1 // Copyright 2011 The Go Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style
3 // license that can be found in the LICENSE file.
5 // This file implements the Check function, which drives type-checking.
17 // debugging/development support
19 debug = false // leave on during development
20 trace = false // turn on for detailed type resolution traces
22 // TODO(rfindley): add compiler error message handling from types2, guarded
23 // behind this flag, so that we can keep the code in sync.
24 compilerErrorMessages = false // match compiler error messages
27 // If forceStrict is set, the type-checker enforces additional
28 // rules not specified by the Go 1 spec, but which will
29 // catch guaranteed run-time errors if the respective
30 // code is executed. In other words, programs passing in
31 // strict mode are Go 1 compliant, but not all Go 1 programs
32 // will pass in strict mode. The additional rules are:
34 // - A type assertion x.(T) where T is an interface type
35 // is invalid if any (statically known) method that exists
36 // for both x and T have different signatures.
38 const forceStrict = false
40 // exprInfo stores information about an untyped expression.
41 type exprInfo struct {
42 isLhs bool // expression is lhs operand of a shift with delayed type-check
45 val constant.Value // constant value; or nil (if not a constant)
48 // An environment represents the environment within which an object is
50 type environment struct {
51 decl *declInfo // package-level declaration whose init expression/function body is checked
52 scope *Scope // top-most scope for lookups
53 pos token.Pos // if valid, identifiers are looked up as if at position pos (used by Eval)
54 iota constant.Value // value of iota in a constant declaration; nil otherwise
55 errpos positioner // if set, identifier position of a constant with inherited initializer
56 inTParamList bool // set if inside a type parameter list
57 sig *Signature // function signature if inside a function; nil otherwise
58 isPanic map[*ast.CallExpr]bool // set of panic call expressions (used for termination check)
59 hasLabel bool // set if a function makes use of labels (only ~1% of functions); unused outside functions
60 hasCallOrRecv bool // set if an expression contains a function call or channel receive operation
63 // lookup looks up name in the current environment and returns the matching object, or nil.
64 func (env *environment) lookup(name string) Object {
65 _, obj := env.scope.LookupParent(name, env.pos)
69 // An importKey identifies an imported package by import path and source directory
70 // (directory containing the file containing the import). In practice, the directory
71 // may always be the same, or may not matter. Given an (import path, directory), an
72 // importer must always return the same package (but given two different import paths,
73 // an importer may still return the same package by mapping them to the same package
75 type importKey struct {
79 // A dotImportKey describes a dot-imported object in the given scope.
80 type dotImportKey struct {
85 // An action describes a (delayed) action.
87 f func() // action to be executed
88 desc *actionDesc // action description; may be nil, requires debug to be set
91 // If debug is set, describef sets a printf-formatted description for action a.
92 // Otherwise, it is a no-op.
93 func (a *action) describef(pos positioner, format string, args ...any) {
95 a.desc = &actionDesc{pos, format, args}
99 // An actionDesc provides information on an action.
100 // For debugging only.
101 type actionDesc struct {
107 // A Checker maintains the state of the type checker.
108 // It must be created with NewChecker.
109 type Checker struct {
110 // package information
111 // (initialized by NewChecker, valid for the life-time of checker)
113 ctxt *Context // context for de-duplicating instances
117 version version // accepted language version
118 nextID uint64 // unique Id for type parameters (first valid Id is 1)
119 objMap map[Object]*declInfo // maps package-level objects and (non-interface) methods to declaration info
120 impMap map[importKey]*Package // maps (import path, source directory) to (complete or fake) package
121 infoMap map[*Named]typeInfo // maps named types to their associated type info (for cycle detection)
123 // pkgPathMap maps package names to the set of distinct import paths we've
124 // seen for that name, anywhere in the import graph. It is used for
125 // disambiguating package names in error messages.
127 // pkgPathMap is allocated lazily, so that we don't pay the price of building
128 // it on the happy path. seenPkgMap tracks the packages that we've already
130 pkgPathMap map[string]map[string]bool
131 seenPkgMap map[*Package]bool
133 // information collected during type-checking of a set of package files
134 // (initialized by Files, valid only for the duration of check.Files;
135 // maps and lists are allocated on demand)
136 files []*ast.File // package files
137 imports []*PkgName // list of imported packages
138 dotImportMap map[dotImportKey]*PkgName // maps dot-imported objects to the package they were dot-imported through
139 recvTParamMap map[*ast.Ident]*TypeParam // maps blank receiver type parameters to their type
140 unionTypeSets map[*Union]*_TypeSet // computed type sets for union types
141 mono monoGraph // graph for detecting non-monomorphizable instantiation loops
143 firstErr error // first error encountered
144 methods map[*TypeName][]*Func // maps package scope type names to associated non-blank (non-interface) methods
145 untyped map[ast.Expr]exprInfo // map of expressions without final type
146 delayed []action // stack of delayed action segments; segments are processed in FIFO order
147 objPath []Object // path of object dependencies during type inference (for cycle reporting)
148 defTypes []*Named // defined types created during type checking, for final validation.
150 // environment within which the current object is type-checked (valid only
151 // for the duration of type-checking a specific object)
155 indent int // indentation for tracing
158 // addDeclDep adds the dependency edge (check.decl -> to) if check.decl exists
159 func (check *Checker) addDeclDep(to Object) {
162 return // not in a package-level init expression
164 if _, found := check.objMap[to]; !found {
165 return // to is not a package-level object
170 func (check *Checker) rememberUntyped(e ast.Expr, lhs bool, mode operandMode, typ *Basic, val constant.Value) {
173 m = make(map[ast.Expr]exprInfo)
176 m[e] = exprInfo{lhs, mode, typ, val}
179 // later pushes f on to the stack of actions that will be processed later;
180 // either at the end of the current statement, or in case of a local constant
181 // or variable declaration, before the constant or variable is in scope
182 // (so that f still sees the scope before any new declarations).
183 // later returns the pushed action so one can provide a description
184 // via action.describef for debugging, if desired.
185 func (check *Checker) later(f func()) *action {
186 i := len(check.delayed)
187 check.delayed = append(check.delayed, action{f: f})
188 return &check.delayed[i]
191 // push pushes obj onto the object path and returns its index in the path.
192 func (check *Checker) push(obj Object) int {
193 check.objPath = append(check.objPath, obj)
194 return len(check.objPath) - 1
197 // pop pops and returns the topmost object from the object path.
198 func (check *Checker) pop() Object {
199 i := len(check.objPath) - 1
200 obj := check.objPath[i]
201 check.objPath[i] = nil
202 check.objPath = check.objPath[:i]
206 // NewChecker returns a new Checker instance for a given package.
207 // Package files may be added incrementally via checker.Files.
208 func NewChecker(conf *Config, fset *token.FileSet, pkg *Package, info *Info) *Checker {
209 // make sure we have a configuration
214 // make sure we have an info struct
219 version, err := parseGoVersion(conf.GoVersion)
221 panic(fmt.Sprintf("invalid Go version %q (%v)", conf.GoVersion, err))
231 objMap: make(map[Object]*declInfo),
232 impMap: make(map[importKey]*Package),
233 infoMap: make(map[*Named]typeInfo),
237 // initFiles initializes the files-specific portion of checker.
238 // The provided files must all belong to the same package.
239 func (check *Checker) initFiles(files []*ast.File) {
240 // start with a clean slate (check.Files may be called multiple times)
243 check.dotImportMap = nil
250 // determine package name and collect valid files
252 for _, file := range files {
253 switch name := file.Name.Name; pkg.name {
258 check.errorf(file.Name, _BlankPkgName, "invalid package name _")
263 check.files = append(check.files, file)
266 check.errorf(atPos(file.Package), _MismatchedPkgName, "package %s; expected %s", name, pkg.name)
272 // A bailout panic is used for early termination.
273 type bailout struct{}
275 func (check *Checker) handleBailout(err *error) {
276 switch p := recover().(type) {
278 // normal return or early exit
279 *err = check.firstErr
286 // Files checks the provided files as part of the checker's package.
287 func (check *Checker) Files(files []*ast.File) error { return check.checkFiles(files) }
289 var errBadCgo = errors.New("cannot use FakeImportC and go115UsesCgo together")
291 func (check *Checker) checkFiles(files []*ast.File) (err error) {
292 if check.conf.FakeImportC && check.conf.go115UsesCgo {
296 defer check.handleBailout(&err)
298 check.initFiles(files)
300 check.collectObjects()
302 check.packageObjects()
304 check.processDelayed(0) // incl. all functions
306 check.expandDefTypes()
310 if !check.conf.DisableUnusedImportCheck {
311 check.unusedImports()
314 check.recordUntyped()
316 if check.firstErr == nil {
317 // TODO(mdempsky): Ensure monomorph is safe when errors exist.
321 check.pkg.complete = true
323 // no longer needed - release memory
325 check.dotImportMap = nil
326 check.pkgPathMap = nil
327 check.seenPkgMap = nil
328 check.recvTParamMap = nil
329 check.unionTypeSets = nil
333 // TODO(rFindley) There's more memory we should release at this point.
338 // processDelayed processes all delayed actions pushed after top.
339 func (check *Checker) processDelayed(top int) {
340 // If each delayed action pushes a new action, the
341 // stack will continue to grow during this loop.
342 // However, it is only processing functions (which
343 // are processed in a delayed fashion) that may
344 // add more actions (such as nested functions), so
345 // this is a sufficiently bounded process.
346 for i := top; i < len(check.delayed); i++ {
347 a := &check.delayed[i]
348 if trace && a.desc != nil {
350 check.trace(a.desc.pos.Pos(), "-- "+a.desc.format, a.desc.args...)
352 a.f() // may append to check.delayed
354 assert(top <= len(check.delayed)) // stack must not have shrunk
355 check.delayed = check.delayed[:top]
358 func (check *Checker) expandDefTypes() {
359 // Ensure that every defined type created in the course of type-checking has
360 // either non-*Named underlying, or is unresolved.
362 // This guarantees that we don't leak any types whose underlying is *Named,
363 // because any unresolved instances will lazily compute their underlying by
364 // substituting in the underlying of their origin. The origin must have
365 // either been imported or type-checked and expanded here, and in either case
366 // its underlying will be fully expanded.
367 for i := 0; i < len(check.defTypes); i++ {
368 n := check.defTypes[i]
369 switch n.underlying.(type) {
371 if n.resolver == nil {
372 panic("nil underlying")
375 n.under() // n.under may add entries to check.defTypes
381 func (check *Checker) record(x *operand) {
382 // convert x into a user-friendly set of values
383 // TODO(gri) this code can be simplified
385 var val constant.Value
397 assert(x.expr != nil && typ != nil)
400 // delay type and value recording until we know the type
401 // or until the end of type checking
402 check.rememberUntyped(x.expr, false, x.mode, typ.(*Basic), val)
404 check.recordTypeAndValue(x.expr, x.mode, typ, val)
408 func (check *Checker) recordUntyped() {
409 if !debug && check.Types == nil {
410 return // nothing to do
413 for x, info := range check.untyped {
414 if debug && isTyped(info.typ) {
415 check.dump("%v: %s (type %s) is typed", x.Pos(), x, info.typ)
418 check.recordTypeAndValue(x, info.mode, info.typ, info.val)
422 func (check *Checker) recordTypeAndValue(x ast.Expr, mode operandMode, typ Type, val constant.Value) {
428 if mode == constant_ {
430 // We check allBasic(typ, IsConstType) here as constant expressions may be
431 // recorded as type parameters.
432 assert(typ == Typ[Invalid] || allBasic(typ, IsConstType))
434 if m := check.Types; m != nil {
435 m[x] = TypeAndValue{mode, typ, val}
439 func (check *Checker) recordBuiltinType(f ast.Expr, sig *Signature) {
440 // f must be a (possibly parenthesized, possibly qualified)
441 // identifier denoting a built-in (including unsafe's non-constant
442 // functions Add and Slice): record the signature for f and possible
445 check.recordTypeAndValue(f, builtin, sig, nil)
446 switch p := f.(type) {
447 case *ast.Ident, *ast.SelectorExpr:
457 func (check *Checker) recordCommaOkTypes(x ast.Expr, a [2]Type) {
459 if a[0] == nil || a[1] == nil {
462 assert(isTyped(a[0]) && isTyped(a[1]) && (isBoolean(a[1]) || a[1] == universeError))
463 if m := check.Types; m != nil {
466 assert(tv.Type != nil) // should have been recorded already
469 NewVar(pos, check.pkg, "", a[0]),
470 NewVar(pos, check.pkg, "", a[1]),
473 // if x is a parenthesized expression (p.X), update p.X
474 p, _ := x.(*ast.ParenExpr)
483 // recordInstance records instantiation information into check.Info, if the
484 // Instances map is non-nil. The given expr must be an ident, selector, or
485 // index (list) expr with ident or selector operand.
487 // TODO(rfindley): the expr parameter is fragile. See if we can access the
488 // instantiated identifier in some other way.
489 func (check *Checker) recordInstance(expr ast.Expr, targs []Type, typ Type) {
490 ident := instantiatedIdent(expr)
493 if m := check.Instances; m != nil {
494 m[ident] = Instance{newTypeList(targs), typ}
498 func instantiatedIdent(expr ast.Expr) *ast.Ident {
499 var selOrIdent ast.Expr
500 switch e := expr.(type) {
503 case *ast.IndexListExpr:
505 case *ast.SelectorExpr, *ast.Ident:
508 switch x := selOrIdent.(type) {
511 case *ast.SelectorExpr:
514 panic("instantiated ident not found")
517 func (check *Checker) recordDef(id *ast.Ident, obj Object) {
519 if m := check.Defs; m != nil {
524 func (check *Checker) recordUse(id *ast.Ident, obj Object) {
527 if m := check.Uses; m != nil {
532 func (check *Checker) recordImplicit(node ast.Node, obj Object) {
535 if m := check.Implicits; m != nil {
540 func (check *Checker) recordSelection(x *ast.SelectorExpr, kind SelectionKind, recv Type, obj Object, index []int, indirect bool) {
541 assert(obj != nil && (recv == nil || len(index) > 0))
542 check.recordUse(x.Sel, obj)
543 if m := check.Selections; m != nil {
544 m[x] = &Selection{kind, recv, obj, index, indirect}
548 func (check *Checker) recordScope(node ast.Node, scope *Scope) {
551 if m := check.Scopes; m != nil {