Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New scoping rules for safe destruction; not ready to land #20539

Closed
wants to merge 65 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
65 commits
Select commit Hold shift + click to select a range
41771d3
keep factored out and early: bug fix to avoid hitting region resoluti…
pnkfelix Nov 28, 2014
315d181
add debug output for region_inference, gather_loans, mem_categorization.
pnkfelix Nov 25, 2014
7d599e1
Checkpoint pcwalton's dtor checker with `SafeDestructor` in enum `inf…
pnkfelix Oct 27, 2014
26a1144
add debug output to check_safey_of_destructor (just for drop-lts).
pnkfelix Nov 25, 2014
8489d3d
factored drop-checking code out into dropck module.
pnkfelix Nov 26, 2014
bda56d4
FIXME checkpoint pcwalton factoring out of `fn mem_categorization::sc…
pnkfelix Oct 27, 2014
1efff70
checkpoint pcwalton removal of `#[unsafe_destructor]` check.
pnkfelix Oct 27, 2014
6ca149c
checkpoint pcwalton test of new destructor static semantics.
pnkfelix Oct 27, 2014
7b475d3
Add `CodeExtent::Remainder` variant to track a suffix of a block.
pnkfelix Nov 25, 2014
079dab3
add debug output to gather_loans.
pnkfelix Nov 25, 2014
15b11e4
Add debug output to expr_use_visitor.
pnkfelix Nov 25, 2014
46bd59a
add debug output to regionck
pnkfelix Nov 25, 2014
2193a6e
add more debug instrumentation to mem_categorization.
pnkfelix Nov 25, 2014
f8ccbc0
instrument the new cat_expr calls that were added to middle::typeck::…
pnkfelix Nov 25, 2014
47dd7c5
more debug instrumentation in mem_categorization.
pnkfelix Nov 26, 2014
b459fe2
more debug instrumentation in regionck
pnkfelix Nov 26, 2014
587f300
"fix" pcwalton changes to avoid premature return from regionck::visit…
pnkfelix Nov 26, 2014
04003a4
region_inference: debug instrumentation of other sites where RegionRe…
pnkfelix Nov 28, 2014
bb5c3fa
regionck: bug fix to instrumentation I added in an earlier commit.
pnkfelix Nov 28, 2014
713d755
Add Closure variant to CodeExtent to lay foundation for special-case
pnkfelix Nov 28, 2014
f1fd35b
`fn constrain_region_for_destructor_safety`: Use `ReFunction` as
pnkfelix Nov 28, 2014
00cfcb5
REMOVE ME: annotate core::panicking to avoid a problem downstream in …
pnkfelix Nov 25, 2014
977bc4b
added libst2 as libstd stubs.
pnkfelix Nov 27, 2014
1c42d2d
re-add pipe::read impl to libst2.
pnkfelix Dec 9, 2014
c110f29
rustc::middle::borrowck::gather_loans::lifetime: revise debug instrum…
pnkfelix Dec 9, 2014
968be6f
rustc::middle::typeck::infer::region_inference add more debug instrum…
pnkfelix Dec 9, 2014
6e5fff0
rustc::middle::typeck::check::dropck remove source of ReFunction.
pnkfelix Dec 9, 2014
b9ebb3e
rustc::middle::region local check for trivial cyclic encl region scope.
pnkfelix Dec 9, 2014
b522963
rustc::middle::region added debug instrumentation to `fn ancestors_of`.
pnkfelix Dec 9, 2014
0e77b13
rustc::middle::region attempt to introduce CodeExtent::Closure and
pnkfelix Dec 9, 2014
b1d0a79
fixes for new rules for lifetimes and destructors.
pnkfelix Dec 13, 2014
b0b8cac
Added DestructionScope variant to CodeExtent, representing the area
pnkfelix Dec 13, 2014
ec5a321
improved descriptions and `.repr(tcx)` output for DestructionScope an…
pnkfelix Dec 13, 2014
b9b36cb
fix typo in comment in region_inference/mod.rs.
pnkfelix Dec 13, 2014
7540ac9
Switch to constructing DestructionScope rather than Misc in a number …
pnkfelix Dec 13, 2014
3333410
`debug!` instrumentation in rustc::middle::borrowck::check_loans.
pnkfelix Dec 13, 2014
9a8c11b
`debug!` instrumentation in rustc::middle::resolve_lifetime.
pnkfelix Dec 13, 2014
c453c3b
Removed `ty::ReFunction` from rustc::middle::typeck::check::dropck.
pnkfelix Dec 13, 2014
c0fe43f
insert DestructionScope and block Remainder into enclosing CodeExtent…
pnkfelix Dec 13, 2014
c87a033
FIXME loosened an assertion in `rustc_trans::trans::cleanup` to accou…
pnkfelix Dec 13, 2014
f5324d2
rustc::middle::typeck::check::wf debug instrumentation and a FIXME co…
pnkfelix Dec 13, 2014
5230f86
middle::resolve_lifetime: Map BlockScope to DestructionScope in `fn r…
pnkfelix Dec 15, 2014
5eae778
FIXME Fallout from changes to rules for lifetimes and Drop.
pnkfelix Dec 18, 2014
700cf12
Fix to earlier instrumentation: `loop_count` was not getting incremen…
pnkfelix Dec 18, 2014
ae0dadf
rustc stage2 bootstrap cleanup: Remove unused imports and bindings.
pnkfelix Dec 18, 2014
5dd63c1
Checkpoint: Refactored librustc_trans, avoid stack-crossing ref cycle.
pnkfelix Dec 19, 2014
4351a7b
librustc_trans: Accomodate new lifetime restrictions.
pnkfelix Dec 19, 2014
fc18f8b
librustdoc: Accomodate new lifetime restrictions.
pnkfelix Dec 19, 2014
f186759
Fixes for compile-fail/ tests in wake of destructor lifetime changes.
pnkfelix Dec 22, 2014
8df61aa
improve `compiletest` error message when path option missing.
pnkfelix Dec 22, 2014
a322029
FIXME some compiler error messages that are newly emitted in drop-lts…
pnkfelix Dec 22, 2014
2c02fd9
fix exponential time blowup on compile-fail/huge-struct.rs by keeping
pnkfelix Jan 4, 2015
ecf6a6c
libregex: accomodate new lifetime rules for droppable things.
pnkfelix Jan 4, 2015
73ae146
remove outdated test.
pnkfelix Jan 4, 2015
7695573
update flowgraph graphviz test output to include new destruction scopes.
pnkfelix Jan 4, 2015
31cec27
std::io::process test: ensure that `path_val` outlives the container …
pnkfelix Jan 4, 2015
f08a619
remove span_note output from dropck; at this point it is more noise t…
pnkfelix Jan 4, 2015
a63ae49
fallout from new scoping rules for destructors.
pnkfelix Jan 5, 2015
20372ae
make `record_encl_scope` pub to accommodate src/librustc_trans/test.rs
pnkfelix Jan 5, 2015
b79ed77
accommodate new scoping rules for destructors.
pnkfelix Jan 5, 2015
c134e3a
work-around for a wart in the current implementation of new destructo…
pnkfelix Jan 5, 2015
1a67901
remove the (temporary from the start) libst2 tree.
pnkfelix Jan 5, 2015
e392169
a new regression test discovered during bootstrapping.
pnkfelix Jan 5, 2015
5f07c00
more regression tests extracted while bootstrapping.
pnkfelix Jan 5, 2015
50c318a
placate `make tidy`
pnkfelix Jan 5, 2015
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 4 additions & 1 deletion src/compiletest/compiletest.rs
Original file line number Diff line number Diff line change
Expand Up @@ -111,7 +111,10 @@ pub fn parse_config(args: Vec<String> ) -> Config {
}

fn opt_path(m: &getopts::Matches, nm: &str) -> Path {
Path::new(m.opt_str(nm).unwrap())
match m.opt_str(nm) {
Some(s) => Path::new(s),
None => panic!("no option (=path) found for {}", nm),
}
}

let filter = if !matches.free.is_empty() {
Expand Down
8 changes: 8 additions & 0 deletions src/liballoc/rc.rs
Original file line number Diff line number Diff line change
Expand Up @@ -142,6 +142,14 @@
//! // destroyed. There are now no strong (Rc) references to the gadgets.
//! // Once they get destroyed, the Gadgets get destroyed. This zeroes the
//! // reference count on Gadget Man, so he gets destroyed as well.
//!
//! // This is an unfortunate wart that is a side-effect of the implmentation
//! // of new destructor semantics: if the above for-loop is the final expression
//! // in the function, the borrow-checker treats the gadget_owner as needing to
//! // live past the destruction scope of the function (which of course it does not).
//! // To work around this, for now I am inserting a dummy value just so the above
//! // for-loop is no longer the final expression in the block.
//! ()
//! }
//! ```

Expand Down
6 changes: 4 additions & 2 deletions src/libcollections/hash/sip.rs
Original file line number Diff line number Diff line change
Expand Up @@ -490,8 +490,10 @@ mod tests {
assert!(s != t && t != u);
assert!(hash(&s) != hash(&t) && hash(&s) != hash(&u));

let v: (&[u8], &[u8], &[u8]) = (&[1u8], &[0u8, 0], &[0u8]);
let w: (&[u8], &[u8], &[u8]) = (&[1u8, 0, 0, 0], &[], &[]);
let (v1, v2, v3) = ([1u8], [0u8, 0], [0u8]);
let (w1, w2, w3) = ([1u8, 0, 0, 0], [], []);
let v: (&[u8], &[u8], &[u8]) = (&v1, &v2, &v3);
let w: (&[u8], &[u8], &[u8]) = (&w1, &w2, &w3);

assert!(v != w);
assert!(hash(&v) != hash(&w));
Expand Down
2 changes: 1 addition & 1 deletion src/libcore/panicking.rs
Original file line number Diff line number Diff line change
Expand Up @@ -64,6 +64,6 @@ pub fn panic_fmt(fmt: &fmt::Arguments, file_line: &(&'static str, uint)) -> ! {
line: uint) -> !;

}
let (file, line) = *file_line;
let (file, line) : (&'static str, uint) = *file_line;
unsafe { panic_impl(fmt, file, line) }
}
6 changes: 4 additions & 2 deletions src/libregex/vm.rs
Original file line number Diff line number Diff line change
Expand Up @@ -116,8 +116,10 @@ impl<'r, 't> Nfa<'r, 't> {
};
let mut matched = false;
let ninsts = self.prog.insts.len();
let mut clist = &mut Threads::new(self.which, ninsts, ncaps);
let mut nlist = &mut Threads::new(self.which, ninsts, ncaps);
let mut cthread = Threads::new(self.which, ninsts, ncaps);
let mut nthread = Threads::new(self.which, ninsts, ncaps);
let mut clist = &mut cthread;
let mut nlist = &mut nthread;

let mut groups = Vec::from_elem(ncaps * 2, None);

Expand Down
6 changes: 4 additions & 2 deletions src/libregex_macros/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -183,8 +183,10 @@ fn exec<'t>(which: ::regex::native::MatchKind, input: &'t str,
fn run(&mut self, start: uint, end: uint) -> Vec<Option<uint>> {
let mut matched = false;
let prefix_bytes: &[u8] = $prefix_bytes;
let mut clist = &mut Threads::new(self.which);
let mut nlist = &mut Threads::new(self.which);
let mut cthread = Threads::new(self.which);
let mut nthread = Threads::new(self.which);
let mut clist = &mut cthread;
let mut nlist = &mut nthread;

let mut groups = $init_groups;

Expand Down
16 changes: 16 additions & 0 deletions src/librustc/metadata/tydecode.rs
Original file line number Diff line number Diff line change
Expand Up @@ -344,6 +344,22 @@ fn parse_scope(st: &mut PState) -> region::CodeExtent {
let node_id = parse_uint(st) as ast::NodeId;
region::CodeExtent::Misc(node_id)
}
'C' => {
let node_id = parse_uint(st) as ast::NodeId;
region::CodeExtent::Closure(node_id)
}
'D' => {
let node_id = parse_uint(st) as ast::NodeId;
region::CodeExtent::DestructionScope(node_id)
}
'B' => {
let node_id = parse_uint(st) as ast::NodeId;
let first_stmt_index = parse_uint(st);
let block_remainder = region::BlockRemainder {
block: node_id, first_statement_index: first_stmt_index,
};
region::CodeExtent::Remainder(block_remainder)
}
_ => panic!("parse_scope: bad input")
}
}
Expand Down
6 changes: 5 additions & 1 deletion src/librustc/metadata/tyencode.rs
Original file line number Diff line number Diff line change
Expand Up @@ -170,7 +170,11 @@ pub fn enc_region(w: &mut SeekableMemWriter, cx: &ctxt, r: ty::Region) {

fn enc_scope(w: &mut SeekableMemWriter, _cx: &ctxt, scope: region::CodeExtent) {
match scope {
region::CodeExtent::Misc(node_id) => mywrite!(w, "M{}", node_id)
region::CodeExtent::Misc(node_id) => mywrite!(w, "M{}", node_id),
region::CodeExtent::Closure(node_id) => mywrite!(w, "C{}", node_id),
region::CodeExtent::Remainder(region::BlockRemainder {
block: b, first_statement_index: i }) => mywrite!(w, "B{}{}", b, i),
region::CodeExtent::DestructionScope(node_id) => mywrite!(w, "D{}", node_id),
}
}

Expand Down
15 changes: 15 additions & 0 deletions src/librustc/middle/borrowck/check_loans.rs
Original file line number Diff line number Diff line change
Expand Up @@ -239,6 +239,10 @@ impl<'a, 'tcx> CheckLoanCtxt<'a, 'tcx> {

let tcx = self.tcx();
self.each_issued_loan(scope, |loan| {
debug!("each_in_scope_loan scope: {} loan: {} loan.kill_scope: {}",
scope.repr(self.tcx()),
loan.repr(self.tcx()),
loan.kill_scope.repr(self.tcx()));
if tcx.region_maps.is_subscope_of(scope, loan.kill_scope) {
op(loan)
} else {
Expand All @@ -265,6 +269,11 @@ impl<'a, 'tcx> CheckLoanCtxt<'a, 'tcx> {
let loan_path = owned_ptr_base_path(loan_path);
let cont = self.each_in_scope_loan(scope, |loan| {
let mut ret = true;
debug!("each_in_scope_loan_affecting_path \
scope: {} loan_path: {} restricted_paths: {}",
scope.repr(self.tcx()),
loan_path.repr(self.tcx()),
loan.restricted_paths.repr(self.tcx()));
for restr_path in loan.restricted_paths.iter() {
if **restr_path == *loan_path {
if !op(loan) {
Expand Down Expand Up @@ -304,6 +313,12 @@ impl<'a, 'tcx> CheckLoanCtxt<'a, 'tcx> {
}

let cont = self.each_in_scope_loan(scope, |loan| {
debug!("each_in_scope_loan_affecting_path \
scope: {} loan_path: {} loan: {}",
scope.repr(self.tcx()),
loan_path.repr(self.tcx()),
loan.repr(self.tcx()));

if *loan.loan_path == *loan_path {
op(loan)
} else {
Expand Down
32 changes: 5 additions & 27 deletions src/librustc/middle/borrowck/gather_loans/lifetime.rs
Original file line number Diff line number Diff line change
Expand Up @@ -96,46 +96,24 @@ impl<'a, 'tcx> GuaranteeLifetimeContext<'a, 'tcx> {
fn check_scope(&self, max_scope: ty::Region) -> R {
//! Reports an error if `loan_region` is larger than `max_scope`

debug!("check_scope self.loan_region: {} max_scope: {}",
self.loan_region.repr(self.bccx.tcx),
max_scope.repr(self.bccx.tcx));
if !self.bccx.is_subregion_of(self.loan_region, max_scope) {
Err(self.report_error(err_out_of_scope(max_scope, self.loan_region)))
} else {
Ok(())
}
}

fn scope(&self, cmt: &mc::cmt) -> ty::Region {
fn scope(&self, cmt: &mc::cmt<'tcx>) -> ty::Region {
//! Returns the maximal region scope for the which the
//! lvalue `cmt` is guaranteed to be valid without any
//! rooting etc, and presuming `cmt` is not mutated.

// See the SCOPE(LV) function in doc.rs

match cmt.cat {
mc::cat_rvalue(temp_scope) => {
temp_scope
}
mc::cat_upvar(..) => {
ty::ReScope(self.item_scope)
}
mc::cat_static_item => {
ty::ReStatic
}
mc::cat_local(local_id) => {
ty::ReScope(self.bccx.tcx.region_maps.var_scope(local_id))
}
mc::cat_deref(_, _, mc::UnsafePtr(..)) => {
ty::ReStatic
}
mc::cat_deref(_, _, mc::BorrowedPtr(_, r)) |
mc::cat_deref(_, _, mc::Implicit(_, r)) => {
r
}
mc::cat_downcast(ref cmt) |
mc::cat_deref(ref cmt, _, mc::OwnedPtr) |
mc::cat_interior(ref cmt, _) => {
self.scope(cmt)
}
}
mc::scope(self.bccx.tcx, cmt, self.item_scope)
}

fn report_error(&self, code: bckerr_code) {
Expand Down
2 changes: 2 additions & 0 deletions src/librustc/middle/borrowck/gather_loans/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -474,6 +474,8 @@ impl<'a, 'tcx, 'v> Visitor<'v> for StaticInitializerCtxt<'a, 'tcx> {
fn visit_expr(&mut self, ex: &Expr) {
match ex.node {
ast::ExprAddrOf(mutbl, ref base) => {
debug!("StaticInitializerCtxt visit_expr ex: {}",
ex.repr(self.bccx.tcx));
let base_cmt = self.bccx.cat_expr(&**base);
let borrow_kind = ty::BorrowKind::from_mutbl(mutbl);
// Check that we don't allow borrows of unsafe static items.
Expand Down
2 changes: 2 additions & 0 deletions src/librustc/middle/borrowck/gather_loans/restrictions.rs
Original file line number Diff line number Diff line change
Expand Up @@ -105,6 +105,8 @@ impl<'a, 'tcx> RestrictionsContext<'a, 'tcx> {
}

mc::cat_deref(cmt_base, _, pk) => {
debug!("restrict cat_deref (cmt={}) pk: {}",
cmt.repr(self.bccx.tcx), pk);
match pk {
mc::OwnedPtr => {
// R-Deref-Send-Pointer
Expand Down
4 changes: 4 additions & 0 deletions src/librustc/middle/expr_use_visitor.rs
Original file line number Diff line number Diff line change
Expand Up @@ -285,6 +285,7 @@ impl<'d,'t,'tcx,TYPER:mc::Typer<'tcx>> ExprUseVisitor<'d,'t,'tcx,TYPER> {
assignment_expr: &ast::Expr,
expr: &ast::Expr,
mode: MutateMode) {
debug!("mutate_expr(expr={})", expr.repr(self.tcx()));
let cmt = return_if_err!(self.mc.cat_expr(expr));
self.delegate.mutate(assignment_expr.id, assignment_expr.span, cmt, mode);
self.walk_expr(expr);
Expand Down Expand Up @@ -601,6 +602,7 @@ impl<'d,'t,'tcx,TYPER:mc::Typer<'tcx>> ExprUseVisitor<'d,'t,'tcx,TYPER> {
}

fn walk_local(&mut self, local: &ast::Local) {
debug!("walk_local(local.id={})", local.id);
match local.init {
None => {
let delegate = &mut self.delegate;
Expand Down Expand Up @@ -643,6 +645,8 @@ impl<'d,'t,'tcx,TYPER:mc::Typer<'tcx>> ExprUseVisitor<'d,'t,'tcx,TYPER> {
_expr: &ast::Expr,
fields: &Vec<ast::Field>,
opt_with: &Option<P<ast::Expr>>) {
debug!("walk_struct_expr(_expr.id={})", _expr.id);

// Consume the expressions supplying values for each field.
for field in fields.iter() {
self.consume_expr(&*field.expr);
Expand Down
53 changes: 48 additions & 5 deletions src/librustc/middle/mem_categorization.rs
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ use middle::typeck;
use util::nodemap::{DefIdMap, NodeMap};
use util::ppaux::{ty_to_string, Repr};

use syntax::ast::{MutImmutable, MutMutable};
use syntax::ast::{MutImmutable, MutMutable, NodeId};
use syntax::ast;
use syntax::ast_map;
use syntax::codemap::Span;
Expand Down Expand Up @@ -414,6 +414,7 @@ impl<'t,'tcx,TYPER:Typer<'tcx>> MemCategorizationContext<'t,TYPER> {
}

pub fn cat_expr(&self, expr: &ast::Expr) -> McResult<cmt<'tcx>> {
debug!("cat_expr expr.id: {} {}", expr.id, expr);
match self.typer.adjustments().borrow().get(&expr.id) {
None => {
// No adjustments.
Expand Down Expand Up @@ -457,6 +458,7 @@ impl<'t,'tcx,TYPER:Typer<'tcx>> MemCategorizationContext<'t,TYPER> {
expr: &ast::Expr,
autoderefs: uint)
-> McResult<cmt<'tcx>> {
debug!("cat_expr_autoderefd: autoderefs={}", autoderefs);
let mut cmt = if_ok!(self.cat_expr_unadjusted(expr));
debug!("cat_expr_autoderefd: autoderefs={}, cmt={}",
autoderefs,
Expand All @@ -468,9 +470,16 @@ impl<'t,'tcx,TYPER:Typer<'tcx>> MemCategorizationContext<'t,TYPER> {
}

pub fn cat_expr_unadjusted(&self, expr: &ast::Expr) -> McResult<cmt<'tcx>> {
debug!("cat_expr: id={} expr={}", expr.id, expr.repr(self.tcx()));

let expr_ty = if_ok!(self.expr_ty(expr));
debug!("cat_expr_unadjusted: id={} expr={}", expr.id, expr.repr(self.tcx()));

// let expr_ty = if_ok!(self.expr_ty(expr));
let expr_ty = match self.expr_ty(expr) {
Ok(expr_ty) => expr_ty,
Err(e) => {
debug!("cat_expr_unadjusted expr_ty errd");
return Err(e);
}
};
match expr.node {
ast::ExprUnary(ast::UnDeref, ref e_base) => {
let base_cmt = if_ok!(self.cat_expr(&**e_base));
Expand Down Expand Up @@ -702,7 +711,10 @@ impl<'t,'tcx,TYPER:Typer<'tcx>> MemCategorizationContext<'t,TYPER> {

// Region of environment pointer
let env_region = ty::ReFree(ty::FreeRegion {
scope: region::CodeExtent::from_node_id(fn_body_id),
// The environment of a closure is guaranteed to
// outlive any bindings introduced in the body of the
// closure itself.
scope: region::CodeExtent::DestructionScope(fn_body_id),
bound_region: ty::BrEnv
});

Expand Down Expand Up @@ -1543,3 +1555,34 @@ fn element_kind(t: Ty) -> ElementKind {
_ => OtherElement
}
}


/// Returns the maximal region scope for the which the lvalue `cmt` is
/// guaranteed to be valid without any rooting etc, and presuming `cmt`
/// is not mutated. See the `SCOPE(LV)` function in `borrowck/doc.rs`.
pub fn scope<'tcx>(tcx: &ty::ctxt<'tcx>,
cmt: &cmt<'tcx>,
extent: region::CodeExtent) -> ty::Region {
let ret = match cmt.cat {
cat_rvalue(temp_scope) => temp_scope,
cat_upvar(..) => ty::ReScope(extent),

cat_static_item => ty::ReStatic,

cat_local(local_id) => {
ty::ReScope(tcx.region_maps.var_scope(local_id))
}

cat_deref(_, _, UnsafePtr(..)) => ty::ReStatic,

cat_deref(_, _, BorrowedPtr(_, r)) |
cat_deref(_, _, Implicit(_, r)) => r,

cat_downcast(ref cmt) |
cat_deref(ref cmt, _, OwnedPtr) |
cat_interior(ref cmt, _) => scope(tcx, cmt, extent),
};
debug!("scope cmt: {} {} return: {}", cmt, cmt.repr(tcx), ret);
return ret;
}

Loading