Skip to content

Commit 1d25fd9

Browse files
author
Ariel Ben-Yehuda
committed
---
yaml --- r: 223661 b: refs/heads/beta c: 445824b h: refs/heads/master i: 223659: 59ecd3b v: v3
1 parent 3147362 commit 1d25fd9

File tree

19 files changed

+81
-311
lines changed

19 files changed

+81
-311
lines changed

[refs]

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ refs/tags/0.9: 36870b185fc5f5486636d4515f0e22677493f225
2323
refs/tags/0.10: ac33f2b15782272ae348dbd7b14b8257b2148b5a
2424
refs/tags/0.11.0: e1247cb1d0d681be034adb4b558b5a0c0d5720f9
2525
refs/tags/0.12.0: f0c419429ef30723ceaf6b42f9b5a2aeb5d2e2d1
26-
refs/heads/beta: e6a9be10bc1b178dc0b23c505fc8f17e925cabb2
26+
refs/heads/beta: 445824b29f5ee9a218f315f8cf56142f089e71d0
2727
refs/tags/1.0.0-alpha: e42bd6d93a1d3433c486200587f8f9e12590a4d7
2828
refs/heads/tmp: 938f5d7af401e2d8238522fed4a612943b6e77fd
2929
refs/tags/1.0.0-alpha.2: 4c705f6bc559886632d3871b04f58aab093bfa2f

branches/beta/src/doc/trpl/concurrency.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,11 @@ system is up to the task, and gives you powerful ways to reason about
1010
concurrent code at compile time.
1111

1212
Before we talk about the concurrency features that come with Rust, it's important
13-
to understand something: Rust is low-level enough that the vast majority of
14-
this is provided by the standard library, not by the language. This means that
15-
if you don't like some aspect of the way Rust handles concurrency, you can
16-
implement an alternative way of doing things.
17-
[mio](https://github.com/carllerche/mio) is a real-world example of this
18-
principle in action.
13+
to understand something: Rust is low-level enough that all of this is provided
14+
by the standard library, not by the language. This means that if you don't like
15+
some aspect of the way Rust handles concurrency, you can implement an alternative
16+
way of doing things. [mio](https://github.com/carllerche/mio) is a real-world
17+
example of this principle in action.
1918

2019
## Background: `Send` and `Sync`
2120

branches/beta/src/doc/trpl/lifetimes.md

Lines changed: 0 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -101,8 +101,6 @@ the lifetime `'a` has snuck in between the `&` and the `mut i32`. We read `&mut
101101
i32` as ‘a mutable reference to an i32’ and `&'a mut i32` as ‘a mutable
102102
reference to an `i32` with the lifetime `'a`’.
103103

104-
# In `struct`s
105-
106104
You’ll also need explicit lifetimes when working with [`struct`][structs]s:
107105

108106
```rust
@@ -139,33 +137,6 @@ x: &'a i32,
139137
uses it. So why do we need a lifetime here? We need to ensure that any reference
140138
to a `Foo` cannot outlive the reference to an `i32` it contains.
141139

142-
## `impl` blocks
143-
144-
Let’s implement a method on `Foo`:
145-
146-
```rust
147-
struct Foo<'a> {
148-
x: &'a i32,
149-
}
150-
151-
impl<'a> Foo<'a> {
152-
fn x(&self) -> &'a i32 { self.x }
153-
}
154-
155-
fn main() {
156-
let y = &5; // this is the same as `let _y = 5; let y = &_y;`
157-
let f = Foo { x: y };
158-
159-
println!("x is: {}", f.x());
160-
}
161-
```
162-
163-
As you can see, we need to declare a lifetime for `Foo` in the `impl` line. We repeat
164-
`'a` twice, just like on functions: `impl<'a>` defines a lifetime `'a`, and `Foo<'a>`
165-
uses it.
166-
167-
## Multiple lifetimes
168-
169140
If you have multiple references, you can use the same lifetime multiple times:
170141

171142
```rust

branches/beta/src/doc/trpl/unsafe.md

Lines changed: 15 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ this, Rust has a keyword, `unsafe`. Code using `unsafe` has less restrictions
88
than normal code does.
99

1010
Let’s go over the syntax, and then we’ll talk semantics. `unsafe` is used in
11-
four contexts. The first one is to mark a function as unsafe:
11+
two contexts. The first one is to mark a function as unsafe:
1212

1313
```rust
1414
unsafe fn danger_will_robinson() {
@@ -27,40 +27,15 @@ unsafe {
2727
}
2828
```
2929

30-
The third is for unsafe traits:
31-
32-
```rust
33-
unsafe trait Scary { }
34-
```
35-
36-
And the fourth is for `impl`ementing one of those traits:
37-
38-
```rust
39-
# unsafe trait Scary { }
40-
unsafe impl Scary for i32 {}
41-
```
42-
4330
It’s important to be able to explicitly delineate code that may have bugs that
4431
cause big problems. If a Rust program segfaults, you can be sure it’s somewhere
4532
in the sections marked `unsafe`.
4633

4734
# What does ‘safe’ mean?
4835

49-
Safe, in the context of Rust, means ‘doesn’t do anything unsafe’. It’s also
50-
important to know that there are certain behaviors that are probably not
51-
desirable in your code, but are expressly _not_ unsafe:
36+
Safe, in the context of Rust, means “doesn’t do anything unsafe.” Easy!
5237

53-
* Deadlocks
54-
* Leaks of memory or other resources
55-
* Exiting without calling destructors
56-
* Integer overflow
57-
58-
Rust cannot prevent all kinds of software problems. Buggy code can and will be
59-
written in Rust. These things aren’t great, but they don’t qualify as `unsafe`
60-
specifically.
61-
62-
In addition, the following are all undefined behaviors in Rust, and must be
63-
avoided, even when writing `unsafe` code:
38+
Okay, let’s try again: what is not safe to do? Here’s a list:
6439

6540
* Data races
6641
* Dereferencing a null/dangling raw pointer
@@ -89,6 +64,18 @@ avoided, even when writing `unsafe` code:
8964
[undef]: http://llvm.org/docs/LangRef.html#undefined-values
9065
[aliasing]: http://llvm.org/docs/LangRef.html#pointer-aliasing-rules
9166

67+
Whew! That’s a bunch of stuff. It’s also important to notice all kinds of
68+
behaviors that are certainly bad, but are expressly _not_ unsafe:
69+
70+
* Deadlocks
71+
* Leaks of memory or other resources
72+
* Exiting without calling destructors
73+
* Integer overflow
74+
75+
Rust cannot prevent all kinds of software problems. Buggy code can and will be
76+
written in Rust. These things aren’t great, but they don’t qualify as `unsafe`
77+
specifically.
78+
9279
# Unsafe Superpowers
9380

9481
In both unsafe functions and unsafe blocks, Rust will let you do three things

branches/beta/src/librustc/middle/cfg/construct.rs

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -332,7 +332,7 @@ impl<'a, 'tcx> CFGBuilder<'a, 'tcx> {
332332
}
333333

334334
ast::ExprIndex(ref l, ref r) |
335-
ast::ExprBinary(_, ref l, ref r) if self.is_method_call(expr) => {
335+
ast::ExprBinary(_, ref l, ref r) if self.tcx.is_method_call(expr.id) => {
336336
self.call(expr, pred, &**l, Some(&**r).into_iter())
337337
}
338338

@@ -342,7 +342,7 @@ impl<'a, 'tcx> CFGBuilder<'a, 'tcx> {
342342
self.straightline(expr, pred, fields)
343343
}
344344

345-
ast::ExprUnary(_, ref e) if self.is_method_call(expr) => {
345+
ast::ExprUnary(_, ref e) if self.tcx.is_method_call(expr.id) => {
346346
self.call(expr, pred, &**e, None::<ast::Expr>.iter())
347347
}
348348

@@ -631,9 +631,4 @@ impl<'a, 'tcx> CFGBuilder<'a, 'tcx> {
631631
}
632632
}
633633
}
634-
635-
fn is_method_call(&self, expr: &ast::Expr) -> bool {
636-
let method_call = ty::MethodCall::expr(expr.id);
637-
self.tcx.tables.borrow().method_map.contains_key(&method_call)
638-
}
639634
}

branches/beta/src/librustc/middle/stability.rs

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -289,19 +289,15 @@ impl<'a, 'tcx> Checker<'a, 'tcx> {
289289
if !cross_crate { return }
290290

291291
match *stab {
292-
Some(&Stability { level: attr::Unstable, ref feature, ref reason, issue, .. }) => {
292+
Some(&Stability { level: attr::Unstable, ref feature, ref reason, .. }) => {
293293
self.used_features.insert(feature.clone(), attr::Unstable);
294294

295295
if !self.active_features.contains(feature) {
296-
let mut msg = match *reason {
296+
let msg = match *reason {
297297
Some(ref r) => format!("use of unstable library feature '{}': {}",
298298
&feature, &r),
299299
None => format!("use of unstable library feature '{}'", &feature)
300300
};
301-
if let Some(n) = issue {
302-
use std::fmt::Write;
303-
write!(&mut msg, " (see issue #{})", n).unwrap();
304-
}
305301

306302
emit_feature_err(&self.tcx.sess.parse_sess.span_diagnostic,
307303
&feature, span, &msg);

branches/beta/src/librustc/middle/ty.rs

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6631,6 +6631,11 @@ impl<'tcx> ctxt<'tcx> {
66316631
self.tables.borrow().method_map.contains_key(&MethodCall::expr(expr_id))
66326632
}
66336633

6634+
pub fn is_overloaded_autoderef(&self, expr_id: ast::NodeId, autoderefs: u32) -> bool {
6635+
self.tables.borrow().method_map.contains_key(&MethodCall::autoderef(expr_id,
6636+
autoderefs))
6637+
}
6638+
66346639
pub fn upvar_capture(&self, upvar_id: ty::UpvarId) -> Option<ty::UpvarCapture> {
66356640
Some(self.tables.borrow().upvar_capture_map.get(&upvar_id).unwrap().clone())
66366641
}

branches/beta/src/librustc_driver/driver.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -547,7 +547,7 @@ pub fn phase_2_configure_and_expand(sess: &Session,
547547
sess.diagnostic()));
548548

549549
krate = time(time_passes, "prelude injection", krate, |krate|
550-
syntax::std_inject::maybe_inject_prelude(&sess.parse_sess, krate));
550+
syntax::std_inject::maybe_inject_prelude(krate));
551551

552552
time(time_passes, "checking that all macro invocations are gone", &krate, |krate|
553553
syntax::ext::expand::check_for_macros(&sess.parse_sess, krate));

branches/beta/src/librustc_trans/trans/expr.rs

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -367,8 +367,7 @@ fn apply_adjustments<'blk, 'tcx>(bcx: Block<'blk, 'tcx>,
367367
match datum.ty.sty {
368368
// Don't skip a conversion from Box<T> to &T, etc.
369369
ty::TyRef(..) => {
370-
let method_call = MethodCall::autoderef(expr.id, 0);
371-
if bcx.tcx().tables.borrow().method_map.contains_key(&method_call) {
370+
if bcx.tcx().is_overloaded_autoderef(expr.id, 0) {
372371
// Don't skip an overloaded deref.
373372
0
374373
} else {
@@ -1612,9 +1611,7 @@ fn trans_unary<'blk, 'tcx>(bcx: Block<'blk, 'tcx>,
16121611
// The only overloaded operator that is translated to a datum
16131612
// is an overloaded deref, since it is always yields a `&T`.
16141613
// Otherwise, we should be in the RvalueDpsExpr path.
1615-
assert!(
1616-
op == ast::UnDeref ||
1617-
!ccx.tcx().tables.borrow().method_map.contains_key(&method_call));
1614+
assert!(op == ast::UnDeref || !ccx.tcx().is_method_call(expr.id));
16181615

16191616
let un_ty = expr_ty(bcx, expr);
16201617

@@ -1907,7 +1904,7 @@ fn trans_binary<'blk, 'tcx>(bcx: Block<'blk, 'tcx>,
19071904
let ccx = bcx.ccx();
19081905

19091906
// if overloaded, would be RvalueDpsExpr
1910-
assert!(!ccx.tcx().tables.borrow().method_map.contains_key(&MethodCall::expr(expr.id)));
1907+
assert!(!ccx.tcx().is_method_call(expr.id));
19111908

19121909
match op.node {
19131910
ast::BiAnd => {
@@ -2141,7 +2138,7 @@ fn trans_assign_op<'blk, 'tcx>(bcx: Block<'blk, 'tcx>,
21412138
debug!("trans_assign_op(expr={:?})", expr);
21422139

21432140
// User-defined operator methods cannot be used with `+=` etc right now
2144-
assert!(!bcx.tcx().tables.borrow().method_map.contains_key(&MethodCall::expr(expr.id)));
2141+
assert!(!bcx.tcx().is_method_call(expr.id));
21452142

21462143
// Evaluate LHS (destination), which should be an lvalue
21472144
let dst_datum = unpack_datum!(bcx, trans_to_lvalue(bcx, dst, "assign_op"));
@@ -2606,7 +2603,7 @@ enum ExprKind {
26062603
}
26072604

26082605
fn expr_kind(tcx: &ty::ctxt, expr: &ast::Expr) -> ExprKind {
2609-
if tcx.tables.borrow().method_map.contains_key(&MethodCall::expr(expr.id)) {
2606+
if tcx.is_method_call(expr.id) {
26102607
// Overloaded operations are generally calls, and hence they are
26112608
// generated via DPS, but there are a few exceptions:
26122609
return match expr.node {

branches/beta/src/librustc_typeck/check/regionck.rs

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -516,8 +516,7 @@ fn visit_expr(rcx: &mut Rcx, expr: &ast::Expr) {
516516
type_must_outlive(rcx, infer::ExprTypeIsNotInScope(expr_ty, expr.span),
517517
expr_ty, ty::ReScope(CodeExtent::from_node_id(expr.id)));
518518

519-
let method_call = MethodCall::expr(expr.id);
520-
let has_method_map = rcx.fcx.inh.tables.borrow().method_map.contains_key(&method_call);
519+
let has_method_map = rcx.fcx.infcx().is_method_call(expr.id);
521520

522521
// Check any autoderefs or autorefs that appear.
523522
let adjustment = rcx.fcx.inh.tables.borrow().adjustments.get(&expr.id).map(|a| a.clone());

branches/beta/src/librustc_typeck/diagnostics.rs

Lines changed: 3 additions & 81 deletions
Original file line numberDiff line numberDiff line change
@@ -1368,62 +1368,6 @@ struct Foo {
13681368
```
13691369
"##,
13701370

1371-
E0128: r##"
1372-
Type parameter defaults can only use parameters that occur before them.
1373-
Erroneous code example:
1374-
1375-
```
1376-
pub struct Foo<T=U, U=()> {
1377-
field1: T,
1378-
filed2: U,
1379-
}
1380-
// error: type parameters with a default cannot use forward declared
1381-
// identifiers
1382-
```
1383-
1384-
Since type parameters are evaluated in-order, you may be able to fix this issue
1385-
by doing:
1386-
1387-
```
1388-
pub struct Foo<U=(), T=U> {
1389-
field1: T,
1390-
filed2: U,
1391-
}
1392-
```
1393-
1394-
Please also verify that this wasn't because of a name-clash and rename the type
1395-
parameter if so.
1396-
"##,
1397-
1398-
E0130: r##"
1399-
You declared a pattern as an argument in a foreign function declaration.
1400-
Erroneous code example:
1401-
1402-
```
1403-
extern {
1404-
fn foo((a, b): (u32, u32)); // error: patterns aren't allowed in foreign
1405-
// function declarations
1406-
}
1407-
```
1408-
1409-
Please replace the pattern argument with a regular one. Example:
1410-
1411-
```
1412-
struct SomeStruct {
1413-
a: u32,
1414-
b: u32,
1415-
}
1416-
1417-
extern {
1418-
fn foo(s: SomeStruct); // ok!
1419-
}
1420-
// or
1421-
extern {
1422-
fn foo(a: (u32, u32)); // ok!
1423-
}
1424-
```
1425-
"##,
1426-
14271371
E0131: r##"
14281372
It is not possible to define `main` with type parameters, or even with function
14291373
parameters. When `main` is present, it must take no arguments and return `()`.
@@ -1438,30 +1382,6 @@ fn(isize, *const *const u8) -> isize
14381382
```
14391383
"##,
14401384

1441-
E0159: r##"
1442-
You tried to use a trait as a struct constructor. Erroneous code example:
1443-
1444-
```
1445-
trait TraitNotAStruct {}
1446-
1447-
TraitNotAStruct{ value: 0 }; // error: use of trait `TraitNotAStruct` as a
1448-
// struct constructor
1449-
```
1450-
1451-
Please verify you used the correct type name or please implement the trait
1452-
on a struct and use this struct constructor. Example:
1453-
1454-
```
1455-
trait TraitNotAStruct {}
1456-
1457-
struct Foo {
1458-
value: i32
1459-
}
1460-
1461-
Foo{ value: 0 }; // ok!
1462-
```
1463-
"##,
1464-
14651385
E0166: r##"
14661386
This error means that the compiler found a return expression in a function
14671387
marked as diverging. A function diverges if it has `!` in the place of the
@@ -1547,7 +1467,6 @@ impl Foo for Bar {
15471467
// the impl
15481468
fn foo() {}
15491469
}
1550-
```
15511470
"##,
15521471

15531472
E0192: r##"
@@ -2059,8 +1978,11 @@ register_diagnostics! {
20591978
E0122,
20601979
E0123,
20611980
E0127,
1981+
E0128,
20621982
E0129,
1983+
E0130,
20631984
E0141,
1985+
E0159,
20641986
E0163,
20651987
E0164,
20661988
E0167,

0 commit comments

Comments
 (0)