
|
predicates, outlives_predicates
|
|
|
|
);
|
2022-02-19 00:48:31 +01:00
|
|
|
let Ok(non_outlives_predicates) = do_normalize_predicates(
|
2019-12-24 17:38:22 -05:00
|
|
|
tcx,
|
|
|
|
cause.clone(),
|
|
|
|
elaborated_env,
|
|
|
|
predicates,
|
2022-02-19 00:48:31 +01:00
|
|
|
) else {
|
2019-12-24 17:38:22 -05:00
|
|
|
// An unnormalized env is better than nothing.
|
2022-02-19 00:48:31 +01:00
|
|
|
debug!("normalize_param_env_or_error: errored resolving non-outlives predicates");
|
|
|
|
return elaborated_env;
|
2019-12-24 17:38:22 -05:00
|
|
|
};
|
2016-05-11 04:14:41 +03:00
|
|
|
|
2018-09-30 20:09:05 +03:00
|
|
|
debug!("normalize_param_env_or_error: non-outlives predicates={:?}", non_outlives_predicates);
|
|
|
|
|
|
|
|
// Not sure whether it is better to include the unnormalized TypeOutlives predicates
|
|
|
|
// here. I believe they should not matter, because we are ignoring TypeOutlives param-env
|
|
|
|
// predicates here anyway. Keeping them here anyway because it seems safer.
|
|
|
|
let outlives_env: Vec<_> =
|
|
|
|
non_outlives_predicates.iter().chain(&outlives_predicates).cloned().collect();
|
2021-12-12 12:34:46 +08:00
|
|
|
let outlives_env = ty::ParamEnv::new(
|
|
|
|
tcx.intern_predicates(&outlives_env),
|
|
|
|
unnormalized_env.reveal(),
|
|
|
|
unnormalized_env.constness(),
|
|
|
|
);
|
2022-02-19 00:48:31 +01:00
|
|
|
let Ok(outlives_predicates) = do_normalize_predicates(
|
2019-12-24 17:38:22 -05:00
|
|
|
tcx,
|
|
|
|
cause,
|
|
|
|
outlives_env,
|
|
|
|
outlives_predicates,
|
2022-02-19 00:48:31 +01:00
|
|
|
) else {
|
2019-12-24 17:38:22 -05:00
|
|
|
// An unnormalized env is better than nothing.
|
2022-02-19 00:48:31 +01:00
|
|
|
debug!("normalize_param_env_or_error: errored resolving outlives predicates");
|
|
|
|
return elaborated_env;
|
2019-12-24 17:38:22 -05:00
|
|
|
};
|
2018-09-30 20:09:05 +03:00
|
|
|
debug!("normalize_param_env_or_error: outlives predicates={:?}", outlives_predicates);
|
2015-12-22 19:51:29 -05:00
|
|
|
|
2018-09-30 20:09:05 +03:00
|
|
|
let mut predicates = non_outlives_predicates;
|
|
|
|
predicates.extend(outlives_predicates);
|
|
|
|
debug!("normalize_param_env_or_error: final predicates={:?}", predicates);
|
2021-12-12 12:34:46 +08:00
|
|
|
ty::ParamEnv::new(
|
|
|
|
tcx.intern_predicates(&predicates),
|
|
|
|
unnormalized_env.reveal(),
|
|
|
|
unnormalized_env.constness(),
|
|
|
|
)
|
2015-01-26 14:20:38 -05:00
|
|
|
}
|
|
|
|
|
2022-08-04 13:59:25 +00:00
|
|
|
/// Normalize a type and process all resulting obligations, returning any errors
|
2022-11-02 00:48:44 +00:00
|
|
|
#[instrument(skip_all)]
|
2022-09-09 13:01:06 -05:00
|
|
|
pub fn fully_normalize<'tcx, T>(
|
|
|
|
infcx: &InferCtxt<'tcx>,
|
2017-11-23 23:03:47 +02:00
|
|
|
cause: ObligationCause<'tcx>,
|
|
|
|
param_env: ty::ParamEnv<'tcx>,
|
2020-10-24 02:21:18 +02:00
|
|
|
value: T,
|
2019-06-14 01:32:15 +03:00
|
|
|
) -> Result<T, Vec<FulfillmentError<'tcx>>>
|
|
|
|
where
|
|
|
|
T: TypeFoldable<'tcx>,
|
2017-11-23 23:03:47 +02:00
|
|
|
{
|
2022-11-02 00:48:44 +00:00
|
|
|
let ocx = ObligationCtxt::new(infcx);
|
|
|
|
debug!(?value);
|
2022-11-25 18:40:52 +00:00
|
|
|
let normalized_value = ocx.normalize(&cause, param_env, value);
|
2022-11-02 00:48:44 +00:00
|
|
|
debug!(?normalized_value);
|
|
|
|
debug!("select_all_or_error start");
|
|
|
|
let errors = ocx.select_all_or_error();
|
2021-11-08 23:35:23 +08:00
|
|
|
if !errors.is_empty() {
|
|
|
|
return Err(errors);
|
|
|
|
}
|
2022-11-02 00:48:44 +00:00
|
|
|
debug!("select_all_or_error complete");
|
2020-10-24 02:21:18 +02:00
|
|
|
let resolved_value = infcx.resolve_vars_if_possible(normalized_value);
|
2022-11-02 00:48:44 +00:00
|
|
|
debug!(?resolved_value);
|
2015-02-13 19:51:43 -05:00
|
|
|
Ok(resolved_value)
|
|
|
|
}
|
|
|
|
|
2022-08-04 13:59:25 +00:00
|
|
|
/// Process an obligation (and any nested obligations that come from it) to
|
|
|
|
/// completion, returning any errors
|
2022-09-09 13:01:06 -05:00
|
|
|
pub fn fully_solve_obligation<'tcx>(
|
|
|
|
infcx: &InferCtxt<'tcx>,
|
2022-08-02 06:02:04 +00:00
|
|
|
obligation: PredicateObligation<'tcx>,
|
|
|
|
) -> Vec<FulfillmentError<'tcx>> {
|
2022-11-17 11:44:24 -03:00
|
|
|
fully_solve_obligations(infcx, [obligation])
|
2022-08-02 06:02:04 +00:00
|
|
|
}
|
|
|
|
|
2022-08-04 13:59:25 +00:00
|
|
|
/// Process a set of obligations (and any nested obligations that come from them)
|
|
|
|
/// to completion
|
2022-09-09 13:01:06 -05:00
|
|
|
pub fn fully_solve_obligations<'tcx>(
|
|
|
|
infcx: &InferCtxt<'tcx>,
|
2022-08-02 06:02:04 +00:00
|
|
|
obligations: impl IntoIterator<Item = PredicateObligation<'tcx>>,
|
|
|
|
) -> Vec<FulfillmentError<'tcx>> {
|
2022-11-16 15:58:48 -03:00
|
|
|
let ocx = ObligationCtxt::new(infcx);
|
|
|
|
ocx.register_obligations(obligations);
|
|
|
|
ocx.select_all_or_error()
|
2022-08-02 06:02:04 +00:00
|
|
|
}
|
|
|
|
|
2022-08-04 13:59:25 +00:00
|
|
|
/// Process a bound (and any nested obligations that come from it) to completion.
|
|
|
|
/// This is a convenience function for traits that have no generic arguments, such
|
|
|
|
/// as auto traits, and builtin traits like Copy or Sized.
|
2022-09-09 13:01:06 -05:00
|
|
|
pub fn fully_solve_bound<'tcx>(
|
|
|
|
infcx: &InferCtxt<'tcx>,
|
2022-08-02 06:02:04 +00:00
|
|
|
cause: ObligationCause<'tcx>,
|
|
|
|
param_env: ty::ParamEnv<'tcx>,
|
|
|
|
ty: Ty<'tcx>,
|
|
|
|
bound: DefId,
|
|
|
|
) -> Vec<FulfillmentError<'tcx>> {
|
2022-11-17 11:44:24 -03:00
|
|
|
let tcx = infcx.tcx;
|
2022-12-13 10:44:35 +00:00
|
|
|
let trait_ref = tcx.mk_trait_ref(bound, [ty]);
|
|
|
|
let obligation = Obligation::new(tcx, cause, param_env, ty::Binder::dummy(trait_ref));
|
2022-11-17 11:44:24 -03:00
|
|
|
|
|
|
|
fully_solve_obligation(infcx, obligation)
|
2022-08-02 06:02:04 +00:00
|
|
|
}
|
|
|
|
|
2020-06-22 13:22:45 +01:00
|
|
|
/// Normalizes the predicates and checks whether they hold in an empty environment. If this
|
|
|
|
/// returns true, then either normalize encountered an error or one of the predicates did not
|
|
|
|
/// hold. Used when creating vtables to check for unsatisfiable methods.
|
|
|
|
pub fn impossible_predicates<'tcx>(
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2019-06-12 00:11:55 +03:00
|
|
|
predicates: Vec<ty::Predicate<'tcx>>,
|
|
|
|
) -> bool {
|
2020-06-22 13:22:45 +01:00
|
|
|
debug!("impossible_predicates(predicates={:?})", predicates);
|
2016-09-19 12:47:47 +03:00
|
|
|
|
2017-06-21 14:50:43 +03:00
|
|
|
let infcx = tcx.infer_ctxt().build();
|
2018-02-10 13:18:02 -05:00
|
|
|
let param_env = ty::ParamEnv::reveal_all();
|
2022-07-26 04:01:34 +00:00
|
|
|
let ocx = ObligationCtxt::new(&infcx);
|
2022-11-25 18:40:52 +00:00
|
|
|
let predicates = ocx.normalize(&ObligationCause::dummy(), param_env, predicates);
|
2016-09-19 12:47:47 +03:00
|
|
|
for predicate in predicates {
|
2022-11-09 10:49:28 +00:00
|
|
|
let obligation = Obligation::new(tcx, ObligationCause::dummy(), param_env, predicate);
|
2022-07-26 04:01:34 +00:00
|
|
|
ocx.register_obligation(obligation);
|
2016-09-19 12:47:47 +03:00
|
|
|
}
|
2022-07-26 04:01:34 +00:00
|
|
|
let errors = ocx.select_all_or_error();
|
2021-11-08 23:35:23 +08:00
|
|
|
|
|
|
|
let result = !errors.is_empty();
|
2020-10-24 02:21:18 +02:00
|
|
|
debug!("impossible_predicates = {:?}", result);
|
2017-06-21 14:50:43 +03:00
|
|
|
result
|
2016-09-19 12:47:47 +03:00
|
|
|
}
|
|
|
|
|
2020-06-22 13:22:45 +01:00
|
|
|
fn subst_and_check_impossible_predicates<'tcx>(
|
2019-06-14 00:48:52 +03:00
|
|
|
tcx: TyCtxt<'tcx>,
|
2020-01-16 18:47:52 -05:00
|
|
|
key: (DefId, SubstsRef<'tcx>),
|
2019-06-12 00:11:55 +03:00
|
|
|
) -> bool {
|
2020-06-22 13:22:45 +01:00
|
|
|
debug!("subst_and_check_impossible_predicates(key={:?})", key);
|
2017-12-27 12:32:44 -05:00
|
|
|
|
2020-06-22 13:22:45 +01:00
|
|
|
let mut predicates = tcx.predicates_of(key.0).instantiate(tcx, key.1).predicates;
|
2022-05-07 10:24:45 +02:00
|
|
|
|
|
|
|
// Specifically check trait fulfillment to avoid an error when trying to resolve
|
|
|
|
// associated items.
|
|
|
|
if let Some(trait_def_id) = tcx.trait_of_item(key.0) {
|
|
|
|
let trait_ref = ty::TraitRef::from_method(tcx, trait_def_id, key.1);
|
2022-11-18 14:10:36 +00:00
|
|
|
predicates.push(ty::Binder::dummy(trait_ref).to_predicate(tcx));
|
2022-05-07 10:24:45 +02:00
|
|
|
}
|
|
|
|
|
2022-01-12 03:19:52 +00:00
|
|
|
predicates.retain(|predicate| !predicate.needs_subst());
|
2020-06-22 13:22:45 +01:00
|
|
|
let result = impossible_predicates(tcx, predicates);
|
2017-12-27 12:32:44 -05:00
|
|
|
|
2020-06-22 13:22:45 +01:00
|
|
|
debug!("subst_and_check_impossible_predicates(key={:?}) = {:?}", key, result);
|
2017-12-27 12:32:44 -05:00
|
|
|
result
|
|
|
|
}
|
|
|
|
|
2022-08-07 05:47:32 +00:00
|
|
|
/// Checks whether a trait's method is impossible to call on a given impl.
|
|
|
|
///
|
|
|
|
/// This only considers predicates that reference the impl's generics, and not
|
|
|
|
/// those that reference the method's generics.
|
2022-12-20 22:10:40 +01:00
|
|
|
fn is_impossible_method(tcx: TyCtxt<'_>, (impl_def_id, trait_item_def_id): (DefId, DefId)) -> bool {
|
2022-08-07 05:47:32 +00:00
|
|
|
struct ReferencesOnlyParentGenerics<'tcx> {
|
|
|
|
tcx: TyCtxt<'tcx>,
|
|
|
|
generics: &'tcx ty::Generics,
|
|
|
|
trait_item_def_id: DefId,
|
|
|
|
}
|
|
|
|
impl<'tcx> ty::TypeVisitor<'tcx> for ReferencesOnlyParentGenerics<'tcx> {
|
|
|
|
type BreakTy = ();
|
|
|
|
fn visit_ty(&mut self, t: Ty<'tcx>) -> ControlFlow<Self::BreakTy> {
|
|
|
|
// If this is a parameter from the trait item's own generics, then bail
|
|
|
|
if let ty::Param(param) = t.kind()
|
|
|
|
&& let param_def_id = self.generics.type_param(param, self.tcx).def_id
|
|
|
|
&& self.tcx.parent(param_def_id) == self.trait_item_def_id
|
|
|
|
{
|
2023-01-17 23:17:13 -08:00
|
|
|
return ControlFlow::Break(());
|
2022-08-07 05:47:32 +00:00
|
|
|
}
|
|
|
|
t.super_visit_with(self)
|
|
|
|
}
|
|
|
|
fn visit_region(&mut self, r: ty::Region<'tcx>) -> ControlFlow<Self::BreakTy> {
|
|
|
|
if let ty::ReEarlyBound(param) = r.kind()
|
|
|
|
&& let param_def_id = self.generics.region_param(¶m, self.tcx).def_id
|
|
|
|
&& self.tcx.parent(param_def_id) == self.trait_item_def_id
|
|
|
|
{
|
2023-01-17 23:17:13 -08:00
|
|
|
return ControlFlow::Break(());
|
2022-08-07 05:47:32 +00:00
|
|
|
}
|
|
|
|
r.super_visit_with(self)
|
|
|
|
}
|
|
|
|
fn visit_const(&mut self, ct: ty::Const<'tcx>) -> ControlFlow<Self::BreakTy> {
|
|
|
|
if let ty::ConstKind::Param(param) = ct.kind()
|
|
|
|
&& let param_def_id = self.generics.const_param(¶m, self.tcx).def_id
|
|
|
|
&& self.tcx.parent(param_def_id) == self.trait_item_def_id
|
|
|
|
{
|
2023-01-17 23:17:13 -08:00
|
|
|
return ControlFlow::Break(());
|
2022-08-07 05:47:32 +00:00
|
|
|
}
|
|
|
|
ct.super_visit_with(self)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let generics = tcx.generics_of(trait_item_def_id);
|
|
|
|
let predicates = tcx.predicates_of(trait_item_def_id);
|
2023-01-10 14:22:52 -07:00
|
|
|
let impl_trait_ref = tcx
|
2023-01-10 14:57:22 -07:00
|
|
|
.impl_trait_ref(impl_def_id)
|
2023-01-10 14:22:52 -07:00
|
|
|
.expect("expected impl to correspond to trait")
|
|
|
|
.subst_identity();
|
2022-08-07 05:47:32 +00:00
|
|
|
let param_env = tcx.param_env(impl_def_id);
|
|
|
|
|
|
|
|
let mut visitor = ReferencesOnlyParentGenerics { tcx, generics, trait_item_def_id };
|
|
|
|
let predicates_for_trait = predicates.predicates.iter().filter_map(|(pred, span)| {
|
|
|
|
if pred.visit_with(&mut visitor).is_continue() {
|
|
|
|
Some(Obligation::new(
|
2022-11-09 10:49:28 +00:00
|
|
|
tcx,
|
2022-08-07 05:47:32 +00:00
|
|
|
ObligationCause::dummy_with_span(*span),
|
|
|
|
param_env,
|
|
|
|
ty::EarlyBinder(*pred).subst(tcx, impl_trait_ref.substs),
|
|
|
|
))
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
let infcx = tcx.infer_ctxt().ignoring_regions().build();
|
2022-08-18 01:12:46 +00:00
|
|
|
for obligation in predicates_for_trait {
|
|
|
|
// Ignore overflow error, to be conservative.
|
|
|
|
if let Ok(result) = infcx.evaluate_obligation(&obligation)
|
|
|
|
&& !result.may_apply()
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
2022-09-19 22:03:59 -05:00
|
|
|
}
|
2022-08-18 01:12:46 +00:00
|
|
|
false
|
2022-08-07 05:47:32 +00:00
|
|
|
}
|
|
|
|
|
2020-07-05 23:00:14 +03:00
|
|
|
pub fn provide(providers: &mut ty::query::Providers) {
|
2020-02-10 19:55:49 +01:00
|
|
|
object_safety::provide(providers);
|
2022-12-08 04:51:46 +00:00
|
|
|
vtable::provide(providers);
|
2018-06-13 16:44:43 +03:00
|
|
|
*providers = ty::query::Providers {
|
2017-05-11 16:01:19 +02:00
|
|
|
specialization_graph_of: specialize::specialization_graph_provider,
|
2017-08-29 09:25:25 -07:00
|
|
|
specializes: specialize::specializes,
|
2020-06-22 13:22:45 +01:00
|
|
|
subst_and_check_impossible_predicates,
|
2023-02-11 23:05:11 +00:00
|
|
|
check_const_param_definitely_unequal: misc::check_const_param_definitely_unequal,
|
2022-08-07 05:47:32 +00:00
|
|
|
is_impossible_method,
|
2017-05-11 16:01:19 +02:00
|
|
|
..*providers
|
|
|
|
};
|
|
|
|
}
|