1 //! Debugging code to test fingerprints computed for query results.
2 //! For each node marked with `#[rustc_clean]` or `#[rustc_dirty]`,
3 //! we will compare the fingerprint from the current and from the previous
4 //! compilation session as appropriate:
6 //! - `#[rustc_clean(cfg="rev2", except="typeck")]` if we are
7 //! in `#[cfg(rev2)]`, then the fingerprints associated with
8 //! `DepNode::typeck(X)` must be DIFFERENT (`X` is the `DefId` of the
10 //! - `#[rustc_clean(cfg="rev2")]` same as above, except that the
11 //! fingerprints must be the SAME (along with all other fingerprints).
13 //! Errors are reported if we are in the suitable configuration but
14 //! the required condition is not met.
16 use rustc_ast::ast::{self, Attribute, NestedMetaItem};
17 use rustc_data_structures::fingerprint::Fingerprint;
18 use rustc_data_structures::fx::FxHashSet;
20 use rustc_hir::def_id::DefId;
21 use rustc_hir::intravisit;
22 use rustc_hir::itemlikevisit::ItemLikeVisitor;
23 use rustc_hir::Node as HirNode;
24 use rustc_hir::{ImplItemKind, ItemKind as HirItem, TraitItemKind};
25 use rustc_middle::dep_graph::{label_strs, DepNode, DepNodeExt};
26 use rustc_middle::hir::map::Map;
27 use rustc_middle::ty::TyCtxt;
28 use rustc_span::symbol::{sym, Symbol};
30 use std::iter::FromIterator;
33 const EXCEPT: Symbol = sym::except;
34 const LABEL: Symbol = sym::label;
35 const CFG: Symbol = sym::cfg;
37 // Base and Extra labels to build up the labels
39 /// For typedef, constants, and statics
40 const BASE_CONST: &[&str] = &[label_strs::type_of];
42 /// DepNodes for functions + methods
43 const BASE_FN: &[&str] = &[
44 // Callers will depend on the signature of these items, so we better test
46 label_strs::generics_of,
47 label_strs::predicates_of,
49 // And a big part of compilation (that we eventually want to cache) is type inference
54 /// DepNodes for Hir, which is pretty much everything
55 const BASE_HIR: &[&str] = &[
56 // hir_owner and hir_owner_nodes should be computed for all nodes
57 label_strs::hir_owner,
58 label_strs::hir_owner_nodes,
61 /// `impl` implementation of struct/trait
62 const BASE_IMPL: &[&str] =
63 &[label_strs::associated_item_def_ids, label_strs::generics_of, label_strs::impl_trait_ref];
65 /// DepNodes for mir_built/Optimized, which is relevant in "executable"
66 /// code, i.e., functions+methods
67 const BASE_MIR: &[&str] = &[label_strs::optimized_mir, label_strs::promoted_mir];
69 /// Struct, Enum and Union DepNodes
71 /// Note that changing the type of a field does not change the type of the struct or enum, but
72 /// adding/removing fields or changing a fields name or visibility does.
73 const BASE_STRUCT: &[&str] =
74 &[label_strs::generics_of, label_strs::predicates_of, label_strs::type_of];
76 /// Trait definition `DepNode`s.
77 const BASE_TRAIT_DEF: &[&str] = &[
78 label_strs::associated_item_def_ids,
79 label_strs::generics_of,
80 label_strs::object_safety_violations,
81 label_strs::predicates_of,
82 label_strs::specialization_graph_of,
83 label_strs::trait_def,
84 label_strs::trait_impls_of,
87 /// Extra `DepNode`s for functions and methods.
88 const EXTRA_ASSOCIATED: &[&str] = &[label_strs::associated_item];
90 const EXTRA_TRAIT: &[&str] = &[label_strs::trait_of_item];
94 const LABELS_CONST: &[&[&str]] = &[BASE_HIR, BASE_CONST];
96 /// Constant/Typedef in an impl
97 const LABELS_CONST_IN_IMPL: &[&[&str]] = &[BASE_HIR, BASE_CONST, EXTRA_ASSOCIATED];
99 /// Trait-Const/Typedef DepNodes
100 const LABELS_CONST_IN_TRAIT: &[&[&str]] = &[BASE_HIR, BASE_CONST, EXTRA_ASSOCIATED, EXTRA_TRAIT];
102 /// Function `DepNode`s.
103 const LABELS_FN: &[&[&str]] = &[BASE_HIR, BASE_MIR, BASE_FN];
105 /// Method `DepNode`s.
106 const LABELS_FN_IN_IMPL: &[&[&str]] = &[BASE_HIR, BASE_MIR, BASE_FN, EXTRA_ASSOCIATED];
108 /// Trait method `DepNode`s.
109 const LABELS_FN_IN_TRAIT: &[&[&str]] =
110 &[BASE_HIR, BASE_MIR, BASE_FN, EXTRA_ASSOCIATED, EXTRA_TRAIT];
112 /// For generic cases like inline-assembly, modules, etc.
113 const LABELS_HIR_ONLY: &[&[&str]] = &[BASE_HIR];
116 const LABELS_IMPL: &[&[&str]] = &[BASE_HIR, BASE_IMPL];
118 /// Abstract data type (struct, enum, union) `DepNode`s.
119 const LABELS_ADT: &[&[&str]] = &[BASE_HIR, BASE_STRUCT];
121 /// Trait definition `DepNode`s.
123 const LABELS_TRAIT: &[&[&str]] = &[BASE_HIR, BASE_TRAIT_DEF];
125 // FIXME: Struct/Enum/Unions Fields (there is currently no way to attach these)
127 // Fields are kind of separate from their containers, as they can change independently from
128 // them. We should at least check
130 // type_of for these.
132 type Labels = FxHashSet<String>;
134 /// Represents the requested configuration by rustc_clean/dirty
141 fn from_clean_labels(labels: Labels) -> Assertion {
142 Assertion { clean: labels, dirty: Labels::default() }
145 fn from_dirty_labels(labels: Labels) -> Assertion {
146 Assertion { clean: Labels::default(), dirty: labels }
150 pub fn check_dirty_clean_annotations(tcx: TyCtxt<'_>) {
151 // can't add `#[rustc_dirty]` etc without opting in to this feature
152 if !tcx.features().rustc_attrs {
156 tcx.dep_graph.with_ignore(|| {
157 let krate = tcx.hir().krate();
158 let mut dirty_clean_visitor = DirtyCleanVisitor { tcx, checked_attrs: Default::default() };
159 krate.visit_all_item_likes(&mut dirty_clean_visitor);
161 let mut all_attrs = FindAllAttrs {
163 attr_names: vec![sym::rustc_dirty, sym::rustc_clean],
166 intravisit::walk_crate(&mut all_attrs, krate);
168 // Note that we cannot use the existing "unused attribute"-infrastructure
169 // here, since that is running before codegen. This is also the reason why
170 // all codegen-specific attributes are `AssumedUsed` in rustc_ast::feature_gate.
171 all_attrs.report_unchecked_attrs(&dirty_clean_visitor.checked_attrs);
175 pub struct DirtyCleanVisitor<'tcx> {
177 checked_attrs: FxHashSet<ast::AttrId>,
180 impl DirtyCleanVisitor<'tcx> {
181 /// Possibly "deserialize" the attribute into a clean/dirty assertion
182 fn assertion_maybe(&mut self, item_id: hir::HirId, attr: &Attribute) -> Option<Assertion> {
183 let is_clean = if self.tcx.sess.check_name(attr, sym::rustc_dirty) {
185 } else if self.tcx.sess.check_name(attr, sym::rustc_clean) {
188 // skip: not rustc_clean/dirty
191 if !check_config(self.tcx, attr) {
192 // skip: not the correct `cfg=`
195 let assertion = if let Some(labels) = self.labels(attr) {
197 Assertion::from_clean_labels(labels)
199 Assertion::from_dirty_labels(labels)
202 self.assertion_auto(item_id, attr, is_clean)
207 /// Gets the "auto" assertion on pre-validated attr, along with the `except` labels.
214 let (name, mut auto) = self.auto_labels(item_id, attr);
215 let except = self.except(attr);
216 for e in except.iter() {
219 "`except` specified DepNodes that can not be affected for \"{}\": \"{}\"",
222 self.tcx.sess.span_fatal(attr.span, &msg);
226 Assertion { clean: auto, dirty: except }
228 Assertion { clean: except, dirty: auto }
232 fn labels(&self, attr: &Attribute) -> Option<Labels> {
233 for item in attr.meta_item_list().unwrap_or_else(Vec::new) {
234 if item.has_name(LABEL) {
235 let value = expect_associated_value(self.tcx, &item);
236 return Some(self.resolve_labels(&item, value));
242 /// `except=` attribute value
243 fn except(&self, attr: &Attribute) -> Labels {
244 for item in attr.meta_item_list().unwrap_or_else(Vec::new) {
245 if item.has_name(EXCEPT) {
246 let value = expect_associated_value(self.tcx, &item);
247 return self.resolve_labels(&item, value);
250 // if no `label` or `except` is given, only the node's group are asserted
254 /// Return all DepNode labels that should be asserted for this item.
255 /// index=0 is the "name" used for error messages
256 fn auto_labels(&mut self, item_id: hir::HirId, attr: &Attribute) -> (&'static str, Labels) {
257 let node = self.tcx.hir().get(item_id);
258 let (name, labels) = match node {
259 HirNode::Item(item) => {
261 // note: these are in the same order as hir::Item_;
262 // FIXME(michaelwoerister): do commented out ones
264 // // An `extern crate` item, with optional original crate name,
265 // HirItem::ExternCrate(..), // intentionally no assertions
267 // // `use foo::bar::*;` or `use foo::bar::baz as quux;`
268 // HirItem::Use(..), // intentionally no assertions
271 HirItem::Static(..) => ("ItemStatic", LABELS_CONST),
274 HirItem::Const(..) => ("ItemConst", LABELS_CONST),
276 // A function declaration
277 HirItem::Fn(..) => ("ItemFn", LABELS_FN),
280 HirItem::Mod(..) => ("ItemMod", LABELS_HIR_ONLY),
282 // // An external module
283 HirItem::ForeignMod(..) => ("ItemForeignMod", LABELS_HIR_ONLY),
285 // Module-level inline assembly (from global_asm!)
286 HirItem::GlobalAsm(..) => ("ItemGlobalAsm", LABELS_HIR_ONLY),
288 // A type alias, e.g., `type Foo = Bar<u8>`
289 HirItem::TyAlias(..) => ("ItemTy", LABELS_HIR_ONLY),
291 // An enum definition, e.g., `enum Foo<A, B> {C<A>, D<B>}`
292 HirItem::Enum(..) => ("ItemEnum", LABELS_ADT),
294 // A struct definition, e.g., `struct Foo<A> {x: A}`
295 HirItem::Struct(..) => ("ItemStruct", LABELS_ADT),
297 // A union definition, e.g., `union Foo<A, B> {x: A, y: B}`
298 HirItem::Union(..) => ("ItemUnion", LABELS_ADT),
300 // Represents a Trait Declaration
301 // FIXME(michaelwoerister): trait declaration is buggy because sometimes some of
302 // the depnodes don't exist (because they legitametely didn't need to be
305 // michaelwoerister and vitiral came up with a possible solution,
306 // to just do this before every query
308 // ::rustc_middle::ty::query::plumbing::force_from_dep_node(tcx, dep_node)
311 // However, this did not seem to work effectively and more bugs were hit.
312 // Nebie @vitiral gave up :)
314 //HirItem::Trait(..) => ("ItemTrait", LABELS_TRAIT),
316 // An implementation, eg `impl<A> Trait for Foo { .. }`
317 HirItem::Impl { .. } => ("ItemKind::Impl", LABELS_IMPL),
319 _ => self.tcx.sess.span_fatal(
322 "clean/dirty auto-assertions not yet defined \
323 for Node::Item.node={:?}",
329 HirNode::TraitItem(item) => match item.kind {
330 TraitItemKind::Fn(..) => ("Node::TraitItem", LABELS_FN_IN_TRAIT),
331 TraitItemKind::Const(..) => ("NodeTraitConst", LABELS_CONST_IN_TRAIT),
332 TraitItemKind::Type(..) => ("NodeTraitType", LABELS_CONST_IN_TRAIT),
334 HirNode::ImplItem(item) => match item.kind {
335 ImplItemKind::Fn(..) => ("Node::ImplItem", LABELS_FN_IN_IMPL),
336 ImplItemKind::Const(..) => ("NodeImplConst", LABELS_CONST_IN_IMPL),
337 ImplItemKind::TyAlias(..) => ("NodeImplType", LABELS_CONST_IN_IMPL),
339 _ => self.tcx.sess.span_fatal(
341 &format!("clean/dirty auto-assertions not yet defined for {:?}", node),
345 Labels::from_iter(labels.iter().flat_map(|s| s.iter().map(|l| (*l).to_string())));
349 fn resolve_labels(&self, item: &NestedMetaItem, value: Symbol) -> Labels {
350 let mut out = Labels::default();
351 for label in value.as_str().split(',') {
352 let label = label.trim();
353 if DepNode::has_label_string(label) {
354 if out.contains(label) {
355 self.tcx.sess.span_fatal(
357 &format!("dep-node label `{}` is repeated", label),
360 out.insert(label.to_string());
364 .span_fatal(item.span(), &format!("dep-node label `{}` not recognized", label));
374 ) -> impl Iterator<Item = DepNode> + 'l {
375 let def_path_hash = self.tcx.def_path_hash(def_id);
376 labels.iter().map(move |label| match DepNode::from_label_string(label, def_path_hash) {
377 Ok(dep_node) => dep_node,
378 Err(()) => unreachable!("label: {}", label),
382 fn dep_node_str(&self, dep_node: &DepNode) -> String {
383 if let Some(def_id) = dep_node.extract_def_id(self.tcx) {
384 format!("{:?}({})", dep_node.kind, self.tcx.def_path_str(def_id))
386 format!("{:?}({:?})", dep_node.kind, dep_node.hash)
390 fn assert_dirty(&self, item_span: Span, dep_node: DepNode) {
391 debug!("assert_dirty({:?})", dep_node);
393 let current_fingerprint = self.get_fingerprint(&dep_node);
394 let prev_fingerprint = self.tcx.dep_graph.prev_fingerprint_of(&dep_node);
396 if current_fingerprint == prev_fingerprint {
397 let dep_node_str = self.dep_node_str(&dep_node);
400 .span_err(item_span, &format!("`{}` should be dirty but is not", dep_node_str));
404 fn get_fingerprint(&self, dep_node: &DepNode) -> Option<Fingerprint> {
405 if self.tcx.dep_graph.dep_node_exists(dep_node) {
406 let dep_node_index = self.tcx.dep_graph.dep_node_index_of(dep_node);
407 Some(self.tcx.dep_graph.fingerprint_of(dep_node_index))
413 fn assert_clean(&self, item_span: Span, dep_node: DepNode) {
414 debug!("assert_clean({:?})", dep_node);
416 let current_fingerprint = self.get_fingerprint(&dep_node);
417 let prev_fingerprint = self.tcx.dep_graph.prev_fingerprint_of(&dep_node);
419 // if the node wasn't previously evaluated and now is (or vice versa),
420 // then the node isn't actually clean or dirty.
421 if (current_fingerprint == None) ^ (prev_fingerprint == None) {
425 if current_fingerprint != prev_fingerprint {
426 let dep_node_str = self.dep_node_str(&dep_node);
429 .span_err(item_span, &format!("`{}` should be clean but is not", dep_node_str));
433 fn check_item(&mut self, item_id: hir::HirId, item_span: Span) {
434 let def_id = self.tcx.hir().local_def_id(item_id);
435 for attr in self.tcx.get_attrs(def_id.to_def_id()).iter() {
436 let assertion = match self.assertion_maybe(item_id, attr) {
440 self.checked_attrs.insert(attr.id);
441 for dep_node in self.dep_nodes(&assertion.clean, def_id.to_def_id()) {
442 self.assert_clean(item_span, dep_node);
444 for dep_node in self.dep_nodes(&assertion.dirty, def_id.to_def_id()) {
445 self.assert_dirty(item_span, dep_node);
451 impl ItemLikeVisitor<'tcx> for DirtyCleanVisitor<'tcx> {
452 fn visit_item(&mut self, item: &'tcx hir::Item<'tcx>) {
453 self.check_item(item.hir_id, item.span);
456 fn visit_trait_item(&mut self, item: &hir::TraitItem<'_>) {
457 self.check_item(item.hir_id, item.span);
460 fn visit_impl_item(&mut self, item: &hir::ImplItem<'_>) {
461 self.check_item(item.hir_id, item.span);
465 /// Given a `#[rustc_dirty]` or `#[rustc_clean]` attribute, scan
466 /// for a `cfg="foo"` attribute and check whether we have a cfg
467 /// flag called `foo`.
469 /// Also make sure that the `label` and `except` fields do not
471 fn check_config(tcx: TyCtxt<'_>, attr: &Attribute) -> bool {
472 debug!("check_config(attr={:?})", attr);
473 let config = &tcx.sess.parse_sess.config;
474 debug!("check_config: config={:?}", config);
475 let (mut cfg, mut except, mut label) = (None, false, false);
476 for item in attr.meta_item_list().unwrap_or_else(Vec::new) {
477 if item.has_name(CFG) {
478 let value = expect_associated_value(tcx, &item);
479 debug!("check_config: searching for cfg {:?}", value);
480 cfg = Some(config.contains(&(value, None)));
482 if item.has_name(LABEL) {
485 if item.has_name(EXCEPT) {
491 tcx.sess.span_fatal(attr.span, "must specify only one of: `label`, `except`");
495 None => tcx.sess.span_fatal(attr.span, "no cfg attribute"),
500 fn expect_associated_value(tcx: TyCtxt<'_>, item: &NestedMetaItem) -> Symbol {
501 if let Some(value) = item.value_str() {
504 let msg = if let Some(ident) = item.ident() {
505 format!("associated value expected for `{}`", ident)
507 "expected an associated value".to_string()
510 tcx.sess.span_fatal(item.span(), &msg);
514 // A visitor that collects all #[rustc_dirty]/#[rustc_clean] attributes from
515 // the HIR. It is used to verfiy that we really ran checks for all annotated
517 pub struct FindAllAttrs<'tcx> {
519 attr_names: Vec<Symbol>,
520 found_attrs: Vec<&'tcx Attribute>,
523 impl FindAllAttrs<'tcx> {
524 fn is_active_attr(&mut self, attr: &Attribute) -> bool {
525 for attr_name in &self.attr_names {
526 if self.tcx.sess.check_name(attr, *attr_name) && check_config(self.tcx, attr) {
534 fn report_unchecked_attrs(&self, checked_attrs: &FxHashSet<ast::AttrId>) {
535 for attr in &self.found_attrs {
536 if !checked_attrs.contains(&attr.id) {
537 self.tcx.sess.span_err(
539 "found unchecked `#[rustc_dirty]` / `#[rustc_clean]` attribute",
546 impl intravisit::Visitor<'tcx> for FindAllAttrs<'tcx> {
547 type Map = Map<'tcx>;
549 fn nested_visit_map(&mut self) -> intravisit::NestedVisitorMap<Self::Map> {
550 intravisit::NestedVisitorMap::All(self.tcx.hir())
553 fn visit_attribute(&mut self, attr: &'tcx Attribute) {
554 if self.is_active_attr(attr) {
555 self.found_attrs.push(attr);