Auto merge of #135278 - tgross35:ignore-std-dep-crates, r=SparrowLii

Exclude dependencies of `std` for diagnostics

Currently crates in the sysroot can show up in diagnostic suggestions, such as in https://github.com/rust-lang/rust/issues/135232. To prevent this, duplicate `all_traits` into `visible_traits` which only shows traits in non-private crates.

Setting `#![feature(rustc_private)]` overrides this and makes items in private crates visible as well, since `rustc_private` enables use of `std`'s private dependencies.

This may be reviewed per-commit.

Fixes: https://github.com/rust-lang/rust/issues/135232
This commit is contained in:
bors 2025-01-14 14:15:39 +00:00
commit 8c39ce5b4f
11 changed files with 225 additions and 44 deletions

View file

@ -179,7 +179,7 @@ impl<'tcx> dyn HirTyLowerer<'tcx> + '_ {
// all visible traits. If there's one clear winner, just suggest that. // all visible traits. If there's one clear winner, just suggest that.
let visible_traits: Vec<_> = tcx let visible_traits: Vec<_> = tcx
.all_traits() .visible_traits()
.filter(|trait_def_id| { .filter(|trait_def_id| {
let viz = tcx.visibility(*trait_def_id); let viz = tcx.visibility(*trait_def_id);
let def_id = self.item_def_id(); let def_id = self.item_def_id();

View file

@ -29,7 +29,7 @@ use rustc_session::lint::{self, BuiltinLintDiag};
use rustc_session::output::validate_crate_name; use rustc_session::output::validate_crate_name;
use rustc_session::search_paths::PathKind; use rustc_session::search_paths::PathKind;
use rustc_span::edition::Edition; use rustc_span::edition::Edition;
use rustc_span::{DUMMY_SP, Ident, Span, Symbol, sym}; use rustc_span::{DUMMY_SP, Ident, STDLIB_STABLE_CRATES, Span, Symbol, sym};
use rustc_target::spec::{PanicStrategy, Target, TargetTuple}; use rustc_target::spec::{PanicStrategy, Target, TargetTuple};
use tracing::{debug, info, trace}; use tracing::{debug, info, trace};
@ -390,19 +390,51 @@ impl<'a, 'tcx> CrateLoader<'a, 'tcx> {
None None
} }
// The `dependency` type is determined by the command line arguments(`--extern`) and /// Determine whether a dependency should be considered private.
// `private_dep`. However, sometimes the directly dependent crate is not specified by ///
// `--extern`, in this case, `private-dep` is none during loading. This is equivalent to the /// Dependencies are private if they get extern option specified, e.g. `--extern priv:mycrate`.
// scenario where the command parameter is set to `public-dependency` /// This is stored in metadata, so `private_dep` can be correctly set during load. A `Some`
fn is_private_dep(&self, name: &str, private_dep: Option<bool>) -> bool { /// value for `private_dep` indicates that the crate is known to be private or public (note
self.sess.opts.externs.get(name).map_or(private_dep.unwrap_or(false), |e| e.is_private_dep) /// that any `None` or `Some(false)` use of the same crate will make it public).
&& private_dep.unwrap_or(true) ///
/// Sometimes the directly dependent crate is not specified by `--extern`, in this case,
/// `private-dep` is none during loading. This is equivalent to the scenario where the
/// command parameter is set to `public-dependency`
fn is_private_dep(
&self,
name: Symbol,
private_dep: Option<bool>,
dep_root: Option<&CratePaths>,
) -> bool {
// Standard library crates are never private.
if STDLIB_STABLE_CRATES.contains(&name) {
tracing::info!("returning false for {name} is private");
return false;
}
let extern_private = self.sess.opts.externs.get(name.as_str()).map(|e| e.is_private_dep);
// Any descendants of `std` should be private. These crates are usually not marked
// private in metadata, so we ignore that field.
if extern_private.is_none()
&& dep_root.map_or(false, |d| STDLIB_STABLE_CRATES.contains(&d.name))
{
return true;
}
match (extern_private, private_dep) {
// Explicit non-private via `--extern`, explicit non-private from metadata, or
// unspecified with default to public.
(Some(false), _) | (_, Some(false)) | (None, None) => false,
// Marked private via `--extern priv:mycrate` or in metadata.
(Some(true) | None, Some(true) | None) => true,
}
} }
fn register_crate( fn register_crate(
&mut self, &mut self,
host_lib: Option<Library>, host_lib: Option<Library>,
root: Option<&CratePaths>, dep_root: Option<&CratePaths>,
lib: Library, lib: Library,
dep_kind: CrateDepKind, dep_kind: CrateDepKind,
name: Symbol, name: Symbol,
@ -414,7 +446,7 @@ impl<'a, 'tcx> CrateLoader<'a, 'tcx> {
let Library { source, metadata } = lib; let Library { source, metadata } = lib;
let crate_root = metadata.get_root(); let crate_root = metadata.get_root();
let host_hash = host_lib.as_ref().map(|lib| lib.metadata.get_root().hash()); let host_hash = host_lib.as_ref().map(|lib| lib.metadata.get_root().hash());
let private_dep = self.is_private_dep(name.as_str(), private_dep); let private_dep = self.is_private_dep(name, private_dep, dep_root);
// Claim this crate number and cache it // Claim this crate number and cache it
let feed = self.cstore.intern_stable_crate_id(&crate_root, self.tcx)?; let feed = self.cstore.intern_stable_crate_id(&crate_root, self.tcx)?;
@ -430,14 +462,14 @@ impl<'a, 'tcx> CrateLoader<'a, 'tcx> {
// Maintain a reference to the top most crate. // Maintain a reference to the top most crate.
// Stash paths for top-most crate locally if necessary. // Stash paths for top-most crate locally if necessary.
let crate_paths; let crate_paths;
let root = if let Some(root) = root { let dep_root = if let Some(dep_root) = dep_root {
root dep_root
} else { } else {
crate_paths = CratePaths::new(crate_root.name(), source.clone()); crate_paths = CratePaths::new(crate_root.name(), source.clone());
&crate_paths &crate_paths
}; };
let cnum_map = self.resolve_crate_deps(root, &crate_root, &metadata, cnum, dep_kind)?; let cnum_map = self.resolve_crate_deps(dep_root, &crate_root, &metadata, cnum, dep_kind)?;
let raw_proc_macros = if crate_root.is_proc_macro_crate() { let raw_proc_macros = if crate_root.is_proc_macro_crate() {
let temp_root; let temp_root;
@ -559,23 +591,21 @@ impl<'a, 'tcx> CrateLoader<'a, 'tcx> {
&'b mut self, &'b mut self,
name: Symbol, name: Symbol,
mut dep_kind: CrateDepKind, mut dep_kind: CrateDepKind,
dep: Option<(&'b CratePaths, &'b CrateDep)>, dep_of: Option<(&'b CratePaths, &'b CrateDep)>,
) -> Result<CrateNum, CrateError> { ) -> Result<CrateNum, CrateError> {
info!("resolving crate `{}`", name); info!("resolving crate `{}`", name);
if !name.as_str().is_ascii() { if !name.as_str().is_ascii() {
return Err(CrateError::NonAsciiName(name)); return Err(CrateError::NonAsciiName(name));
} }
let (root, hash, host_hash, extra_filename, path_kind, private_dep) = match dep {
Some((root, dep)) => ( let dep_root = dep_of.map(|d| d.0);
Some(root), let dep = dep_of.map(|d| d.1);
Some(dep.hash), let hash = dep.map(|d| d.hash);
dep.host_hash, let host_hash = dep.map(|d| d.host_hash).flatten();
Some(&dep.extra_filename[..]), let extra_filename = dep.map(|d| &d.extra_filename[..]);
PathKind::Dependency, let path_kind = if dep.is_some() { PathKind::Dependency } else { PathKind::Crate };
Some(dep.is_private), let private_dep = dep.map(|d| d.is_private);
),
None => (None, None, None, None, PathKind::Crate, None),
};
let result = if let Some(cnum) = self.existing_match(name, hash, path_kind) { let result = if let Some(cnum) = self.existing_match(name, hash, path_kind) {
(LoadResult::Previous(cnum), None) (LoadResult::Previous(cnum), None)
} else { } else {
@ -599,7 +629,7 @@ impl<'a, 'tcx> CrateLoader<'a, 'tcx> {
dep_kind = CrateDepKind::MacrosOnly; dep_kind = CrateDepKind::MacrosOnly;
match self.load_proc_macro(&mut locator, path_kind, host_hash)? { match self.load_proc_macro(&mut locator, path_kind, host_hash)? {
Some(res) => res, Some(res) => res,
None => return Err(locator.into_error(root.cloned())), None => return Err(locator.into_error(dep_root.cloned())),
} }
} }
} }
@ -612,7 +642,7 @@ impl<'a, 'tcx> CrateLoader<'a, 'tcx> {
// not specified by `--extern` on command line parameters, it may be // not specified by `--extern` on command line parameters, it may be
// `private-dependency` when `register_crate` is called for the first time. Then it must be updated to // `private-dependency` when `register_crate` is called for the first time. Then it must be updated to
// `public-dependency` here. // `public-dependency` here.
let private_dep = self.is_private_dep(name.as_str(), private_dep); let private_dep = self.is_private_dep(name, private_dep, dep_root);
let data = self.cstore.get_crate_data_mut(cnum); let data = self.cstore.get_crate_data_mut(cnum);
if data.is_proc_macro_crate() { if data.is_proc_macro_crate() {
dep_kind = CrateDepKind::MacrosOnly; dep_kind = CrateDepKind::MacrosOnly;
@ -623,7 +653,7 @@ impl<'a, 'tcx> CrateLoader<'a, 'tcx> {
} }
(LoadResult::Loaded(library), host_library) => { (LoadResult::Loaded(library), host_library) => {
info!("register newly loaded library for `{}`", name); info!("register newly loaded library for `{}`", name);
self.register_crate(host_library, root, library, dep_kind, name, private_dep) self.register_crate(host_library, dep_root, library, dep_kind, name, private_dep)
} }
_ => panic!(), _ => panic!(),
} }
@ -663,16 +693,20 @@ impl<'a, 'tcx> CrateLoader<'a, 'tcx> {
})) }))
} }
// Go through the crate metadata and load any crates that it references /// Go through the crate metadata and load any crates that it references.
fn resolve_crate_deps( fn resolve_crate_deps(
&mut self, &mut self,
root: &CratePaths, dep_root: &CratePaths,
crate_root: &CrateRoot, crate_root: &CrateRoot,
metadata: &MetadataBlob, metadata: &MetadataBlob,
krate: CrateNum, krate: CrateNum,
dep_kind: CrateDepKind, dep_kind: CrateDepKind,
) -> Result<CrateNumMap, CrateError> { ) -> Result<CrateNumMap, CrateError> {
debug!("resolving deps of external crate"); debug!(
"resolving deps of external crate `{}` with dep root `{}`",
crate_root.name(),
dep_root.name
);
if crate_root.is_proc_macro_crate() { if crate_root.is_proc_macro_crate() {
return Ok(CrateNumMap::new()); return Ok(CrateNumMap::new());
} }
@ -685,14 +719,17 @@ impl<'a, 'tcx> CrateLoader<'a, 'tcx> {
crate_num_map.push(krate); crate_num_map.push(krate);
for dep in deps { for dep in deps {
info!( info!(
"resolving dep crate {} hash: `{}` extra filename: `{}`", "resolving dep `{}`->`{}` hash: `{}` extra filename: `{}`",
dep.name, dep.hash, dep.extra_filename crate_root.name(),
dep.name,
dep.hash,
dep.extra_filename
); );
let dep_kind = match dep_kind { let dep_kind = match dep_kind {
CrateDepKind::MacrosOnly => CrateDepKind::MacrosOnly, CrateDepKind::MacrosOnly => CrateDepKind::MacrosOnly,
_ => dep.kind, _ => dep.kind,
}; };
let cnum = self.maybe_resolve_crate(dep.name, dep_kind, Some((root, &dep)))?; let cnum = self.maybe_resolve_crate(dep.name, dep_kind, Some((dep_root, &dep)))?;
crate_num_map.push(cnum); crate_num_map.push(cnum);
} }

View file

@ -262,7 +262,7 @@ pub(crate) struct CrateLocator<'a> {
#[derive(Clone)] #[derive(Clone)]
pub(crate) struct CratePaths { pub(crate) struct CratePaths {
name: Symbol, pub(crate) name: Symbol,
source: CrateSource, source: CrateSource,
} }
@ -765,10 +765,10 @@ impl<'a> CrateLocator<'a> {
self.extract_lib(rlibs, rmetas, dylibs).map(|opt| opt.map(|(_, lib)| lib)) self.extract_lib(rlibs, rmetas, dylibs).map(|opt| opt.map(|(_, lib)| lib))
} }
pub(crate) fn into_error(self, root: Option<CratePaths>) -> CrateError { pub(crate) fn into_error(self, dep_root: Option<CratePaths>) -> CrateError {
CrateError::LocatorCombined(Box::new(CombinedLocatorError { CrateError::LocatorCombined(Box::new(CombinedLocatorError {
crate_name: self.crate_name, crate_name: self.crate_name,
root, dep_root,
triple: self.tuple, triple: self.tuple,
dll_prefix: self.target.dll_prefix.to_string(), dll_prefix: self.target.dll_prefix.to_string(),
dll_suffix: self.target.dll_suffix.to_string(), dll_suffix: self.target.dll_suffix.to_string(),
@ -914,7 +914,7 @@ struct CrateRejections {
/// otherwise they are ignored. /// otherwise they are ignored.
pub(crate) struct CombinedLocatorError { pub(crate) struct CombinedLocatorError {
crate_name: Symbol, crate_name: Symbol,
root: Option<CratePaths>, dep_root: Option<CratePaths>,
triple: TargetTuple, triple: TargetTuple,
dll_prefix: String, dll_prefix: String,
dll_suffix: String, dll_suffix: String,
@ -987,7 +987,7 @@ impl CrateError {
} }
CrateError::LocatorCombined(locator) => { CrateError::LocatorCombined(locator) => {
let crate_name = locator.crate_name; let crate_name = locator.crate_name;
let add_info = match &locator.root { let add_info = match &locator.dep_root {
None => String::new(), None => String::new(),
Some(r) => format!(" which `{}` depends on", r.name), Some(r) => format!(" which `{}` depends on", r.name),
}; };
@ -1012,7 +1012,7 @@ impl CrateError {
path.display() path.display()
)); ));
} }
if let Some(r) = locator.root { if let Some(r) = locator.dep_root {
for path in r.source.paths() { for path in r.source.paths() {
found_crates.push_str(&format!( found_crates.push_str(&format!(
"\ncrate `{}`: {}", "\ncrate `{}`: {}",

View file

@ -2129,6 +2129,8 @@ rustc_queries! {
eval_always eval_always
desc { "calculating the stability index for the local crate" } desc { "calculating the stability index for the local crate" }
} }
/// All available crates in the graph, including those that should not be user-facing
/// (such as private crates).
query crates(_: ()) -> &'tcx [CrateNum] { query crates(_: ()) -> &'tcx [CrateNum] {
eval_always eval_always
desc { "fetching all foreign CrateNum instances" } desc { "fetching all foreign CrateNum instances" }

View file

@ -2078,12 +2078,23 @@ impl<'tcx> TyCtxt<'tcx> {
self.limits(()).move_size_limit self.limits(()).move_size_limit
} }
/// All traits in the crate graph, including those not visible to the user.
pub fn all_traits(self) -> impl Iterator<Item = DefId> + 'tcx { pub fn all_traits(self) -> impl Iterator<Item = DefId> + 'tcx {
iter::once(LOCAL_CRATE) iter::once(LOCAL_CRATE)
.chain(self.crates(()).iter().copied()) .chain(self.crates(()).iter().copied())
.flat_map(move |cnum| self.traits(cnum).iter().copied()) .flat_map(move |cnum| self.traits(cnum).iter().copied())
} }
/// All traits that are visible within the crate graph (i.e. excluding private dependencies).
pub fn visible_traits(self) -> impl Iterator<Item = DefId> + 'tcx {
let visible_crates =
self.crates(()).iter().copied().filter(move |cnum| self.is_user_visible_dep(*cnum));
iter::once(LOCAL_CRATE)
.chain(visible_crates)
.flat_map(move |cnum| self.traits(cnum).iter().copied())
}
#[inline] #[inline]
pub fn local_visibility(self, def_id: LocalDefId) -> Visibility { pub fn local_visibility(self, def_id: LocalDefId) -> Visibility {
self.visibility(def_id).expect_local() self.visibility(def_id).expect_local()

View file

@ -876,6 +876,11 @@ impl<'tcx> TyCtxt<'tcx> {
/// [public]: TyCtxt::is_private_dep /// [public]: TyCtxt::is_private_dep
/// [direct]: rustc_session::cstore::ExternCrate::is_direct /// [direct]: rustc_session::cstore::ExternCrate::is_direct
pub fn is_user_visible_dep(self, key: CrateNum) -> bool { pub fn is_user_visible_dep(self, key: CrateNum) -> bool {
// `#![rustc_private]` overrides defaults to make private dependencies usable.
if self.features().enabled(sym::rustc_private) {
return true;
}
// | Private | Direct | Visible | | // | Private | Direct | Visible | |
// |---------|--------|---------|--------------------| // |---------|--------|---------|--------------------|
// | Yes | Yes | Yes | !true || true | // | Yes | Yes | Yes | !true || true |

View file

@ -79,8 +79,14 @@ fn all_diagnostic_items(tcx: TyCtxt<'_>, (): ()) -> DiagnosticItems {
// Initialize the collector. // Initialize the collector.
let mut items = DiagnosticItems::default(); let mut items = DiagnosticItems::default();
// Collect diagnostic items in other crates. // Collect diagnostic items in visible crates.
for &cnum in tcx.crates(()).iter().chain(std::iter::once(&LOCAL_CRATE)) { for cnum in tcx
.crates(())
.iter()
.copied()
.filter(|cnum| tcx.is_user_visible_dep(*cnum))
.chain(std::iter::once(LOCAL_CRATE))
{
for (&name, &def_id) in &tcx.diagnostic_items(cnum).name_to_id { for (&name, &def_id) in &tcx.diagnostic_items(cnum).name_to_id {
collect_item(tcx, &mut items, name, def_id); collect_item(tcx, &mut items, name, def_id);
} }

View file

@ -2189,7 +2189,7 @@ impl<'a, 'tcx> TypeErrCtxt<'a, 'tcx> {
let required_trait_path = self.tcx.def_path_str(trait_ref.def_id()); let required_trait_path = self.tcx.def_path_str(trait_ref.def_id());
let traits_with_same_path: UnordSet<_> = self let traits_with_same_path: UnordSet<_> = self
.tcx .tcx
.all_traits() .visible_traits()
.filter(|trait_def_id| *trait_def_id != trait_ref.def_id()) .filter(|trait_def_id| *trait_def_id != trait_ref.def_id())
.map(|trait_def_id| (self.tcx.def_path_str(trait_def_id), trait_def_id)) .map(|trait_def_id| (self.tcx.def_path_str(trait_def_id), trait_def_id))
.filter(|(p, _)| *p == required_trait_path) .filter(|(p, _)| *p == required_trait_path)

View file

@ -0,0 +1,39 @@
error[E0405]: cannot find trait `Equivalent` in this scope
--> $DIR/sysroot-private.rs:26:18
|
LL | trait Trait2<K>: Equivalent<K> {}
| ^^^^^^^^^^ not found in this scope
error[E0412]: cannot find type `K` in this scope
--> $DIR/sysroot-private.rs:31:35
|
LL | fn trait_member<T>(val: &T, key: &K) -> bool {
| - ^
| |
| similarly named type parameter `T` defined here
|
help: a type parameter with a similar name exists
|
LL | fn trait_member<T>(val: &T, key: &T) -> bool {
| ~
help: you might be missing a type parameter
|
LL | fn trait_member<T, K>(val: &T, key: &K) -> bool {
| +++
error[E0220]: associated type `ExpressionStack` not found for `Trait`
--> $DIR/sysroot-private.rs:21:31
|
LL | type AssociatedTy = dyn Trait<ExpressionStack = i32, Bar = i32>;
| ^^^^^^^^^^^^^^^ help: `Trait` has the following associated type: `Bar`
error[E0425]: cannot find function `memchr2` in this scope
--> $DIR/sysroot-private.rs:39:5
|
LL | memchr2(b'a', b'b', buf)
| ^^^^^^^ not found in this scope
error: aborting due to 4 previous errors
Some errors have detailed explanations: E0220, E0405, E0412, E0425.
For more information about an error, try `rustc --explain E0220`.

View file

@ -0,0 +1,42 @@
//! Test that private dependencies of `std` that live in the sysroot do not reach through to
//! diagnostics.
//!
//! This test would be more robust if we could patch the sysroot with an "evil" crate that
//! provided known types that we control; however, this would effectively require rebuilding
//! `std` (or patching crate metadata). So, this test relies on what is currently public API
//! of `std`'s dependencies, but may not be robust against dependency upgrades/changes.
//@ only-unix Windows sysroots seem to not expose this dependency
//@ revisions: default rustc_private_enabled
// Enabling `rustc_private` should `std`'s dependencies accessible, so they should show up
// in diagnostics. NB: not all diagnostics are affected by this.
#![cfg_attr(rustc_private_enabled, feature(rustc_private))]
#![crate_type = "lib"]
trait Trait { type Bar; }
// Attempt to get a suggestion for `gimli::read::op::EvaluationStoreage`, which should not be
// present in diagnostics (it is a dependency of the compiler).
type AssociatedTy = dyn Trait<ExpressionStack = i32, Bar = i32>;
//~^ ERROR associated type `ExpressionStack` not found
//[rustc_private_enabled]~| NOTE there is an associated type `ExpressionStack` in the trait `gimli::read::op::EvaluationStorage`
// Attempt to get a suggestion for `hashbrown::Equivalent`
trait Trait2<K>: Equivalent<K> {}
//~^ ERROR cannot find trait
//~| NOTE not found
// Attempt to get a suggestion for `hashbrown::Equivalent::equivalent`
fn trait_member<T>(val: &T, key: &K) -> bool {
//~^ ERROR cannot find type `K`
//~| NOTE similarly named
val.equivalent(key)
}
// Attempt to get a suggestion for `memchr::memchr2`
fn free_function(buf: &[u8]) -> Option<usize> {
memchr2(b'a', b'b', buf)
//~^ ERROR cannot find function
//~| NOTE not found
}

View file

@ -0,0 +1,39 @@
error[E0405]: cannot find trait `Equivalent` in this scope
--> $DIR/sysroot-private.rs:26:18
|
LL | trait Trait2<K>: Equivalent<K> {}
| ^^^^^^^^^^ not found in this scope
error[E0412]: cannot find type `K` in this scope
--> $DIR/sysroot-private.rs:31:35
|
LL | fn trait_member<T>(val: &T, key: &K) -> bool {
| - ^
| |
| similarly named type parameter `T` defined here
|
help: a type parameter with a similar name exists
|
LL | fn trait_member<T>(val: &T, key: &T) -> bool {
| ~
help: you might be missing a type parameter
|
LL | fn trait_member<T, K>(val: &T, key: &K) -> bool {
| +++
error[E0220]: associated type `ExpressionStack` not found for `Trait`
--> $DIR/sysroot-private.rs:21:31
|
LL | type AssociatedTy = dyn Trait<ExpressionStack = i32, Bar = i32>;
| ^^^^^^^^^^^^^^^ there is an associated type `ExpressionStack` in the trait `gimli::read::op::EvaluationStorage`
error[E0425]: cannot find function `memchr2` in this scope
--> $DIR/sysroot-private.rs:39:5
|
LL | memchr2(b'a', b'b', buf)
| ^^^^^^^ not found in this scope
error: aborting due to 4 previous errors
Some errors have detailed explanations: E0220, E0405, E0412, E0425.
For more information about an error, try `rustc --explain E0220`.