context.cpp 43 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105
  1. // Part of the Carbon Language project, under the Apache License v2.0 with LLVM
  2. // Exceptions. See /LICENSE for license information.
  3. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  4. #include "toolchain/check/context.h"
  5. #include <optional>
  6. #include <string>
  7. #include <utility>
  8. #include "common/check.h"
  9. #include "common/vlog.h"
  10. #include "llvm/ADT/Sequence.h"
  11. #include "toolchain/check/decl_name_stack.h"
  12. #include "toolchain/check/eval.h"
  13. #include "toolchain/check/generic.h"
  14. #include "toolchain/check/generic_region_stack.h"
  15. #include "toolchain/check/import.h"
  16. #include "toolchain/check/import_ref.h"
  17. #include "toolchain/check/inst_block_stack.h"
  18. #include "toolchain/check/merge.h"
  19. #include "toolchain/check/type_completion.h"
  20. #include "toolchain/diagnostics/diagnostic_emitter.h"
  21. #include "toolchain/diagnostics/format_providers.h"
  22. #include "toolchain/lex/tokenized_buffer.h"
  23. #include "toolchain/parse/node_ids.h"
  24. #include "toolchain/parse/node_kind.h"
  25. #include "toolchain/sem_ir/file.h"
  26. #include "toolchain/sem_ir/formatter.h"
  27. #include "toolchain/sem_ir/generic.h"
  28. #include "toolchain/sem_ir/ids.h"
  29. #include "toolchain/sem_ir/import_ir.h"
  30. #include "toolchain/sem_ir/inst.h"
  31. #include "toolchain/sem_ir/inst_kind.h"
  32. #include "toolchain/sem_ir/name_scope.h"
  33. #include "toolchain/sem_ir/type_info.h"
  34. #include "toolchain/sem_ir/typed_insts.h"
  35. namespace Carbon::Check {
  36. Context::Context(DiagnosticEmitter* emitter,
  37. Parse::GetTreeAndSubtreesFn tree_and_subtrees_getter,
  38. SemIR::File* sem_ir, int imported_ir_count, int total_ir_count,
  39. llvm::raw_ostream* vlog_stream)
  40. : emitter_(emitter),
  41. tree_and_subtrees_getter_(tree_and_subtrees_getter),
  42. sem_ir_(sem_ir),
  43. vlog_stream_(vlog_stream),
  44. node_stack_(sem_ir->parse_tree(), vlog_stream),
  45. inst_block_stack_("inst_block_stack_", *sem_ir, vlog_stream),
  46. pattern_block_stack_("pattern_block_stack_", *sem_ir, vlog_stream),
  47. param_and_arg_refs_stack_(*sem_ir, vlog_stream, node_stack_),
  48. args_type_info_stack_("args_type_info_stack_", *sem_ir, vlog_stream),
  49. decl_name_stack_(this),
  50. scope_stack_(sem_ir_->identifiers()),
  51. vtable_stack_("vtable_stack_", *sem_ir, vlog_stream),
  52. global_init_(this) {
  53. // Prepare fields which relate to the number of IRs available for import.
  54. import_irs().Reserve(imported_ir_count);
  55. import_ir_constant_values_.reserve(imported_ir_count);
  56. check_ir_map_.resize(total_ir_count, SemIR::ImportIRId::None);
  57. // Map the builtin `<error>` and `type` type constants to their corresponding
  58. // special `TypeId` values.
  59. type_ids_for_type_constants_.Insert(
  60. SemIR::ConstantId::ForTemplateConstant(SemIR::ErrorInst::SingletonInstId),
  61. SemIR::ErrorInst::SingletonTypeId);
  62. type_ids_for_type_constants_.Insert(
  63. SemIR::ConstantId::ForTemplateConstant(SemIR::TypeType::SingletonInstId),
  64. SemIR::TypeType::SingletonTypeId);
  65. // TODO: Remove this and add a `VerifyOnFinish` once we properly push and pop
  66. // in the right places.
  67. generic_region_stack().Push();
  68. }
  69. auto Context::TODO(SemIRLoc loc, std::string label) -> bool {
  70. CARBON_DIAGNOSTIC(SemanticsTodo, Error, "semantics TODO: `{0}`", std::string);
  71. emitter_->Emit(loc, SemanticsTodo, std::move(label));
  72. return false;
  73. }
  74. auto Context::VerifyOnFinish() -> void {
  75. // Information in all the various context objects should be cleaned up as
  76. // various pieces of context go out of scope. At this point, nothing should
  77. // remain.
  78. // node_stack_ will still contain top-level entities.
  79. inst_block_stack_.VerifyOnFinish();
  80. pattern_block_stack_.VerifyOnFinish();
  81. param_and_arg_refs_stack_.VerifyOnFinish();
  82. args_type_info_stack_.VerifyOnFinish();
  83. CARBON_CHECK(struct_type_fields_stack_.empty());
  84. // TODO: Add verification for decl_name_stack_ and
  85. // decl_introducer_state_stack_.
  86. scope_stack_.VerifyOnFinish();
  87. // TODO: Add verification for generic_region_stack_.
  88. }
  89. auto Context::GetOrAddInst(SemIR::LocIdAndInst loc_id_and_inst)
  90. -> SemIR::InstId {
  91. if (loc_id_and_inst.loc_id.is_implicit()) {
  92. auto const_id =
  93. TryEvalInst(*this, SemIR::InstId::None, loc_id_and_inst.inst);
  94. if (const_id.has_value()) {
  95. CARBON_VLOG("GetOrAddInst: constant: {0}\n", loc_id_and_inst.inst);
  96. return constant_values().GetInstId(const_id);
  97. }
  98. }
  99. // TODO: For an implicit instruction, this reattempts evaluation.
  100. return AddInst(loc_id_and_inst);
  101. }
  102. // Finish producing an instruction. Set its constant value, and register it in
  103. // any applicable instruction lists.
  104. auto Context::FinishInst(SemIR::InstId inst_id, SemIR::Inst inst) -> void {
  105. GenericRegionStack::DependencyKind dep_kind =
  106. GenericRegionStack::DependencyKind::None;
  107. // If the instruction has a symbolic constant type, track that we need to
  108. // substitute into it.
  109. if (constant_values().DependsOnGenericParameter(
  110. types().GetConstantId(inst.type_id()))) {
  111. dep_kind |= GenericRegionStack::DependencyKind::SymbolicType;
  112. }
  113. // If the instruction has a constant value, compute it.
  114. auto const_id = TryEvalInst(*this, inst_id, inst);
  115. constant_values().Set(inst_id, const_id);
  116. if (const_id.is_constant()) {
  117. CARBON_VLOG("Constant: {0} -> {1}\n", inst,
  118. constant_values().GetInstId(const_id));
  119. // If the constant value is symbolic, track that we need to substitute into
  120. // it.
  121. if (constant_values().DependsOnGenericParameter(const_id)) {
  122. dep_kind |= GenericRegionStack::DependencyKind::SymbolicConstant;
  123. }
  124. }
  125. // Keep track of dependent instructions.
  126. if (dep_kind != GenericRegionStack::DependencyKind::None) {
  127. // TODO: Also check for template-dependent instructions.
  128. generic_region_stack().AddDependentInst(
  129. {.inst_id = inst_id, .kind = dep_kind});
  130. }
  131. }
  132. // Returns whether a parse node associated with an imported instruction of kind
  133. // `imported_kind` is usable as the location of a corresponding local
  134. // instruction of kind `local_kind`.
  135. static auto HasCompatibleImportedNodeKind(SemIR::InstKind imported_kind,
  136. SemIR::InstKind local_kind) -> bool {
  137. if (imported_kind == local_kind) {
  138. return true;
  139. }
  140. if (imported_kind == SemIR::ImportDecl::Kind &&
  141. local_kind == SemIR::Namespace::Kind) {
  142. static_assert(
  143. std::is_convertible_v<decltype(SemIR::ImportDecl::Kind)::TypedNodeId,
  144. decltype(SemIR::Namespace::Kind)::TypedNodeId>);
  145. return true;
  146. }
  147. return false;
  148. }
  149. auto Context::CheckCompatibleImportedNodeKind(
  150. SemIR::ImportIRInstId imported_loc_id, SemIR::InstKind kind) -> void {
  151. auto& import_ir_inst = import_ir_insts().Get(imported_loc_id);
  152. const auto* import_ir = import_irs().Get(import_ir_inst.ir_id).sem_ir;
  153. auto imported_kind = import_ir->insts().Get(import_ir_inst.inst_id).kind();
  154. CARBON_CHECK(
  155. HasCompatibleImportedNodeKind(imported_kind, kind),
  156. "Node of kind {0} created with location of imported node of kind {1}",
  157. kind, imported_kind);
  158. }
  159. auto Context::AddPlaceholderInstInNoBlock(SemIR::LocIdAndInst loc_id_and_inst)
  160. -> SemIR::InstId {
  161. auto inst_id = sem_ir().insts().AddInNoBlock(loc_id_and_inst);
  162. CARBON_VLOG("AddPlaceholderInst: {0}\n", loc_id_and_inst.inst);
  163. constant_values().Set(inst_id, SemIR::ConstantId::None);
  164. return inst_id;
  165. }
  166. auto Context::AddPlaceholderInst(SemIR::LocIdAndInst loc_id_and_inst)
  167. -> SemIR::InstId {
  168. auto inst_id = AddPlaceholderInstInNoBlock(loc_id_and_inst);
  169. inst_block_stack_.AddInstId(inst_id);
  170. return inst_id;
  171. }
  172. auto Context::ReplaceLocIdAndInstBeforeConstantUse(
  173. SemIR::InstId inst_id, SemIR::LocIdAndInst loc_id_and_inst) -> void {
  174. sem_ir().insts().SetLocIdAndInst(inst_id, loc_id_and_inst);
  175. CARBON_VLOG("ReplaceInst: {0} -> {1}\n", inst_id, loc_id_and_inst.inst);
  176. FinishInst(inst_id, loc_id_and_inst.inst);
  177. }
  178. auto Context::ReplaceInstBeforeConstantUse(SemIR::InstId inst_id,
  179. SemIR::Inst inst) -> void {
  180. sem_ir().insts().Set(inst_id, inst);
  181. CARBON_VLOG("ReplaceInst: {0} -> {1}\n", inst_id, inst);
  182. FinishInst(inst_id, inst);
  183. }
  184. auto Context::ReplaceInstPreservingConstantValue(SemIR::InstId inst_id,
  185. SemIR::Inst inst) -> void {
  186. auto old_const_id = sem_ir().constant_values().Get(inst_id);
  187. sem_ir().insts().Set(inst_id, inst);
  188. CARBON_VLOG("ReplaceInst: {0} -> {1}\n", inst_id, inst);
  189. auto new_const_id = TryEvalInst(*this, inst_id, inst);
  190. CARBON_CHECK(old_const_id == new_const_id);
  191. }
  192. auto Context::DiagnoseDuplicateName(SemIRLoc dup_def, SemIRLoc prev_def)
  193. -> void {
  194. CARBON_DIAGNOSTIC(NameDeclDuplicate, Error,
  195. "duplicate name being declared in the same scope");
  196. CARBON_DIAGNOSTIC(NameDeclPrevious, Note, "name is previously declared here");
  197. emitter_->Build(dup_def, NameDeclDuplicate)
  198. .Note(prev_def, NameDeclPrevious)
  199. .Emit();
  200. }
  201. auto Context::DiagnosePoisonedName(SemIR::LocId poisoning_loc_id,
  202. SemIR::InstId decl_inst_id) -> void {
  203. CARBON_CHECK(poisoning_loc_id.has_value(),
  204. "Trying to diagnose poisoned name with no poisoning location");
  205. CARBON_DIAGNOSTIC(NameUseBeforeDecl, Error,
  206. "name used before it was declared");
  207. CARBON_DIAGNOSTIC(NameUseBeforeDeclNote, Note, "declared here");
  208. emitter_->Build(poisoning_loc_id, NameUseBeforeDecl)
  209. .Note(decl_inst_id, NameUseBeforeDeclNote)
  210. .Emit();
  211. }
  212. auto Context::DiagnoseNameNotFound(SemIRLoc loc, SemIR::NameId name_id)
  213. -> void {
  214. CARBON_DIAGNOSTIC(NameNotFound, Error, "name `{0}` not found", SemIR::NameId);
  215. emitter_->Emit(loc, NameNotFound, name_id);
  216. }
  217. auto Context::DiagnoseMemberNameNotFound(
  218. SemIRLoc loc, SemIR::NameId name_id,
  219. llvm::ArrayRef<LookupScope> lookup_scopes) -> void {
  220. if (lookup_scopes.size() == 1 &&
  221. lookup_scopes.front().name_scope_id.has_value()) {
  222. auto specific_id = lookup_scopes.front().specific_id;
  223. auto scope_inst_id =
  224. specific_id.has_value()
  225. ? GetInstForSpecific(*this, specific_id)
  226. : name_scopes().Get(lookup_scopes.front().name_scope_id).inst_id();
  227. CARBON_DIAGNOSTIC(MemberNameNotFoundInScope, Error,
  228. "member name `{0}` not found in {1}", SemIR::NameId,
  229. InstIdAsType);
  230. emitter_->Emit(loc, MemberNameNotFoundInScope, name_id, scope_inst_id);
  231. return;
  232. }
  233. CARBON_DIAGNOSTIC(MemberNameNotFound, Error, "member name `{0}` not found",
  234. SemIR::NameId);
  235. emitter_->Emit(loc, MemberNameNotFound, name_id);
  236. }
  237. auto Context::NoteAbstractClass(SemIR::ClassId class_id,
  238. DiagnosticBuilder& builder) -> void {
  239. const auto& class_info = classes().Get(class_id);
  240. CARBON_CHECK(
  241. class_info.inheritance_kind == SemIR::Class::InheritanceKind::Abstract,
  242. "Class is not abstract");
  243. CARBON_DIAGNOSTIC(ClassAbstractHere, Note,
  244. "class was declared abstract here");
  245. builder.Note(class_info.definition_id, ClassAbstractHere);
  246. }
  247. auto Context::NoteIncompleteClass(SemIR::ClassId class_id,
  248. DiagnosticBuilder& builder) -> void {
  249. const auto& class_info = classes().Get(class_id);
  250. CARBON_CHECK(!class_info.is_defined(), "Class is not incomplete");
  251. if (class_info.has_definition_started()) {
  252. CARBON_DIAGNOSTIC(ClassIncompleteWithinDefinition, Note,
  253. "class is incomplete within its definition");
  254. builder.Note(class_info.definition_id, ClassIncompleteWithinDefinition);
  255. } else {
  256. CARBON_DIAGNOSTIC(ClassForwardDeclaredHere, Note,
  257. "class was forward declared here");
  258. builder.Note(class_info.latest_decl_id(), ClassForwardDeclaredHere);
  259. }
  260. }
  261. auto Context::NoteUndefinedInterface(SemIR::InterfaceId interface_id,
  262. DiagnosticBuilder& builder) -> void {
  263. const auto& interface_info = interfaces().Get(interface_id);
  264. CARBON_CHECK(!interface_info.is_defined(), "Interface is not incomplete");
  265. if (interface_info.is_being_defined()) {
  266. CARBON_DIAGNOSTIC(InterfaceUndefinedWithinDefinition, Note,
  267. "interface is currently being defined");
  268. builder.Note(interface_info.definition_id,
  269. InterfaceUndefinedWithinDefinition);
  270. } else {
  271. CARBON_DIAGNOSTIC(InterfaceForwardDeclaredHere, Note,
  272. "interface was forward declared here");
  273. builder.Note(interface_info.latest_decl_id(), InterfaceForwardDeclaredHere);
  274. }
  275. }
  276. auto Context::AddNameToLookup(SemIR::NameId name_id, SemIR::InstId target_id,
  277. ScopeIndex scope_index) -> void {
  278. if (auto existing =
  279. scope_stack().LookupOrAddName(name_id, target_id, scope_index);
  280. existing.has_value()) {
  281. DiagnoseDuplicateName(target_id, existing);
  282. }
  283. }
  284. auto Context::LookupNameInDecl(SemIR::LocId loc_id, SemIR::NameId name_id,
  285. SemIR::NameScopeId scope_id,
  286. ScopeIndex scope_index)
  287. -> SemIR::ScopeLookupResult {
  288. if (!scope_id.has_value()) {
  289. // Look for a name in the specified scope or a scope nested within it only.
  290. // There are two cases where the name would be in an outer scope:
  291. //
  292. // - The name is the sole component of the declared name:
  293. //
  294. // class A;
  295. // fn F() {
  296. // class A;
  297. // }
  298. //
  299. // In this case, the inner A is not the same class as the outer A, so
  300. // lookup should not find the outer A.
  301. //
  302. // - The name is a qualifier of some larger declared name:
  303. //
  304. // class A { class B; }
  305. // fn F() {
  306. // class A.B {}
  307. // }
  308. //
  309. // In this case, we're not in the correct scope to define a member of
  310. // class A, so we should reject, and we achieve this by not finding the
  311. // name A from the outer scope.
  312. //
  313. // There is also one case where the name would be in an inner scope:
  314. //
  315. // - The name is redeclared by a parameter of the same entity:
  316. //
  317. // fn F() {
  318. // class C(C:! type);
  319. // }
  320. //
  321. // In this case, the class C is not a redeclaration of its parameter, but
  322. // we find the parameter in order to diagnose a redeclaration error.
  323. return SemIR::ScopeLookupResult::MakeWrappedLookupResult(
  324. scope_stack().LookupInLexicalScopesWithin(name_id, scope_index),
  325. SemIR::AccessKind::Public);
  326. } else {
  327. // We do not look into `extend`ed scopes here. A qualified name in a
  328. // declaration must specify the exact scope in which the name was originally
  329. // introduced:
  330. //
  331. // base class A { fn F(); }
  332. // class B { extend base: A; }
  333. //
  334. // // Error, no `F` in `B`.
  335. // fn B.F() {}
  336. return LookupNameInExactScope(loc_id, name_id, scope_id,
  337. name_scopes().Get(scope_id),
  338. /*is_being_declared=*/true);
  339. }
  340. }
  341. auto Context::LookupUnqualifiedName(Parse::NodeId node_id,
  342. SemIR::NameId name_id, bool required)
  343. -> LookupResult {
  344. // TODO: Check for shadowed lookup results.
  345. // Find the results from ancestor lexical scopes. These will be combined with
  346. // results from non-lexical scopes such as namespaces and classes.
  347. auto [lexical_result, non_lexical_scopes] =
  348. scope_stack().LookupInLexicalScopes(name_id);
  349. // Walk the non-lexical scopes and perform lookups into each of them.
  350. for (auto [index, lookup_scope_id, specific_id] :
  351. llvm::reverse(non_lexical_scopes)) {
  352. if (auto non_lexical_result =
  353. LookupQualifiedName(node_id, name_id,
  354. LookupScope{.name_scope_id = lookup_scope_id,
  355. .specific_id = specific_id},
  356. /*required=*/false);
  357. non_lexical_result.scope_result.is_found()) {
  358. return non_lexical_result;
  359. }
  360. }
  361. if (lexical_result == SemIR::InstId::InitTombstone) {
  362. CARBON_DIAGNOSTIC(UsedBeforeInitialization, Error,
  363. "`{0}` used before initialization", SemIR::NameId);
  364. emitter_->Emit(node_id, UsedBeforeInitialization, name_id);
  365. return {.specific_id = SemIR::SpecificId::None,
  366. .scope_result = SemIR::ScopeLookupResult::MakeError()};
  367. }
  368. if (lexical_result.has_value()) {
  369. // A lexical scope never needs an associated specific. If there's a
  370. // lexically enclosing generic, then it also encloses the point of use of
  371. // the name.
  372. return {.specific_id = SemIR::SpecificId::None,
  373. .scope_result = SemIR::ScopeLookupResult::MakeFound(
  374. lexical_result, SemIR::AccessKind::Public)};
  375. }
  376. // We didn't find anything at all.
  377. if (required) {
  378. DiagnoseNameNotFound(node_id, name_id);
  379. }
  380. return {.specific_id = SemIR::SpecificId::None,
  381. .scope_result = SemIR::ScopeLookupResult::MakeError()};
  382. }
  383. auto Context::LookupNameInExactScope(SemIR::LocId loc_id, SemIR::NameId name_id,
  384. SemIR::NameScopeId scope_id,
  385. SemIR::NameScope& scope,
  386. bool is_being_declared)
  387. -> SemIR::ScopeLookupResult {
  388. if (auto entry_id = is_being_declared
  389. ? scope.Lookup(name_id)
  390. : scope.LookupOrPoison(loc_id, name_id)) {
  391. auto lookup_result = scope.GetEntry(*entry_id).result;
  392. if (!lookup_result.is_poisoned()) {
  393. LoadImportRef(*this, lookup_result.target_inst_id());
  394. }
  395. return lookup_result;
  396. }
  397. if (!scope.import_ir_scopes().empty()) {
  398. // TODO: Enforce other access modifiers for imports.
  399. return SemIR::ScopeLookupResult::MakeWrappedLookupResult(
  400. ImportNameFromOtherPackage(*this, loc_id, scope_id,
  401. scope.import_ir_scopes(), name_id),
  402. SemIR::AccessKind::Public);
  403. }
  404. return SemIR::ScopeLookupResult::MakeNotFound();
  405. }
  406. // Prints diagnostics on invalid qualified name access.
  407. static auto DiagnoseInvalidQualifiedNameAccess(Context& context, SemIRLoc loc,
  408. SemIR::InstId scope_result_id,
  409. SemIR::NameId name_id,
  410. SemIR::AccessKind access_kind,
  411. bool is_parent_access,
  412. AccessInfo access_info) -> void {
  413. auto class_type = context.insts().TryGetAs<SemIR::ClassType>(
  414. context.constant_values().GetInstId(access_info.constant_id));
  415. if (!class_type) {
  416. return;
  417. }
  418. // TODO: Support scoped entities other than just classes.
  419. const auto& class_info = context.classes().Get(class_type->class_id);
  420. auto parent_type_id = class_info.self_type_id;
  421. if (access_kind == SemIR::AccessKind::Private && is_parent_access) {
  422. if (auto base_type_id =
  423. class_info.GetBaseType(context.sem_ir(), class_type->specific_id);
  424. base_type_id.has_value()) {
  425. parent_type_id = base_type_id;
  426. } else if (auto adapted_type_id = class_info.GetAdaptedType(
  427. context.sem_ir(), class_type->specific_id);
  428. adapted_type_id.has_value()) {
  429. parent_type_id = adapted_type_id;
  430. } else {
  431. CARBON_FATAL("Expected parent for parent access");
  432. }
  433. }
  434. CARBON_DIAGNOSTIC(
  435. ClassInvalidMemberAccess, Error,
  436. "cannot access {0:private|protected} member `{1}` of type {2}",
  437. BoolAsSelect, SemIR::NameId, SemIR::TypeId);
  438. CARBON_DIAGNOSTIC(ClassMemberDeclaration, Note, "declared here");
  439. context.emitter()
  440. .Build(loc, ClassInvalidMemberAccess,
  441. access_kind == SemIR::AccessKind::Private, name_id, parent_type_id)
  442. .Note(scope_result_id, ClassMemberDeclaration)
  443. .Emit();
  444. }
  445. // Returns whether the access is prohibited by the access modifiers.
  446. static auto IsAccessProhibited(std::optional<AccessInfo> access_info,
  447. SemIR::AccessKind access_kind,
  448. bool is_parent_access) -> bool {
  449. if (!access_info) {
  450. return false;
  451. }
  452. switch (access_kind) {
  453. case SemIR::AccessKind::Public:
  454. return false;
  455. case SemIR::AccessKind::Protected:
  456. return access_info->highest_allowed_access == SemIR::AccessKind::Public;
  457. case SemIR::AccessKind::Private:
  458. return access_info->highest_allowed_access !=
  459. SemIR::AccessKind::Private ||
  460. is_parent_access;
  461. }
  462. }
  463. // Information regarding a prohibited access.
  464. struct ProhibitedAccessInfo {
  465. // The resulting inst of the lookup.
  466. SemIR::InstId scope_result_id;
  467. // The access kind of the lookup.
  468. SemIR::AccessKind access_kind;
  469. // If the lookup is from an extended scope. For example, if this is a base
  470. // class member access from a class that extends it.
  471. bool is_parent_access;
  472. };
  473. auto Context::AppendLookupScopesForConstant(
  474. SemIR::LocId loc_id, SemIR::ConstantId base_const_id,
  475. llvm::SmallVector<LookupScope>* scopes) -> bool {
  476. auto base_id = constant_values().GetInstId(base_const_id);
  477. auto base = insts().Get(base_id);
  478. if (auto base_as_namespace = base.TryAs<SemIR::Namespace>()) {
  479. scopes->push_back(
  480. LookupScope{.name_scope_id = base_as_namespace->name_scope_id,
  481. .specific_id = SemIR::SpecificId::None});
  482. return true;
  483. }
  484. if (auto base_as_class = base.TryAs<SemIR::ClassType>()) {
  485. RequireDefinedType(
  486. *this, GetTypeIdForTypeConstant(base_const_id), loc_id, [&] {
  487. CARBON_DIAGNOSTIC(QualifiedExprInIncompleteClassScope, Error,
  488. "member access into incomplete class {0}",
  489. InstIdAsType);
  490. return emitter().Build(loc_id, QualifiedExprInIncompleteClassScope,
  491. base_id);
  492. });
  493. auto& class_info = classes().Get(base_as_class->class_id);
  494. scopes->push_back(LookupScope{.name_scope_id = class_info.scope_id,
  495. .specific_id = base_as_class->specific_id});
  496. return true;
  497. }
  498. if (auto base_as_facet_type = base.TryAs<SemIR::FacetType>()) {
  499. RequireDefinedType(
  500. *this, GetTypeIdForTypeConstant(base_const_id), loc_id, [&] {
  501. CARBON_DIAGNOSTIC(QualifiedExprInUndefinedInterfaceScope, Error,
  502. "member access into undefined interface {0}",
  503. InstIdAsType);
  504. return emitter().Build(loc_id, QualifiedExprInUndefinedInterfaceScope,
  505. base_id);
  506. });
  507. const auto& facet_type_info =
  508. facet_types().Get(base_as_facet_type->facet_type_id);
  509. for (auto interface : facet_type_info.impls_constraints) {
  510. auto& interface_info = interfaces().Get(interface.interface_id);
  511. scopes->push_back(LookupScope{.name_scope_id = interface_info.scope_id,
  512. .specific_id = interface.specific_id});
  513. }
  514. return true;
  515. }
  516. if (base_const_id == SemIR::ErrorInst::SingletonConstantId) {
  517. // Lookup into this scope should fail without producing an error.
  518. scopes->push_back(LookupScope{.name_scope_id = SemIR::NameScopeId::None,
  519. .specific_id = SemIR::SpecificId::None});
  520. return true;
  521. }
  522. // TODO: Per the design, if `base_id` is any kind of type, then lookup should
  523. // treat it as a name scope, even if it doesn't have members. For example,
  524. // `(i32*).X` should fail because there's no name `X` in `i32*`, not because
  525. // there's no name `X` in `type`.
  526. return false;
  527. }
  528. auto Context::LookupQualifiedName(SemIR::LocId loc_id, SemIR::NameId name_id,
  529. llvm::ArrayRef<LookupScope> lookup_scopes,
  530. bool required,
  531. std::optional<AccessInfo> access_info)
  532. -> LookupResult {
  533. llvm::SmallVector<LookupScope> scopes(lookup_scopes);
  534. // TODO: Support reporting of multiple prohibited access.
  535. llvm::SmallVector<ProhibitedAccessInfo> prohibited_accesses;
  536. LookupResult result = {
  537. .specific_id = SemIR::SpecificId::None,
  538. .scope_result = SemIR::ScopeLookupResult::MakeNotFound()};
  539. bool has_error = false;
  540. bool is_parent_access = false;
  541. // Walk this scope and, if nothing is found here, the scopes it extends.
  542. while (!scopes.empty()) {
  543. auto [scope_id, specific_id] = scopes.pop_back_val();
  544. if (!scope_id.has_value()) {
  545. has_error = true;
  546. continue;
  547. }
  548. auto& name_scope = name_scopes().Get(scope_id);
  549. has_error |= name_scope.has_error();
  550. const SemIR::ScopeLookupResult scope_result =
  551. LookupNameInExactScope(loc_id, name_id, scope_id, name_scope);
  552. SemIR::AccessKind access_kind = scope_result.access_kind();
  553. auto is_access_prohibited =
  554. IsAccessProhibited(access_info, access_kind, is_parent_access);
  555. // Keep track of prohibited accesses, this will be useful for reporting
  556. // multiple prohibited accesses if we can't find a suitable lookup.
  557. if (is_access_prohibited) {
  558. prohibited_accesses.push_back({
  559. .scope_result_id = scope_result.target_inst_id(),
  560. .access_kind = access_kind,
  561. .is_parent_access = is_parent_access,
  562. });
  563. }
  564. if (!scope_result.is_found() || is_access_prohibited) {
  565. // If nothing is found in this scope or if we encountered an invalid
  566. // access, look in its extended scopes.
  567. const auto& extended = name_scope.extended_scopes();
  568. scopes.reserve(scopes.size() + extended.size());
  569. for (auto extended_id : llvm::reverse(extended)) {
  570. // Substitute into the constant describing the extended scope to
  571. // determine its corresponding specific.
  572. CARBON_CHECK(extended_id.has_value());
  573. LoadImportRef(*this, extended_id);
  574. SemIR::ConstantId const_id =
  575. GetConstantValueInSpecific(sem_ir(), specific_id, extended_id);
  576. DiagnosticAnnotationScope annotate_diagnostics(
  577. &emitter(), [&](auto& builder) {
  578. CARBON_DIAGNOSTIC(FromExtendHere, Note,
  579. "declared as an extended scope here");
  580. builder.Note(extended_id, FromExtendHere);
  581. });
  582. if (!AppendLookupScopesForConstant(loc_id, const_id, &scopes)) {
  583. // TODO: Handle case where we have a symbolic type and instead should
  584. // look in its type.
  585. }
  586. }
  587. is_parent_access |= !extended.empty();
  588. continue;
  589. }
  590. // If this is our second lookup result, diagnose an ambiguity.
  591. if (result.scope_result.is_found()) {
  592. CARBON_DIAGNOSTIC(
  593. NameAmbiguousDueToExtend, Error,
  594. "ambiguous use of name `{0}` found in multiple extended scopes",
  595. SemIR::NameId);
  596. emitter_->Emit(loc_id, NameAmbiguousDueToExtend, name_id);
  597. // TODO: Add notes pointing to the scopes.
  598. return {.specific_id = SemIR::SpecificId::None,
  599. .scope_result = SemIR::ScopeLookupResult::MakeError()};
  600. }
  601. result.scope_result = scope_result;
  602. result.specific_id = specific_id;
  603. }
  604. if (required && !result.scope_result.is_found()) {
  605. if (!has_error) {
  606. if (prohibited_accesses.empty()) {
  607. DiagnoseMemberNameNotFound(loc_id, name_id, lookup_scopes);
  608. } else {
  609. // TODO: We should report multiple prohibited accesses in case we don't
  610. // find a valid lookup. Reporting the last one should suffice for now.
  611. auto [scope_result_id, access_kind, is_parent_access] =
  612. prohibited_accesses.back();
  613. // Note, `access_info` is guaranteed to have a value here, since
  614. // `prohibited_accesses` is non-empty.
  615. DiagnoseInvalidQualifiedNameAccess(*this, loc_id, scope_result_id,
  616. name_id, access_kind,
  617. is_parent_access, *access_info);
  618. }
  619. }
  620. CARBON_CHECK(!result.scope_result.is_poisoned());
  621. return {.specific_id = SemIR::SpecificId::None,
  622. .scope_result = SemIR::ScopeLookupResult::MakeError()};
  623. }
  624. return result;
  625. }
  626. // Returns the scope of the Core package, or `None` if it's not found.
  627. //
  628. // TODO: Consider tracking the Core package in SemIR so we don't need to use
  629. // name lookup to find it.
  630. static auto GetCorePackage(Context& context, SemIR::LocId loc_id,
  631. llvm::StringRef name) -> SemIR::NameScopeId {
  632. auto packaging = context.parse_tree().packaging_decl();
  633. if (packaging && packaging->names.package_id == PackageNameId::Core) {
  634. return SemIR::NameScopeId::Package;
  635. }
  636. auto core_name_id = SemIR::NameId::Core;
  637. // Look up `package.Core`.
  638. auto core_scope_result = context.LookupNameInExactScope(
  639. loc_id, core_name_id, SemIR::NameScopeId::Package,
  640. context.name_scopes().Get(SemIR::NameScopeId::Package));
  641. if (core_scope_result.is_found()) {
  642. // We expect it to be a namespace.
  643. if (auto namespace_inst = context.insts().TryGetAs<SemIR::Namespace>(
  644. core_scope_result.target_inst_id())) {
  645. // TODO: Decide whether to allow the case where `Core` is not a package.
  646. return namespace_inst->name_scope_id;
  647. }
  648. }
  649. CARBON_DIAGNOSTIC(
  650. CoreNotFound, Error,
  651. "`Core.{0}` implicitly referenced here, but package `Core` not found",
  652. std::string);
  653. context.emitter().Emit(loc_id, CoreNotFound, name.str());
  654. return SemIR::NameScopeId::None;
  655. }
  656. auto Context::LookupNameInCore(SemIR::LocId loc_id, llvm::StringRef name)
  657. -> SemIR::InstId {
  658. auto core_package_id = GetCorePackage(*this, loc_id, name);
  659. if (!core_package_id.has_value()) {
  660. return SemIR::ErrorInst::SingletonInstId;
  661. }
  662. auto name_id = SemIR::NameId::ForIdentifier(identifiers().Add(name));
  663. auto scope_result = LookupNameInExactScope(
  664. loc_id, name_id, core_package_id, name_scopes().Get(core_package_id));
  665. if (!scope_result.is_found()) {
  666. CARBON_DIAGNOSTIC(
  667. CoreNameNotFound, Error,
  668. "name `Core.{0}` implicitly referenced here, but not found",
  669. SemIR::NameId);
  670. emitter_->Emit(loc_id, CoreNameNotFound, name_id);
  671. return SemIR::ErrorInst::SingletonInstId;
  672. }
  673. // Look through import_refs and aliases.
  674. return constant_values().GetConstantInstId(scope_result.target_inst_id());
  675. }
  676. template <typename BranchNode, typename... Args>
  677. static auto AddDominatedBlockAndBranchImpl(Context& context,
  678. Parse::NodeId node_id, Args... args)
  679. -> SemIR::InstBlockId {
  680. if (!context.inst_block_stack().is_current_block_reachable()) {
  681. return SemIR::InstBlockId::Unreachable;
  682. }
  683. auto block_id = context.inst_blocks().AddDefaultValue();
  684. context.AddInst<BranchNode>(node_id, {block_id, args...});
  685. return block_id;
  686. }
  687. auto Context::AddDominatedBlockAndBranch(Parse::NodeId node_id)
  688. -> SemIR::InstBlockId {
  689. return AddDominatedBlockAndBranchImpl<SemIR::Branch>(*this, node_id);
  690. }
  691. auto Context::AddDominatedBlockAndBranchWithArg(Parse::NodeId node_id,
  692. SemIR::InstId arg_id)
  693. -> SemIR::InstBlockId {
  694. return AddDominatedBlockAndBranchImpl<SemIR::BranchWithArg>(*this, node_id,
  695. arg_id);
  696. }
  697. auto Context::AddDominatedBlockAndBranchIf(Parse::NodeId node_id,
  698. SemIR::InstId cond_id)
  699. -> SemIR::InstBlockId {
  700. return AddDominatedBlockAndBranchImpl<SemIR::BranchIf>(*this, node_id,
  701. cond_id);
  702. }
  703. auto Context::AddConvergenceBlockAndPush(Parse::NodeId node_id, int num_blocks)
  704. -> void {
  705. CARBON_CHECK(num_blocks >= 2, "no convergence");
  706. SemIR::InstBlockId new_block_id = SemIR::InstBlockId::Unreachable;
  707. for ([[maybe_unused]] auto _ : llvm::seq(num_blocks)) {
  708. if (inst_block_stack().is_current_block_reachable()) {
  709. if (new_block_id == SemIR::InstBlockId::Unreachable) {
  710. new_block_id = inst_blocks().AddDefaultValue();
  711. }
  712. CARBON_CHECK(node_id.has_value());
  713. AddInst<SemIR::Branch>(node_id, {.target_id = new_block_id});
  714. }
  715. inst_block_stack().Pop();
  716. }
  717. inst_block_stack().Push(new_block_id);
  718. AddToRegion(new_block_id, node_id);
  719. }
  720. auto Context::AddConvergenceBlockWithArgAndPush(
  721. Parse::NodeId node_id, std::initializer_list<SemIR::InstId> block_args)
  722. -> SemIR::InstId {
  723. CARBON_CHECK(block_args.size() >= 2, "no convergence");
  724. SemIR::InstBlockId new_block_id = SemIR::InstBlockId::Unreachable;
  725. for (auto arg_id : block_args) {
  726. if (inst_block_stack().is_current_block_reachable()) {
  727. if (new_block_id == SemIR::InstBlockId::Unreachable) {
  728. new_block_id = inst_blocks().AddDefaultValue();
  729. }
  730. AddInst<SemIR::BranchWithArg>(
  731. node_id, {.target_id = new_block_id, .arg_id = arg_id});
  732. }
  733. inst_block_stack().Pop();
  734. }
  735. inst_block_stack().Push(new_block_id);
  736. AddToRegion(new_block_id, node_id);
  737. // Acquire the result value.
  738. SemIR::TypeId result_type_id = insts().Get(*block_args.begin()).type_id();
  739. return AddInst<SemIR::BlockArg>(
  740. node_id, {.type_id = result_type_id, .block_id = new_block_id});
  741. }
  742. auto Context::SetBlockArgResultBeforeConstantUse(SemIR::InstId select_id,
  743. SemIR::InstId cond_id,
  744. SemIR::InstId if_true,
  745. SemIR::InstId if_false)
  746. -> void {
  747. CARBON_CHECK(insts().Is<SemIR::BlockArg>(select_id));
  748. // Determine the constant result based on the condition value.
  749. SemIR::ConstantId const_id = SemIR::ConstantId::NotConstant;
  750. auto cond_const_id = constant_values().Get(cond_id);
  751. if (!cond_const_id.is_template()) {
  752. // Symbolic or non-constant condition means a non-constant result.
  753. } else if (auto literal = insts().TryGetAs<SemIR::BoolLiteral>(
  754. constant_values().GetInstId(cond_const_id))) {
  755. const_id = constant_values().Get(literal.value().value.ToBool() ? if_true
  756. : if_false);
  757. } else {
  758. CARBON_CHECK(cond_const_id == SemIR::ErrorInst::SingletonConstantId,
  759. "Unexpected constant branch condition.");
  760. const_id = SemIR::ErrorInst::SingletonConstantId;
  761. }
  762. if (const_id.is_constant()) {
  763. CARBON_VLOG("Constant: {0} -> {1}\n", insts().Get(select_id),
  764. constant_values().GetInstId(const_id));
  765. constant_values().Set(select_id, const_id);
  766. }
  767. }
  768. auto Context::AddToRegion(SemIR::InstBlockId block_id, SemIR::LocId loc_id)
  769. -> void {
  770. if (region_stack_.empty()) {
  771. TODO(loc_id,
  772. "Control flow expressions are currently only supported inside "
  773. "functions.");
  774. return;
  775. }
  776. if (block_id == SemIR::InstBlockId::Unreachable) {
  777. return;
  778. }
  779. region_stack_.AppendToTop(block_id);
  780. }
  781. auto Context::BeginSubpattern() -> void {
  782. inst_block_stack().Push();
  783. PushRegion(inst_block_stack().PeekOrAdd());
  784. }
  785. auto Context::EndSubpatternAsExpr(SemIR::InstId result_id)
  786. -> SemIR::ExprRegionId {
  787. if (region_stack_.PeekArray().size() > 1) {
  788. // End the exit block with a branch to a successor block, whose contents
  789. // will be determined later.
  790. AddInst(SemIR::LocIdAndInst::NoLoc<SemIR::Branch>(
  791. {.target_id = inst_blocks().AddDefaultValue()}));
  792. } else {
  793. // This single-block region will be inserted as a SpliceBlock, so we don't
  794. // need control flow out of it.
  795. }
  796. auto block_id = inst_block_stack().Pop();
  797. CARBON_CHECK(block_id == region_stack_.PeekArray().back());
  798. // TODO: Is it possible to validate that this region is genuinely
  799. // single-entry, single-exit?
  800. return sem_ir().expr_regions().Add(
  801. {.block_ids = PopRegion(), .result_id = result_id});
  802. }
  803. auto Context::EndSubpatternAsEmpty() -> void {
  804. auto block_id = inst_block_stack().Pop();
  805. CARBON_CHECK(block_id == region_stack_.PeekArray().back());
  806. CARBON_CHECK(region_stack_.PeekArray().size() == 1);
  807. CARBON_CHECK(inst_blocks().Get(block_id).empty());
  808. region_stack_.PopArray();
  809. }
  810. auto Context::InsertHere(SemIR::ExprRegionId region_id) -> SemIR::InstId {
  811. auto region = sem_ir_->expr_regions().Get(region_id);
  812. auto loc_id = insts().GetLocId(region.result_id);
  813. auto exit_block = inst_blocks().Get(region.block_ids.back());
  814. if (region.block_ids.size() == 1) {
  815. // TODO: Is it possible to avoid leaving an "orphan" block in the IR in the
  816. // first two cases?
  817. if (exit_block.empty()) {
  818. return region.result_id;
  819. }
  820. if (exit_block.size() == 1) {
  821. inst_block_stack_.AddInstId(exit_block.front());
  822. return region.result_id;
  823. }
  824. return AddInst<SemIR::SpliceBlock>(
  825. loc_id, {.type_id = insts().Get(region.result_id).type_id(),
  826. .block_id = region.block_ids.front(),
  827. .result_id = region.result_id});
  828. }
  829. if (region_stack_.empty()) {
  830. TODO(loc_id,
  831. "Control flow expressions are currently only supported inside "
  832. "functions.");
  833. return SemIR::ErrorInst::SingletonInstId;
  834. }
  835. AddInst(SemIR::LocIdAndInst::NoLoc<SemIR::Branch>(
  836. {.target_id = region.block_ids.front()}));
  837. inst_block_stack_.Pop();
  838. // TODO: this will cumulatively cost O(MN) running time for M blocks
  839. // at the Nth level of the stack. Figure out how to do better.
  840. region_stack_.AppendToTop(region.block_ids);
  841. auto resume_with_block_id =
  842. insts().GetAs<SemIR::Branch>(exit_block.back()).target_id;
  843. CARBON_CHECK(inst_blocks().GetOrEmpty(resume_with_block_id).empty());
  844. inst_block_stack_.Push(resume_with_block_id);
  845. AddToRegion(resume_with_block_id, loc_id);
  846. return region.result_id;
  847. }
  848. auto Context::is_current_position_reachable() -> bool {
  849. if (!inst_block_stack().is_current_block_reachable()) {
  850. return false;
  851. }
  852. // Our current position is at the end of a reachable block. That position is
  853. // reachable unless the previous instruction is a terminator instruction.
  854. auto block_contents = inst_block_stack().PeekCurrentBlockContents();
  855. if (block_contents.empty()) {
  856. return true;
  857. }
  858. const auto& last_inst = insts().Get(block_contents.back());
  859. return last_inst.kind().terminator_kind() !=
  860. SemIR::TerminatorKind::Terminator;
  861. }
  862. auto Context::Finalize() -> void {
  863. // Pop information for the file-level scope.
  864. sem_ir().set_top_inst_block_id(inst_block_stack().Pop());
  865. scope_stack().Pop();
  866. // Finalizes the list of exports on the IR.
  867. inst_blocks().Set(SemIR::InstBlockId::Exports, exports_);
  868. // Finalizes the ImportRef inst block.
  869. inst_blocks().Set(SemIR::InstBlockId::ImportRefs, import_ref_ids_);
  870. // Finalizes __global_init.
  871. global_init_.Finalize();
  872. }
  873. auto Context::GetTypeIdForTypeConstant(SemIR::ConstantId constant_id)
  874. -> SemIR::TypeId {
  875. CARBON_CHECK(constant_id.is_constant(),
  876. "Canonicalizing non-constant type: {0}", constant_id);
  877. auto type_id =
  878. insts().Get(constant_values().GetInstId(constant_id)).type_id();
  879. // TODO: For now, we allow values of facet type to be used as types.
  880. CARBON_CHECK(IsFacetType(type_id) ||
  881. constant_id == SemIR::ErrorInst::SingletonConstantId,
  882. "Forming type ID for non-type constant of type {0}",
  883. types().GetAsInst(type_id));
  884. return SemIR::TypeId::ForTypeConstant(constant_id);
  885. }
  886. auto Context::FacetTypeFromInterface(SemIR::InterfaceId interface_id,
  887. SemIR::SpecificId specific_id)
  888. -> SemIR::FacetType {
  889. SemIR::FacetTypeId facet_type_id = facet_types().Add(
  890. SemIR::FacetTypeInfo{.impls_constraints = {{interface_id, specific_id}},
  891. .other_requirements = false});
  892. return {.type_id = SemIR::TypeType::SingletonTypeId,
  893. .facet_type_id = facet_type_id};
  894. }
  895. // Gets or forms a type_id for a type, given the instruction kind and arguments.
  896. template <typename InstT, typename... EachArgT>
  897. static auto GetTypeImpl(Context& context, EachArgT... each_arg)
  898. -> SemIR::TypeId {
  899. // TODO: Remove inst_id parameter from TryEvalInst.
  900. InstT inst = {SemIR::TypeType::SingletonTypeId, each_arg...};
  901. return context.GetTypeIdForTypeConstant(
  902. TryEvalInst(context, SemIR::InstId::None, inst));
  903. }
  904. // Gets or forms a type_id for a type, given the instruction kind and arguments,
  905. // and completes the type. This should only be used when type completion cannot
  906. // fail.
  907. template <typename InstT, typename... EachArgT>
  908. static auto GetCompleteTypeImpl(Context& context, EachArgT... each_arg)
  909. -> SemIR::TypeId {
  910. auto type_id = GetTypeImpl<InstT>(context, each_arg...);
  911. CompleteTypeOrCheckFail(context, type_id);
  912. return type_id;
  913. }
  914. auto Context::GetStructType(SemIR::StructTypeFieldsId fields_id)
  915. -> SemIR::TypeId {
  916. return GetTypeImpl<SemIR::StructType>(*this, fields_id);
  917. }
  918. auto Context::GetTupleType(llvm::ArrayRef<SemIR::TypeId> type_ids)
  919. -> SemIR::TypeId {
  920. return GetTypeImpl<SemIR::TupleType>(*this,
  921. type_blocks().AddCanonical(type_ids));
  922. }
  923. auto Context::GetAssociatedEntityType(SemIR::TypeId interface_type_id)
  924. -> SemIR::TypeId {
  925. return GetTypeImpl<SemIR::AssociatedEntityType>(*this, interface_type_id);
  926. }
  927. auto Context::GetSingletonType(SemIR::InstId singleton_id) -> SemIR::TypeId {
  928. CARBON_CHECK(SemIR::IsSingletonInstId(singleton_id));
  929. auto type_id = GetTypeIdForTypeInst(singleton_id);
  930. // To keep client code simpler, complete builtin types before returning them.
  931. CompleteTypeOrCheckFail(*this, type_id);
  932. return type_id;
  933. }
  934. auto Context::GetClassType(SemIR::ClassId class_id,
  935. SemIR::SpecificId specific_id) -> SemIR::TypeId {
  936. return GetTypeImpl<SemIR::ClassType>(*this, class_id, specific_id);
  937. }
  938. auto Context::GetFunctionType(SemIR::FunctionId fn_id,
  939. SemIR::SpecificId specific_id) -> SemIR::TypeId {
  940. return GetCompleteTypeImpl<SemIR::FunctionType>(*this, fn_id, specific_id);
  941. }
  942. auto Context::GetFunctionTypeWithSelfType(
  943. SemIR::InstId interface_function_type_id, SemIR::InstId self_id)
  944. -> SemIR::TypeId {
  945. return GetCompleteTypeImpl<SemIR::FunctionTypeWithSelfType>(
  946. *this, interface_function_type_id, self_id);
  947. }
  948. auto Context::GetGenericClassType(SemIR::ClassId class_id,
  949. SemIR::SpecificId enclosing_specific_id)
  950. -> SemIR::TypeId {
  951. return GetCompleteTypeImpl<SemIR::GenericClassType>(*this, class_id,
  952. enclosing_specific_id);
  953. }
  954. auto Context::GetGenericInterfaceType(SemIR::InterfaceId interface_id,
  955. SemIR::SpecificId enclosing_specific_id)
  956. -> SemIR::TypeId {
  957. return GetCompleteTypeImpl<SemIR::GenericInterfaceType>(
  958. *this, interface_id, enclosing_specific_id);
  959. }
  960. auto Context::GetInterfaceType(SemIR::InterfaceId interface_id,
  961. SemIR::SpecificId specific_id) -> SemIR::TypeId {
  962. return GetTypeImpl<SemIR::FacetType>(
  963. *this, FacetTypeFromInterface(interface_id, specific_id).facet_type_id);
  964. }
  965. auto Context::GetPointerType(SemIR::TypeId pointee_type_id) -> SemIR::TypeId {
  966. return GetTypeImpl<SemIR::PointerType>(*this, pointee_type_id);
  967. }
  968. auto Context::GetUnboundElementType(SemIR::TypeId class_type_id,
  969. SemIR::TypeId element_type_id)
  970. -> SemIR::TypeId {
  971. return GetTypeImpl<SemIR::UnboundElementType>(*this, class_type_id,
  972. element_type_id);
  973. }
  974. auto Context::PrintForStackDump(llvm::raw_ostream& output) const -> void {
  975. output << "Check::Context\n";
  976. // In a stack dump, this is probably indented by a tab. We treat that as 8
  977. // spaces then add a couple to indent past the Context label.
  978. constexpr int Indent = 10;
  979. node_stack_.PrintForStackDump(Indent, output);
  980. inst_block_stack_.PrintForStackDump(Indent, output);
  981. pattern_block_stack_.PrintForStackDump(Indent, output);
  982. param_and_arg_refs_stack_.PrintForStackDump(Indent, output);
  983. args_type_info_stack_.PrintForStackDump(Indent, output);
  984. }
  985. auto Context::DumpFormattedFile() const -> void {
  986. SemIR::Formatter formatter(sem_ir_);
  987. formatter.Print(llvm::errs());
  988. }
  989. } // namespace Carbon::Check