-
Notifications
You must be signed in to change notification settings - Fork 13.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refine scopes around temporaries generated in local accesses #92508
Changes from all commits
876f04d
bc114c4
4097274
906cdbf
7cad314
849eb4b
348584d
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4134,6 +4134,7 @@ dependencies = [ | |
"rustc_session", | ||
"rustc_span", | ||
"rustc_target", | ||
"smallvec", | ||
"tracing", | ||
] | ||
|
||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -10,16 +10,15 @@ impl Client { | |
} | ||
} | ||
|
||
async fn get() { } | ||
async fn get() {} | ||
|
||
pub fn foo() -> impl Future + Send { | ||
//~^ ERROR future cannot be sent between threads safely | ||
let client = Client(Box::new(true)); | ||
async move { | ||
match client.status() { | ||
async { | ||
match Client(Box::new(true)).status() { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Is this just cleaning up the test, or were changes needed so that it still tested the same behavior as before? In other words, did the error from the previous version go away due to your changes? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The error goes away with this change. However, I checked the issue #64130 and it seems that this test is intended for prompting hints for remedies when values living through yield points make generators non- There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Sounds good! |
||
200 => { | ||
let _x = get().await; | ||
}, | ||
} | ||
_ => (), | ||
} | ||
} | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll admit, I still need to reload my mental cache here, but: Is this actually true? Aren't there cases where the value produced by
y.z()
may hold references to those temporaries, so you'd need to keep them alive across the evaluation of the indexing operation?I'll do some investigation to double-check my understanding here, and see if I can convince myself that you are correct.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(While talking to niko about this, he notes the example of
mutex.lock().something()
as a potentially problematic example...)There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this was initially bending my mind as well. Let me try to elaborate. So the indexing operation, either through
Index
orIndexMut
, produces borrows with lifetimes that must outlivesself
.Let us take
Index
as an example. In this example, we attempt to allow indexing intoA
with a temporary reference&()
, producing a value of type&B<'_>
. The result of this indexing will need the temporary index&()
to be kept aliveAt
(1)
, we are expected to construct a borrow with a lifetime's
. However, theIndex
trait definition does allow us to imposeSelf::Output: 's
or any outliving relation between'a
and's
in this scope. Overall, this means that if the index, which is'_ ()
in this example, has a lifetime'a
,'s
must outlives'a
.A side track
I think there should be an implicit bound ofSelf::Output: 's
to be satisfied, but the current compiler does not complain as long as the return value is!
.Regarding the example from @nikomatsakis, let us example the following elaborated code.
The expression
a[i.lock().unwrap().deref_mut()] = ()
is currently rejected because the temporary mutex guardmutex.lock()
is preserved only until the end of this assignment.In any case, I am also experimenting ways to produce examples that requiring living temporaries after index to be extra sure.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Okay.
It looks like you are making an argument based on the lifetimes embedded in the
Idx
type oftrait Index<Idx>
.I think I can see the reasoning there; its something like "the definition of the
Index
trait:pub trait Index<Idx: ?Sized> { type Output: ?Sized; fn index(&self, index: Idx) -> &Self::Output; }
, will force any free lifetimes associated with theIdx
to be bound at the scope of theimpl<'a, 'b, ...> Index<...> for Concrete<...>
for any concrete typeConcrete<...>
."My follow-up question then is: Is there a case where the
Idx
type doesn't have any lifetimes in it, but the scope of temporaries of the expression computingIdx
are nonetheless significant (and where the change suggested here could break code)?My current suspicion is that the most natural cases where that could arise is that it could only happen in unsafe code that is incorrect (i.e., unsafe code that should be using lifetimes to express the constraints between the temporaries and the dynamic extent of the produced value, but is sidestepping doing so, and in the process opens up potential issues where user code can violate those now implicit constraints).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(In case its not clear, I'm going to poke around a bit more and see if I can make my concerns here concrete. My current thinking is that you may indeed be safe in the assertions you are making here, but I want to make sure I understand the edge cases really well.)