1 use crate::creader::{CStore, LoadedMacro};
2 use crate::foreign_modules;
3 use crate::native_libs;
4 use crate::rmeta::AttrFlags;
7 use rustc_attr::Deprecation;
8 use rustc_hir::def::{CtorKind, DefKind, Res};
9 use rustc_hir::def_id::{CrateNum, DefId, DefIdMap, LOCAL_CRATE};
10 use rustc_hir::definitions::{DefKey, DefPath, DefPathHash};
11 use rustc_middle::arena::ArenaAllocatable;
12 use rustc_middle::metadata::ModChild;
13 use rustc_middle::middle::exported_symbols::ExportedSymbol;
14 use rustc_middle::middle::stability::DeprecationEntry;
15 use rustc_middle::ty::fast_reject::SimplifiedType;
16 use rustc_middle::ty::query::{ExternProviders, Providers};
17 use rustc_middle::ty::{self, TyCtxt, Visibility};
18 use rustc_session::cstore::{CrateSource, CrateStore};
19 use rustc_session::{Session, StableCrateId};
20 use rustc_span::hygiene::{ExpnHash, ExpnId};
21 use rustc_span::source_map::{Span, Spanned};
22 use rustc_span::symbol::{kw, Symbol};
24 use rustc_data_structures::sync::Lrc;
27 use super::{Decodable, DecodeContext, DecodeIterator};
29 trait ProcessQueryValue<'tcx, T> {
30 fn process_decoded(self, _tcx: TyCtxt<'tcx>, _err: impl Fn() -> !) -> T;
33 impl<T> ProcessQueryValue<'_, Option<T>> for Option<T> {
35 fn process_decoded(self, _tcx: TyCtxt<'_>, _err: impl Fn() -> !) -> Option<T> {
40 impl<T> ProcessQueryValue<'_, T> for Option<T> {
42 fn process_decoded(self, _tcx: TyCtxt<'_>, err: impl Fn() -> !) -> T {
43 if let Some(value) = self { value } else { err() }
47 impl<'tcx, T: ArenaAllocatable<'tcx>> ProcessQueryValue<'tcx, &'tcx T> for Option<T> {
49 fn process_decoded(self, tcx: TyCtxt<'tcx>, err: impl Fn() -> !) -> &'tcx T {
50 if let Some(value) = self { tcx.arena.alloc(value) } else { err() }
54 impl<T, E> ProcessQueryValue<'_, Result<Option<T>, E>> for Option<T> {
56 fn process_decoded(self, _tcx: TyCtxt<'_>, _err: impl Fn() -> !) -> Result<Option<T>, E> {
61 impl<'a, 'tcx, T: Copy + Decodable<DecodeContext<'a, 'tcx>>> ProcessQueryValue<'tcx, &'tcx [T]>
62 for Option<DecodeIterator<'a, 'tcx, T>>
65 fn process_decoded(self, tcx: TyCtxt<'tcx>, _err: impl Fn() -> !) -> &'tcx [T] {
66 if let Some(iter) = self { tcx.arena.alloc_from_iter(iter) } else { &[] }
70 impl ProcessQueryValue<'_, Option<DeprecationEntry>> for Option<Deprecation> {
72 fn process_decoded(self, _tcx: TyCtxt<'_>, _err: impl Fn() -> !) -> Option<DeprecationEntry> {
73 self.map(DeprecationEntry::external)
77 macro_rules! provide_one {
78 ($tcx:ident, $def_id:ident, $other:ident, $cdata:ident, $name:ident => { table }) => {
80 $tcx, $def_id, $other, $cdata, $name => {
85 .get($cdata, $def_id.index)
86 .map(|lazy| lazy.decode(($cdata, $tcx)))
87 .process_decoded($tcx, || panic!("{:?} does not have a {:?}", $def_id, stringify!($name)))
91 ($tcx:ident, $def_id:ident, $other:ident, $cdata:ident, $name:ident => { table_direct }) => {
93 $tcx, $def_id, $other, $cdata, $name => {
94 // We don't decode `table_direct`, since it's not a Lazy, but an actual value
99 .get($cdata, $def_id.index)
100 .process_decoded($tcx, || panic!("{:?} does not have a {:?}", $def_id, stringify!($name)))
104 ($tcx:ident, $def_id:ident, $other:ident, $cdata:ident, $name:ident => $compute:block) => {
107 def_id_arg: ty::query::query_keys::$name<'tcx>,
108 ) -> ty::query::query_values::$name<'tcx> {
110 $tcx.prof.generic_activity(concat!("metadata_decode_entry_", stringify!($name)));
112 #[allow(unused_variables)]
113 let ($def_id, $other) = def_id_arg.into_args();
114 assert!(!$def_id.is_local());
116 // External query providers call `crate_hash` in order to register a dependency
117 // on the crate metadata. The exception is `crate_hash` itself, which obviously
118 // doesn't need to do this (and can't, as it would cause a query cycle).
119 use rustc_middle::dep_graph::DepKind;
120 if DepKind::$name != DepKind::crate_hash && $tcx.dep_graph.is_fully_enabled() {
121 $tcx.ensure().crate_hash($def_id.krate);
124 let $cdata = CStore::from_tcx($tcx).get_crate_data($def_id.krate);
131 macro_rules! provide {
132 ($tcx:ident, $def_id:ident, $other:ident, $cdata:ident,
133 $($name:ident => { $($compute:tt)* })*) => {
134 pub fn provide_extern(providers: &mut ExternProviders) {
136 $tcx, $def_id, $other, $cdata, $name => { $($compute)* }
139 *providers = ExternProviders {
147 // small trait to work around different signature queries all being defined via
151 fn into_args(self) -> (DefId, Self::Other);
154 impl IntoArgs for DefId {
156 fn into_args(self) -> (DefId, ()) {
161 impl IntoArgs for CrateNum {
163 fn into_args(self) -> (DefId, ()) {
164 (self.as_def_id(), ())
168 impl IntoArgs for (CrateNum, DefId) {
170 fn into_args(self) -> (DefId, DefId) {
171 (self.0.as_def_id(), self.1)
175 impl<'tcx> IntoArgs for ty::InstanceDef<'tcx> {
177 fn into_args(self) -> (DefId, ()) {
182 impl IntoArgs for (CrateNum, SimplifiedType) {
183 type Other = SimplifiedType;
184 fn into_args(self) -> (DefId, SimplifiedType) {
185 (self.0.as_def_id(), self.1)
189 provide! { tcx, def_id, other, cdata,
190 explicit_item_bounds => { table }
191 explicit_predicates_of => { table }
192 generics_of => { table }
193 inferred_outlives_of => { table }
194 super_predicates_of => { table }
196 variances_of => { table }
198 codegen_fn_attrs => { table }
199 impl_trait_ref => { table }
200 const_param_default => { table }
201 object_lifetime_default => { table }
202 thir_abstract_const => { table }
203 optimized_mir => { table }
204 mir_for_ctfe => { table }
205 promoted_mir => { table }
206 def_span => { table }
207 def_ident_span => { table }
208 lookup_stability => { table }
209 lookup_const_stability => { table }
210 lookup_default_body_stability => { table }
211 lookup_deprecation_entry => { table }
212 params_in_repr => { table }
213 unused_generic_params => { table }
214 opt_def_kind => { table_direct }
215 impl_parent => { table }
216 impl_polarity => { table_direct }
217 impl_defaultness => { table_direct }
218 constness => { table_direct }
219 coerce_unsized_info => { table }
220 mir_const_qualif => { table }
221 rendered_const => { table }
222 asyncness => { table_direct }
223 fn_arg_names => { table }
224 generator_kind => { table }
225 trait_def => { table }
226 deduced_param_attrs => { table }
227 is_type_alias_impl_trait => {
228 debug_assert_eq!(tcx.def_kind(def_id), DefKind::OpaqueTy);
232 .is_type_alias_impl_trait
233 .get(cdata, def_id.index)
236 collect_return_position_impl_trait_in_trait_tys => {
240 .trait_impl_trait_tys
241 .get(cdata, def_id.index)
242 .map(|lazy| lazy.decode((cdata, tcx)))
243 .process_decoded(tcx, || panic!("{def_id:?} does not have trait_impl_trait_tys")))
246 visibility => { cdata.get_visibility(def_id.index) }
247 adt_def => { cdata.get_adt_def(def_id.index, tcx) }
250 tcx.calculate_dtor(def_id, |_,_| Ok(()))
252 associated_item_def_ids => {
253 tcx.arena.alloc_from_iter(cdata.get_associated_item_def_ids(def_id.index, tcx.sess))
255 associated_item => { cdata.get_associated_item(def_id.index, tcx.sess) }
256 inherent_impls => { cdata.get_inherent_implementations_for_type(tcx, def_id.index) }
257 is_foreign_item => { cdata.is_foreign_item(def_id.index) }
258 item_attrs => { tcx.arena.alloc_from_iter(cdata.get_item_attrs(def_id.index, tcx.sess)) }
259 is_mir_available => { cdata.is_item_mir_available(def_id.index) }
260 is_ctfe_mir_available => { cdata.is_ctfe_mir_available(def_id.index) }
262 dylib_dependency_formats => { cdata.get_dylib_dependency_formats(tcx) }
263 is_private_dep => { cdata.private_dep }
264 is_panic_runtime => { cdata.root.panic_runtime }
265 is_compiler_builtins => { cdata.root.compiler_builtins }
266 has_global_allocator => { cdata.root.has_global_allocator }
267 has_alloc_error_handler => { cdata.root.has_alloc_error_handler }
268 has_panic_handler => { cdata.root.has_panic_handler }
269 is_profiler_runtime => { cdata.root.profiler_runtime }
270 required_panic_strategy => { cdata.root.required_panic_strategy }
271 panic_in_drop_strategy => { cdata.root.panic_in_drop_strategy }
273 let r = *cdata.extern_crate.lock();
274 r.map(|c| &*tcx.arena.alloc(c))
276 is_no_builtins => { cdata.root.no_builtins }
277 symbol_mangling_version => { cdata.root.symbol_mangling_version }
278 reachable_non_generics => {
279 let reachable_non_generics = tcx
280 .exported_symbols(cdata.cnum)
282 .filter_map(|&(exported_symbol, export_info)| {
283 if let ExportedSymbol::NonGeneric(def_id) = exported_symbol {
284 Some((def_id, export_info))
291 reachable_non_generics
293 native_libraries => { cdata.get_native_libraries(tcx.sess).collect() }
294 foreign_modules => { cdata.get_foreign_modules(tcx.sess).map(|m| (m.def_id, m)).collect() }
295 crate_hash => { cdata.root.hash }
296 crate_host_hash => { cdata.host_hash }
297 crate_name => { cdata.root.name }
299 extra_filename => { cdata.root.extra_filename.clone() }
301 traits_in_crate => { tcx.arena.alloc_from_iter(cdata.get_traits()) }
302 implementations_of_trait => { cdata.get_implementations_of_trait(tcx, other) }
303 crate_incoherent_impls => { cdata.get_incoherent_impls(tcx, other) }
306 let r = *cdata.dep_kind.lock();
310 tcx.arena.alloc_from_iter(cdata.get_module_children(def_id.index, tcx.sess))
312 defined_lib_features => { cdata.get_lib_features(tcx) }
313 stability_implications => {
314 cdata.get_stability_implications(tcx).iter().copied().collect()
316 is_intrinsic => { cdata.get_is_intrinsic(def_id.index) }
317 defined_lang_items => { cdata.get_lang_items(tcx) }
318 diagnostic_items => { cdata.get_diagnostic_items() }
319 missing_lang_items => { cdata.get_missing_lang_items(tcx) }
321 missing_extern_crate_item => {
322 let r = matches!(*cdata.extern_crate.borrow(), Some(extern_crate) if !extern_crate.is_direct());
326 used_crate_source => { Lrc::clone(&cdata.source) }
327 debugger_visualizers => { cdata.get_debugger_visualizers() }
329 exported_symbols => {
330 let syms = cdata.exported_symbols(tcx);
332 // FIXME rust-lang/rust#64319, rust-lang/rust#64872: We want
333 // to block export of generics from dylibs, but we must fix
334 // rust-lang/rust#65890 before we can do that robustly.
339 crate_extern_paths => { cdata.source().paths().cloned().collect() }
340 expn_that_defined => { cdata.get_expn_that_defined(def_id.index, tcx.sess) }
341 generator_diagnostic_data => { cdata.get_generator_diagnostic_data(tcx, def_id.index) }
342 is_doc_hidden => { cdata.get_attr_flags(def_id.index).contains(AttrFlags::IS_DOC_HIDDEN) }
345 pub(in crate::rmeta) fn provide(providers: &mut Providers) {
346 // FIXME(#44234) - almost all of these queries have no sub-queries and
347 // therefore no actual inputs, they're just reading tables calculated in
348 // resolve! Does this work? Unsure! That's what the issue is about
349 *providers = Providers {
350 allocator_kind: |tcx, ()| CStore::from_tcx(tcx).allocator_kind(),
351 alloc_error_handler_kind: |tcx, ()| CStore::from_tcx(tcx).alloc_error_handler_kind(),
352 is_private_dep: |_tcx, cnum| {
353 assert_eq!(cnum, LOCAL_CRATE);
356 native_library: |tcx, id| {
357 tcx.native_libraries(id.krate)
359 .filter(|lib| native_libs::relevant_lib(&tcx.sess, lib))
361 let Some(fm_id) = lib.foreign_module else {
364 let map = tcx.foreign_modules(id.krate);
366 .expect("failed to find foreign module")
371 native_libraries: |tcx, cnum| {
372 assert_eq!(cnum, LOCAL_CRATE);
373 native_libs::collect(tcx)
375 foreign_modules: |tcx, cnum| {
376 assert_eq!(cnum, LOCAL_CRATE);
377 foreign_modules::collect(tcx).into_iter().map(|m| (m.def_id, m)).collect()
380 // Returns a map from a sufficiently visible external item (i.e., an
381 // external item that is visible from at least one local module) to a
382 // sufficiently visible parent (considering modules that re-export the
383 // external item to be parents).
384 visible_parent_map: |tcx, ()| {
385 use std::collections::hash_map::Entry;
386 use std::collections::vec_deque::VecDeque;
388 let mut visible_parent_map: DefIdMap<DefId> = Default::default();
389 // This is a secondary visible_parent_map, storing the DefId of
390 // parents that re-export the child as `_` or module parents
391 // which are `#[doc(hidden)]`. Since we prefer paths that don't
392 // do this, merge this map at the end, only if we're missing
393 // keys from the former.
394 // This is a rudimentary check that does not catch all cases,
396 let mut fallback_map: Vec<(DefId, DefId)> = Default::default();
398 // Issue 46112: We want the map to prefer the shortest
399 // paths when reporting the path to an item. Therefore we
400 // build up the map via a breadth-first search (BFS),
401 // which naturally yields minimal-length paths.
403 // Note that it needs to be a BFS over the whole forest of
404 // crates, not just each individual crate; otherwise you
405 // only get paths that are locally minimal with respect to
406 // whatever crate we happened to encounter first in this
407 // traversal, but not globally minimal across all crates.
408 let bfs_queue = &mut VecDeque::new();
410 for &cnum in tcx.crates(()) {
411 // Ignore crates without a corresponding local `extern crate` item.
412 if tcx.missing_extern_crate_item(cnum) {
416 bfs_queue.push_back(cnum.as_def_id());
419 let mut add_child = |bfs_queue: &mut VecDeque<_>, child: &ModChild, parent: DefId| {
420 if !child.vis.is_public() {
424 if let Some(def_id) = child.res.opt_def_id() {
425 if child.ident.name == kw::Underscore {
426 fallback_map.push((def_id, parent));
430 if tcx.is_doc_hidden(parent) {
431 fallback_map.push((def_id, parent));
435 match visible_parent_map.entry(def_id) {
436 Entry::Occupied(mut entry) => {
437 // If `child` is defined in crate `cnum`, ensure
438 // that it is mapped to a parent in `cnum`.
439 if def_id.is_local() && entry.get().is_local() {
440 entry.insert(parent);
443 Entry::Vacant(entry) => {
444 entry.insert(parent);
447 Res::Def(DefKind::Mod | DefKind::Enum | DefKind::Trait, _)
449 bfs_queue.push_back(def_id);
456 while let Some(def) = bfs_queue.pop_front() {
457 for child in tcx.module_children(def).iter() {
458 add_child(bfs_queue, child, def);
462 // Fill in any missing entries with the less preferable path.
463 // If this path re-exports the child as `_`, we still use this
464 // path in a diagnostic that suggests importing `::*`.
466 for (child, parent) in fallback_map {
467 visible_parent_map.entry(child).or_insert(parent);
473 dependency_formats: |tcx, ()| Lrc::new(crate::dependency_format::calculate(tcx)),
474 has_global_allocator: |tcx, cnum| {
475 assert_eq!(cnum, LOCAL_CRATE);
476 CStore::from_tcx(tcx).has_global_allocator()
478 has_alloc_error_handler: |tcx, cnum| {
479 assert_eq!(cnum, LOCAL_CRATE);
480 CStore::from_tcx(tcx).has_alloc_error_handler()
482 postorder_cnums: |tcx, ()| {
484 .alloc_slice(&CStore::from_tcx(tcx).crate_dependencies_in_postorder(LOCAL_CRATE))
486 crates: |tcx, ()| tcx.arena.alloc_from_iter(CStore::from_tcx(tcx).crates_untracked()),
492 pub fn struct_field_names_untracked<'a>(
496 ) -> impl Iterator<Item = Spanned<Symbol>> + 'a {
497 self.get_crate_data(def.krate).get_struct_field_names(def.index, sess)
500 pub fn struct_field_visibilities_untracked(
503 ) -> impl Iterator<Item = Visibility<DefId>> + '_ {
504 self.get_crate_data(def.krate).get_struct_field_visibilities(def.index)
507 pub fn ctor_untracked(&self, def: DefId) -> Option<(CtorKind, DefId)> {
508 self.get_crate_data(def.krate).get_ctor(def.index)
511 pub fn visibility_untracked(&self, def: DefId) -> Visibility<DefId> {
512 self.get_crate_data(def.krate).get_visibility(def.index)
515 pub fn module_children_untracked<'a>(
519 ) -> impl Iterator<Item = ModChild> + 'a {
520 self.get_crate_data(def_id.krate).get_module_children(def_id.index, sess)
523 pub fn load_macro_untracked(&self, id: DefId, sess: &Session) -> LoadedMacro {
524 let _prof_timer = sess.prof.generic_activity("metadata_load_macro");
526 let data = self.get_crate_data(id.krate);
527 if data.root.is_proc_macro_crate() {
528 return LoadedMacro::ProcMacro(data.load_proc_macro(id.index, sess));
531 let span = data.get_span(id.index, sess);
533 LoadedMacro::MacroDef(
535 ident: data.item_ident(id.index, sess),
536 id: ast::DUMMY_NODE_ID,
538 attrs: data.get_item_attrs(id.index, sess).collect(),
539 kind: ast::ItemKind::MacroDef(data.get_macro(id.index, sess)),
540 vis: ast::Visibility {
541 span: span.shrink_to_lo(),
542 kind: ast::VisibilityKind::Inherited,
551 pub fn fn_has_self_parameter_untracked(&self, def: DefId, sess: &Session) -> bool {
552 self.get_crate_data(def.krate).get_fn_has_self_parameter(def.index, sess)
555 pub fn crate_source_untracked(&self, cnum: CrateNum) -> Lrc<CrateSource> {
556 self.get_crate_data(cnum).source.clone()
559 pub fn get_span_untracked(&self, def_id: DefId, sess: &Session) -> Span {
560 self.get_crate_data(def_id.krate).get_span(def_id.index, sess)
563 pub fn def_kind(&self, def: DefId) -> DefKind {
564 self.get_crate_data(def.krate).def_kind(def.index)
567 pub fn crates_untracked(&self) -> impl Iterator<Item = CrateNum> + '_ {
568 self.iter_crate_data().map(|(cnum, _)| cnum)
571 pub fn item_generics_num_lifetimes(&self, def_id: DefId, sess: &Session) -> usize {
572 self.get_crate_data(def_id.krate).get_generics(def_id.index, sess).own_counts().lifetimes
575 pub fn module_expansion_untracked(&self, def_id: DefId, sess: &Session) -> ExpnId {
576 self.get_crate_data(def_id.krate).module_expansion(def_id.index, sess)
579 /// Only public-facing way to traverse all the definitions in a non-local crate.
580 /// Critically useful for this third-party project: <https://github.com/hacspec/hacspec>.
581 /// See <https://github.com/rust-lang/rust/pull/85889> for context.
582 pub fn num_def_ids_untracked(&self, cnum: CrateNum) -> usize {
583 self.get_crate_data(cnum).num_def_ids()
586 pub fn item_attrs_untracked<'a>(
590 ) -> impl Iterator<Item = ast::Attribute> + 'a {
591 self.get_crate_data(def_id.krate).get_item_attrs(def_id.index, sess)
594 pub fn get_proc_macro_quoted_span_untracked(
600 self.get_crate_data(cnum).get_proc_macro_quoted_span(id, sess)
603 /// Decodes all trait impls in the crate (for rustdoc).
604 pub fn trait_impls_in_crate_untracked(
607 ) -> impl Iterator<Item = (DefId, DefId, Option<SimplifiedType>)> + '_ {
608 self.get_crate_data(cnum).get_trait_impls()
611 /// Decodes all inherent impls in the crate (for rustdoc).
612 pub fn inherent_impls_in_crate_untracked(
615 ) -> impl Iterator<Item = (DefId, DefId)> + '_ {
616 self.get_crate_data(cnum).get_inherent_impls()
619 /// Decodes all incoherent inherent impls in the crate (for rustdoc).
620 pub fn incoherent_impls_in_crate_untracked(
623 ) -> impl Iterator<Item = DefId> + '_ {
624 self.get_crate_data(cnum).get_all_incoherent_impls()
627 pub fn associated_item_def_ids_untracked<'a>(
631 ) -> impl Iterator<Item = DefId> + 'a {
632 self.get_crate_data(def_id.krate).get_associated_item_def_ids(def_id.index, sess)
635 pub fn may_have_doc_links_untracked(&self, def_id: DefId) -> bool {
636 self.get_crate_data(def_id.krate)
637 .get_attr_flags(def_id.index)
638 .contains(AttrFlags::MAY_HAVE_DOC_LINKS)
642 impl CrateStore for CStore {
643 fn as_any(&self) -> &dyn Any {
646 fn untracked_as_any(&mut self) -> &mut dyn Any {
650 fn crate_name(&self, cnum: CrateNum) -> Symbol {
651 self.get_crate_data(cnum).root.name
654 fn stable_crate_id(&self, cnum: CrateNum) -> StableCrateId {
655 self.get_crate_data(cnum).root.stable_crate_id
658 fn stable_crate_id_to_crate_num(&self, stable_crate_id: StableCrateId) -> CrateNum {
659 self.stable_crate_ids[&stable_crate_id]
662 /// Returns the `DefKey` for a given `DefId`. This indicates the
663 /// parent `DefId` as well as some idea of what kind of data the
664 /// `DefId` refers to.
665 fn def_key(&self, def: DefId) -> DefKey {
666 self.get_crate_data(def.krate).def_key(def.index)
669 fn def_path(&self, def: DefId) -> DefPath {
670 self.get_crate_data(def.krate).def_path(def.index)
673 fn def_path_hash(&self, def: DefId) -> DefPathHash {
674 self.get_crate_data(def.krate).def_path_hash(def.index)
677 fn def_path_hash_to_def_id(&self, cnum: CrateNum, hash: DefPathHash) -> DefId {
678 let def_index = self.get_crate_data(cnum).def_path_hash_to_def_index(hash);
679 DefId { krate: cnum, index: def_index }
682 fn expn_hash_to_expn_id(
689 self.get_crate_data(cnum).expn_hash_to_expn_id(sess, index_guess, hash)
692 fn import_source_files(&self, sess: &Session, cnum: CrateNum) {
693 let cdata = self.get_crate_data(cnum);
694 for file_index in 0..cdata.root.source_map.size() {
695 cdata.imported_source_file(file_index as u32, sess);