Auto merge of #70222 - Dylan-DPC:rollup-cwkv5ez, r=Dylan-DPC

Rollup of 6 pull requests

Successful merges:

 - #69497 (Don't unwind when hitting the macro expansion recursion limit)
 - #69901 (add #[rustc_layout(debug)])
 - #69910 (Avoid query type in generics)
 - #69955 (Fix abort-on-eprintln during process shutdown)
 - #70032 (put type params in front of const params in generics_of)
 - #70119 (rustc: use LocalDefId instead of DefId in TypeckTables.)

Failed merges:

r? @ghost
This commit is contained in:
bors 2020-03-21 13:26:44 +00:00
commit 7900b2bc13
39 changed files with 946 additions and 478 deletions

View File

@ -188,37 +188,37 @@ pub struct CommonConsts<'tcx> {
} }
pub struct LocalTableInContext<'a, V> { pub struct LocalTableInContext<'a, V> {
local_id_root: Option<DefId>, hir_owner: Option<LocalDefId>,
data: &'a ItemLocalMap<V>, data: &'a ItemLocalMap<V>,
} }
/// Validate that the given HirId (respectively its `local_id` part) can be /// Validate that the given HirId (respectively its `local_id` part) can be
/// safely used as a key in the tables of a TypeckTable. For that to be /// safely used as a key in the tables of a TypeckTable. For that to be
/// the case, the HirId must have the same `owner` as all the other IDs in /// the case, the HirId must have the same `owner` as all the other IDs in
/// this table (signified by `local_id_root`). Otherwise the HirId /// this table (signified by `hir_owner`). Otherwise the HirId
/// would be in a different frame of reference and using its `local_id` /// would be in a different frame of reference and using its `local_id`
/// would result in lookup errors, or worse, in silently wrong data being /// would result in lookup errors, or worse, in silently wrong data being
/// stored/returned. /// stored/returned.
fn validate_hir_id_for_typeck_tables( fn validate_hir_id_for_typeck_tables(
local_id_root: Option<DefId>, hir_owner: Option<LocalDefId>,
hir_id: hir::HirId, hir_id: hir::HirId,
mut_access: bool, mut_access: bool,
) { ) {
if let Some(local_id_root) = local_id_root { if let Some(hir_owner) = hir_owner {
if hir_id.owner.to_def_id() != local_id_root { if hir_id.owner != hir_owner {
ty::tls::with(|tcx| { ty::tls::with(|tcx| {
bug!( bug!(
"node {} with HirId::owner {:?} cannot be placed in \ "node {} with HirId::owner {:?} cannot be placed in \
TypeckTables with local_id_root {:?}", TypeckTables with hir_owner {:?}",
tcx.hir().node_to_string(hir_id), tcx.hir().node_to_string(hir_id),
hir_id.owner, hir_id.owner,
local_id_root hir_owner
) )
}); });
} }
} else { } else {
// We use "Null Object" TypeckTables in some of the analysis passes. // We use "Null Object" TypeckTables in some of the analysis passes.
// These are just expected to be empty and their `local_id_root` is // These are just expected to be empty and their `hir_owner` is
// `None`. Therefore we cannot verify whether a given `HirId` would // `None`. Therefore we cannot verify whether a given `HirId` would
// be a valid key for the given table. Instead we make sure that // be a valid key for the given table. Instead we make sure that
// nobody tries to write to such a Null Object table. // nobody tries to write to such a Null Object table.
@ -230,12 +230,12 @@ fn validate_hir_id_for_typeck_tables(
impl<'a, V> LocalTableInContext<'a, V> { impl<'a, V> LocalTableInContext<'a, V> {
pub fn contains_key(&self, id: hir::HirId) -> bool { pub fn contains_key(&self, id: hir::HirId) -> bool {
validate_hir_id_for_typeck_tables(self.local_id_root, id, false); validate_hir_id_for_typeck_tables(self.hir_owner, id, false);
self.data.contains_key(&id.local_id) self.data.contains_key(&id.local_id)
} }
pub fn get(&self, id: hir::HirId) -> Option<&V> { pub fn get(&self, id: hir::HirId) -> Option<&V> {
validate_hir_id_for_typeck_tables(self.local_id_root, id, false); validate_hir_id_for_typeck_tables(self.hir_owner, id, false);
self.data.get(&id.local_id) self.data.get(&id.local_id)
} }
@ -253,28 +253,28 @@ impl<'a, V> ::std::ops::Index<hir::HirId> for LocalTableInContext<'a, V> {
} }
pub struct LocalTableInContextMut<'a, V> { pub struct LocalTableInContextMut<'a, V> {
local_id_root: Option<DefId>, hir_owner: Option<LocalDefId>,
data: &'a mut ItemLocalMap<V>, data: &'a mut ItemLocalMap<V>,
} }
impl<'a, V> LocalTableInContextMut<'a, V> { impl<'a, V> LocalTableInContextMut<'a, V> {
pub fn get_mut(&mut self, id: hir::HirId) -> Option<&mut V> { pub fn get_mut(&mut self, id: hir::HirId) -> Option<&mut V> {
validate_hir_id_for_typeck_tables(self.local_id_root, id, true); validate_hir_id_for_typeck_tables(self.hir_owner, id, true);
self.data.get_mut(&id.local_id) self.data.get_mut(&id.local_id)
} }
pub fn entry(&mut self, id: hir::HirId) -> Entry<'_, hir::ItemLocalId, V> { pub fn entry(&mut self, id: hir::HirId) -> Entry<'_, hir::ItemLocalId, V> {
validate_hir_id_for_typeck_tables(self.local_id_root, id, true); validate_hir_id_for_typeck_tables(self.hir_owner, id, true);
self.data.entry(id.local_id) self.data.entry(id.local_id)
} }
pub fn insert(&mut self, id: hir::HirId, val: V) -> Option<V> { pub fn insert(&mut self, id: hir::HirId, val: V) -> Option<V> {
validate_hir_id_for_typeck_tables(self.local_id_root, id, true); validate_hir_id_for_typeck_tables(self.hir_owner, id, true);
self.data.insert(id.local_id, val) self.data.insert(id.local_id, val)
} }
pub fn remove(&mut self, id: hir::HirId) -> Option<V> { pub fn remove(&mut self, id: hir::HirId) -> Option<V> {
validate_hir_id_for_typeck_tables(self.local_id_root, id, true); validate_hir_id_for_typeck_tables(self.hir_owner, id, true);
self.data.remove(&id.local_id) self.data.remove(&id.local_id)
} }
} }
@ -322,8 +322,8 @@ pub struct GeneratorInteriorTypeCause<'tcx> {
#[derive(RustcEncodable, RustcDecodable, Debug)] #[derive(RustcEncodable, RustcDecodable, Debug)]
pub struct TypeckTables<'tcx> { pub struct TypeckTables<'tcx> {
/// The HirId::owner all ItemLocalIds in this table are relative to. /// The `HirId::owner` all `ItemLocalId`s in this table are relative to.
pub local_id_root: Option<DefId>, pub hir_owner: Option<LocalDefId>,
/// Resolved definitions for `<T>::X` associated paths and /// Resolved definitions for `<T>::X` associated paths and
/// method calls, including those of overloaded operators. /// method calls, including those of overloaded operators.
@ -431,9 +431,9 @@ pub struct TypeckTables<'tcx> {
} }
impl<'tcx> TypeckTables<'tcx> { impl<'tcx> TypeckTables<'tcx> {
pub fn empty(local_id_root: Option<DefId>) -> TypeckTables<'tcx> { pub fn empty(hir_owner: Option<LocalDefId>) -> TypeckTables<'tcx> {
TypeckTables { TypeckTables {
local_id_root, hir_owner,
type_dependent_defs: Default::default(), type_dependent_defs: Default::default(),
field_indices: Default::default(), field_indices: Default::default(),
user_provided_types: Default::default(), user_provided_types: Default::default(),
@ -469,11 +469,11 @@ impl<'tcx> TypeckTables<'tcx> {
pub fn type_dependent_defs( pub fn type_dependent_defs(
&self, &self,
) -> LocalTableInContext<'_, Result<(DefKind, DefId), ErrorReported>> { ) -> LocalTableInContext<'_, Result<(DefKind, DefId), ErrorReported>> {
LocalTableInContext { local_id_root: self.local_id_root, data: &self.type_dependent_defs } LocalTableInContext { hir_owner: self.hir_owner, data: &self.type_dependent_defs }
} }
pub fn type_dependent_def(&self, id: HirId) -> Option<(DefKind, DefId)> { pub fn type_dependent_def(&self, id: HirId) -> Option<(DefKind, DefId)> {
validate_hir_id_for_typeck_tables(self.local_id_root, id, false); validate_hir_id_for_typeck_tables(self.hir_owner, id, false);
self.type_dependent_defs.get(&id.local_id).cloned().and_then(|r| r.ok()) self.type_dependent_defs.get(&id.local_id).cloned().and_then(|r| r.ok())
} }
@ -484,39 +484,33 @@ impl<'tcx> TypeckTables<'tcx> {
pub fn type_dependent_defs_mut( pub fn type_dependent_defs_mut(
&mut self, &mut self,
) -> LocalTableInContextMut<'_, Result<(DefKind, DefId), ErrorReported>> { ) -> LocalTableInContextMut<'_, Result<(DefKind, DefId), ErrorReported>> {
LocalTableInContextMut { LocalTableInContextMut { hir_owner: self.hir_owner, data: &mut self.type_dependent_defs }
local_id_root: self.local_id_root,
data: &mut self.type_dependent_defs,
}
} }
pub fn field_indices(&self) -> LocalTableInContext<'_, usize> { pub fn field_indices(&self) -> LocalTableInContext<'_, usize> {
LocalTableInContext { local_id_root: self.local_id_root, data: &self.field_indices } LocalTableInContext { hir_owner: self.hir_owner, data: &self.field_indices }
} }
pub fn field_indices_mut(&mut self) -> LocalTableInContextMut<'_, usize> { pub fn field_indices_mut(&mut self) -> LocalTableInContextMut<'_, usize> {
LocalTableInContextMut { local_id_root: self.local_id_root, data: &mut self.field_indices } LocalTableInContextMut { hir_owner: self.hir_owner, data: &mut self.field_indices }
} }
pub fn user_provided_types(&self) -> LocalTableInContext<'_, CanonicalUserType<'tcx>> { pub fn user_provided_types(&self) -> LocalTableInContext<'_, CanonicalUserType<'tcx>> {
LocalTableInContext { local_id_root: self.local_id_root, data: &self.user_provided_types } LocalTableInContext { hir_owner: self.hir_owner, data: &self.user_provided_types }
} }
pub fn user_provided_types_mut( pub fn user_provided_types_mut(
&mut self, &mut self,
) -> LocalTableInContextMut<'_, CanonicalUserType<'tcx>> { ) -> LocalTableInContextMut<'_, CanonicalUserType<'tcx>> {
LocalTableInContextMut { LocalTableInContextMut { hir_owner: self.hir_owner, data: &mut self.user_provided_types }
local_id_root: self.local_id_root,
data: &mut self.user_provided_types,
}
} }
pub fn node_types(&self) -> LocalTableInContext<'_, Ty<'tcx>> { pub fn node_types(&self) -> LocalTableInContext<'_, Ty<'tcx>> {
LocalTableInContext { local_id_root: self.local_id_root, data: &self.node_types } LocalTableInContext { hir_owner: self.hir_owner, data: &self.node_types }
} }
pub fn node_types_mut(&mut self) -> LocalTableInContextMut<'_, Ty<'tcx>> { pub fn node_types_mut(&mut self) -> LocalTableInContextMut<'_, Ty<'tcx>> {
LocalTableInContextMut { local_id_root: self.local_id_root, data: &mut self.node_types } LocalTableInContextMut { hir_owner: self.hir_owner, data: &mut self.node_types }
} }
pub fn node_type(&self, id: hir::HirId) -> Ty<'tcx> { pub fn node_type(&self, id: hir::HirId) -> Ty<'tcx> {
@ -526,21 +520,21 @@ impl<'tcx> TypeckTables<'tcx> {
} }
pub fn node_type_opt(&self, id: hir::HirId) -> Option<Ty<'tcx>> { pub fn node_type_opt(&self, id: hir::HirId) -> Option<Ty<'tcx>> {
validate_hir_id_for_typeck_tables(self.local_id_root, id, false); validate_hir_id_for_typeck_tables(self.hir_owner, id, false);
self.node_types.get(&id.local_id).cloned() self.node_types.get(&id.local_id).cloned()
} }
pub fn node_substs_mut(&mut self) -> LocalTableInContextMut<'_, SubstsRef<'tcx>> { pub fn node_substs_mut(&mut self) -> LocalTableInContextMut<'_, SubstsRef<'tcx>> {
LocalTableInContextMut { local_id_root: self.local_id_root, data: &mut self.node_substs } LocalTableInContextMut { hir_owner: self.hir_owner, data: &mut self.node_substs }
} }
pub fn node_substs(&self, id: hir::HirId) -> SubstsRef<'tcx> { pub fn node_substs(&self, id: hir::HirId) -> SubstsRef<'tcx> {
validate_hir_id_for_typeck_tables(self.local_id_root, id, false); validate_hir_id_for_typeck_tables(self.hir_owner, id, false);
self.node_substs.get(&id.local_id).cloned().unwrap_or_else(|| InternalSubsts::empty()) self.node_substs.get(&id.local_id).cloned().unwrap_or_else(|| InternalSubsts::empty())
} }
pub fn node_substs_opt(&self, id: hir::HirId) -> Option<SubstsRef<'tcx>> { pub fn node_substs_opt(&self, id: hir::HirId) -> Option<SubstsRef<'tcx>> {
validate_hir_id_for_typeck_tables(self.local_id_root, id, false); validate_hir_id_for_typeck_tables(self.hir_owner, id, false);
self.node_substs.get(&id.local_id).cloned() self.node_substs.get(&id.local_id).cloned()
} }
@ -573,17 +567,17 @@ impl<'tcx> TypeckTables<'tcx> {
} }
pub fn adjustments(&self) -> LocalTableInContext<'_, Vec<ty::adjustment::Adjustment<'tcx>>> { pub fn adjustments(&self) -> LocalTableInContext<'_, Vec<ty::adjustment::Adjustment<'tcx>>> {
LocalTableInContext { local_id_root: self.local_id_root, data: &self.adjustments } LocalTableInContext { hir_owner: self.hir_owner, data: &self.adjustments }
} }
pub fn adjustments_mut( pub fn adjustments_mut(
&mut self, &mut self,
) -> LocalTableInContextMut<'_, Vec<ty::adjustment::Adjustment<'tcx>>> { ) -> LocalTableInContextMut<'_, Vec<ty::adjustment::Adjustment<'tcx>>> {
LocalTableInContextMut { local_id_root: self.local_id_root, data: &mut self.adjustments } LocalTableInContextMut { hir_owner: self.hir_owner, data: &mut self.adjustments }
} }
pub fn expr_adjustments(&self, expr: &hir::Expr<'_>) -> &[ty::adjustment::Adjustment<'tcx>] { pub fn expr_adjustments(&self, expr: &hir::Expr<'_>) -> &[ty::adjustment::Adjustment<'tcx>] {
validate_hir_id_for_typeck_tables(self.local_id_root, expr.hir_id, false); validate_hir_id_for_typeck_tables(self.hir_owner, expr.hir_id, false);
self.adjustments.get(&expr.hir_id.local_id).map_or(&[], |a| &a[..]) self.adjustments.get(&expr.hir_id.local_id).map_or(&[], |a| &a[..])
} }
@ -618,25 +612,19 @@ impl<'tcx> TypeckTables<'tcx> {
} }
pub fn pat_binding_modes(&self) -> LocalTableInContext<'_, BindingMode> { pub fn pat_binding_modes(&self) -> LocalTableInContext<'_, BindingMode> {
LocalTableInContext { local_id_root: self.local_id_root, data: &self.pat_binding_modes } LocalTableInContext { hir_owner: self.hir_owner, data: &self.pat_binding_modes }
} }
pub fn pat_binding_modes_mut(&mut self) -> LocalTableInContextMut<'_, BindingMode> { pub fn pat_binding_modes_mut(&mut self) -> LocalTableInContextMut<'_, BindingMode> {
LocalTableInContextMut { LocalTableInContextMut { hir_owner: self.hir_owner, data: &mut self.pat_binding_modes }
local_id_root: self.local_id_root,
data: &mut self.pat_binding_modes,
}
} }
pub fn pat_adjustments(&self) -> LocalTableInContext<'_, Vec<Ty<'tcx>>> { pub fn pat_adjustments(&self) -> LocalTableInContext<'_, Vec<Ty<'tcx>>> {
LocalTableInContext { local_id_root: self.local_id_root, data: &self.pat_adjustments } LocalTableInContext { hir_owner: self.hir_owner, data: &self.pat_adjustments }
} }
pub fn pat_adjustments_mut(&mut self) -> LocalTableInContextMut<'_, Vec<Ty<'tcx>>> { pub fn pat_adjustments_mut(&mut self) -> LocalTableInContextMut<'_, Vec<Ty<'tcx>>> {
LocalTableInContextMut { LocalTableInContextMut { hir_owner: self.hir_owner, data: &mut self.pat_adjustments }
local_id_root: self.local_id_root,
data: &mut self.pat_adjustments,
}
} }
pub fn upvar_capture(&self, upvar_id: ty::UpvarId) -> ty::UpvarCapture<'tcx> { pub fn upvar_capture(&self, upvar_id: ty::UpvarId) -> ty::UpvarCapture<'tcx> {
@ -644,40 +632,31 @@ impl<'tcx> TypeckTables<'tcx> {
} }
pub fn closure_kind_origins(&self) -> LocalTableInContext<'_, (Span, ast::Name)> { pub fn closure_kind_origins(&self) -> LocalTableInContext<'_, (Span, ast::Name)> {
LocalTableInContext { local_id_root: self.local_id_root, data: &self.closure_kind_origins } LocalTableInContext { hir_owner: self.hir_owner, data: &self.closure_kind_origins }
} }
pub fn closure_kind_origins_mut(&mut self) -> LocalTableInContextMut<'_, (Span, ast::Name)> { pub fn closure_kind_origins_mut(&mut self) -> LocalTableInContextMut<'_, (Span, ast::Name)> {
LocalTableInContextMut { LocalTableInContextMut { hir_owner: self.hir_owner, data: &mut self.closure_kind_origins }
local_id_root: self.local_id_root,
data: &mut self.closure_kind_origins,
}
} }
pub fn liberated_fn_sigs(&self) -> LocalTableInContext<'_, ty::FnSig<'tcx>> { pub fn liberated_fn_sigs(&self) -> LocalTableInContext<'_, ty::FnSig<'tcx>> {
LocalTableInContext { local_id_root: self.local_id_root, data: &self.liberated_fn_sigs } LocalTableInContext { hir_owner: self.hir_owner, data: &self.liberated_fn_sigs }
} }
pub fn liberated_fn_sigs_mut(&mut self) -> LocalTableInContextMut<'_, ty::FnSig<'tcx>> { pub fn liberated_fn_sigs_mut(&mut self) -> LocalTableInContextMut<'_, ty::FnSig<'tcx>> {
LocalTableInContextMut { LocalTableInContextMut { hir_owner: self.hir_owner, data: &mut self.liberated_fn_sigs }
local_id_root: self.local_id_root,
data: &mut self.liberated_fn_sigs,
}
} }
pub fn fru_field_types(&self) -> LocalTableInContext<'_, Vec<Ty<'tcx>>> { pub fn fru_field_types(&self) -> LocalTableInContext<'_, Vec<Ty<'tcx>>> {
LocalTableInContext { local_id_root: self.local_id_root, data: &self.fru_field_types } LocalTableInContext { hir_owner: self.hir_owner, data: &self.fru_field_types }
} }
pub fn fru_field_types_mut(&mut self) -> LocalTableInContextMut<'_, Vec<Ty<'tcx>>> { pub fn fru_field_types_mut(&mut self) -> LocalTableInContextMut<'_, Vec<Ty<'tcx>>> {
LocalTableInContextMut { LocalTableInContextMut { hir_owner: self.hir_owner, data: &mut self.fru_field_types }
local_id_root: self.local_id_root,
data: &mut self.fru_field_types,
}
} }
pub fn is_coercion_cast(&self, hir_id: hir::HirId) -> bool { pub fn is_coercion_cast(&self, hir_id: hir::HirId) -> bool {
validate_hir_id_for_typeck_tables(self.local_id_root, hir_id, true); validate_hir_id_for_typeck_tables(self.hir_owner, hir_id, true);
self.coercion_casts.contains(&hir_id.local_id) self.coercion_casts.contains(&hir_id.local_id)
} }
@ -693,7 +672,7 @@ impl<'tcx> TypeckTables<'tcx> {
impl<'a, 'tcx> HashStable<StableHashingContext<'a>> for TypeckTables<'tcx> { impl<'a, 'tcx> HashStable<StableHashingContext<'a>> for TypeckTables<'tcx> {
fn hash_stable(&self, hcx: &mut StableHashingContext<'a>, hasher: &mut StableHasher) { fn hash_stable(&self, hcx: &mut StableHashingContext<'a>, hasher: &mut StableHasher) {
let ty::TypeckTables { let ty::TypeckTables {
local_id_root, hir_owner,
ref type_dependent_defs, ref type_dependent_defs,
ref field_indices, ref field_indices,
ref user_provided_types, ref user_provided_types,
@ -730,18 +709,12 @@ impl<'a, 'tcx> HashStable<StableHashingContext<'a>> for TypeckTables<'tcx> {
hash_stable_hashmap(hcx, hasher, upvar_capture_map, |up_var_id, hcx| { hash_stable_hashmap(hcx, hasher, upvar_capture_map, |up_var_id, hcx| {
let ty::UpvarId { var_path, closure_expr_id } = *up_var_id; let ty::UpvarId { var_path, closure_expr_id } = *up_var_id;
let local_id_root = local_id_root.expect("trying to hash invalid TypeckTables"); assert_eq!(Some(var_path.hir_id.owner), hir_owner);
let var_owner_def_id = DefId {
krate: local_id_root.krate,
index: var_path.hir_id.owner.local_def_index,
};
let closure_def_id =
DefId { krate: local_id_root.krate, index: closure_expr_id.local_def_index };
( (
hcx.def_path_hash(var_owner_def_id), hcx.local_def_path_hash(var_path.hir_id.owner),
var_path.hir_id.local_id, var_path.hir_id.local_id,
hcx.def_path_hash(closure_def_id), hcx.local_def_path_hash(closure_expr_id),
) )
}); });

View File

@ -1,5 +1,4 @@
use crate::dep_graph::DepNodeIndex; use crate::dep_graph::DepNodeIndex;
use crate::ty::query::config::QueryAccessors;
use crate::ty::query::plumbing::{QueryLookup, QueryState, QueryStateShard}; use crate::ty::query::plumbing::{QueryLookup, QueryState, QueryStateShard};
use crate::ty::TyCtxt; use crate::ty::TyCtxt;
@ -7,39 +6,43 @@ use rustc_data_structures::fx::FxHashMap;
use rustc_data_structures::sharded::Sharded; use rustc_data_structures::sharded::Sharded;
use std::default::Default; use std::default::Default;
use std::hash::Hash; use std::hash::Hash;
use std::marker::PhantomData;
pub(crate) trait CacheSelector<K, V> { pub(crate) trait CacheSelector<K, V> {
type Cache: QueryCache<K, V>; type Cache: QueryCache<Key = K, Value = V>;
} }
pub(crate) trait QueryCache<K, V>: Default { pub(crate) trait QueryCache: Default {
type Key;
type Value;
type Sharded: Default; type Sharded: Default;
/// Checks if the query is already computed and in the cache. /// Checks if the query is already computed and in the cache.
/// It returns the shard index and a lock guard to the shard, /// It returns the shard index and a lock guard to the shard,
/// which will be used if the query is not in the cache and we need /// which will be used if the query is not in the cache and we need
/// to compute it. /// to compute it.
fn lookup<'tcx, R, GetCache, OnHit, OnMiss, Q>( fn lookup<'tcx, R, GetCache, OnHit, OnMiss>(
&self, &self,
state: &'tcx QueryState<'tcx, Q>, state: &'tcx QueryState<'tcx, Self>,
get_cache: GetCache, get_cache: GetCache,
key: K, key: Self::Key,
// `on_hit` can be called while holding a lock to the query state shard. // `on_hit` can be called while holding a lock to the query state shard.
on_hit: OnHit, on_hit: OnHit,
on_miss: OnMiss, on_miss: OnMiss,
) -> R ) -> R
where where
Q: QueryAccessors<'tcx>, GetCache: for<'a> Fn(
GetCache: for<'a> Fn(&'a mut QueryStateShard<'tcx, Q>) -> &'a mut Self::Sharded, &'a mut QueryStateShard<'tcx, Self::Key, Self::Sharded>,
OnHit: FnOnce(&V, DepNodeIndex) -> R, ) -> &'a mut Self::Sharded,
OnMiss: FnOnce(K, QueryLookup<'tcx, Q>) -> R; OnHit: FnOnce(&Self::Value, DepNodeIndex) -> R,
OnMiss: FnOnce(Self::Key, QueryLookup<'tcx, Self::Key, Self::Sharded>) -> R;
fn complete( fn complete(
&self, &self,
tcx: TyCtxt<'tcx>, tcx: TyCtxt<'tcx>,
lock_sharded_storage: &mut Self::Sharded, lock_sharded_storage: &mut Self::Sharded,
key: K, key: Self::Key,
value: V, value: Self::Value,
index: DepNodeIndex, index: DepNodeIndex,
); );
@ -47,36 +50,45 @@ pub(crate) trait QueryCache<K, V>: Default {
&self, &self,
shards: &Sharded<L>, shards: &Sharded<L>,
get_shard: impl Fn(&mut L) -> &mut Self::Sharded, get_shard: impl Fn(&mut L) -> &mut Self::Sharded,
f: impl for<'a> FnOnce(Box<dyn Iterator<Item = (&'a K, &'a V, DepNodeIndex)> + 'a>) -> R, f: impl for<'a> FnOnce(
Box<dyn Iterator<Item = (&'a Self::Key, &'a Self::Value, DepNodeIndex)> + 'a>,
) -> R,
) -> R; ) -> R;
} }
pub struct DefaultCacheSelector; pub struct DefaultCacheSelector;
impl<K: Eq + Hash, V: Clone> CacheSelector<K, V> for DefaultCacheSelector { impl<K: Eq + Hash, V: Clone> CacheSelector<K, V> for DefaultCacheSelector {
type Cache = DefaultCache; type Cache = DefaultCache<K, V>;
} }
#[derive(Default)] pub struct DefaultCache<K, V>(PhantomData<(K, V)>);
pub struct DefaultCache;
impl<K: Eq + Hash, V: Clone> QueryCache<K, V> for DefaultCache { impl<K, V> Default for DefaultCache<K, V> {
fn default() -> Self {
DefaultCache(PhantomData)
}
}
impl<K: Eq + Hash, V: Clone> QueryCache for DefaultCache<K, V> {
type Key = K;
type Value = V;
type Sharded = FxHashMap<K, (V, DepNodeIndex)>; type Sharded = FxHashMap<K, (V, DepNodeIndex)>;
#[inline(always)] #[inline(always)]
fn lookup<'tcx, R, GetCache, OnHit, OnMiss, Q>( fn lookup<'tcx, R, GetCache, OnHit, OnMiss>(
&self, &self,
state: &'tcx QueryState<'tcx, Q>, state: &'tcx QueryState<'tcx, Self>,
get_cache: GetCache, get_cache: GetCache,
key: K, key: K,
on_hit: OnHit, on_hit: OnHit,
on_miss: OnMiss, on_miss: OnMiss,
) -> R ) -> R
where where
Q: QueryAccessors<'tcx>, GetCache:
GetCache: for<'a> Fn(&'a mut QueryStateShard<'tcx, Q>) -> &'a mut Self::Sharded, for<'a> Fn(&'a mut QueryStateShard<'tcx, K, Self::Sharded>) -> &'a mut Self::Sharded,
OnHit: FnOnce(&V, DepNodeIndex) -> R, OnHit: FnOnce(&V, DepNodeIndex) -> R,
OnMiss: FnOnce(K, QueryLookup<'tcx, Q>) -> R, OnMiss: FnOnce(K, QueryLookup<'tcx, K, Self::Sharded>) -> R,
{ {
let mut lookup = state.get_lookup(&key); let mut lookup = state.get_lookup(&key);
let lock = &mut *lookup.lock; let lock = &mut *lookup.lock;

View File

@ -2,7 +2,7 @@ use crate::dep_graph::SerializedDepNodeIndex;
use crate::dep_graph::{DepKind, DepNode}; use crate::dep_graph::{DepKind, DepNode};
use crate::ty::query::caches::QueryCache; use crate::ty::query::caches::QueryCache;
use crate::ty::query::plumbing::CycleError; use crate::ty::query::plumbing::CycleError;
use crate::ty::query::{Query, QueryState}; use crate::ty::query::QueryState;
use crate::ty::TyCtxt; use crate::ty::TyCtxt;
use rustc_data_structures::profiling::ProfileCategory; use rustc_data_structures::profiling::ProfileCategory;
use rustc_hir::def_id::DefId; use rustc_hir::def_id::DefId;
@ -28,18 +28,15 @@ pub trait QueryConfig<'tcx> {
pub(crate) trait QueryAccessors<'tcx>: QueryConfig<'tcx> { pub(crate) trait QueryAccessors<'tcx>: QueryConfig<'tcx> {
const ANON: bool; const ANON: bool;
const EVAL_ALWAYS: bool; const EVAL_ALWAYS: bool;
const DEP_KIND: DepKind;
type Cache: QueryCache<Self::Key, Self::Value>; type Cache: QueryCache<Key = Self::Key, Value = Self::Value>;
fn query(key: Self::Key) -> Query<'tcx>;
// Don't use this method to access query results, instead use the methods on TyCtxt // Don't use this method to access query results, instead use the methods on TyCtxt
fn query_state<'a>(tcx: TyCtxt<'tcx>) -> &'a QueryState<'tcx, Self>; fn query_state<'a>(tcx: TyCtxt<'tcx>) -> &'a QueryState<'tcx, Self::Cache>;
fn to_dep_node(tcx: TyCtxt<'tcx>, key: &Self::Key) -> DepNode; fn to_dep_node(tcx: TyCtxt<'tcx>, key: &Self::Key) -> DepNode;
fn dep_kind() -> DepKind;
// Don't use this method to compute query results, instead use the methods on TyCtxt // Don't use this method to compute query results, instead use the methods on TyCtxt
fn compute(tcx: TyCtxt<'tcx>, key: Self::Key) -> Self::Value; fn compute(tcx: TyCtxt<'tcx>, key: Self::Key) -> Self::Value;
@ -62,10 +59,7 @@ pub(crate) trait QueryDescription<'tcx>: QueryAccessors<'tcx> {
} }
} }
impl<'tcx, M: QueryAccessors<'tcx, Key = DefId>> QueryDescription<'tcx> for M impl<'tcx, M: QueryAccessors<'tcx, Key = DefId>> QueryDescription<'tcx> for M {
where
<M as QueryAccessors<'tcx>>::Cache: QueryCache<DefId, <M as QueryConfig<'tcx>>::Value>,
{
default fn describe(tcx: TyCtxt<'_>, def_id: DefId) -> Cow<'static, str> { default fn describe(tcx: TyCtxt<'_>, def_id: DefId) -> Cow<'static, str> {
if !tcx.sess.verbose() { if !tcx.sess.verbose() {
format!("processing `{}`", tcx.def_path_str(def_id)).into() format!("processing `{}`", tcx.def_path_str(def_id)).into()

View File

@ -56,13 +56,12 @@ use rustc_span::symbol::Symbol;
use rustc_span::{Span, DUMMY_SP}; use rustc_span::{Span, DUMMY_SP};
use std::borrow::Cow; use std::borrow::Cow;
use std::collections::BTreeMap; use std::collections::BTreeMap;
use std::convert::TryFrom;
use std::ops::Deref; use std::ops::Deref;
use std::sync::Arc; use std::sync::Arc;
#[macro_use] #[macro_use]
mod plumbing; mod plumbing;
pub use self::plumbing::CycleError; pub(crate) use self::plumbing::CycleError;
use self::plumbing::*; use self::plumbing::*;
mod stats; mod stats;

View File

@ -2,10 +2,10 @@
//! generate the actual methods on tcx which find and execute the provider, //! generate the actual methods on tcx which find and execute the provider,
//! manage the caches, and so forth. //! manage the caches, and so forth.
use crate::dep_graph::{DepNode, DepNodeIndex, SerializedDepNodeIndex}; use crate::dep_graph::{DepKind, DepNode, DepNodeIndex, SerializedDepNodeIndex};
use crate::ty::query::caches::QueryCache; use crate::ty::query::caches::QueryCache;
use crate::ty::query::config::{QueryAccessors, QueryDescription}; use crate::ty::query::config::QueryDescription;
use crate::ty::query::job::{QueryInfo, QueryJob, QueryJobId, QueryShardJobId}; use crate::ty::query::job::{QueryInfo, QueryJob, QueryJobId, QueryJobInfo, QueryShardJobId};
use crate::ty::query::Query; use crate::ty::query::Query;
use crate::ty::tls; use crate::ty::tls;
use crate::ty::{self, TyCtxt}; use crate::ty::{self, TyCtxt};
@ -20,6 +20,8 @@ use rustc_errors::{struct_span_err, Diagnostic, DiagnosticBuilder, FatalError, H
use rustc_span::source_map::DUMMY_SP; use rustc_span::source_map::DUMMY_SP;
use rustc_span::Span; use rustc_span::Span;
use std::collections::hash_map::Entry; use std::collections::hash_map::Entry;
use std::convert::TryFrom;
use std::fmt::Debug;
use std::hash::{Hash, Hasher}; use std::hash::{Hash, Hasher};
use std::mem; use std::mem;
use std::num::NonZeroU32; use std::num::NonZeroU32;
@ -27,37 +29,38 @@ use std::ptr;
#[cfg(debug_assertions)] #[cfg(debug_assertions)]
use std::sync::atomic::{AtomicUsize, Ordering}; use std::sync::atomic::{AtomicUsize, Ordering};
pub(crate) struct QueryStateShard<'tcx, D: QueryAccessors<'tcx> + ?Sized> { pub(crate) struct QueryStateShard<'tcx, K, C> {
pub(super) cache: <<D as QueryAccessors<'tcx>>::Cache as QueryCache<D::Key, D::Value>>::Sharded, cache: C,
pub(super) active: FxHashMap<D::Key, QueryResult<'tcx>>, active: FxHashMap<K, QueryResult<'tcx>>,
/// Used to generate unique ids for active jobs. /// Used to generate unique ids for active jobs.
pub(super) jobs: u32, jobs: u32,
} }
impl<'tcx, Q: QueryAccessors<'tcx>> QueryStateShard<'tcx, Q> { impl<'tcx, K, C> QueryStateShard<'tcx, K, C> {
fn get_cache( fn get_cache(&mut self) -> &mut C {
&mut self,
) -> &mut <<Q as QueryAccessors<'tcx>>::Cache as QueryCache<Q::Key, Q::Value>>::Sharded {
&mut self.cache &mut self.cache
} }
} }
impl<'tcx, Q: QueryAccessors<'tcx>> Default for QueryStateShard<'tcx, Q> { impl<'tcx, K, C: Default> Default for QueryStateShard<'tcx, K, C> {
fn default() -> QueryStateShard<'tcx, Q> { fn default() -> QueryStateShard<'tcx, K, C> {
QueryStateShard { cache: Default::default(), active: Default::default(), jobs: 0 } QueryStateShard { cache: Default::default(), active: Default::default(), jobs: 0 }
} }
} }
pub(crate) struct QueryState<'tcx, D: QueryAccessors<'tcx> + ?Sized> { pub(crate) struct QueryState<'tcx, C: QueryCache> {
pub(super) cache: D::Cache, cache: C,
pub(super) shards: Sharded<QueryStateShard<'tcx, D>>, shards: Sharded<QueryStateShard<'tcx, C::Key, C::Sharded>>,
#[cfg(debug_assertions)] #[cfg(debug_assertions)]
pub(super) cache_hits: AtomicUsize, pub(super) cache_hits: AtomicUsize,
} }
impl<'tcx, Q: QueryAccessors<'tcx>> QueryState<'tcx, Q> { impl<'tcx, C: QueryCache> QueryState<'tcx, C> {
pub(super) fn get_lookup<K: Hash>(&'tcx self, key: &K) -> QueryLookup<'tcx, Q> { pub(super) fn get_lookup<K2: Hash>(
&'tcx self,
key: &K2,
) -> QueryLookup<'tcx, C::Key, C::Sharded> {
// We compute the key's hash once and then use it for both the // We compute the key's hash once and then use it for both the
// shard lookup and the hashmap lookup. This relies on the fact // shard lookup and the hashmap lookup. This relies on the fact
// that both of them use `FxHasher`. // that both of them use `FxHasher`.
@ -72,7 +75,7 @@ impl<'tcx, Q: QueryAccessors<'tcx>> QueryState<'tcx, Q> {
} }
/// Indicates the state of a query for a given key in a query map. /// Indicates the state of a query for a given key in a query map.
pub(super) enum QueryResult<'tcx> { enum QueryResult<'tcx> {
/// An already executing query. The query job can be used to await for its completion. /// An already executing query. The query job can be used to await for its completion.
Started(QueryJob<'tcx>), Started(QueryJob<'tcx>),
@ -81,25 +84,54 @@ pub(super) enum QueryResult<'tcx> {
Poisoned, Poisoned,
} }
impl<'tcx, M: QueryAccessors<'tcx>> QueryState<'tcx, M> { impl<'tcx, C: QueryCache> QueryState<'tcx, C> {
pub fn iter_results<R>( pub(super) fn iter_results<R>(
&self, &self,
f: impl for<'a> FnOnce( f: impl for<'a> FnOnce(
Box<dyn Iterator<Item = (&'a M::Key, &'a M::Value, DepNodeIndex)> + 'a>, Box<dyn Iterator<Item = (&'a C::Key, &'a C::Value, DepNodeIndex)> + 'a>,
) -> R, ) -> R,
) -> R { ) -> R {
self.cache.iter(&self.shards, |shard| &mut shard.cache, f) self.cache.iter(&self.shards, |shard| &mut shard.cache, f)
} }
pub fn all_inactive(&self) -> bool { pub(super) fn all_inactive(&self) -> bool {
let shards = self.shards.lock_shards(); let shards = self.shards.lock_shards();
shards.iter().all(|shard| shard.active.is_empty()) shards.iter().all(|shard| shard.active.is_empty())
} }
pub(super) fn try_collect_active_jobs(
&self,
kind: DepKind,
make_query: fn(C::Key) -> Query<'tcx>,
jobs: &mut FxHashMap<QueryJobId, QueryJobInfo<'tcx>>,
) -> Option<()>
where
C::Key: Clone,
{
// We use try_lock_shards here since we are called from the
// deadlock handler, and this shouldn't be locked.
let shards = self.shards.try_lock_shards()?;
let shards = shards.iter().enumerate();
jobs.extend(shards.flat_map(|(shard_id, shard)| {
shard.active.iter().filter_map(move |(k, v)| {
if let QueryResult::Started(ref job) = *v {
let id =
QueryJobId { job: job.id, shard: u16::try_from(shard_id).unwrap(), kind };
let info = QueryInfo { span: job.span, query: make_query(k.clone()) };
Some((id, QueryJobInfo { info, job: job.clone() }))
} else {
None
}
})
}));
Some(())
}
} }
impl<'tcx, M: QueryAccessors<'tcx>> Default for QueryState<'tcx, M> { impl<'tcx, C: QueryCache> Default for QueryState<'tcx, C> {
fn default() -> QueryState<'tcx, M> { fn default() -> QueryState<'tcx, C> {
QueryState { QueryState {
cache: M::Cache::default(), cache: C::default(),
shards: Default::default(), shards: Default::default(),
#[cfg(debug_assertions)] #[cfg(debug_assertions)]
cache_hits: AtomicUsize::new(0), cache_hits: AtomicUsize::new(0),
@ -108,21 +140,31 @@ impl<'tcx, M: QueryAccessors<'tcx>> Default for QueryState<'tcx, M> {
} }
/// Values used when checking a query cache which can be reused on a cache-miss to execute the query. /// Values used when checking a query cache which can be reused on a cache-miss to execute the query.
pub(crate) struct QueryLookup<'tcx, Q: QueryAccessors<'tcx>> { pub(crate) struct QueryLookup<'tcx, K, C> {
pub(super) key_hash: u64, pub(super) key_hash: u64,
pub(super) shard: usize, shard: usize,
pub(super) lock: LockGuard<'tcx, QueryStateShard<'tcx, Q>>, pub(super) lock: LockGuard<'tcx, QueryStateShard<'tcx, K, C>>,
} }
/// A type representing the responsibility to execute the job in the `job` field. /// A type representing the responsibility to execute the job in the `job` field.
/// This will poison the relevant query if dropped. /// This will poison the relevant query if dropped.
pub(super) struct JobOwner<'tcx, Q: QueryDescription<'tcx>> { struct JobOwner<'tcx, C>
tcx: TyCtxt<'tcx>, where
key: Q::Key, C: QueryCache,
C::Key: Eq + Hash + Clone + Debug,
C::Value: Clone,
{
state: &'tcx QueryState<'tcx, C>,
key: C::Key,
id: QueryJobId, id: QueryJobId,
} }
impl<'tcx, Q: QueryDescription<'tcx>> JobOwner<'tcx, Q> { impl<'tcx, C: QueryCache> JobOwner<'tcx, C>
where
C: QueryCache,
C::Key: Eq + Hash + Clone + Debug,
C::Value: Clone,
{
/// Either gets a `JobOwner` corresponding the query, allowing us to /// Either gets a `JobOwner` corresponding the query, allowing us to
/// start executing the query, or returns with the result of the query. /// start executing the query, or returns with the result of the query.
/// This function assumes that `try_get_cached` is already called and returned `lookup`. /// This function assumes that `try_get_cached` is already called and returned `lookup`.
@ -132,12 +174,15 @@ impl<'tcx, Q: QueryDescription<'tcx>> JobOwner<'tcx, Q> {
/// This function is inlined because that results in a noticeable speed-up /// This function is inlined because that results in a noticeable speed-up
/// for some compile-time benchmarks. /// for some compile-time benchmarks.
#[inline(always)] #[inline(always)]
pub(super) fn try_start( fn try_start<Q>(
tcx: TyCtxt<'tcx>, tcx: TyCtxt<'tcx>,
span: Span, span: Span,
key: &Q::Key, key: &C::Key,
mut lookup: QueryLookup<'tcx, Q>, mut lookup: QueryLookup<'tcx, C::Key, C::Sharded>,
) -> TryGetJob<'tcx, Q> { ) -> TryGetJob<'tcx, C>
where
Q: QueryDescription<'tcx, Key = C::Key, Value = C::Value, Cache = C>,
{
let lock = &mut *lookup.lock; let lock = &mut *lookup.lock;
let (latch, mut _query_blocked_prof_timer) = match lock.active.entry((*key).clone()) { let (latch, mut _query_blocked_prof_timer) = match lock.active.entry((*key).clone()) {
@ -154,7 +199,7 @@ impl<'tcx, Q: QueryDescription<'tcx>> JobOwner<'tcx, Q> {
}; };
// Create the id of the job we're waiting for // Create the id of the job we're waiting for
let id = QueryJobId::new(job.id, lookup.shard, Q::dep_kind()); let id = QueryJobId::new(job.id, lookup.shard, Q::DEP_KIND);
(job.latch(id), _query_blocked_prof_timer) (job.latch(id), _query_blocked_prof_timer)
} }
@ -169,13 +214,14 @@ impl<'tcx, Q: QueryDescription<'tcx>> JobOwner<'tcx, Q> {
lock.jobs = id; lock.jobs = id;
let id = QueryShardJobId(NonZeroU32::new(id).unwrap()); let id = QueryShardJobId(NonZeroU32::new(id).unwrap());
let global_id = QueryJobId::new(id, lookup.shard, Q::dep_kind()); let global_id = QueryJobId::new(id, lookup.shard, Q::DEP_KIND);
let job = tls::with_related_context(tcx, |icx| QueryJob::new(id, span, icx.query)); let job = tls::with_related_context(tcx, |icx| QueryJob::new(id, span, icx.query));
entry.insert(QueryResult::Started(job)); entry.insert(QueryResult::Started(job));
let owner = JobOwner { tcx, id: global_id, key: (*key).clone() }; let owner =
JobOwner { state: Q::query_state(tcx), id: global_id, key: (*key).clone() };
return TryGetJob::NotYetStarted(owner); return TryGetJob::NotYetStarted(owner);
} }
}; };
@ -198,7 +244,8 @@ impl<'tcx, Q: QueryDescription<'tcx>> JobOwner<'tcx, Q> {
return TryGetJob::Cycle(Q::handle_cycle_error(tcx, cycle)); return TryGetJob::Cycle(Q::handle_cycle_error(tcx, cycle));
} }
let cached = tcx.try_get_cached::<Q, _, _, _>( let cached = tcx.try_get_cached(
Q::query_state(tcx),
(*key).clone(), (*key).clone(),
|value, index| (value.clone(), index), |value, index| (value.clone(), index),
|_, _| panic!("value must be in cache after waiting"), |_, _| panic!("value must be in cache after waiting"),
@ -215,16 +262,15 @@ impl<'tcx, Q: QueryDescription<'tcx>> JobOwner<'tcx, Q> {
/// Completes the query by updating the query cache with the `result`, /// Completes the query by updating the query cache with the `result`,
/// signals the waiter and forgets the JobOwner, so it won't poison the query /// signals the waiter and forgets the JobOwner, so it won't poison the query
#[inline(always)] #[inline(always)]
pub(super) fn complete(self, result: &Q::Value, dep_node_index: DepNodeIndex) { fn complete(self, tcx: TyCtxt<'tcx>, result: &C::Value, dep_node_index: DepNodeIndex) {
// We can move out of `self` here because we `mem::forget` it below // We can move out of `self` here because we `mem::forget` it below
let key = unsafe { ptr::read(&self.key) }; let key = unsafe { ptr::read(&self.key) };
let tcx = self.tcx; let state = self.state;
// Forget ourself so our destructor won't poison the query // Forget ourself so our destructor won't poison the query
mem::forget(self); mem::forget(self);
let job = { let job = {
let state = Q::query_state(tcx);
let result = result.clone(); let result = result.clone();
let mut lock = state.shards.get_shard_by_value(&key).lock(); let mut lock = state.shards.get_shard_by_value(&key).lock();
let job = match lock.active.remove(&key).unwrap() { let job = match lock.active.remove(&key).unwrap() {
@ -249,12 +295,16 @@ where
(result, diagnostics.into_inner()) (result, diagnostics.into_inner())
} }
impl<'tcx, Q: QueryDescription<'tcx>> Drop for JobOwner<'tcx, Q> { impl<'tcx, C: QueryCache> Drop for JobOwner<'tcx, C>
where
C::Key: Eq + Hash + Clone + Debug,
C::Value: Clone,
{
#[inline(never)] #[inline(never)]
#[cold] #[cold]
fn drop(&mut self) { fn drop(&mut self) {
// Poison the query so jobs waiting on it panic. // Poison the query so jobs waiting on it panic.
let state = Q::query_state(self.tcx); let state = self.state;
let shard = state.shards.get_shard_by_value(&self.key); let shard = state.shards.get_shard_by_value(&self.key);
let job = { let job = {
let mut shard = shard.lock(); let mut shard = shard.lock();
@ -272,25 +322,29 @@ impl<'tcx, Q: QueryDescription<'tcx>> Drop for JobOwner<'tcx, Q> {
} }
#[derive(Clone)] #[derive(Clone)]
pub struct CycleError<'tcx> { pub(crate) struct CycleError<'tcx> {
/// The query and related span that uses the cycle. /// The query and related span that uses the cycle.
pub(super) usage: Option<(Span, Query<'tcx>)>, pub(super) usage: Option<(Span, Query<'tcx>)>,
pub(super) cycle: Vec<QueryInfo<'tcx>>, pub(super) cycle: Vec<QueryInfo<'tcx>>,
} }
/// The result of `try_start`. /// The result of `try_start`.
pub(super) enum TryGetJob<'tcx, D: QueryDescription<'tcx>> { enum TryGetJob<'tcx, C: QueryCache>
where
C::Key: Eq + Hash + Clone + Debug,
C::Value: Clone,
{
/// The query is not yet started. Contains a guard to the cache eventually used to start it. /// The query is not yet started. Contains a guard to the cache eventually used to start it.
NotYetStarted(JobOwner<'tcx, D>), NotYetStarted(JobOwner<'tcx, C>),
/// The query was already completed. /// The query was already completed.
/// Returns the result of the query and its dep-node index /// Returns the result of the query and its dep-node index
/// if it succeeded or a cycle error if it failed. /// if it succeeded or a cycle error if it failed.
#[cfg(parallel_compiler)] #[cfg(parallel_compiler)]
JobCompleted((D::Value, DepNodeIndex)), JobCompleted((C::Value, DepNodeIndex)),
/// Trying to execute the query resulted in a cycle. /// Trying to execute the query resulted in a cycle.
Cycle(D::Value), Cycle(C::Value),
} }
impl<'tcx> TyCtxt<'tcx> { impl<'tcx> TyCtxt<'tcx> {
@ -298,7 +352,7 @@ impl<'tcx> TyCtxt<'tcx> {
/// new query job while it executes. It returns the diagnostics /// new query job while it executes. It returns the diagnostics
/// captured during execution and the actual result. /// captured during execution and the actual result.
#[inline(always)] #[inline(always)]
pub(super) fn start_query<F, R>( fn start_query<F, R>(
self, self,
token: QueryJobId, token: QueryJobId,
diagnostics: Option<&Lock<ThinVec<Diagnostic>>>, diagnostics: Option<&Lock<ThinVec<Diagnostic>>>,
@ -419,23 +473,22 @@ impl<'tcx> TyCtxt<'tcx> {
/// which will be used if the query is not in the cache and we need /// which will be used if the query is not in the cache and we need
/// to compute it. /// to compute it.
#[inline(always)] #[inline(always)]
fn try_get_cached<Q, R, OnHit, OnMiss>( fn try_get_cached<C, R, OnHit, OnMiss>(
self, self,
key: Q::Key, state: &'tcx QueryState<'tcx, C>,
key: C::Key,
// `on_hit` can be called while holding a lock to the query cache // `on_hit` can be called while holding a lock to the query cache
on_hit: OnHit, on_hit: OnHit,
on_miss: OnMiss, on_miss: OnMiss,
) -> R ) -> R
where where
Q: QueryDescription<'tcx> + 'tcx, C: QueryCache,
OnHit: FnOnce(&Q::Value, DepNodeIndex) -> R, OnHit: FnOnce(&C::Value, DepNodeIndex) -> R,
OnMiss: FnOnce(Q::Key, QueryLookup<'tcx, Q>) -> R, OnMiss: FnOnce(C::Key, QueryLookup<'tcx, C::Key, C::Sharded>) -> R,
{ {
let state = Q::query_state(self);
state.cache.lookup( state.cache.lookup(
state, state,
QueryStateShard::<Q>::get_cache, QueryStateShard::<C::Key, C::Sharded>::get_cache,
key, key,
|value, index| { |value, index| {
if unlikely!(self.prof.enabled()) { if unlikely!(self.prof.enabled()) {
@ -459,7 +512,8 @@ impl<'tcx> TyCtxt<'tcx> {
) -> Q::Value { ) -> Q::Value {
debug!("ty::query::get_query<{}>(key={:?}, span={:?})", Q::NAME, key, span); debug!("ty::query::get_query<{}>(key={:?}, span={:?})", Q::NAME, key, span);
self.try_get_cached::<Q, _, _, _>( self.try_get_cached(
Q::query_state(self),
key, key,
|value, index| { |value, index| {
self.dep_graph.read_index(index); self.dep_graph.read_index(index);
@ -470,13 +524,13 @@ impl<'tcx> TyCtxt<'tcx> {
} }
#[inline(always)] #[inline(always)]
pub(super) fn try_execute_query<Q: QueryDescription<'tcx>>( fn try_execute_query<Q: QueryDescription<'tcx> + 'tcx>(
self, self,
span: Span, span: Span,
key: Q::Key, key: Q::Key,
lookup: QueryLookup<'tcx, Q>, lookup: QueryLookup<'tcx, Q::Key, <Q::Cache as QueryCache>::Sharded>,
) -> Q::Value { ) -> Q::Value {
let job = match JobOwner::try_start(self, span, &key, lookup) { let job = match JobOwner::try_start::<Q>(self, span, &key, lookup) {
TryGetJob::NotYetStarted(job) => job, TryGetJob::NotYetStarted(job) => job,
TryGetJob::Cycle(result) => return result, TryGetJob::Cycle(result) => return result,
#[cfg(parallel_compiler)] #[cfg(parallel_compiler)]
@ -498,7 +552,7 @@ impl<'tcx> TyCtxt<'tcx> {
let ((result, dep_node_index), diagnostics) = with_diagnostics(|diagnostics| { let ((result, dep_node_index), diagnostics) = with_diagnostics(|diagnostics| {
self.start_query(job.id, diagnostics, |tcx| { self.start_query(job.id, diagnostics, |tcx| {
tcx.dep_graph.with_anon_task(Q::dep_kind(), || Q::compute(tcx, key)) tcx.dep_graph.with_anon_task(Q::DEP_KIND, || Q::compute(tcx, key))
}) })
}); });
@ -512,7 +566,7 @@ impl<'tcx> TyCtxt<'tcx> {
.store_diagnostics_for_anon_node(dep_node_index, diagnostics); .store_diagnostics_for_anon_node(dep_node_index, diagnostics);
} }
job.complete(&result, dep_node_index); job.complete(self, &result, dep_node_index);
return result; return result;
} }
@ -538,7 +592,7 @@ impl<'tcx> TyCtxt<'tcx> {
}) })
}); });
if let Some((result, dep_node_index)) = loaded { if let Some((result, dep_node_index)) = loaded {
job.complete(&result, dep_node_index); job.complete(self, &result, dep_node_index);
return result; return result;
} }
} }
@ -634,10 +688,10 @@ impl<'tcx> TyCtxt<'tcx> {
} }
#[inline(always)] #[inline(always)]
fn force_query_with_job<Q: QueryDescription<'tcx>>( fn force_query_with_job<Q: QueryDescription<'tcx> + 'tcx>(
self, self,
key: Q::Key, key: Q::Key,
job: JobOwner<'tcx, Q>, job: JobOwner<'tcx, Q::Cache>,
dep_node: DepNode, dep_node: DepNode,
) -> (Q::Value, DepNodeIndex) { ) -> (Q::Value, DepNodeIndex) {
// If the following assertion triggers, it can have two reasons: // If the following assertion triggers, it can have two reasons:
@ -680,7 +734,7 @@ impl<'tcx> TyCtxt<'tcx> {
} }
} }
job.complete(&result, dep_node_index); job.complete(self, &result, dep_node_index);
(result, dep_node_index) (result, dep_node_index)
} }
@ -729,13 +783,14 @@ impl<'tcx> TyCtxt<'tcx> {
// We may be concurrently trying both execute and force a query. // We may be concurrently trying both execute and force a query.
// Ensure that only one of them runs the query. // Ensure that only one of them runs the query.
self.try_get_cached::<Q, _, _, _>( self.try_get_cached(
Q::query_state(self),
key, key,
|_, _| { |_, _| {
// Cache hit, do nothing // Cache hit, do nothing
}, },
|key, lookup| { |key, lookup| {
let job = match JobOwner::try_start(self, span, &key, lookup) { let job = match JobOwner::try_start::<Q>(self, span, &key, lookup) {
TryGetJob::NotYetStarted(job) => job, TryGetJob::NotYetStarted(job) => job,
TryGetJob::Cycle(_) => return, TryGetJob::Cycle(_) => return,
#[cfg(parallel_compiler)] #[cfg(parallel_compiler)]
@ -842,55 +897,6 @@ macro_rules! define_queries_inner {
input: ($(([$($modifiers)*] [$($attr)*] [$name]))*) input: ($(([$($modifiers)*] [$($attr)*] [$name]))*)
} }
impl<$tcx> Queries<$tcx> {
pub fn new(
providers: IndexVec<CrateNum, Providers<$tcx>>,
fallback_extern_providers: Providers<$tcx>,
on_disk_cache: OnDiskCache<'tcx>,
) -> Self {
Queries {
providers,
fallback_extern_providers: Box::new(fallback_extern_providers),
on_disk_cache,
$($name: Default::default()),*
}
}
pub fn try_collect_active_jobs(
&self
) -> Option<FxHashMap<QueryJobId, QueryJobInfo<'tcx>>> {
let mut jobs = FxHashMap::default();
$(
// We use try_lock_shards here since we are called from the
// deadlock handler, and this shouldn't be locked.
let shards = self.$name.shards.try_lock_shards()?;
let shards = shards.iter().enumerate();
jobs.extend(shards.flat_map(|(shard_id, shard)| {
shard.active.iter().filter_map(move |(k, v)| {
if let QueryResult::Started(ref job) = *v {
let id = QueryJobId {
job: job.id,
shard: u16::try_from(shard_id).unwrap(),
kind:
<queries::$name<'tcx> as QueryAccessors<'tcx>>::dep_kind(),
};
let info = QueryInfo {
span: job.span,
query: queries::$name::query(k.clone())
};
Some((id, QueryJobInfo { info, job: job.clone() }))
} else {
None
}
})
}));
)*
Some(jobs)
}
}
#[allow(nonstandard_style)] #[allow(nonstandard_style)]
#[derive(Clone, Debug)] #[derive(Clone, Debug)]
pub enum Query<$tcx> { pub enum Query<$tcx> {
@ -951,16 +957,6 @@ macro_rules! define_queries_inner {
})* })*
} }
// This module and the functions in it exist only to provide a
// predictable symbol name prefix for query providers. This is helpful
// for analyzing queries in profilers.
pub(super) mod __query_compute {
$(#[inline(never)]
pub fn $name<F: FnOnce() -> R, R>(f: F) -> R {
f()
})*
}
$(impl<$tcx> QueryConfig<$tcx> for queries::$name<$tcx> { $(impl<$tcx> QueryConfig<$tcx> for queries::$name<$tcx> {
type Key = $K; type Key = $K;
type Value = $V; type Value = $V;
@ -971,16 +967,12 @@ macro_rules! define_queries_inner {
impl<$tcx> QueryAccessors<$tcx> for queries::$name<$tcx> { impl<$tcx> QueryAccessors<$tcx> for queries::$name<$tcx> {
const ANON: bool = is_anon!([$($modifiers)*]); const ANON: bool = is_anon!([$($modifiers)*]);
const EVAL_ALWAYS: bool = is_eval_always!([$($modifiers)*]); const EVAL_ALWAYS: bool = is_eval_always!([$($modifiers)*]);
const DEP_KIND: dep_graph::DepKind = dep_graph::DepKind::$node;
type Cache = query_storage!([$($modifiers)*][$K, $V]); type Cache = query_storage!([$($modifiers)*][$K, $V]);
#[inline(always)] #[inline(always)]
fn query(key: Self::Key) -> Query<'tcx> { fn query_state<'a>(tcx: TyCtxt<$tcx>) -> &'a QueryState<$tcx, Self::Cache> {
Query::$name(key)
}
#[inline(always)]
fn query_state<'a>(tcx: TyCtxt<$tcx>) -> &'a QueryState<$tcx, Self> {
&tcx.queries.$name &tcx.queries.$name
} }
@ -990,23 +982,16 @@ macro_rules! define_queries_inner {
DepConstructor::$node(tcx, *key) DepConstructor::$node(tcx, *key)
} }
#[inline(always)]
fn dep_kind() -> dep_graph::DepKind {
dep_graph::DepKind::$node
}
#[inline] #[inline]
fn compute(tcx: TyCtxt<'tcx>, key: Self::Key) -> Self::Value { fn compute(tcx: TyCtxt<'tcx>, key: Self::Key) -> Self::Value {
__query_compute::$name(move || { let provider = tcx.queries.providers.get(key.query_crate())
let provider = tcx.queries.providers.get(key.query_crate()) // HACK(eddyb) it's possible crates may be loaded after
// HACK(eddyb) it's possible crates may be loaded after // the query engine is created, and because crate loading
// the query engine is created, and because crate loading // is not yet integrated with the query engine, such crates
// is not yet integrated with the query engine, such crates // would be missing appropriate entries in `providers`.
// would be missing appropriate entries in `providers`. .unwrap_or(&tcx.queries.fallback_extern_providers)
.unwrap_or(&tcx.queries.fallback_extern_providers) .$name;
.$name; provider(tcx, key)
provider(tcx, key)
})
} }
fn hash_result( fn hash_result(
@ -1139,7 +1124,41 @@ macro_rules! define_queries_struct {
providers: IndexVec<CrateNum, Providers<$tcx>>, providers: IndexVec<CrateNum, Providers<$tcx>>,
fallback_extern_providers: Box<Providers<$tcx>>, fallback_extern_providers: Box<Providers<$tcx>>,
$($(#[$attr])* $name: QueryState<$tcx, queries::$name<$tcx>>,)* $($(#[$attr])* $name: QueryState<
$tcx,
<queries::$name<$tcx> as QueryAccessors<'tcx>>::Cache,
>,)*
}
impl<$tcx> Queries<$tcx> {
pub(crate) fn new(
providers: IndexVec<CrateNum, Providers<$tcx>>,
fallback_extern_providers: Providers<$tcx>,
on_disk_cache: OnDiskCache<'tcx>,
) -> Self {
Queries {
providers,
fallback_extern_providers: Box::new(fallback_extern_providers),
on_disk_cache,
$($name: Default::default()),*
}
}
pub(crate) fn try_collect_active_jobs(
&self
) -> Option<FxHashMap<QueryJobId, QueryJobInfo<'tcx>>> {
let mut jobs = FxHashMap::default();
$(
self.$name.try_collect_active_jobs(
<queries::$name<'tcx> as QueryAccessors<'tcx>>::DEP_KIND,
Query::$name,
&mut jobs,
)?;
)*
Some(jobs)
}
} }
}; };
} }

View File

@ -1,6 +1,6 @@
use crate::hir::map::definitions::DefPathData; use crate::hir::map::definitions::DefPathData;
use crate::ty::context::TyCtxt; use crate::ty::context::TyCtxt;
use crate::ty::query::config::QueryAccessors; use crate::ty::query::caches::QueryCache;
use crate::ty::query::plumbing::QueryState; use crate::ty::query::plumbing::QueryState;
use measureme::{StringComponent, StringId}; use measureme::{StringComponent, StringId};
use rustc_data_structures::fx::FxHashMap; use rustc_data_structures::fx::FxHashMap;
@ -157,13 +157,14 @@ where
/// Allocate the self-profiling query strings for a single query cache. This /// Allocate the self-profiling query strings for a single query cache. This
/// method is called from `alloc_self_profile_query_strings` which knows all /// method is called from `alloc_self_profile_query_strings` which knows all
/// the queries via macro magic. /// the queries via macro magic.
pub(super) fn alloc_self_profile_query_strings_for_query_cache<'tcx, Q>( pub(super) fn alloc_self_profile_query_strings_for_query_cache<'tcx, C>(
tcx: TyCtxt<'tcx>, tcx: TyCtxt<'tcx>,
query_name: &'static str, query_name: &'static str,
query_state: &QueryState<'tcx, Q>, query_state: &QueryState<'tcx, C>,
string_cache: &mut QueryKeyStringCache, string_cache: &mut QueryKeyStringCache,
) where ) where
Q: QueryAccessors<'tcx>, C: QueryCache,
C::Key: Debug + Clone,
{ {
tcx.prof.with_profiler(|profiler| { tcx.prof.with_profiler(|profiler| {
let event_id_builder = profiler.event_id_builder(); let event_id_builder = profiler.event_id_builder();

View File

@ -1,3 +1,4 @@
use crate::ty::query::caches::QueryCache;
use crate::ty::query::config::QueryAccessors; use crate::ty::query::config::QueryAccessors;
use crate::ty::query::plumbing::QueryState; use crate::ty::query::plumbing::QueryState;
use crate::ty::query::queries; use crate::ty::query::queries;
@ -37,20 +38,17 @@ struct QueryStats {
local_def_id_keys: Option<usize>, local_def_id_keys: Option<usize>,
} }
fn stats<'tcx, Q: QueryAccessors<'tcx>>( fn stats<'tcx, C: QueryCache>(name: &'static str, map: &QueryState<'tcx, C>) -> QueryStats {
name: &'static str,
map: &QueryState<'tcx, Q>,
) -> QueryStats {
let mut stats = QueryStats { let mut stats = QueryStats {
name, name,
#[cfg(debug_assertions)] #[cfg(debug_assertions)]
cache_hits: map.cache_hits.load(Ordering::Relaxed), cache_hits: map.cache_hits.load(Ordering::Relaxed),
#[cfg(not(debug_assertions))] #[cfg(not(debug_assertions))]
cache_hits: 0, cache_hits: 0,
key_size: mem::size_of::<Q::Key>(), key_size: mem::size_of::<C::Key>(),
key_type: type_name::<Q::Key>(), key_type: type_name::<C::Key>(),
value_size: mem::size_of::<Q::Value>(), value_size: mem::size_of::<C::Value>(),
value_type: type_name::<Q::Value>(), value_type: type_name::<C::Value>(),
entry_count: map.iter_results(|results| results.count()), entry_count: map.iter_results(|results| results.count()),
local_def_id_keys: None, local_def_id_keys: None,
}; };
@ -125,7 +123,9 @@ macro_rules! print_stats {
let mut queries = Vec::new(); let mut queries = Vec::new();
$($( $($(
queries.push(stats::<queries::$name<'_>>( queries.push(stats::<
<queries::$name<'_> as QueryAccessors<'_>>::Cache,
>(
stringify!($name), stringify!($name),
&tcx.queries.$name, &tcx.queries.$name,
)); ));

View File

@ -645,6 +645,8 @@ impl<'a> AstValidator<'a> {
} }
} }
/// Checks that generic parameters are in the correct order,
/// which is lifetimes, then types and then consts. (`<'a, T, const N: usize>`)
fn validate_generic_param_order<'a>( fn validate_generic_param_order<'a>(
sess: &Session, sess: &Session,
handler: &rustc_errors::Handler, handler: &rustc_errors::Handler,

View File

@ -922,6 +922,7 @@ pub struct ExpansionData {
pub struct ExtCtxt<'a> { pub struct ExtCtxt<'a> {
pub parse_sess: &'a ParseSess, pub parse_sess: &'a ParseSess,
pub ecfg: expand::ExpansionConfig<'a>, pub ecfg: expand::ExpansionConfig<'a>,
pub reduced_recursion_limit: Option<usize>,
pub root_path: PathBuf, pub root_path: PathBuf,
pub resolver: &'a mut dyn Resolver, pub resolver: &'a mut dyn Resolver,
pub current_expansion: ExpansionData, pub current_expansion: ExpansionData,
@ -940,6 +941,7 @@ impl<'a> ExtCtxt<'a> {
ExtCtxt { ExtCtxt {
parse_sess, parse_sess,
ecfg, ecfg,
reduced_recursion_limit: None,
resolver, resolver,
extern_mod_loaded, extern_mod_loaded,
root_path: PathBuf::new(), root_path: PathBuf::new(),

View File

@ -17,7 +17,7 @@ use rustc_ast::util::map_in_place::MapInPlace;
use rustc_ast::visit::{self, AssocCtxt, Visitor}; use rustc_ast::visit::{self, AssocCtxt, Visitor};
use rustc_ast_pretty::pprust; use rustc_ast_pretty::pprust;
use rustc_attr::{self as attr, is_builtin_attr, HasAttrs}; use rustc_attr::{self as attr, is_builtin_attr, HasAttrs};
use rustc_errors::{Applicability, FatalError, PResult}; use rustc_errors::{Applicability, PResult};
use rustc_feature::Features; use rustc_feature::Features;
use rustc_parse::parser::Parser; use rustc_parse::parser::Parser;
use rustc_parse::validate_attr; use rustc_parse::validate_attr;
@ -645,7 +645,6 @@ impl<'a, 'b> MacroExpander<'a, 'b> {
)) ))
.emit(); .emit();
self.cx.trace_macros_diag(); self.cx.trace_macros_diag();
FatalError.raise();
} }
/// A macro's expansion does not fit in this fragment kind. /// A macro's expansion does not fit in this fragment kind.
@ -665,8 +664,17 @@ impl<'a, 'b> MacroExpander<'a, 'b> {
invoc: Invocation, invoc: Invocation,
ext: &SyntaxExtensionKind, ext: &SyntaxExtensionKind,
) -> ExpandResult<AstFragment, Invocation> { ) -> ExpandResult<AstFragment, Invocation> {
if self.cx.current_expansion.depth > self.cx.ecfg.recursion_limit { let recursion_limit =
self.error_recursion_limit_reached(); self.cx.reduced_recursion_limit.unwrap_or(self.cx.ecfg.recursion_limit);
if self.cx.current_expansion.depth > recursion_limit {
if self.cx.reduced_recursion_limit.is_none() {
self.error_recursion_limit_reached();
}
// Reduce the recursion limit by half each time it triggers.
self.cx.reduced_recursion_limit = Some(recursion_limit / 2);
return ExpandResult::Ready(invoc.fragment_kind.dummy(invoc.span()));
} }
let (fragment_kind, span) = (invoc.fragment_kind, invoc.span()); let (fragment_kind, span) = (invoc.fragment_kind, invoc.span());

View File

@ -1784,11 +1784,11 @@ impl<'a, 'tcx> InferCtxt<'a, 'tcx> {
// suggest adding an explicit lifetime bound to it. // suggest adding an explicit lifetime bound to it.
let type_param_span = match (self.in_progress_tables, bound_kind) { let type_param_span = match (self.in_progress_tables, bound_kind) {
(Some(ref table), GenericKind::Param(ref param)) => { (Some(ref table), GenericKind::Param(ref param)) => {
let table = table.borrow(); let table_owner = table.borrow().hir_owner;
table.local_id_root.and_then(|did| { table_owner.and_then(|table_owner| {
let generics = self.tcx.generics_of(did); let generics = self.tcx.generics_of(table_owner.to_def_id());
// Account for the case where `did` corresponds to `Self`, which doesn't have // Account for the case where `param` corresponds to `Self`,
// the expected type argument. // which doesn't have the expected type argument.
if !(generics.has_self && param.index == 0) { if !(generics.has_self && param.index == 0) {
let type_param = generics.type_param(param, self.tcx); let type_param = generics.type_param(param, self.tcx);
let hir = &self.tcx.hir(); let hir = &self.tcx.hir();

View File

@ -29,7 +29,7 @@ use rustc_data_structures::sync::Lrc;
use rustc_data_structures::unify as ut; use rustc_data_structures::unify as ut;
use rustc_errors::DiagnosticBuilder; use rustc_errors::DiagnosticBuilder;
use rustc_hir as hir; use rustc_hir as hir;
use rustc_hir::def_id::DefId; use rustc_hir::def_id::{DefId, LocalDefId};
use rustc_session::config::BorrowckMode; use rustc_session::config::BorrowckMode;
use rustc_span::symbol::Symbol; use rustc_span::symbol::Symbol;
use rustc_span::Span; use rustc_span::Span;
@ -559,7 +559,7 @@ impl TyCtxtInferExt<'tcx> for TyCtxt<'tcx> {
impl<'tcx> InferCtxtBuilder<'tcx> { impl<'tcx> InferCtxtBuilder<'tcx> {
/// Used only by `rustc_typeck` during body type-checking/inference, /// Used only by `rustc_typeck` during body type-checking/inference,
/// will initialize `in_progress_tables` with fresh `TypeckTables`. /// will initialize `in_progress_tables` with fresh `TypeckTables`.
pub fn with_fresh_in_progress_tables(mut self, table_owner: DefId) -> Self { pub fn with_fresh_in_progress_tables(mut self, table_owner: LocalDefId) -> Self {
self.fresh_tables = Some(RefCell::new(ty::TypeckTables::empty(Some(table_owner)))); self.fresh_tables = Some(RefCell::new(ty::TypeckTables::empty(Some(table_owner))));
self self
} }

View File

@ -312,6 +312,8 @@ fn configure_and_expand_inner<'a>(
ecx.parse_sess.missing_fragment_specifiers.borrow().iter().cloned().collect(); ecx.parse_sess.missing_fragment_specifiers.borrow().iter().cloned().collect();
missing_fragment_specifiers.sort(); missing_fragment_specifiers.sort();
let recursion_limit_hit = ecx.reduced_recursion_limit.is_some();
for span in missing_fragment_specifiers { for span in missing_fragment_specifiers {
let lint = lint::builtin::MISSING_FRAGMENT_SPECIFIER; let lint = lint::builtin::MISSING_FRAGMENT_SPECIFIER;
let msg = "missing fragment specifier"; let msg = "missing fragment specifier";
@ -320,8 +322,15 @@ fn configure_and_expand_inner<'a>(
if cfg!(windows) { if cfg!(windows) {
env::set_var("PATH", &old_path); env::set_var("PATH", &old_path);
} }
krate
}); if recursion_limit_hit {
// If we hit a recursion limit, exit early to avoid later passes getting overwhelmed
// with a large AST
Err(ErrorReported)
} else {
Ok(krate)
}
})?;
sess.time("maybe_building_test_harness", || { sess.time("maybe_building_test_harness", || {
rustc_builtin_macros::test_harness::inject( rustc_builtin_macros::test_harness::inject(

View File

@ -17,24 +17,30 @@ use rustc_span::symbol::sym;
pub fn test_layout(tcx: TyCtxt<'_>) { pub fn test_layout(tcx: TyCtxt<'_>) {
if tcx.features().rustc_attrs { if tcx.features().rustc_attrs {
// if the `rustc_attrs` feature is not enabled, don't bother testing layout // if the `rustc_attrs` feature is not enabled, don't bother testing layout
tcx.hir().krate().visit_all_item_likes(&mut VarianceTest { tcx }); tcx.hir().krate().visit_all_item_likes(&mut LayoutTest { tcx });
} }
} }
struct VarianceTest<'tcx> { struct LayoutTest<'tcx> {
tcx: TyCtxt<'tcx>, tcx: TyCtxt<'tcx>,
} }
impl ItemLikeVisitor<'tcx> for VarianceTest<'tcx> { impl ItemLikeVisitor<'tcx> for LayoutTest<'tcx> {
fn visit_item(&mut self, item: &'tcx hir::Item<'tcx>) { fn visit_item(&mut self, item: &'tcx hir::Item<'tcx>) {
let item_def_id = self.tcx.hir().local_def_id(item.hir_id); let item_def_id = self.tcx.hir().local_def_id(item.hir_id);
if let ItemKind::TyAlias(..) = item.kind { match item.kind {
for attr in self.tcx.get_attrs(item_def_id).iter() { ItemKind::TyAlias(..)
if attr.check_name(sym::rustc_layout) { | ItemKind::Enum(..)
self.dump_layout_of(item_def_id, item, attr); | ItemKind::Struct(..)
| ItemKind::Union(..) => {
for attr in self.tcx.get_attrs(item_def_id).iter() {
if attr.check_name(sym::rustc_layout) {
self.dump_layout_of(item_def_id, item, attr);
}
} }
} }
_ => {}
} }
} }
@ -42,7 +48,7 @@ impl ItemLikeVisitor<'tcx> for VarianceTest<'tcx> {
fn visit_impl_item(&mut self, _: &'tcx hir::ImplItem<'tcx>) {} fn visit_impl_item(&mut self, _: &'tcx hir::ImplItem<'tcx>) {}
} }
impl VarianceTest<'tcx> { impl LayoutTest<'tcx> {
fn dump_layout_of(&self, item_def_id: DefId, item: &hir::Item<'tcx>, attr: &Attribute) { fn dump_layout_of(&self, item_def_id: DefId, item: &hir::Item<'tcx>, attr: &Attribute) {
let tcx = self.tcx; let tcx = self.tcx;
let param_env = self.tcx.param_env(item_def_id); let param_env = self.tcx.param_env(item_def_id);
@ -81,6 +87,13 @@ impl VarianceTest<'tcx> {
); );
} }
sym::debug => {
self.tcx.sess.span_err(
item.span,
&format!("layout debugging: {:#?}", *ty_layout),
);
}
name => { name => {
self.tcx.sess.span_err( self.tcx.sess.span_err(
meta_item.span(), meta_item.span(),

View File

@ -253,6 +253,7 @@ symbols! {
debug_trait, debug_trait,
declare_lint_pass, declare_lint_pass,
decl_macro, decl_macro,
debug,
Debug, Debug,
Decodable, Decodable,
Default, Default,

View File

@ -1105,15 +1105,15 @@ impl<'a, 'tcx> InferCtxtExt<'tcx> for InferCtxt<'a, 'tcx> {
let generator_did_root = self.tcx.closure_base_def_id(generator_did); let generator_did_root = self.tcx.closure_base_def_id(generator_did);
debug!( debug!(
"maybe_note_obligation_cause_for_async_await: generator_did={:?} \ "maybe_note_obligation_cause_for_async_await: generator_did={:?} \
generator_did_root={:?} in_progress_tables.local_id_root={:?} span={:?}", generator_did_root={:?} in_progress_tables.hir_owner={:?} span={:?}",
generator_did, generator_did,
generator_did_root, generator_did_root,
in_progress_tables.as_ref().map(|t| t.local_id_root), in_progress_tables.as_ref().map(|t| t.hir_owner),
span span
); );
let query_tables; let query_tables;
let tables: &TypeckTables<'tcx> = match &in_progress_tables { let tables: &TypeckTables<'tcx> = match &in_progress_tables {
Some(t) if t.local_id_root == Some(generator_did_root) => t, Some(t) if t.hir_owner.map(|owner| owner.to_def_id()) == Some(generator_did_root) => t,
_ => { _ => {
query_tables = self.tcx.typeck_tables_of(generator_did); query_tables = self.tcx.typeck_tables_of(generator_did);
&query_tables &query_tables

View File

@ -213,7 +213,7 @@ fn compare_predicate_entailment<'tcx>(
); );
tcx.infer_ctxt().enter(|infcx| { tcx.infer_ctxt().enter(|infcx| {
let inh = Inherited::new(infcx, impl_m.def_id); let inh = Inherited::new(infcx, impl_m.def_id.expect_local());
let infcx = &inh.infcx; let infcx = &inh.infcx;
debug!("compare_impl_method: caller_bounds={:?}", param_env.caller_bounds); debug!("compare_impl_method: caller_bounds={:?}", param_env.caller_bounds);
@ -950,7 +950,7 @@ crate fn compare_const_impl<'tcx>(
tcx.infer_ctxt().enter(|infcx| { tcx.infer_ctxt().enter(|infcx| {
let param_env = tcx.param_env(impl_c.def_id); let param_env = tcx.param_env(impl_c.def_id);
let inh = Inherited::new(infcx, impl_c.def_id); let inh = Inherited::new(infcx, impl_c.def_id.expect_local());
let infcx = &inh.infcx; let infcx = &inh.infcx;
// The below is for the most part highly similar to the procedure // The below is for the most part highly similar to the procedure
@ -1130,7 +1130,7 @@ fn compare_type_predicate_entailment(
normalize_cause.clone(), normalize_cause.clone(),
); );
tcx.infer_ctxt().enter(|infcx| { tcx.infer_ctxt().enter(|infcx| {
let inh = Inherited::new(infcx, impl_ty.def_id); let inh = Inherited::new(infcx, impl_ty.def_id.expect_local());
let infcx = &inh.infcx; let infcx = &inh.infcx;
debug!("compare_type_predicate_entailment: caller_bounds={:?}", param_env.caller_bounds); debug!("compare_type_predicate_entailment: caller_bounds={:?}", param_env.caller_bounds);

View File

@ -1018,9 +1018,9 @@ impl<'a, 'tcx> FnCtxt<'a, 'tcx> {
// Obtain the span for `param` and use it for a structured suggestion. // Obtain the span for `param` and use it for a structured suggestion.
let mut suggested = false; let mut suggested = false;
if let (Some(ref param), Some(ref table)) = (param_type, self.in_progress_tables) { if let (Some(ref param), Some(ref table)) = (param_type, self.in_progress_tables) {
let table = table.borrow(); let table_owner = table.borrow().hir_owner;
if let Some(did) = table.local_id_root { if let Some(table_owner) = table_owner {
let generics = self.tcx.generics_of(did); let generics = self.tcx.generics_of(table_owner.to_def_id());
let type_param = generics.type_param(param, self.tcx); let type_param = generics.type_param(param, self.tcx);
let hir = &self.tcx.hir(); let hir = &self.tcx.hir();
if let Some(id) = hir.as_local_hir_id(type_param.def_id) { if let Some(id) = hir.as_local_hir_id(type_param.def_id) {

View File

@ -112,7 +112,7 @@ use rustc_data_structures::fx::{FxHashMap, FxHashSet};
use rustc_errors::{pluralize, struct_span_err, Applicability, DiagnosticBuilder, DiagnosticId}; use rustc_errors::{pluralize, struct_span_err, Applicability, DiagnosticBuilder, DiagnosticId};
use rustc_hir as hir; use rustc_hir as hir;
use rustc_hir::def::{CtorOf, DefKind, Res}; use rustc_hir::def::{CtorOf, DefKind, Res};
use rustc_hir::def_id::{CrateNum, DefId, DefIdMap, DefIdSet, LOCAL_CRATE}; use rustc_hir::def_id::{CrateNum, DefId, DefIdMap, DefIdSet, LocalDefId, LOCAL_CRATE};
use rustc_hir::intravisit::{self, NestedVisitorMap, Visitor}; use rustc_hir::intravisit::{self, NestedVisitorMap, Visitor};
use rustc_hir::itemlikevisit::ItemLikeVisitor; use rustc_hir::itemlikevisit::ItemLikeVisitor;
use rustc_hir::{ExprKind, GenericArg, HirIdMap, Item, ItemKind, Node, PatKind, QPath}; use rustc_hir::{ExprKind, GenericArg, HirIdMap, Item, ItemKind, Node, PatKind, QPath};
@ -633,19 +633,15 @@ impl<'a, 'tcx> Deref for FnCtxt<'a, 'tcx> {
/// `F: for<'b, 'tcx> where 'tcx FnOnce(Inherited<'b, 'tcx>)`. /// `F: for<'b, 'tcx> where 'tcx FnOnce(Inherited<'b, 'tcx>)`.
pub struct InheritedBuilder<'tcx> { pub struct InheritedBuilder<'tcx> {
infcx: infer::InferCtxtBuilder<'tcx>, infcx: infer::InferCtxtBuilder<'tcx>,
def_id: DefId, def_id: LocalDefId,
} }
impl Inherited<'_, 'tcx> { impl Inherited<'_, 'tcx> {
pub fn build(tcx: TyCtxt<'tcx>, def_id: DefId) -> InheritedBuilder<'tcx> { pub fn build(tcx: TyCtxt<'tcx>, def_id: LocalDefId) -> InheritedBuilder<'tcx> {
let hir_id_root = if let Some(def_id) = def_id.as_local() { let hir_owner = tcx.hir().local_def_id_to_hir_id(def_id).owner;
tcx.hir().local_def_id_to_hir_id(def_id).owner.to_def_id()
} else {
def_id
};
InheritedBuilder { InheritedBuilder {
infcx: tcx.infer_ctxt().with_fresh_in_progress_tables(hir_id_root), infcx: tcx.infer_ctxt().with_fresh_in_progress_tables(hir_owner),
def_id, def_id,
} }
} }
@ -662,10 +658,10 @@ impl<'tcx> InheritedBuilder<'tcx> {
} }
impl Inherited<'a, 'tcx> { impl Inherited<'a, 'tcx> {
fn new(infcx: InferCtxt<'a, 'tcx>, def_id: DefId) -> Self { fn new(infcx: InferCtxt<'a, 'tcx>, def_id: LocalDefId) -> Self {
let tcx = infcx.tcx; let tcx = infcx.tcx;
let item_id = tcx.hir().as_local_hir_id(def_id); let item_id = tcx.hir().local_def_id_to_hir_id(def_id);
let body_id = item_id.and_then(|id| tcx.hir().maybe_body_owned_by(id)); let body_id = tcx.hir().maybe_body_owned_by(item_id);
let implicit_region_bound = body_id.map(|body_id| { let implicit_region_bound = body_id.map(|body_id| {
let body = tcx.hir().body(body_id); let body = tcx.hir().body(body_id);
tcx.mk_region(ty::ReScope(region::Scope { tcx.mk_region(ty::ReScope(region::Scope {
@ -1002,7 +998,7 @@ fn typeck_tables_of_with_fallback<'tcx>(
}); });
let body = tcx.hir().body(body_id); let body = tcx.hir().body(body_id);
let tables = Inherited::build(tcx, def_id).enter(|inh| { let tables = Inherited::build(tcx, def_id.expect_local()).enter(|inh| {
let param_env = tcx.param_env(def_id); let param_env = tcx.param_env(def_id);
let fcx = if let (Some(header), Some(decl)) = (fn_header, fn_decl) { let fcx = if let (Some(header), Some(decl)) = (fn_header, fn_decl) {
let fn_sig = if crate::collect::get_infer_ret_ty(&decl.output).is_some() { let fn_sig = if crate::collect::get_infer_ret_ty(&decl.output).is_some() {
@ -1127,7 +1123,7 @@ fn typeck_tables_of_with_fallback<'tcx>(
// Consistency check our TypeckTables instance can hold all ItemLocalIds // Consistency check our TypeckTables instance can hold all ItemLocalIds
// it will need to hold. // it will need to hold.
assert_eq!(tables.local_id_root, Some(id.owner.to_def_id())); assert_eq!(tables.hir_owner, Some(id.owner));
tables tables
} }

View File

@ -316,12 +316,12 @@ fn for_item<'tcx>(tcx: TyCtxt<'tcx>, item: &hir::Item<'_>) -> CheckWfFcxBuilder<
} }
fn for_id(tcx: TyCtxt<'_>, id: hir::HirId, span: Span) -> CheckWfFcxBuilder<'_> { fn for_id(tcx: TyCtxt<'_>, id: hir::HirId, span: Span) -> CheckWfFcxBuilder<'_> {
let def_id = tcx.hir().local_def_id(id); let def_id = tcx.hir().local_def_id(id).expect_local();
CheckWfFcxBuilder { CheckWfFcxBuilder {
inherited: Inherited::build(tcx, def_id), inherited: Inherited::build(tcx, def_id),
id, id,
span, span,
param_env: tcx.param_env(def_id), param_env: tcx.param_env(def_id.to_def_id()),
} }
} }

View File

@ -111,7 +111,7 @@ impl<'cx, 'tcx> WritebackCx<'cx, 'tcx> {
WritebackCx { WritebackCx {
fcx, fcx,
tables: ty::TypeckTables::empty(Some(owner.to_def_id())), tables: ty::TypeckTables::empty(Some(owner)),
body, body,
rustc_dump_user_substs, rustc_dump_user_substs,
} }
@ -338,11 +338,11 @@ impl<'cx, 'tcx> WritebackCx<'cx, 'tcx> {
fn visit_closures(&mut self) { fn visit_closures(&mut self) {
let fcx_tables = self.fcx.tables.borrow(); let fcx_tables = self.fcx.tables.borrow();
debug_assert_eq!(fcx_tables.local_id_root, self.tables.local_id_root); assert_eq!(fcx_tables.hir_owner, self.tables.hir_owner);
let common_local_id_root = fcx_tables.local_id_root.unwrap(); let common_hir_owner = fcx_tables.hir_owner.unwrap();
for (&id, &origin) in fcx_tables.closure_kind_origins().iter() { for (&id, &origin) in fcx_tables.closure_kind_origins().iter() {
let hir_id = hir::HirId { owner: common_local_id_root.expect_local(), local_id: id }; let hir_id = hir::HirId { owner: common_hir_owner, local_id: id };
self.tables.closure_kind_origins_mut().insert(hir_id, origin); self.tables.closure_kind_origins_mut().insert(hir_id, origin);
} }
} }
@ -350,7 +350,7 @@ impl<'cx, 'tcx> WritebackCx<'cx, 'tcx> {
fn visit_coercion_casts(&mut self) { fn visit_coercion_casts(&mut self) {
let fcx_tables = self.fcx.tables.borrow(); let fcx_tables = self.fcx.tables.borrow();
let fcx_coercion_casts = fcx_tables.coercion_casts(); let fcx_coercion_casts = fcx_tables.coercion_casts();
debug_assert_eq!(fcx_tables.local_id_root, self.tables.local_id_root); assert_eq!(fcx_tables.hir_owner, self.tables.hir_owner);
for local_id in fcx_coercion_casts { for local_id in fcx_coercion_casts {
self.tables.set_coercion_cast(*local_id); self.tables.set_coercion_cast(*local_id);
@ -359,12 +359,12 @@ impl<'cx, 'tcx> WritebackCx<'cx, 'tcx> {
fn visit_user_provided_tys(&mut self) { fn visit_user_provided_tys(&mut self) {
let fcx_tables = self.fcx.tables.borrow(); let fcx_tables = self.fcx.tables.borrow();
debug_assert_eq!(fcx_tables.local_id_root, self.tables.local_id_root); assert_eq!(fcx_tables.hir_owner, self.tables.hir_owner);
let common_local_id_root = fcx_tables.local_id_root.unwrap(); let common_hir_owner = fcx_tables.hir_owner.unwrap();
let mut errors_buffer = Vec::new(); let mut errors_buffer = Vec::new();
for (&local_id, c_ty) in fcx_tables.user_provided_types().iter() { for (&local_id, c_ty) in fcx_tables.user_provided_types().iter() {
let hir_id = hir::HirId { owner: common_local_id_root.expect_local(), local_id }; let hir_id = hir::HirId { owner: common_hir_owner, local_id };
if cfg!(debug_assertions) && c_ty.has_local_value() { if cfg!(debug_assertions) && c_ty.has_local_value() {
span_bug!(hir_id.to_span(self.fcx.tcx), "writeback: `{:?}` is a local value", c_ty); span_bug!(hir_id.to_span(self.fcx.tcx), "writeback: `{:?}` is a local value", c_ty);
@ -397,7 +397,7 @@ impl<'cx, 'tcx> WritebackCx<'cx, 'tcx> {
fn visit_user_provided_sigs(&mut self) { fn visit_user_provided_sigs(&mut self) {
let fcx_tables = self.fcx.tables.borrow(); let fcx_tables = self.fcx.tables.borrow();
debug_assert_eq!(fcx_tables.local_id_root, self.tables.local_id_root); assert_eq!(fcx_tables.hir_owner, self.tables.hir_owner);
for (&def_id, c_sig) in fcx_tables.user_provided_sigs.iter() { for (&def_id, c_sig) in fcx_tables.user_provided_sigs.iter() {
if cfg!(debug_assertions) && c_sig.has_local_value() { if cfg!(debug_assertions) && c_sig.has_local_value() {
@ -414,7 +414,7 @@ impl<'cx, 'tcx> WritebackCx<'cx, 'tcx> {
fn visit_generator_interior_types(&mut self) { fn visit_generator_interior_types(&mut self) {
let fcx_tables = self.fcx.tables.borrow(); let fcx_tables = self.fcx.tables.borrow();
debug_assert_eq!(fcx_tables.local_id_root, self.tables.local_id_root); assert_eq!(fcx_tables.hir_owner, self.tables.hir_owner);
self.tables.generator_interior_types = fcx_tables.generator_interior_types.clone(); self.tables.generator_interior_types = fcx_tables.generator_interior_types.clone();
} }
@ -553,11 +553,11 @@ impl<'cx, 'tcx> WritebackCx<'cx, 'tcx> {
fn visit_liberated_fn_sigs(&mut self) { fn visit_liberated_fn_sigs(&mut self) {
let fcx_tables = self.fcx.tables.borrow(); let fcx_tables = self.fcx.tables.borrow();
debug_assert_eq!(fcx_tables.local_id_root, self.tables.local_id_root); assert_eq!(fcx_tables.hir_owner, self.tables.hir_owner);
let common_local_id_root = fcx_tables.local_id_root.unwrap(); let common_hir_owner = fcx_tables.hir_owner.unwrap();
for (&local_id, fn_sig) in fcx_tables.liberated_fn_sigs().iter() { for (&local_id, fn_sig) in fcx_tables.liberated_fn_sigs().iter() {
let hir_id = hir::HirId { owner: common_local_id_root.expect_local(), local_id }; let hir_id = hir::HirId { owner: common_hir_owner, local_id };
let fn_sig = self.resolve(fn_sig, &hir_id); let fn_sig = self.resolve(fn_sig, &hir_id);
self.tables.liberated_fn_sigs_mut().insert(hir_id, fn_sig.clone()); self.tables.liberated_fn_sigs_mut().insert(hir_id, fn_sig.clone());
} }
@ -565,11 +565,11 @@ impl<'cx, 'tcx> WritebackCx<'cx, 'tcx> {
fn visit_fru_field_types(&mut self) { fn visit_fru_field_types(&mut self) {
let fcx_tables = self.fcx.tables.borrow(); let fcx_tables = self.fcx.tables.borrow();
debug_assert_eq!(fcx_tables.local_id_root, self.tables.local_id_root); assert_eq!(fcx_tables.hir_owner, self.tables.hir_owner);
let common_local_id_root = fcx_tables.local_id_root.unwrap(); let common_hir_owner = fcx_tables.hir_owner.unwrap();
for (&local_id, ftys) in fcx_tables.fru_field_types().iter() { for (&local_id, ftys) in fcx_tables.fru_field_types().iter() {
let hir_id = hir::HirId { owner: common_local_id_root.expect_local(), local_id }; let hir_id = hir::HirId { owner: common_hir_owner, local_id };
let ftys = self.resolve(ftys, &hir_id); let ftys = self.resolve(ftys, &hir_id);
self.tables.fru_field_types_mut().insert(hir_id, ftys); self.tables.fru_field_types_mut().insert(hir_id, ftys);
} }

View File

@ -1306,47 +1306,67 @@ fn generics_of(tcx: TyCtxt<'_>, def_id: DefId) -> &ty::Generics {
// Now create the real type and const parameters. // Now create the real type and const parameters.
let type_start = own_start - has_self as u32 + params.len() as u32; let type_start = own_start - has_self as u32 + params.len() as u32;
let mut i = 0; let mut i = 0;
params.extend(ast_generics.params.iter().filter_map(|param| {
let kind = match param.kind {
GenericParamKind::Type { ref default, synthetic, .. } => {
if !allow_defaults && default.is_some() {
if !tcx.features().default_type_parameter_fallback {
tcx.struct_span_lint_hir(
lint::builtin::INVALID_TYPE_PARAM_DEFAULT,
param.hir_id,
param.span,
|lint| {
lint.build(
"defaults for type parameters are only allowed in \
`struct`, `enum`, `type`, or `trait` definitions.",
)
.emit();
},
);
}
}
ty::GenericParamDefKind::Type { // FIXME(const_generics): a few places in the compiler expect generic params
has_default: default.is_some(), // to be in the order lifetimes, then type params, then const params.
object_lifetime_default: object_lifetime_defaults //
.as_ref() // To prevent internal errors in case const parameters are supplied before
.map_or(rl::Set1::Empty, |o| o[i]), // type parameters we first add all type params, then all const params.
synthetic, params.extend(ast_generics.params.iter().filter_map(|param| {
if let GenericParamKind::Type { ref default, synthetic, .. } = param.kind {
if !allow_defaults && default.is_some() {
if !tcx.features().default_type_parameter_fallback {
tcx.struct_span_lint_hir(
lint::builtin::INVALID_TYPE_PARAM_DEFAULT,
param.hir_id,
param.span,
|lint| {
lint.build(
"defaults for type parameters are only allowed in \
`struct`, `enum`, `type`, or `trait` definitions.",
)
.emit();
},
);
} }
} }
GenericParamKind::Const { .. } => ty::GenericParamDefKind::Const,
_ => return None,
};
let param_def = ty::GenericParamDef { let kind = ty::GenericParamDefKind::Type {
index: type_start + i as u32, has_default: default.is_some(),
name: param.name.ident().name, object_lifetime_default: object_lifetime_defaults
def_id: tcx.hir().local_def_id(param.hir_id), .as_ref()
pure_wrt_drop: param.pure_wrt_drop, .map_or(rl::Set1::Empty, |o| o[i]),
kind, synthetic,
}; };
i += 1;
Some(param_def) let param_def = ty::GenericParamDef {
index: type_start + i as u32,
name: param.name.ident().name,
def_id: tcx.hir().local_def_id(param.hir_id),
pure_wrt_drop: param.pure_wrt_drop,
kind,
};
i += 1;
Some(param_def)
} else {
None
}
}));
params.extend(ast_generics.params.iter().filter_map(|param| {
if let GenericParamKind::Const { .. } = param.kind {
let param_def = ty::GenericParamDef {
index: type_start + i as u32,
name: param.name.ident().name,
def_id: tcx.hir().local_def_id(param.hir_id),
pure_wrt_drop: param.pure_wrt_drop,
kind: ty::GenericParamDefKind::Const,
};
i += 1;
Some(param_def)
} else {
None
}
})); }));
// provide junk type parameter defs - the only place that // provide junk type parameter defs - the only place that

View File

@ -6,7 +6,7 @@ use crate::cell::RefCell;
use crate::fmt; use crate::fmt;
use crate::io::lazy::Lazy; use crate::io::lazy::Lazy;
use crate::io::{self, BufReader, Initializer, IoSlice, IoSliceMut, LineWriter}; use crate::io::{self, BufReader, Initializer, IoSlice, IoSliceMut, LineWriter};
use crate::sync::{Arc, Mutex, MutexGuard}; use crate::sync::{Arc, Mutex, MutexGuard, Once};
use crate::sys::stdio; use crate::sys::stdio;
use crate::sys_common::remutex::{ReentrantMutex, ReentrantMutexGuard}; use crate::sys_common::remutex::{ReentrantMutex, ReentrantMutexGuard};
use crate::thread::LocalKey; use crate::thread::LocalKey;
@ -493,7 +493,11 @@ pub fn stdout() -> Stdout {
Ok(stdout) => Maybe::Real(stdout), Ok(stdout) => Maybe::Real(stdout),
_ => Maybe::Fake, _ => Maybe::Fake,
}; };
Arc::new(ReentrantMutex::new(RefCell::new(LineWriter::new(stdout)))) unsafe {
let ret = Arc::new(ReentrantMutex::new(RefCell::new(LineWriter::new(stdout))));
ret.init();
return ret;
}
} }
} }
@ -520,7 +524,7 @@ impl Stdout {
/// ``` /// ```
#[stable(feature = "rust1", since = "1.0.0")] #[stable(feature = "rust1", since = "1.0.0")]
pub fn lock(&self) -> StdoutLock<'_> { pub fn lock(&self) -> StdoutLock<'_> {
StdoutLock { inner: self.inner.lock().unwrap_or_else(|e| e.into_inner()) } StdoutLock { inner: self.inner.lock() }
} }
} }
@ -581,7 +585,7 @@ impl fmt::Debug for StdoutLock<'_> {
/// an error. /// an error.
#[stable(feature = "rust1", since = "1.0.0")] #[stable(feature = "rust1", since = "1.0.0")]
pub struct Stderr { pub struct Stderr {
inner: Arc<ReentrantMutex<RefCell<Maybe<StderrRaw>>>>, inner: &'static ReentrantMutex<RefCell<Maybe<StderrRaw>>>,
} }
/// A locked reference to the `Stderr` handle. /// A locked reference to the `Stderr` handle.
@ -639,19 +643,28 @@ pub struct StderrLock<'a> {
/// ``` /// ```
#[stable(feature = "rust1", since = "1.0.0")] #[stable(feature = "rust1", since = "1.0.0")]
pub fn stderr() -> Stderr { pub fn stderr() -> Stderr {
static INSTANCE: Lazy<ReentrantMutex<RefCell<Maybe<StderrRaw>>>> = Lazy::new(); // Note that unlike `stdout()` we don't use `Lazy` here which registers a
return Stderr { // destructor. Stderr is not buffered nor does the `stderr_raw` type consume
inner: unsafe { INSTANCE.get(stderr_init).expect("cannot access stderr during shutdown") }, // any owned resources, so there's no need to run any destructors at some
}; // point in the future.
//
// This has the added benefit of allowing `stderr` to be usable during
// process shutdown as well!
static INSTANCE: ReentrantMutex<RefCell<Maybe<StderrRaw>>> =
unsafe { ReentrantMutex::new(RefCell::new(Maybe::Fake)) };
fn stderr_init() -> Arc<ReentrantMutex<RefCell<Maybe<StderrRaw>>>> { // When accessing stderr we need one-time initialization of the reentrant
// This must not reentrantly access `INSTANCE` // mutex, followed by one-time detection of whether we actually have a
let stderr = match stderr_raw() { // stderr handle or not. Afterwards we can just always use the now-filled-in
Ok(stderr) => Maybe::Real(stderr), // `INSTANCE` value.
_ => Maybe::Fake, static INIT: Once = Once::new();
}; INIT.call_once(|| unsafe {
Arc::new(ReentrantMutex::new(RefCell::new(stderr))) INSTANCE.init();
} if let Ok(stderr) = stderr_raw() {
*INSTANCE.lock().borrow_mut() = Maybe::Real(stderr);
}
});
return Stderr { inner: &INSTANCE };
} }
impl Stderr { impl Stderr {
@ -677,7 +690,7 @@ impl Stderr {
/// ``` /// ```
#[stable(feature = "rust1", since = "1.0.0")] #[stable(feature = "rust1", since = "1.0.0")]
pub fn lock(&self) -> StderrLock<'_> { pub fn lock(&self) -> StderrLock<'_> {
StderrLock { inner: self.inner.lock().unwrap_or_else(|e| e.into_inner()) } StderrLock { inner: self.inner.lock() }
} }
} }

View File

@ -53,16 +53,16 @@ pub struct ReentrantMutex {
} }
impl ReentrantMutex { impl ReentrantMutex {
pub unsafe fn uninitialized() -> ReentrantMutex { pub const unsafe fn uninitialized() -> ReentrantMutex {
ReentrantMutex { ReentrantMutex {
lock: UnsafeCell::new(MaybeUninit::uninit()), lock: UnsafeCell::new(MaybeUninit::uninit()),
recursion: UnsafeCell::new(MaybeUninit::uninit()), recursion: UnsafeCell::new(MaybeUninit::uninit()),
} }
} }
pub unsafe fn init(&mut self) { pub unsafe fn init(&self) {
self.lock = UnsafeCell::new(MaybeUninit::new(AtomicU32::new(abi::LOCK_UNLOCKED.0))); *self.lock.get() = MaybeUninit::new(AtomicU32::new(abi::LOCK_UNLOCKED.0));
self.recursion = UnsafeCell::new(MaybeUninit::new(0)); *self.recursion.get() = MaybeUninit::new(0);
} }
pub unsafe fn try_lock(&self) -> bool { pub unsafe fn try_lock(&self) -> bool {

View File

@ -46,13 +46,13 @@ pub struct ReentrantMutex {
} }
impl ReentrantMutex { impl ReentrantMutex {
pub unsafe fn uninitialized() -> ReentrantMutex { pub const unsafe fn uninitialized() -> ReentrantMutex {
ReentrantMutex { inner: ptr::null() } ReentrantMutex { inner: ptr::null() }
} }
#[inline] #[inline]
pub unsafe fn init(&mut self) { pub unsafe fn init(&self) {
let _ = abi::recmutex_init(&mut self.inner as *mut *const c_void); let _ = abi::recmutex_init(&self.inner as *const *const c_void as *mut _);
} }
#[inline] #[inline]

View File

@ -75,7 +75,7 @@ impl ReentrantMutex {
} }
#[inline] #[inline]
pub unsafe fn init(&mut self) {} pub unsafe fn init(&self) {}
#[inline] #[inline]
pub unsafe fn lock(&self) { pub unsafe fn lock(&self) {

View File

@ -92,11 +92,11 @@ unsafe impl Send for ReentrantMutex {}
unsafe impl Sync for ReentrantMutex {} unsafe impl Sync for ReentrantMutex {}
impl ReentrantMutex { impl ReentrantMutex {
pub unsafe fn uninitialized() -> ReentrantMutex { pub const unsafe fn uninitialized() -> ReentrantMutex {
ReentrantMutex { inner: UnsafeCell::new(libc::PTHREAD_MUTEX_INITIALIZER) } ReentrantMutex { inner: UnsafeCell::new(libc::PTHREAD_MUTEX_INITIALIZER) }
} }
pub unsafe fn init(&mut self) { pub unsafe fn init(&self) {
let mut attr = MaybeUninit::<libc::pthread_mutexattr_t>::uninit(); let mut attr = MaybeUninit::<libc::pthread_mutexattr_t>::uninit();
let result = libc::pthread_mutexattr_init(attr.as_mut_ptr()); let result = libc::pthread_mutexattr_init(attr.as_mut_ptr());
debug_assert_eq!(result, 0); debug_assert_eq!(result, 0);

View File

@ -92,11 +92,11 @@ unsafe impl Send for ReentrantMutex {}
unsafe impl Sync for ReentrantMutex {} unsafe impl Sync for ReentrantMutex {}
impl ReentrantMutex { impl ReentrantMutex {
pub unsafe fn uninitialized() -> ReentrantMutex { pub const unsafe fn uninitialized() -> ReentrantMutex {
ReentrantMutex { inner: UnsafeCell::new(libc::PTHREAD_MUTEX_INITIALIZER) } ReentrantMutex { inner: UnsafeCell::new(libc::PTHREAD_MUTEX_INITIALIZER) }
} }
pub unsafe fn init(&mut self) { pub unsafe fn init(&self) {
let mut attr = MaybeUninit::<libc::pthread_mutexattr_t>::uninit(); let mut attr = MaybeUninit::<libc::pthread_mutexattr_t>::uninit();
let result = libc::pthread_mutexattr_init(attr.as_mut_ptr()); let result = libc::pthread_mutexattr_init(attr.as_mut_ptr());
debug_assert_eq!(result, 0); debug_assert_eq!(result, 0);

View File

@ -47,11 +47,11 @@ impl Mutex {
pub struct ReentrantMutex {} pub struct ReentrantMutex {}
impl ReentrantMutex { impl ReentrantMutex {
pub unsafe fn uninitialized() -> ReentrantMutex { pub const unsafe fn uninitialized() -> ReentrantMutex {
ReentrantMutex {} ReentrantMutex {}
} }
pub unsafe fn init(&mut self) {} pub unsafe fn init(&self) {}
pub unsafe fn lock(&self) {} pub unsafe fn lock(&self) {}

View File

@ -80,11 +80,11 @@ unsafe impl Sync for ReentrantMutex {}
// released when this recursion counter reaches 0. // released when this recursion counter reaches 0.
impl ReentrantMutex { impl ReentrantMutex {
pub unsafe fn uninitialized() -> ReentrantMutex { pub const unsafe fn uninitialized() -> ReentrantMutex {
ReentrantMutex { owner: AtomicU32::new(0), recursions: UnsafeCell::new(0) } ReentrantMutex { owner: AtomicU32::new(0), recursions: UnsafeCell::new(0) }
} }
pub unsafe fn init(&mut self) { pub unsafe fn init(&self) {
// nothing to do... // nothing to do...
} }

View File

@ -109,7 +109,7 @@ impl Mutex {
0 => {} 0 => {}
n => return n as *mut _, n => return n as *mut _,
} }
let mut re = box ReentrantMutex::uninitialized(); let re = box ReentrantMutex::uninitialized();
re.init(); re.init();
let re = Box::into_raw(re); let re = Box::into_raw(re);
match self.lock.compare_and_swap(0, re as usize, Ordering::SeqCst) { match self.lock.compare_and_swap(0, re as usize, Ordering::SeqCst) {
@ -157,11 +157,11 @@ unsafe impl Send for ReentrantMutex {}
unsafe impl Sync for ReentrantMutex {} unsafe impl Sync for ReentrantMutex {}
impl ReentrantMutex { impl ReentrantMutex {
pub fn uninitialized() -> ReentrantMutex { pub const fn uninitialized() -> ReentrantMutex {
ReentrantMutex { inner: UnsafeCell::new(MaybeUninit::uninit()) } ReentrantMutex { inner: UnsafeCell::new(MaybeUninit::uninit()) }
} }
pub unsafe fn init(&mut self) { pub unsafe fn init(&self) {
c::InitializeCriticalSection((&mut *self.inner.get()).as_mut_ptr()); c::InitializeCriticalSection((&mut *self.inner.get()).as_mut_ptr());
} }

View File

@ -3,7 +3,6 @@ use crate::marker;
use crate::ops::Deref; use crate::ops::Deref;
use crate::panic::{RefUnwindSafe, UnwindSafe}; use crate::panic::{RefUnwindSafe, UnwindSafe};
use crate::sys::mutex as sys; use crate::sys::mutex as sys;
use crate::sys_common::poison::{self, LockResult, TryLockError, TryLockResult};
/// A re-entrant mutual exclusion /// A re-entrant mutual exclusion
/// ///
@ -11,8 +10,7 @@ use crate::sys_common::poison::{self, LockResult, TryLockError, TryLockResult};
/// available. The thread which has already locked the mutex can lock it /// available. The thread which has already locked the mutex can lock it
/// multiple times without blocking, preventing a common source of deadlocks. /// multiple times without blocking, preventing a common source of deadlocks.
pub struct ReentrantMutex<T> { pub struct ReentrantMutex<T> {
inner: Box<sys::ReentrantMutex>, inner: sys::ReentrantMutex,
poison: poison::Flag,
data: T, data: T,
} }
@ -39,23 +37,30 @@ pub struct ReentrantMutexGuard<'a, T: 'a> {
// funny underscores due to how Deref currently works (it disregards field // funny underscores due to how Deref currently works (it disregards field
// privacy). // privacy).
__lock: &'a ReentrantMutex<T>, __lock: &'a ReentrantMutex<T>,
__poison: poison::Guard,
} }
impl<T> !marker::Send for ReentrantMutexGuard<'_, T> {} impl<T> !marker::Send for ReentrantMutexGuard<'_, T> {}
impl<T> ReentrantMutex<T> { impl<T> ReentrantMutex<T> {
/// Creates a new reentrant mutex in an unlocked state. /// Creates a new reentrant mutex in an unlocked state.
pub fn new(t: T) -> ReentrantMutex<T> { ///
unsafe { /// # Unsafety
let mut mutex = ReentrantMutex { ///
inner: box sys::ReentrantMutex::uninitialized(), /// This function is unsafe because it is required that `init` is called
poison: poison::Flag::new(), /// once this mutex is in its final resting place, and only then are the
data: t, /// lock/unlock methods safe.
}; pub const unsafe fn new(t: T) -> ReentrantMutex<T> {
mutex.inner.init(); ReentrantMutex { inner: sys::ReentrantMutex::uninitialized(), data: t }
mutex }
}
/// Initializes this mutex so it's ready for use.
///
/// # Unsafety
///
/// Unsafe to call more than once, and must be called after this will no
/// longer move in memory.
pub unsafe fn init(&self) {
self.inner.init();
} }
/// Acquires a mutex, blocking the current thread until it is able to do so. /// Acquires a mutex, blocking the current thread until it is able to do so.
@ -70,7 +75,7 @@ impl<T> ReentrantMutex<T> {
/// If another user of this mutex panicked while holding the mutex, then /// If another user of this mutex panicked while holding the mutex, then
/// this call will return failure if the mutex would otherwise be /// this call will return failure if the mutex would otherwise be
/// acquired. /// acquired.
pub fn lock(&self) -> LockResult<ReentrantMutexGuard<'_, T>> { pub fn lock(&self) -> ReentrantMutexGuard<'_, T> {
unsafe { self.inner.lock() } unsafe { self.inner.lock() }
ReentrantMutexGuard::new(&self) ReentrantMutexGuard::new(&self)
} }
@ -87,12 +92,8 @@ impl<T> ReentrantMutex<T> {
/// If another user of this mutex panicked while holding the mutex, then /// If another user of this mutex panicked while holding the mutex, then
/// this call will return failure if the mutex would otherwise be /// this call will return failure if the mutex would otherwise be
/// acquired. /// acquired.
pub fn try_lock(&self) -> TryLockResult<ReentrantMutexGuard<'_, T>> { pub fn try_lock(&self) -> Option<ReentrantMutexGuard<'_, T>> {
if unsafe { self.inner.try_lock() } { if unsafe { self.inner.try_lock() } { Some(ReentrantMutexGuard::new(&self)) } else { None }
Ok(ReentrantMutexGuard::new(&self)?)
} else {
Err(TryLockError::WouldBlock)
}
} }
} }
@ -108,11 +109,8 @@ impl<T> Drop for ReentrantMutex<T> {
impl<T: fmt::Debug + 'static> fmt::Debug for ReentrantMutex<T> { impl<T: fmt::Debug + 'static> fmt::Debug for ReentrantMutex<T> {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
match self.try_lock() { match self.try_lock() {
Ok(guard) => f.debug_struct("ReentrantMutex").field("data", &*guard).finish(), Some(guard) => f.debug_struct("ReentrantMutex").field("data", &*guard).finish(),
Err(TryLockError::Poisoned(err)) => { None => {
f.debug_struct("ReentrantMutex").field("data", &**err.get_ref()).finish()
}
Err(TryLockError::WouldBlock) => {
struct LockedPlaceholder; struct LockedPlaceholder;
impl fmt::Debug for LockedPlaceholder { impl fmt::Debug for LockedPlaceholder {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
@ -127,11 +125,8 @@ impl<T: fmt::Debug + 'static> fmt::Debug for ReentrantMutex<T> {
} }
impl<'mutex, T> ReentrantMutexGuard<'mutex, T> { impl<'mutex, T> ReentrantMutexGuard<'mutex, T> {
fn new(lock: &'mutex ReentrantMutex<T>) -> LockResult<ReentrantMutexGuard<'mutex, T>> { fn new(lock: &'mutex ReentrantMutex<T>) -> ReentrantMutexGuard<'mutex, T> {
poison::map_result(lock.poison.borrow(), |guard| ReentrantMutexGuard { ReentrantMutexGuard { __lock: lock }
__lock: lock,
__poison: guard,
})
} }
} }
@ -147,7 +142,6 @@ impl<T> Drop for ReentrantMutexGuard<'_, T> {
#[inline] #[inline]
fn drop(&mut self) { fn drop(&mut self) {
unsafe { unsafe {
self.__lock.poison.done(&self.__poison);
self.__lock.inner.unlock(); self.__lock.inner.unlock();
} }
} }
@ -162,13 +156,17 @@ mod tests {
#[test] #[test]
fn smoke() { fn smoke() {
let m = ReentrantMutex::new(()); let m = unsafe {
let m = ReentrantMutex::new(());
m.init();
m
};
{ {
let a = m.lock().unwrap(); let a = m.lock();
{ {
let b = m.lock().unwrap(); let b = m.lock();
{ {
let c = m.lock().unwrap(); let c = m.lock();
assert_eq!(*c, ()); assert_eq!(*c, ());
} }
assert_eq!(*b, ()); assert_eq!(*b, ());
@ -179,15 +177,19 @@ mod tests {
#[test] #[test]
fn is_mutex() { fn is_mutex() {
let m = Arc::new(ReentrantMutex::new(RefCell::new(0))); let m = unsafe {
let m = Arc::new(ReentrantMutex::new(RefCell::new(0)));
m.init();
m
};
let m2 = m.clone(); let m2 = m.clone();
let lock = m.lock().unwrap(); let lock = m.lock();
let child = thread::spawn(move || { let child = thread::spawn(move || {
let lock = m2.lock().unwrap(); let lock = m2.lock();
assert_eq!(*lock.borrow(), 4950); assert_eq!(*lock.borrow(), 4950);
}); });
for i in 0..100 { for i in 0..100 {
let lock = m.lock().unwrap(); let lock = m.lock();
*lock.borrow_mut() += i; *lock.borrow_mut() += i;
} }
drop(lock); drop(lock);
@ -196,17 +198,21 @@ mod tests {
#[test] #[test]
fn trylock_works() { fn trylock_works() {
let m = Arc::new(ReentrantMutex::new(())); let m = unsafe {
let m = Arc::new(ReentrantMutex::new(()));
m.init();
m
};
let m2 = m.clone(); let m2 = m.clone();
let _lock = m.try_lock().unwrap(); let _lock = m.try_lock();
let _lock2 = m.try_lock().unwrap(); let _lock2 = m.try_lock();
thread::spawn(move || { thread::spawn(move || {
let lock = m2.try_lock(); let lock = m2.try_lock();
assert!(lock.is_err()); assert!(lock.is_none());
}) })
.join() .join()
.unwrap(); .unwrap();
let _lock3 = m.try_lock().unwrap(); let _lock3 = m.try_lock();
} }
pub struct Answer<'a>(pub ReentrantMutexGuard<'a, RefCell<u32>>); pub struct Answer<'a>(pub ReentrantMutexGuard<'a, RefCell<u32>>);
@ -215,22 +221,4 @@ mod tests {
*self.0.borrow_mut() = 42; *self.0.borrow_mut() = 42;
} }
} }
#[test]
fn poison_works() {
let m = Arc::new(ReentrantMutex::new(RefCell::new(0)));
let mc = m.clone();
let result = thread::spawn(move || {
let lock = mc.lock().unwrap();
*lock.borrow_mut() = 1;
let lock2 = mc.lock().unwrap();
*lock.borrow_mut() = 2;
let _answer = Answer(lock2);
panic!("What the answer to my lifetimes dilemma is?");
})
.join();
assert!(result.is_err());
let r = m.lock().err().unwrap().into_inner();
assert_eq!(*r.borrow(), 42);
}
} }

View File

@ -0,0 +1,9 @@
#![feature(const_generics)]
//~^ WARN the feature `const_generics` is incomplete and may cause the compiler to crash
struct Bad<const N: usize, T> { //~ ERROR type parameters must be declared prior
arr: [u8; { N }],
another: T,
}
fn main() { }

View File

@ -0,0 +1,16 @@
error: type parameters must be declared prior to const parameters
--> $DIR/argument_order.rs:4:28
|
LL | struct Bad<const N: usize, T> {
| -----------------^- help: reorder the parameters: lifetimes, then types, then consts: `<T, const N: usize>`
warning: the feature `const_generics` is incomplete and may cause the compiler to crash
--> $DIR/argument_order.rs:1:12
|
LL | #![feature(const_generics)]
| ^^^^^^^^^^^^^^
|
= note: `#[warn(incomplete_features)]` on by default
error: aborting due to previous error

View File

@ -0,0 +1,48 @@
// run-pass
// ignore-emscripten no processes
use std::cell::RefCell;
use std::env;
use std::process::Command;
fn main() {
let name = "YOU_ARE_THE_TEST";
if env::var(name).is_ok() {
std::thread::spawn(|| {
TLS.with(|f| f.borrow().ensure());
})
.join()
.unwrap();
} else {
let me = env::current_exe().unwrap();
let output = Command::new(&me).env(name, "1").output().unwrap();
println!("{:?}", output);
assert!(output.status.success());
let stderr = String::from_utf8(output.stderr).unwrap();
assert!(stderr.contains("hello new\n"));
assert!(stderr.contains("hello drop\n"));
}
}
struct Stuff {
_x: usize,
}
impl Stuff {
fn new() -> Self {
eprintln!("hello new");
Self { _x: 0 }
}
fn ensure(&self) {}
}
impl Drop for Stuff {
fn drop(&mut self) {
eprintln!("hello drop");
}
}
thread_local! {
static TLS: RefCell<Stuff> = RefCell::new(Stuff::new());
}

View File

@ -0,0 +1,15 @@
// normalize-stderr-test "pref: Align \{\n *pow2: [1-3],\n *\}" -> "pref: $$PREF_ALIGN"
#![feature(never_type, rustc_attrs)]
#![crate_type = "lib"]
#[rustc_layout(debug)]
enum E { Foo, Bar(!, i32, i32) } //~ ERROR: layout debugging
#[rustc_layout(debug)]
struct S { f1: i32, f2: (), f3: i32 } //~ ERROR: layout debugging
#[rustc_layout(debug)]
union U { f1: (i32, i32), f3: i32 } //~ ERROR: layout debugging
#[rustc_layout(debug)]
type Test = Result<i32, i32>; //~ ERROR: layout debugging

View File

@ -0,0 +1,319 @@
error: layout debugging: LayoutDetails {
fields: Arbitrary {
offsets: [
Size {
raw: 0,
},
],
memory_index: [
0,
],
},
variants: Multiple {
discr: Scalar {
value: Int(
I32,
false,
),
valid_range: 0..=0,
},
discr_kind: Tag,
discr_index: 0,
variants: [
LayoutDetails {
fields: Arbitrary {
offsets: [],
memory_index: [],
},
variants: Single {
index: 0,
},
abi: Aggregate {
sized: true,
},
largest_niche: None,
align: AbiAndPrefAlign {
abi: Align {
pow2: 0,
},
pref: $PREF_ALIGN,
},
size: Size {
raw: 4,
},
},
LayoutDetails {
fields: Arbitrary {
offsets: [
Size {
raw: 4,
},
Size {
raw: 4,
},
Size {
raw: 8,
},
],
memory_index: [
0,
1,
2,
],
},
variants: Single {
index: 1,
},
abi: Uninhabited,
largest_niche: None,
align: AbiAndPrefAlign {
abi: Align {
pow2: 2,
},
pref: $PREF_ALIGN,
},
size: Size {
raw: 12,
},
},
],
},
abi: Aggregate {
sized: true,
},
largest_niche: Some(
Niche {
offset: Size {
raw: 0,
},
scalar: Scalar {
value: Int(
I32,
false,
),
valid_range: 0..=0,
},
},
),
align: AbiAndPrefAlign {
abi: Align {
pow2: 2,
},
pref: $PREF_ALIGN,
},
size: Size {
raw: 12,
},
}
--> $DIR/debug.rs:6:1
|
LL | enum E { Foo, Bar(!, i32, i32) }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
error: layout debugging: LayoutDetails {
fields: Arbitrary {
offsets: [
Size {
raw: 0,
},
Size {
raw: 0,
},
Size {
raw: 4,
},
],
memory_index: [
1,
0,
2,
],
},
variants: Single {
index: 0,
},
abi: ScalarPair(
Scalar {
value: Int(
I32,
true,
),
valid_range: 0..=4294967295,
},
Scalar {
value: Int(
I32,
true,
),
valid_range: 0..=4294967295,
},
),
largest_niche: None,
align: AbiAndPrefAlign {
abi: Align {
pow2: 2,
},
pref: $PREF_ALIGN,
},
size: Size {
raw: 8,
},
}
--> $DIR/debug.rs:9:1
|
LL | struct S { f1: i32, f2: (), f3: i32 }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
error: layout debugging: LayoutDetails {
fields: Union(
2,
),
variants: Single {
index: 0,
},
abi: Aggregate {
sized: true,
},
largest_niche: None,
align: AbiAndPrefAlign {
abi: Align {
pow2: 2,
},
pref: $PREF_ALIGN,
},
size: Size {
raw: 8,
},
}
--> $DIR/debug.rs:12:1
|
LL | union U { f1: (i32, i32), f3: i32 }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
error: layout debugging: LayoutDetails {
fields: Arbitrary {
offsets: [
Size {
raw: 0,
},
],
memory_index: [
0,
],
},
variants: Multiple {
discr: Scalar {
value: Int(
I32,
false,
),
valid_range: 0..=1,
},
discr_kind: Tag,
discr_index: 0,
variants: [
LayoutDetails {
fields: Arbitrary {
offsets: [
Size {
raw: 4,
},
],
memory_index: [
0,
],
},
variants: Single {
index: 0,
},
abi: Aggregate {
sized: true,
},
largest_niche: None,
align: AbiAndPrefAlign {
abi: Align {
pow2: 2,
},
pref: $PREF_ALIGN,
},
size: Size {
raw: 8,
},
},
LayoutDetails {
fields: Arbitrary {
offsets: [
Size {
raw: 4,
},
],
memory_index: [
0,
],
},
variants: Single {
index: 1,
},
abi: Aggregate {
sized: true,
},
largest_niche: None,
align: AbiAndPrefAlign {
abi: Align {
pow2: 2,
},
pref: $PREF_ALIGN,
},
size: Size {
raw: 8,
},
},
],
},
abi: ScalarPair(
Scalar {
value: Int(
I32,
false,
),
valid_range: 0..=1,
},
Scalar {
value: Int(
I32,
true,
),
valid_range: 0..=4294967295,
},
),
largest_niche: Some(
Niche {
offset: Size {
raw: 0,
},
scalar: Scalar {
value: Int(
I32,
false,
),
valid_range: 0..=1,
},
},
),
align: AbiAndPrefAlign {
abi: Align {
pow2: 2,
},
pref: $PREF_ALIGN,
},
size: Size {
raw: 8,
},
}
--> $DIR/debug.rs:15:1
|
LL | type Test = Result<i32, i32>;
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
error: aborting due to 4 previous errors

View File

@ -13,7 +13,7 @@ macro_rules! pat_macro {
pat_macro!(A{a:a, b:0, c:_, ..}); pat_macro!(A{a:a, b:0, c:_, ..});
}; };
($a:pat) => { ($a:pat) => {
$a $a //~ ERROR expected expression
}; };
} }

View File

@ -49,5 +49,16 @@ LL | my_recursive_macro!();
= note: expanding `my_recursive_macro! { }` = note: expanding `my_recursive_macro! { }`
= note: to `my_recursive_macro ! () ;` = note: to `my_recursive_macro ! () ;`
error: aborting due to 2 previous errors error: expected expression, found `A { a: a, b: 0, c: _, .. }`
--> $DIR/trace_faulty_macros.rs:16:9
|
LL | $a
| ^^ expected expression
...
LL | let a = pat_macro!();
| ------------ in this macro invocation
|
= note: this error originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info)
error: aborting due to 3 previous errors