1 use crate::creader::{CStore, LoadedMacro};
2 use crate::foreign_modules;
3 use crate::native_libs;
4 use crate::rmeta::AttrFlags;
7 use rustc_attr::Deprecation;
8 use rustc_hir::def::{CtorKind, DefKind, Res};
9 use rustc_hir::def_id::{CrateNum, DefId, DefIdMap, LOCAL_CRATE};
10 use rustc_hir::definitions::{DefKey, DefPath, DefPathHash};
11 use rustc_middle::arena::ArenaAllocatable;
12 use rustc_middle::metadata::ModChild;
13 use rustc_middle::middle::exported_symbols::ExportedSymbol;
14 use rustc_middle::middle::stability::DeprecationEntry;
15 use rustc_middle::ty::fast_reject::SimplifiedType;
16 use rustc_middle::ty::query::{ExternProviders, Providers};
17 use rustc_middle::ty::{self, TyCtxt, Visibility};
18 use rustc_session::cstore::{CrateSource, CrateStore};
19 use rustc_session::{Session, StableCrateId};
20 use rustc_span::hygiene::{ExpnHash, ExpnId};
21 use rustc_span::source_map::{Span, Spanned};
22 use rustc_span::symbol::{kw, Symbol};
24 use rustc_data_structures::sync::Lrc;
27 use super::{Decodable, DecodeContext, DecodeIterator};
29 trait ProcessQueryValue<'tcx, T> {
30 fn process_decoded(self, _tcx: TyCtxt<'tcx>, _err: impl Fn() -> !) -> T;
33 impl<T> ProcessQueryValue<'_, Option<T>> for Option<T> {
35 fn process_decoded(self, _tcx: TyCtxt<'_>, _err: impl Fn() -> !) -> Option<T> {
40 impl<T> ProcessQueryValue<'_, T> for Option<T> {
42 fn process_decoded(self, _tcx: TyCtxt<'_>, err: impl Fn() -> !) -> T {
43 if let Some(value) = self { value } else { err() }
47 impl<'tcx, T: ArenaAllocatable<'tcx>> ProcessQueryValue<'tcx, &'tcx T> for Option<T> {
49 fn process_decoded(self, tcx: TyCtxt<'tcx>, err: impl Fn() -> !) -> &'tcx T {
50 if let Some(value) = self { tcx.arena.alloc(value) } else { err() }
54 impl<T, E> ProcessQueryValue<'_, Result<Option<T>, E>> for Option<T> {
56 fn process_decoded(self, _tcx: TyCtxt<'_>, _err: impl Fn() -> !) -> Result<Option<T>, E> {
61 impl<'a, 'tcx, T: Copy + Decodable<DecodeContext<'a, 'tcx>>> ProcessQueryValue<'tcx, &'tcx [T]>
62 for Option<DecodeIterator<'a, 'tcx, T>>
65 fn process_decoded(self, tcx: TyCtxt<'tcx>, _err: impl Fn() -> !) -> &'tcx [T] {
66 if let Some(iter) = self { tcx.arena.alloc_from_iter(iter) } else { &[] }
70 impl ProcessQueryValue<'_, Option<DeprecationEntry>> for Option<Deprecation> {
72 fn process_decoded(self, _tcx: TyCtxt<'_>, _err: impl Fn() -> !) -> Option<DeprecationEntry> {
73 self.map(DeprecationEntry::external)
77 macro_rules! provide_one {
78 ($tcx:ident, $def_id:ident, $other:ident, $cdata:ident, $name:ident => { table }) => {
80 $tcx, $def_id, $other, $cdata, $name => {
85 .get($cdata, $def_id.index)
86 .map(|lazy| lazy.decode(($cdata, $tcx)))
87 .process_decoded($tcx, || panic!("{:?} does not have a {:?}", $def_id, stringify!($name)))
91 ($tcx:ident, $def_id:ident, $other:ident, $cdata:ident, $name:ident => { table_direct }) => {
93 $tcx, $def_id, $other, $cdata, $name => {
94 // We don't decode `table_direct`, since it's not a Lazy, but an actual value
99 .get($cdata, $def_id.index)
100 .process_decoded($tcx, || panic!("{:?} does not have a {:?}", $def_id, stringify!($name)))
104 ($tcx:ident, $def_id:ident, $other:ident, $cdata:ident, $name:ident => $compute:block) => {
107 def_id_arg: ty::query::query_keys::$name<'tcx>,
108 ) -> ty::query::query_values::$name<'tcx> {
110 $tcx.prof.generic_activity(concat!("metadata_decode_entry_", stringify!($name)));
112 #[allow(unused_variables)]
113 let ($def_id, $other) = def_id_arg.into_args();
114 assert!(!$def_id.is_local());
116 // External query providers call `crate_hash` in order to register a dependency
117 // on the crate metadata. The exception is `crate_hash` itself, which obviously
118 // doesn't need to do this (and can't, as it would cause a query cycle).
119 use rustc_middle::dep_graph::DepKind;
120 if DepKind::$name != DepKind::crate_hash && $tcx.dep_graph.is_fully_enabled() {
121 $tcx.ensure().crate_hash($def_id.krate);
124 let $cdata = CStore::from_tcx($tcx).get_crate_data($def_id.krate);
131 macro_rules! provide {
132 ($tcx:ident, $def_id:ident, $other:ident, $cdata:ident,
133 $($name:ident => { $($compute:tt)* })*) => {
134 pub fn provide_extern(providers: &mut ExternProviders) {
136 $tcx, $def_id, $other, $cdata, $name => { $($compute)* }
139 *providers = ExternProviders {
147 // small trait to work around different signature queries all being defined via
151 fn into_args(self) -> (DefId, Self::Other);
154 impl IntoArgs for DefId {
156 fn into_args(self) -> (DefId, ()) {
161 impl IntoArgs for CrateNum {
163 fn into_args(self) -> (DefId, ()) {
164 (self.as_def_id(), ())
168 impl IntoArgs for (CrateNum, DefId) {
170 fn into_args(self) -> (DefId, DefId) {
171 (self.0.as_def_id(), self.1)
175 impl<'tcx> IntoArgs for ty::InstanceDef<'tcx> {
177 fn into_args(self) -> (DefId, ()) {
182 impl IntoArgs for (CrateNum, SimplifiedType) {
183 type Other = SimplifiedType;
184 fn into_args(self) -> (DefId, SimplifiedType) {
185 (self.0.as_def_id(), self.1)
189 provide! { tcx, def_id, other, cdata,
190 explicit_item_bounds => { table }
191 explicit_predicates_of => { table }
192 generics_of => { table }
193 inferred_outlives_of => { table }
194 super_predicates_of => { table }
196 variances_of => { table }
198 codegen_fn_attrs => { table }
199 impl_trait_ref => { table }
200 const_param_default => { table }
201 object_lifetime_default => { table }
202 thir_abstract_const => { table }
203 optimized_mir => { table }
204 mir_for_ctfe => { table }
205 promoted_mir => { table }
206 def_span => { table }
207 def_ident_span => { table }
208 lookup_stability => { table }
209 lookup_const_stability => { table }
210 lookup_default_body_stability => { table }
211 lookup_deprecation_entry => { table }
212 params_in_repr => { table }
213 unused_generic_params => { table }
214 opt_def_kind => { table_direct }
215 impl_parent => { table }
216 impl_polarity => { table_direct }
217 impl_defaultness => { table_direct }
218 constness => { table_direct }
219 coerce_unsized_info => { table }
220 mir_const_qualif => { table }
221 rendered_const => { table }
222 asyncness => { table_direct }
223 fn_arg_names => { table }
224 generator_kind => { table }
225 trait_def => { table }
226 deduced_param_attrs => { table }
227 is_type_alias_impl_trait => {
228 debug_assert_eq!(tcx.def_kind(def_id), DefKind::OpaqueTy);
229 cdata.root.tables.is_type_alias_impl_trait.get(cdata, def_id.index)
231 collect_return_position_impl_trait_in_trait_tys => {
235 .trait_impl_trait_tys
236 .get(cdata, def_id.index)
237 .map(|lazy| lazy.decode((cdata, tcx)))
238 .process_decoded(tcx, || panic!("{def_id:?} does not have trait_impl_trait_tys")))
241 visibility => { cdata.get_visibility(def_id.index) }
242 adt_def => { cdata.get_adt_def(def_id.index, tcx) }
245 tcx.calculate_dtor(def_id, |_,_| Ok(()))
247 associated_item_def_ids => {
248 tcx.arena.alloc_from_iter(cdata.get_associated_item_def_ids(def_id.index, tcx.sess))
250 associated_item => { cdata.get_associated_item(def_id.index, tcx.sess) }
251 inherent_impls => { cdata.get_inherent_implementations_for_type(tcx, def_id.index) }
252 is_foreign_item => { cdata.is_foreign_item(def_id.index) }
253 item_attrs => { tcx.arena.alloc_from_iter(cdata.get_item_attrs(def_id.index, tcx.sess)) }
254 is_mir_available => { cdata.is_item_mir_available(def_id.index) }
255 is_ctfe_mir_available => { cdata.is_ctfe_mir_available(def_id.index) }
257 dylib_dependency_formats => { cdata.get_dylib_dependency_formats(tcx) }
258 is_private_dep => { cdata.private_dep }
259 is_panic_runtime => { cdata.root.panic_runtime }
260 is_compiler_builtins => { cdata.root.compiler_builtins }
261 has_global_allocator => { cdata.root.has_global_allocator }
262 has_alloc_error_handler => { cdata.root.has_alloc_error_handler }
263 has_panic_handler => { cdata.root.has_panic_handler }
264 is_profiler_runtime => { cdata.root.profiler_runtime }
265 required_panic_strategy => { cdata.root.required_panic_strategy }
266 panic_in_drop_strategy => { cdata.root.panic_in_drop_strategy }
268 let r = *cdata.extern_crate.lock();
269 r.map(|c| &*tcx.arena.alloc(c))
271 is_no_builtins => { cdata.root.no_builtins }
272 symbol_mangling_version => { cdata.root.symbol_mangling_version }
273 reachable_non_generics => {
274 let reachable_non_generics = tcx
275 .exported_symbols(cdata.cnum)
277 .filter_map(|&(exported_symbol, export_info)| {
278 if let ExportedSymbol::NonGeneric(def_id) = exported_symbol {
279 Some((def_id, export_info))
286 reachable_non_generics
288 native_libraries => { cdata.get_native_libraries(tcx.sess).collect() }
289 foreign_modules => { cdata.get_foreign_modules(tcx.sess).map(|m| (m.def_id, m)).collect() }
290 crate_hash => { cdata.root.hash }
291 crate_host_hash => { cdata.host_hash }
292 crate_name => { cdata.root.name }
294 extra_filename => { cdata.root.extra_filename.clone() }
296 traits_in_crate => { tcx.arena.alloc_from_iter(cdata.get_traits()) }
297 implementations_of_trait => { cdata.get_implementations_of_trait(tcx, other) }
298 crate_incoherent_impls => { cdata.get_incoherent_impls(tcx, other) }
301 let r = *cdata.dep_kind.lock();
305 tcx.arena.alloc_from_iter(cdata.get_module_children(def_id.index, tcx.sess))
307 defined_lib_features => { cdata.get_lib_features(tcx) }
308 stability_implications => {
309 cdata.get_stability_implications(tcx).iter().copied().collect()
311 is_intrinsic => { cdata.get_is_intrinsic(def_id.index) }
312 defined_lang_items => { cdata.get_lang_items(tcx) }
313 diagnostic_items => { cdata.get_diagnostic_items() }
314 missing_lang_items => { cdata.get_missing_lang_items(tcx) }
316 missing_extern_crate_item => {
317 let r = matches!(*cdata.extern_crate.borrow(), Some(extern_crate) if !extern_crate.is_direct());
321 used_crate_source => { Lrc::clone(&cdata.source) }
322 debugger_visualizers => { cdata.get_debugger_visualizers() }
324 exported_symbols => {
325 let syms = cdata.exported_symbols(tcx);
327 // FIXME rust-lang/rust#64319, rust-lang/rust#64872: We want
328 // to block export of generics from dylibs, but we must fix
329 // rust-lang/rust#65890 before we can do that robustly.
334 crate_extern_paths => { cdata.source().paths().cloned().collect() }
335 expn_that_defined => { cdata.get_expn_that_defined(def_id.index, tcx.sess) }
336 generator_diagnostic_data => { cdata.get_generator_diagnostic_data(tcx, def_id.index) }
337 is_doc_hidden => { cdata.get_attr_flags(def_id.index).contains(AttrFlags::IS_DOC_HIDDEN) }
340 pub(in crate::rmeta) fn provide(providers: &mut Providers) {
341 // FIXME(#44234) - almost all of these queries have no sub-queries and
342 // therefore no actual inputs, they're just reading tables calculated in
343 // resolve! Does this work? Unsure! That's what the issue is about
344 *providers = Providers {
345 allocator_kind: |tcx, ()| CStore::from_tcx(tcx).allocator_kind(),
346 alloc_error_handler_kind: |tcx, ()| CStore::from_tcx(tcx).alloc_error_handler_kind(),
347 is_private_dep: |_tcx, cnum| {
348 assert_eq!(cnum, LOCAL_CRATE);
351 native_library: |tcx, id| {
352 tcx.native_libraries(id.krate)
354 .filter(|lib| native_libs::relevant_lib(&tcx.sess, lib))
356 let Some(fm_id) = lib.foreign_module else {
359 let map = tcx.foreign_modules(id.krate);
361 .expect("failed to find foreign module")
366 native_libraries: |tcx, cnum| {
367 assert_eq!(cnum, LOCAL_CRATE);
368 native_libs::collect(tcx)
370 foreign_modules: |tcx, cnum| {
371 assert_eq!(cnum, LOCAL_CRATE);
372 foreign_modules::collect(tcx).into_iter().map(|m| (m.def_id, m)).collect()
375 // Returns a map from a sufficiently visible external item (i.e., an
376 // external item that is visible from at least one local module) to a
377 // sufficiently visible parent (considering modules that re-export the
378 // external item to be parents).
379 visible_parent_map: |tcx, ()| {
380 use std::collections::hash_map::Entry;
381 use std::collections::vec_deque::VecDeque;
383 let mut visible_parent_map: DefIdMap<DefId> = Default::default();
384 // This is a secondary visible_parent_map, storing the DefId of
385 // parents that re-export the child as `_` or module parents
386 // which are `#[doc(hidden)]`. Since we prefer paths that don't
387 // do this, merge this map at the end, only if we're missing
388 // keys from the former.
389 // This is a rudimentary check that does not catch all cases,
391 let mut fallback_map: Vec<(DefId, DefId)> = Default::default();
393 // Issue 46112: We want the map to prefer the shortest
394 // paths when reporting the path to an item. Therefore we
395 // build up the map via a breadth-first search (BFS),
396 // which naturally yields minimal-length paths.
398 // Note that it needs to be a BFS over the whole forest of
399 // crates, not just each individual crate; otherwise you
400 // only get paths that are locally minimal with respect to
401 // whatever crate we happened to encounter first in this
402 // traversal, but not globally minimal across all crates.
403 let bfs_queue = &mut VecDeque::new();
405 for &cnum in tcx.crates(()) {
406 // Ignore crates without a corresponding local `extern crate` item.
407 if tcx.missing_extern_crate_item(cnum) {
411 bfs_queue.push_back(cnum.as_def_id());
414 let mut add_child = |bfs_queue: &mut VecDeque<_>, child: &ModChild, parent: DefId| {
415 if !child.vis.is_public() {
419 if let Some(def_id) = child.res.opt_def_id() {
420 if child.ident.name == kw::Underscore {
421 fallback_map.push((def_id, parent));
425 if tcx.is_doc_hidden(parent) {
426 fallback_map.push((def_id, parent));
430 match visible_parent_map.entry(def_id) {
431 Entry::Occupied(mut entry) => {
432 // If `child` is defined in crate `cnum`, ensure
433 // that it is mapped to a parent in `cnum`.
434 if def_id.is_local() && entry.get().is_local() {
435 entry.insert(parent);
438 Entry::Vacant(entry) => {
439 entry.insert(parent);
442 Res::Def(DefKind::Mod | DefKind::Enum | DefKind::Trait, _)
444 bfs_queue.push_back(def_id);
451 while let Some(def) = bfs_queue.pop_front() {
452 for child in tcx.module_children(def).iter() {
453 add_child(bfs_queue, child, def);
457 // Fill in any missing entries with the less preferable path.
458 // If this path re-exports the child as `_`, we still use this
459 // path in a diagnostic that suggests importing `::*`.
461 for (child, parent) in fallback_map {
462 visible_parent_map.entry(child).or_insert(parent);
468 dependency_formats: |tcx, ()| Lrc::new(crate::dependency_format::calculate(tcx)),
469 has_global_allocator: |tcx, cnum| {
470 assert_eq!(cnum, LOCAL_CRATE);
471 CStore::from_tcx(tcx).has_global_allocator()
473 has_alloc_error_handler: |tcx, cnum| {
474 assert_eq!(cnum, LOCAL_CRATE);
475 CStore::from_tcx(tcx).has_alloc_error_handler()
477 postorder_cnums: |tcx, ()| {
479 .alloc_slice(&CStore::from_tcx(tcx).crate_dependencies_in_postorder(LOCAL_CRATE))
481 crates: |tcx, ()| tcx.arena.alloc_from_iter(CStore::from_tcx(tcx).crates_untracked()),
487 pub fn struct_field_names_untracked<'a>(
491 ) -> impl Iterator<Item = Spanned<Symbol>> + 'a {
492 self.get_crate_data(def.krate).get_struct_field_names(def.index, sess)
495 pub fn struct_field_visibilities_untracked(
498 ) -> impl Iterator<Item = Visibility<DefId>> + '_ {
499 self.get_crate_data(def.krate).get_struct_field_visibilities(def.index)
502 pub fn ctor_untracked(&self, def: DefId) -> Option<(CtorKind, DefId)> {
503 self.get_crate_data(def.krate).get_ctor(def.index)
506 pub fn visibility_untracked(&self, def: DefId) -> Visibility<DefId> {
507 self.get_crate_data(def.krate).get_visibility(def.index)
510 pub fn module_children_untracked<'a>(
514 ) -> impl Iterator<Item = ModChild> + 'a {
515 self.get_crate_data(def_id.krate).get_module_children(def_id.index, sess)
518 pub fn load_macro_untracked(&self, id: DefId, sess: &Session) -> LoadedMacro {
519 let _prof_timer = sess.prof.generic_activity("metadata_load_macro");
521 let data = self.get_crate_data(id.krate);
522 if data.root.is_proc_macro_crate() {
523 return LoadedMacro::ProcMacro(data.load_proc_macro(id.index, sess));
526 let span = data.get_span(id.index, sess);
528 LoadedMacro::MacroDef(
530 ident: data.item_ident(id.index, sess),
531 id: ast::DUMMY_NODE_ID,
533 attrs: data.get_item_attrs(id.index, sess).collect(),
534 kind: ast::ItemKind::MacroDef(data.get_macro(id.index, sess)),
535 vis: ast::Visibility {
536 span: span.shrink_to_lo(),
537 kind: ast::VisibilityKind::Inherited,
546 pub fn fn_has_self_parameter_untracked(&self, def: DefId, sess: &Session) -> bool {
547 self.get_crate_data(def.krate).get_fn_has_self_parameter(def.index, sess)
550 pub fn crate_source_untracked(&self, cnum: CrateNum) -> Lrc<CrateSource> {
551 self.get_crate_data(cnum).source.clone()
554 pub fn get_span_untracked(&self, def_id: DefId, sess: &Session) -> Span {
555 self.get_crate_data(def_id.krate).get_span(def_id.index, sess)
558 pub fn def_kind(&self, def: DefId) -> DefKind {
559 self.get_crate_data(def.krate).def_kind(def.index)
562 pub fn crates_untracked(&self) -> impl Iterator<Item = CrateNum> + '_ {
563 self.iter_crate_data().map(|(cnum, _)| cnum)
566 pub fn item_generics_num_lifetimes(&self, def_id: DefId, sess: &Session) -> usize {
567 self.get_crate_data(def_id.krate).get_generics(def_id.index, sess).own_counts().lifetimes
570 pub fn module_expansion_untracked(&self, def_id: DefId, sess: &Session) -> ExpnId {
571 self.get_crate_data(def_id.krate).module_expansion(def_id.index, sess)
574 /// Only public-facing way to traverse all the definitions in a non-local crate.
575 /// Critically useful for this third-party project: <https://github.com/hacspec/hacspec>.
576 /// See <https://github.com/rust-lang/rust/pull/85889> for context.
577 pub fn num_def_ids_untracked(&self, cnum: CrateNum) -> usize {
578 self.get_crate_data(cnum).num_def_ids()
581 pub fn item_attrs_untracked<'a>(
585 ) -> impl Iterator<Item = ast::Attribute> + 'a {
586 self.get_crate_data(def_id.krate).get_item_attrs(def_id.index, sess)
589 pub fn get_proc_macro_quoted_span_untracked(
595 self.get_crate_data(cnum).get_proc_macro_quoted_span(id, sess)
598 /// Decodes all trait impls in the crate (for rustdoc).
599 pub fn trait_impls_in_crate_untracked(
602 ) -> impl Iterator<Item = (DefId, DefId, Option<SimplifiedType>)> + '_ {
603 self.get_crate_data(cnum).get_trait_impls()
606 /// Decodes all inherent impls in the crate (for rustdoc).
607 pub fn inherent_impls_in_crate_untracked(
610 ) -> impl Iterator<Item = (DefId, DefId)> + '_ {
611 self.get_crate_data(cnum).get_inherent_impls()
614 /// Decodes all incoherent inherent impls in the crate (for rustdoc).
615 pub fn incoherent_impls_in_crate_untracked(
618 ) -> impl Iterator<Item = DefId> + '_ {
619 self.get_crate_data(cnum).get_all_incoherent_impls()
622 pub fn associated_item_def_ids_untracked<'a>(
626 ) -> impl Iterator<Item = DefId> + 'a {
627 self.get_crate_data(def_id.krate).get_associated_item_def_ids(def_id.index, sess)
630 pub fn may_have_doc_links_untracked(&self, def_id: DefId) -> bool {
631 self.get_crate_data(def_id.krate)
632 .get_attr_flags(def_id.index)
633 .contains(AttrFlags::MAY_HAVE_DOC_LINKS)
637 impl CrateStore for CStore {
638 fn as_any(&self) -> &dyn Any {
641 fn untracked_as_any(&mut self) -> &mut dyn Any {
645 fn crate_name(&self, cnum: CrateNum) -> Symbol {
646 self.get_crate_data(cnum).root.name
649 fn stable_crate_id(&self, cnum: CrateNum) -> StableCrateId {
650 self.get_crate_data(cnum).root.stable_crate_id
653 fn stable_crate_id_to_crate_num(&self, stable_crate_id: StableCrateId) -> CrateNum {
654 self.stable_crate_ids[&stable_crate_id]
657 /// Returns the `DefKey` for a given `DefId`. This indicates the
658 /// parent `DefId` as well as some idea of what kind of data the
659 /// `DefId` refers to.
660 fn def_key(&self, def: DefId) -> DefKey {
661 self.get_crate_data(def.krate).def_key(def.index)
664 fn def_path(&self, def: DefId) -> DefPath {
665 self.get_crate_data(def.krate).def_path(def.index)
668 fn def_path_hash(&self, def: DefId) -> DefPathHash {
669 self.get_crate_data(def.krate).def_path_hash(def.index)
672 fn def_path_hash_to_def_id(&self, cnum: CrateNum, hash: DefPathHash) -> DefId {
673 let def_index = self.get_crate_data(cnum).def_path_hash_to_def_index(hash);
674 DefId { krate: cnum, index: def_index }
677 fn expn_hash_to_expn_id(
684 self.get_crate_data(cnum).expn_hash_to_expn_id(sess, index_guess, hash)
687 fn import_source_files(&self, sess: &Session, cnum: CrateNum) {
688 let cdata = self.get_crate_data(cnum);
689 for file_index in 0..cdata.root.source_map.size() {
690 cdata.imported_source_file(file_index as u32, sess);