lint.rs 38.3 KB
Newer Older
1 2 3 4 5 6 7 8 9 10
// Copyright 2012 The Rust Project Developers. See the COPYRIGHT
// file at the top-level directory of this distribution and at
// http://rust-lang.org/COPYRIGHT.
//
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
// option. This file may not be copied, modified, or distributed
// except according to those terms.

11 12
use core::prelude::*;

13
use driver::session;
P
Patrick Walton 已提交
14
use middle::ty;
15
use middle::pat_util;
P
Patrick Walton 已提交
16
use util::ppaux::{ty_to_str};
17

18 19
use core::char;
use core::cmp;
20
use core::hashmap::HashMap;
21 22 23 24 25 26 27 28 29
use core::i16;
use core::i32;
use core::i64;
use core::i8;
use core::u16;
use core::u32;
use core::u64;
use core::u8;
use core::vec;
30
use extra::smallintmap::SmallIntMap;
31 32
use syntax::attr;
use syntax::codemap::span;
J
John Clements 已提交
33
use syntax::codemap;
34
use syntax::{ast, visit, ast_util};
35

36 37 38 39 40 41 42
/**
 * A 'lint' check is a kind of miscellaneous constraint that a user _might_
 * want to enforce, but might reasonably want to permit as well, on a
 * module-by-module basis. They contrast with static constraints enforced by
 * other phases of the compiler, which are generally required to hold in order
 * to compile the program at all.
 *
43 44 45 46 47
 * The lint checking is all consolidated into one pass which runs just before
 * translation to LLVM bytecode. Throughout compilation, lint warnings can be
 * added via the `add_lint` method on the Session structure. This requires a
 * span and an id of the node that the lint is being added to. The lint isn't
 * actually emitted at that time because it is unknown what the actual lint
48
 * level at that location is.
49
 *
50 51 52 53 54 55
 * To actually emit lint warnings/errors, a separate pass is used just before
 * translation. A context keeps track of the current state of all lint levels.
 * Upon entering a node of the ast which can modify the lint settings, the
 * previous lint state is pushed onto a stack and the ast is then recursed upon.
 * As the ast is traversed, this keeps track of the current lint level for all
 * lint attributes.
56
 *
57 58 59 60 61 62 63 64 65 66 67 68 69 70
 * At each node of the ast which can modify lint attributes, all known lint
 * passes are also applied.  Each lint pass is a visit::vt<()> structure. These
 * visitors are constructed via the lint_*() functions below. There are also
 * some lint checks which operate directly on ast nodes (such as @ast::item),
 * and those are organized as check_item_*(). Each visitor added to the lint
 * context is modified to stop once it reaches a node which could alter the lint
 * levels. This means that everything is looked at once and only once by every
 * lint pass.
 *
 * With this all in place, to add a new lint warning, all you need to do is to
 * either invoke `add_lint` on the session at the appropriate time, or write a
 * lint pass in this module which is just an ast visitor. The context used when
 * traversing the ast has a `span_lint` method which only needs the span of the
 * item that's being warned about.
71
 */
72

73
#[deriving(Eq)]
74
pub enum lint {
P
Patrick Walton 已提交
75
    ctypes,
76
    unused_imports,
77 78
    while_true,
    path_statement,
79
    implicit_copies,
80
    unrecognized_lint,
81
    non_implicitly_copyable_typarams,
82
    deprecated_pattern,
83
    non_camel_case_types,
84
    type_limits,
85
    default_methods,
86
    unused_unsafe,
87

88 89 90 91
    managed_heap_memory,
    owned_heap_memory,
    heap_memory,

92 93
    unused_variable,
    dead_assignment,
94
    unused_mut,
95
    unnecessary_allocation,
96

97
    missing_doc,
98
    unreachable_code,
99 100

    warnings,
101 102
}

103
pub fn level_to_str(lv: level) -> &'static str {
104
    match lv {
105 106 107 108
      allow => "allow",
      warn => "warn",
      deny => "deny",
      forbid => "forbid"
109 110 111
    }
}

112
#[deriving(Eq)]
113
pub enum level {
114
    allow, warn, deny, forbid
115 116
}

117 118
struct LintSpec {
    lint: lint,
119
    desc: &'static str,
120
    default: level
121
}
122

123
pub type LintDict = HashMap<&'static str, LintSpec>;
124 125 126 127 128 129

enum AttributedNode<'self> {
    Item(@ast::item),
    Method(&'self ast::method),
    Crate(@ast::crate),
}
130

131 132 133 134 135 136 137
#[deriving(Eq)]
enum LintSource {
    Node(span),
    Default,
    CommandLine
}

S
Sangeun Kim 已提交
138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263
static lint_table: &'static [(&'static str, LintSpec)] = &[
    ("ctypes",
     LintSpec {
        lint: ctypes,
        desc: "proper use of core::libc types in foreign modules",
        default: warn
     }),

    ("unused_imports",
     LintSpec {
        lint: unused_imports,
        desc: "imports that are never used",
        default: warn
     }),

    ("while_true",
     LintSpec {
        lint: while_true,
        desc: "suggest using loop { } instead of while(true) { }",
        default: warn
     }),

    ("path_statement",
     LintSpec {
        lint: path_statement,
        desc: "path statements with no effect",
        default: warn
     }),

    ("unrecognized_lint",
     LintSpec {
        lint: unrecognized_lint,
        desc: "unrecognized lint attribute",
        default: warn
     }),

    ("non_implicitly_copyable_typarams",
     LintSpec {
        lint: non_implicitly_copyable_typarams,
        desc: "passing non implicitly copyable types as copy type params",
        default: warn
     }),

    ("implicit_copies",
     LintSpec {
        lint: implicit_copies,
        desc: "implicit copies of non implicitly copyable data",
        default: warn
     }),

    ("deprecated_pattern",
     LintSpec {
        lint: deprecated_pattern,
        desc: "warn about deprecated uses of pattern bindings",
        default: allow
     }),

    ("non_camel_case_types",
     LintSpec {
        lint: non_camel_case_types,
        desc: "types, variants and traits should have camel case names",
        default: allow
     }),

    ("managed_heap_memory",
     LintSpec {
        lint: managed_heap_memory,
        desc: "use of managed (@ type) heap memory",
        default: allow
     }),

    ("owned_heap_memory",
     LintSpec {
        lint: owned_heap_memory,
        desc: "use of owned (~ type) heap memory",
        default: allow
     }),

    ("heap_memory",
     LintSpec {
        lint: heap_memory,
        desc: "use of any (~ type or @ type) heap memory",
        default: allow
     }),

    ("type_limits",
     LintSpec {
        lint: type_limits,
        desc: "comparisons made useless by limits of the types involved",
        default: warn
     }),

    ("default_methods",
     LintSpec {
        lint: default_methods,
        desc: "allow default methods",
        default: deny
     }),

    ("unused_unsafe",
     LintSpec {
        lint: unused_unsafe,
        desc: "unnecessary use of an `unsafe` block",
        default: warn
    }),

    ("unused_variable",
     LintSpec {
        lint: unused_variable,
        desc: "detect variables which are not used in any way",
        default: warn
    }),

    ("dead_assignment",
     LintSpec {
        lint: dead_assignment,
        desc: "detect assignments that will never be read",
        default: warn
    }),

    ("unused_mut",
     LintSpec {
        lint: unused_mut,
        desc: "detect mut variables which don't need to be mutable",
        default: warn
    }),
264 265 266 267 268 269 270

    ("unnecessary_allocation",
     LintSpec {
        lint: unnecessary_allocation,
        desc: "detects unnecessary allocations that can be eliminated",
        default: warn
    }),
271

272
    ("missing_doc",
273
     LintSpec {
274 275
        lint: missing_doc,
        desc: "detects missing documentation for public members",
276 277
        default: allow
    }),
278 279 280 281 282 283 284

    ("unreachable_code",
     LintSpec {
        lint: unreachable_code,
        desc: "detects unreachable code",
        default: warn
    }),
285 286 287 288 289 290 291

    ("warnings",
     LintSpec {
        lint: warnings,
        desc: "mass-change the level for lints which produce warnings",
        default: warn
    }),
S
Sangeun Kim 已提交
292 293
];

294 295 296 297
/*
  Pass names should not contain a '-', as the compiler normalizes
  '-' to '_' in command-line flags
 */
298
pub fn get_lint_dict() -> LintDict {
299
    let mut map = HashMap::new();
300
    for lint_table.iter().advance |&(k, v)| {
301
        map.insert(k, v);
302
    }
303
    return map;
304 305
}

306
struct Context {
307 308 309
    // All known lint modes (string versions)
    dict: @LintDict,
    // Current levels of each lint warning
310
    curr: SmallIntMap<(level, LintSource)>,
311 312
    // context we're checking in (used to access fields like sess)
    tcx: ty::ctxt,
313 314 315
    // Just a simple flag if we're currently recursing into a trait
    // implementation. This is only used by the lint_missing_doc() pass
    in_trait_impl: bool,
316 317 318 319
    // Another flag for doc lint emissions. Does some parent of the current node
    // have the doc(hidden) attribute? Treating this as allow(missing_doc) would
    // play badly with forbid(missing_doc) when it shouldn't.
    doc_hidden: bool,
320 321 322
    // When recursing into an attributed node of the ast which modifies lint
    // levels, this stack keeps track of the previous lint levels of whatever
    // was modified.
323
    lint_stack: ~[(lint, level, LintSource)],
324 325 326 327 328
    // Each of these visitors represents a lint pass. A number of the lint
    // attributes are registered by adding a visitor to iterate over the ast.
    // Others operate directly on @ast::item structures (or similar). Finally,
    // others still are added to the Session object via `add_lint`, and these
    // are all passed with the lint_session visitor.
329 330 331 332 333 334 335 336 337
    //
    // This is a pair so every visitor can visit every node. When a lint pass is
    // registered, another visitor is created which stops at all items which can
    // alter the attributes of the ast. This "item stopping visitor" is the
    // second element of the pair, while the original visitor is the first
    // element. This means that when visiting a node, the original recursive
    // call can used the original visitor's method, although the recursing
    // visitor supplied to the method is the item stopping visitor.
    visitors: ~[(visit::vt<@mut Context>, visit::vt<@mut Context>)],
338
}
339

340
impl Context {
341
    fn get_level(&self, lint: lint) -> level {
342
        match self.curr.find(&(lint as uint)) {
343
          Some(&(lvl, _)) => lvl,
344 345
          None => allow
        }
346 347
    }

348 349 350 351 352 353 354 355
    fn get_source(&self, lint: lint) -> LintSource {
        match self.curr.find(&(lint as uint)) {
          Some(&(_, src)) => src,
          None => Default
        }
    }

    fn set_level(&mut self, lint: lint, level: level, src: LintSource) {
356
        if level == allow {
D
Daniel Micay 已提交
357
            self.curr.remove(&(lint as uint));
358
        } else {
359 360 361 362
            self.curr.insert(lint as uint, (level, src));
        }
    }

363
    fn lint_to_str(&self, lint: lint) -> &'static str {
364 365
        for self.dict.each |k, v| {
            if v.lint == lint {
366
                return *k;
367
            }
368
        }
369
        fail!("unregistered lint %?", lint);
370 371
    }

372
    fn span_lint(&self, lint: lint, span: span, msg: &str) {
373
        let (level, src) = match self.curr.find(&(lint as uint)) {
374 375
            None => { return }
            Some(&(warn, src)) => (self.get_level(warnings), src),
376 377
            Some(&pair) => pair,
        };
378
        if level == allow { return }
379 380 381 382 383 384 385

        let mut note = None;
        let msg = match src {
            Default | CommandLine => {
                fmt!("%s [-%c %s%s]", msg, match level {
                        warn => 'W', deny => 'D', forbid => 'F',
                        allow => fail!()
386
                    }, self.lint_to_str(lint).replace("_", "-"),
387 388 389 390 391 392 393 394 395 396 397 398 399
                    if src == Default { " (default)" } else { "" })
            },
            Node(src) => {
                note = Some(src);
                msg.to_str()
            }
        };
        match level {
            warn =>          { self.tcx.sess.span_warn(span, msg); }
            deny | forbid => { self.tcx.sess.span_err(span, msg);  }
            allow => fail!(),
        }

400
        for note.iter().advance |&span| {
401 402
            self.tcx.sess.span_note(span, "lint level defined here");
        }
403 404
    }

405
    /**
406
     * Merge the lints specified by any lint attributes into the
407
     * current lint context, call the provided function, then reset the
408
     * lints in effect to their previous state.
409
     */
410 411 412 413 414 415
    fn with_lint_attrs(@mut self, attrs: &[ast::attribute], f: &fn()) {
        // Parse all of the lint attributes, and then add them all to the
        // current dictionary of lint information. Along the way, keep a history
        // of what we changed so we can roll everything back after invoking the
        // specified closure
        let mut pushed = 0u;
416
        for each_lint(self.tcx.sess, attrs) |meta, level, lintname| {
417
            let lint = match self.dict.find_equiv(&lintname) {
B
Brian Anderson 已提交
418
              None => {
419
                self.span_lint(
420
                    unrecognized_lint,
421
                    meta.span,
P
Paul Stansifer 已提交
422
                    fmt!("unknown `%s` attribute: `%s`",
423
                         level_to_str(level), lintname));
424
                loop
425
              }
426 427
              Some(lint) => { lint.lint }
            };
428

429 430 431 432 433
            let now = self.get_level(lint);
            if now == forbid && level != forbid {
                self.tcx.sess.span_err(meta.span,
                    fmt!("%s(%s) overruled by outer forbid(%s)",
                         level_to_str(level),
434
                         lintname, lintname));
435
                loop;
436
            }
437

438
            if now != level {
439 440
                let src = self.get_source(lint);
                self.lint_stack.push((lint, now, src));
441
                pushed += 1;
442
                self.set_level(lint, level, Node(meta.span));
443
            }
444
        }
445

446 447
        // detect doc(hidden)
        let mut doc_hidden = false;
448 449
        let r = attr::find_attrs_by_name(attrs, "doc");
        for r.iter().advance |attr| {
450 451 452 453 454 455 456 457 458 459 460 461 462 463 464
            match attr::get_meta_item_list(attr.node.value) {
                Some(s) => {
                    if attr::find_meta_items_by_name(s, "hidden").len() > 0 {
                        doc_hidden = true;
                    }
                }
                None => {}
            }
        }
        if doc_hidden && !self.doc_hidden {
            self.doc_hidden = true;
        } else {
            doc_hidden = false;
        }

465
        f();
466

467
        // rollback
468 469 470
        if doc_hidden && self.doc_hidden {
            self.doc_hidden = false;
        }
471
        for pushed.times {
472 473
            let (lint, lvl, src) = self.lint_stack.pop();
            self.set_level(lint, lvl, src);
474
        }
475 476
    }

477
    fn add_lint(&mut self, v: visit::vt<@mut Context>) {
478
        self.visitors.push((v, item_stopping_visitor(v)));
479 480
    }

481
    fn process(@mut self, n: AttributedNode) {
482 483
        // see comment of the `visitors` field in the struct for why there's a
        // pair instead of just one visitor.
484
        match n {
485
            Item(it) => {
486
                for self.visitors.iter().advance |&(orig, stopping)| {
487
                    (orig.visit_item)(it, (self, stopping));
488 489 490
                }
            }
            Crate(c) => {
491
                for self.visitors.iter().advance |&(_, stopping)| {
492
                    visit::visit_crate(c, (self, stopping));
493 494
                }
            }
495 496 497
            // Can't use visit::visit_method_helper because the
            // item_stopping_visitor has overridden visit_fn(&fk_method(... ))
            // to be a no-op, so manually invoke visit_fn.
498 499
            Method(m) => {
                let fk = visit::fk_method(copy m.ident, &m.generics, m);
500
                for self.visitors.iter().advance |&(orig, stopping)| {
501
                    (orig.visit_fn)(&fk, &m.decl, &m.body, m.span, m.id,
502
                                    (self, stopping));
503 504
                }
            }
505 506 507 508
        }
    }
}

509 510
pub fn each_lint(sess: session::Session,
                 attrs: &[ast::attribute],
511 512 513
                 f: &fn(@ast::meta_item, level, @str) -> bool) -> bool {
    let xs = [allow, warn, deny, forbid];
    for xs.iter().advance |&level| {
514 515
        let level_name = level_to_str(level);
        let attrs = attr::find_attrs_by_name(attrs, level_name);
516
        for attrs.iter().advance |attr| {
517 518 519 520
            let meta = attr.node.value;
            let metas = match meta.node {
                ast::meta_list(_, ref metas) => metas,
                _ => {
521
                    sess.span_err(meta.span, "malformed lint attribute");
522 523 524
                    loop;
                }
            };
525
            for metas.iter().advance |meta| {
526 527 528 529 530 531 532
                match meta.node {
                    ast::meta_word(lintname) => {
                        if !f(*meta, level, lintname) {
                            return false;
                        }
                    }
                    _ => {
533
                        sess.span_err(meta.span, "malformed lint attribute");
534 535 536 537 538
                    }
                }
            }
        }
    }
539
    true
540 541
}

542 543 544 545
// Take a visitor, and modify it so that it will not proceed past subitems.
// This is used to make the simple visitors used for the lint passes
// not traverse into subitems, since that is handled by the outer
// lint visitor.
546
fn item_stopping_visitor<E: Copy>(outer: visit::vt<E>) -> visit::vt<E> {
547
    visit::mk_vt(@visit::Visitor {
548 549
        visit_item: |_i, (_e, _v)| { },
        visit_fn: |fk, fd, b, s, id, (e, v)| {
550 551
            match *fk {
                visit::fk_method(*) => {}
552
                _ => (outer.visit_fn)(fk, fd, b, s, id, (e, v))
553 554
            }
        },
555
    .. **(ty_stopping_visitor(outer))})
556 557 558
}

fn ty_stopping_visitor<E>(v: visit::vt<E>) -> visit::vt<E> {
559
    visit::mk_vt(@visit::Visitor {visit_ty: |_t, (_e, _v)| { },.. **v})
560 561
}

562 563
fn lint_while_true() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
564
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
565 566 567 568 569 570 571 572 573
            match e.node {
                ast::expr_while(cond, _) => {
                    match cond.node {
                        ast::expr_lit(@codemap::spanned {
                            node: ast::lit_bool(true), _}) =>
                        {
                            cx.span_lint(while_true, e.span,
                                         "denote infinite loops with \
                                          loop { ... }");
574
                        }
575
                        _ => ()
576 577
                    }
                }
578 579
                _ => ()
            }
580
            visit::visit_expr(e, (cx, vt));
581
        },
582
        .. *visit::default_visitor()
583
    })
V
Viktor Dahl 已提交
584 585
}

586
fn lint_type_limits() -> visit::vt<@mut Context> {
587
    fn is_valid<T:cmp::Ord>(binop: ast::binop, v: T,
588 589 590 591 592 593 594
            min: T, max: T) -> bool {
        match binop {
            ast::lt => v <= max,
            ast::le => v < max,
            ast::gt => v >= min,
            ast::ge => v > min,
            ast::eq | ast::ne => v >= min && v <= max,
595
            _ => fail!()
596 597 598
        }
    }

599
    fn rev_binop(binop: ast::binop) -> ast::binop {
600 601 602 603 604 605 606 607 608
        match binop {
            ast::lt => ast::gt,
            ast::le => ast::ge,
            ast::gt => ast::lt,
            ast::ge => ast::le,
            _ => binop
        }
    }

609 610
    // for int & uint, be conservative with the warnings, so that the
    // warnings are consistent between 32- and 64-bit platforms
611
    fn int_ty_range(int_ty: ast::int_ty) -> (i64, i64) {
612
        match int_ty {
613
            ast::ty_i =>    (i64::min_value,        i64::max_value),
614 615 616 617 618 619 620 621
            ast::ty_char => (u32::min_value as i64, u32::max_value as i64),
            ast::ty_i8 =>   (i8::min_value  as i64, i8::max_value  as i64),
            ast::ty_i16 =>  (i16::min_value as i64, i16::max_value as i64),
            ast::ty_i32 =>  (i32::min_value as i64, i32::max_value as i64),
            ast::ty_i64 =>  (i64::min_value,        i64::max_value)
        }
    }

622
    fn uint_ty_range(uint_ty: ast::uint_ty) -> (u64, u64) {
623
        match uint_ty {
624
            ast::ty_u =>   (u64::min_value,         u64::max_value),
625 626 627 628 629 630 631
            ast::ty_u8 =>  (u8::min_value   as u64, u8::max_value   as u64),
            ast::ty_u16 => (u16::min_value  as u64, u16::max_value  as u64),
            ast::ty_u32 => (u32::min_value  as u64, u32::max_value  as u64),
            ast::ty_u64 => (u64::min_value,         u64::max_value)
        }
    }

632
    fn check_limits(cx: &Context, binop: ast::binop, l: &ast::expr,
633
                    r: &ast::expr) -> bool {
634 635 636
        let (lit, expr, swap) = match (&l.node, &r.node) {
            (&ast::expr_lit(_), _) => (l, r, true),
            (_, &ast::expr_lit(_)) => (r, l, false),
637 638 639 640
            _ => return true
        };
        // Normalize the binop so that the literal is always on the RHS in
        // the comparison
641
        let norm_binop = if swap {
642 643 644 645
            rev_binop(binop)
        } else {
            binop
        };
646
        match ty::get(ty::expr_ty(cx.tcx, @/*bad*/copy *expr)).sty {
647 648 649 650 651 652 653 654 655
            ty::ty_int(int_ty) => {
                let (min, max) = int_ty_range(int_ty);
                let lit_val: i64 = match lit.node {
                    ast::expr_lit(@li) => match li.node {
                        ast::lit_int(v, _) => v,
                        ast::lit_uint(v, _) => v as i64,
                        ast::lit_int_unsuffixed(v) => v,
                        _ => return true
                    },
656
                    _ => fail!()
657 658 659 660 661 662 663 664 665 666 667 668
                };
                is_valid(norm_binop, lit_val, min, max)
            }
            ty::ty_uint(uint_ty) => {
                let (min, max): (u64, u64) = uint_ty_range(uint_ty);
                let lit_val: u64 = match lit.node {
                    ast::expr_lit(@li) => match li.node {
                        ast::lit_int(v, _) => v as u64,
                        ast::lit_uint(v, _) => v,
                        ast::lit_int_unsuffixed(v) => v as u64,
                        _ => return true
                    },
669
                    _ => fail!()
670 671 672 673 674 675 676
                };
                is_valid(norm_binop, lit_val, min, max)
            }
            _ => true
        }
    }

677
    fn is_comparison(binop: ast::binop) -> bool {
678 679 680 681 682 683 684
        match binop {
            ast::eq | ast::lt | ast::le |
            ast::ne | ast::ge | ast::gt => true,
            _ => false
        }
    }

685
    visit::mk_vt(@visit::Visitor {
686
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
687
            match e.node {
688
                ast::expr_binary(_, ref binop, @ref l, @ref r) => {
689 690 691 692 693
                    if is_comparison(*binop)
                        && !check_limits(cx, *binop, l, r) {
                        cx.span_lint(type_limits, e.span,
                                     "comparison is useless due to type limits");
                    }
694
                }
695
                _ => ()
696
            }
697
            visit::visit_expr(e, (cx, vt));
698
        },
699

700
        .. *visit::default_visitor()
701
    })
702 703
}

704
fn check_item_default_methods(cx: &Context, item: @ast::item) {
705 706
    match item.node {
        ast::item_trait(_, _, ref methods) => {
707
            for methods.iter().advance |method| {
708 709 710
                match *method {
                    ast::required(*) => {}
                    ast::provided(*) => {
711 712
                        cx.span_lint(default_methods, item.span,
                                     "default methods are experimental");
713 714 715 716 717 718 719 720
                    }
                }
            }
        }
        _ => {}
    }
}

721
fn check_item_ctypes(cx: &Context, it: @ast::item) {
722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741
    fn check_ty(cx: &Context, ty: @ast::Ty) {
        match ty.node {
            ast::ty_path(_, _, id) => {
                match cx.tcx.def_map.get_copy(&id) {
                    ast::def_prim_ty(ast::ty_int(ast::ty_i)) => {
                        cx.span_lint(ctypes, ty.span,
                                "found rust type `int` in foreign module, while \
                                libc::c_int or libc::c_long should be used");
                    }
                    ast::def_prim_ty(ast::ty_uint(ast::ty_u)) => {
                        cx.span_lint(ctypes, ty.span,
                                "found rust type `uint` in foreign module, while \
                                libc::c_uint or libc::c_ulong should be used");
                    }
                    _ => ()
                }
            }
            _ => ()
        }
    }
742

743
    fn check_foreign_fn(cx: &Context, decl: &ast::fn_decl) {
B
Brian Anderson 已提交
744
        let tys = vec::map(decl.inputs, |a| a.ty );
745
        for vec::each(vec::append_one(tys, decl.output)) |ty| {
746
            check_ty(cx, *ty);
747 748 749
        }
    }

750
    match it.node {
751
      ast::item_foreign_mod(ref nmod) if !nmod.abis.is_intrinsic() => {
752
        for nmod.items.iter().advance |ni| {
753
            match ni.node {
754 755 756 757
                ast::foreign_item_fn(ref decl, _, _) => {
                    check_foreign_fn(cx, decl);
                }
                ast::foreign_item_static(t, _) => { check_ty(cx, t); }
758 759
            }
        }
760
      }
B
Brian Anderson 已提交
761
      _ => {/* nothing to do */ }
762 763
    }
}
764

765
fn check_type_for_lint(cx: &Context, lint: lint, span: span, ty: ty::t) {
766
    if cx.get_level(lint) == allow { return }
767

768 769 770 771 772 773 774 775 776 777
    let mut n_box = 0;
    let mut n_uniq = 0;
    ty::fold_ty(cx.tcx, ty, |t| {
        match ty::get(t).sty {
          ty::ty_box(_) => n_box += 1,
          ty::ty_uniq(_) => n_uniq += 1,
          _ => ()
        };
        t
    });
778

779 780 781 782 783
    if n_uniq > 0 && lint != managed_heap_memory {
        let s = ty_to_str(cx.tcx, ty);
        let m = ~"type uses owned (~ type) pointers: " + s;
        cx.span_lint(lint, span, m);
    }
784

785 786 787 788
    if n_box > 0 && lint != owned_heap_memory {
        let s = ty_to_str(cx.tcx, ty);
        let m = ~"type uses managed (@ type) pointers: " + s;
        cx.span_lint(lint, span, m);
789
    }
790
}
791

792
fn check_type(cx: &Context, span: span, ty: ty::t) {
793 794
    let xs = [managed_heap_memory, owned_heap_memory, heap_memory];
    for xs.iter().advance |lint| {
795
        check_type_for_lint(cx, *lint, span, ty);
796
    }
797
}
798

799
fn check_item_heap(cx: &Context, it: @ast::item) {
800 801 802 803 804 805 806 807 808
    match it.node {
      ast::item_fn(*) |
      ast::item_ty(*) |
      ast::item_enum(*) |
      ast::item_struct(*) => check_type(cx, it.span,
                                        ty::node_id_to_type(cx.tcx,
                                                            it.id)),
      _ => ()
    }
809

810 811 812
    // If it's a struct, we also have to check the fields' types
    match it.node {
        ast::item_struct(struct_def, _) => {
813
            for struct_def.fields.iter().advance |struct_field| {
814 815 816
                check_type(cx, struct_field.span,
                           ty::node_id_to_type(cx.tcx,
                                               struct_field.node.id));
817 818 819 820
            }
        }
        _ => ()
    }
821
}
822

823 824
fn lint_heap() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
825
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
826 827
            let ty = ty::expr_ty(cx.tcx, e);
            check_type(cx, e.span, ty);
828
            visit::visit_expr(e, (cx, vt));
829
        },
830
        .. *visit::default_visitor()
831
    })
832 833
}

834 835
fn lint_path_statement() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
836
        visit_stmt: |s, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
837 838 839 840 841 842 843
            match s.node {
                ast::stmt_semi(
                    @ast::expr { node: ast::expr_path(_), _ },
                    _
                ) => {
                    cx.span_lint(path_statement, s.span,
                                 "path statement with no effect");
844
                }
845 846
                _ => ()
            }
847
            visit::visit_stmt(s, (cx, vt));
848
        },
849
        .. *visit::default_visitor()
850
    })
851 852
}

853
fn check_item_non_camel_case_types(cx: &Context, it: @ast::item) {
P
Paul Stansifer 已提交
854 855
    fn is_camel_case(cx: ty::ctxt, ident: ast::ident) -> bool {
        let ident = cx.sess.str_of(ident);
P
Patrick Walton 已提交
856
        assert!(!ident.is_empty());
857
        let ident = ident.trim_chars(&'_');
858
        char::is_uppercase(ident.char_at(0)) &&
859 860 861
            !ident.contains_char('_')
    }

862
    fn check_case(cx: &Context, ident: ast::ident, span: span) {
863 864 865 866
        if !is_camel_case(cx.tcx, ident) {
            cx.span_lint(non_camel_case_types, span,
                         "type, variant, or trait should have \
                          a camel case identifier");
867 868 869
        }
    }

870
    match it.node {
E
Erick Tryzelaar 已提交
871 872
        ast::item_ty(*) | ast::item_struct(*) |
        ast::item_trait(*) => {
873
            check_case(cx, it.ident, it.span)
874
        }
E
Erick Tryzelaar 已提交
875
        ast::item_enum(ref enum_definition, _) => {
876
            check_case(cx, it.ident, it.span);
877
            for enum_definition.variants.iter().advance |variant| {
878
                check_case(cx, variant.node.name, variant.span);
E
Erick Tryzelaar 已提交
879 880 881
            }
        }
        _ => ()
882 883 884
    }
}

885 886
fn lint_unused_unsafe() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
887
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
888 889 890 891 892 893
            match e.node {
                ast::expr_block(ref blk) if blk.node.rules == ast::unsafe_blk => {
                    if !cx.tcx.used_unsafe.contains(&blk.node.id) {
                        cx.span_lint(unused_unsafe, blk.span,
                                     "unnecessary `unsafe` block");
                    }
894
                }
895
                _ => ()
896
            }
897
            visit::visit_expr(e, (cx, vt));
898 899
        },
        .. *visit::default_visitor()
900
    })
901 902
}

903 904
fn lint_unused_mut() -> visit::vt<@mut Context> {
    fn check_pat(cx: &Context, p: @ast::pat) {
905 906
        let mut used = false;
        let mut bindings = 0;
907 908
        do pat_util::pat_bindings(cx.tcx.def_map, p) |_, id, _, _| {
            used = used || cx.tcx.used_mut_nodes.contains(&id);
909 910 911 912
            bindings += 1;
        }
        if !used {
            let msg = if bindings == 1 {
S
Seo Sanghyeon 已提交
913
                "variable does not need to be mutable"
914
            } else {
S
Seo Sanghyeon 已提交
915
                "variables do not need to be mutable"
916
            };
917
            cx.span_lint(unused_mut, p.span, msg);
918
        }
919
    }
920

921
    fn visit_fn_decl(cx: &Context, fd: &ast::fn_decl) {
922
        for fd.inputs.iter().advance |arg| {
923
            if arg.is_mutbl {
924
                check_pat(cx, arg.pat);
925 926
            }
        }
927
    }
928

929
    visit::mk_vt(@visit::Visitor {
930
        visit_local: |l, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
931
            if l.node.is_mutbl {
932
                check_pat(cx, l.node.pat);
933
            }
934
            visit::visit_local(l, (cx, vt));
935
        },
936
        visit_fn: |a, fd, b, c, d, (cx, vt)| {
937
            visit_fn_decl(cx, fd);
938
            visit::visit_fn(a, fd, b, c, d, (cx, vt));
939
        },
940
        visit_ty_method: |tm, (cx, vt)| {
941
            visit_fn_decl(cx, &tm.decl);
942
            visit::visit_ty_method(tm, (cx, vt));
943
        },
944
        visit_struct_method: |sm, (cx, vt)| {
945
            visit_fn_decl(cx, &sm.decl);
946
            visit::visit_struct_method(sm, (cx, vt));
947
        },
948
        visit_trait_method: |tm, (cx, vt)| {
949
            match *tm {
950 951
                ast::required(ref tm) => visit_fn_decl(cx, &tm.decl),
                ast::provided(m) => visit_fn_decl(cx, &m.decl)
952
            }
953
            visit::visit_trait_method(tm, (cx, vt));
954
        },
955
        .. *visit::default_visitor()
956
    })
957 958
}

959 960
fn lint_session() -> visit::vt<@mut Context> {
    ast_util::id_visitor(|id, cx: @mut Context| {
961 962 963 964 965
        match cx.tcx.sess.lints.pop(&id) {
            None => {},
            Some(l) => {
                do vec::consume(l) |_, (lint, span, msg)| {
                    cx.span_lint(lint, span, msg)
966
                }
967 968
            }
        }
969
    })
970 971
}

972
fn lint_unnecessary_allocations() -> visit::vt<@mut Context> {
973 974
    // Warn if string and vector literals with sigils are immediately borrowed.
    // Those can have the sigil removed.
975
    fn check(cx: &Context, e: @ast::expr) {
976 977 978 979 980 981 982 983 984 985 986 987 988 989
        match e.node {
            ast::expr_vstore(e2, ast::expr_vstore_uniq) |
            ast::expr_vstore(e2, ast::expr_vstore_box) => {
                match e2.node {
                    ast::expr_lit(@codemap::spanned{
                            node: ast::lit_str(*), _}) |
                    ast::expr_vec(*) => {}
                    _ => return
                }
            }

            _ => return
        }

990 991 992
        match cx.tcx.adjustments.find_copy(&e.id) {
            Some(@ty::AutoDerefRef(ty::AutoDerefRef {
                autoref: Some(ty::AutoBorrowVec(*)), _ })) => {
993 994 995 996 997 998 999 1000 1001
                cx.span_lint(unnecessary_allocation,
                             e.span, "unnecessary allocation, the sigil can be \
                                      removed");
            }

            _ => ()
        }
    }

1002
    visit::mk_vt(@visit::Visitor {
1003
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
1004
            check(cx, e);
1005
            visit::visit_expr(e, (cx, vt));
1006 1007
        },
        .. *visit::default_visitor()
1008 1009 1010
    })
}

1011 1012 1013
fn lint_missing_doc() -> visit::vt<@mut Context> {
    fn check_attrs(cx: @mut Context, attrs: &[ast::attribute],
                   sp: span, msg: &str) {
1014 1015 1016 1017 1018 1019
        // If we're building a test harness, then warning about documentation is
        // probably not really relevant right now
        if cx.tcx.sess.opts.test { return }
        // If we have doc(hidden), nothing to do
        if cx.doc_hidden { return }
        // If we're documented, nothing to do
1020
        if attrs.iter().any_(|a| a.node.is_sugared_doc) { return }
1021 1022 1023

        // otherwise, warn!
        cx.span_lint(missing_doc, sp, msg);
1024 1025
    }

1026
    visit::mk_vt(@visit::Visitor {
1027
        visit_struct_method: |m, (cx, vt)| {
1028 1029 1030 1031
            if m.vis == ast::public {
                check_attrs(cx, m.attrs, m.span,
                            "missing documentation for a method");
            }
1032
            visit::visit_struct_method(m, (cx, vt));
1033 1034
        },

1035
        visit_ty_method: |m, (cx, vt)| {
1036 1037 1038 1039
            // All ty_method objects are linted about because they're part of a
            // trait (no visibility)
            check_attrs(cx, m.attrs, m.span,
                        "missing documentation for a method");
1040
            visit::visit_ty_method(m, (cx, vt));
1041
        },
1042

1043
        visit_fn: |fk, d, b, sp, id, (cx, vt)| {
1044 1045 1046 1047 1048 1049 1050 1051 1052
            // Only warn about explicitly public methods. Soon implicit
            // public-ness will hopefully be going away.
            match *fk {
                visit::fk_method(_, _, m) if m.vis == ast::public => {
                    // If we're in a trait implementation, no need to duplicate
                    // documentation
                    if !cx.in_trait_impl {
                        check_attrs(cx, m.attrs, sp,
                                    "missing documentation for a method");
1053 1054
                    }
                }
1055

1056 1057
                _ => {}
            }
1058
            visit::visit_fn(fk, d, b, sp, id, (cx, vt));
1059 1060
        },

1061
        visit_item: |it, (cx, vt)| {
1062 1063 1064 1065 1066 1067 1068
            match it.node {
                // Go ahead and match the fields here instead of using
                // visit_struct_field while we have access to the enclosing
                // struct's visibility
                ast::item_struct(sdef, _) if it.vis == ast::public => {
                    check_attrs(cx, it.attrs, it.span,
                                "missing documentation for a struct");
1069
                    for sdef.fields.iter().advance |field| {
1070 1071 1072 1073
                        match field.node.kind {
                            ast::named_field(_, vis) if vis != ast::private => {
                                check_attrs(cx, field.node.attrs, field.span,
                                            "missing documentation for a field");
1074
                            }
1075
                            ast::unnamed_field | ast::named_field(*) => {}
1076 1077 1078
                        }
                    }
                }
1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090

                ast::item_trait(*) if it.vis == ast::public => {
                    check_attrs(cx, it.attrs, it.span,
                                "missing documentation for a trait");
                }

                ast::item_fn(*) if it.vis == ast::public => {
                    check_attrs(cx, it.attrs, it.span,
                                "missing documentation for a function");
                }

                _ => {}
1091
            };
1092

1093
            visit::visit_item(it, (cx, vt));
1094
        },
1095

1096
        .. *visit::default_visitor()
1097 1098 1099
    })
}

1100
pub fn check_crate(tcx: ty::ctxt, crate: @ast::crate) {
1101 1102 1103 1104 1105
    let cx = @mut Context {
        dict: @get_lint_dict(),
        curr: SmallIntMap::new(),
        tcx: tcx,
        lint_stack: ~[],
1106
        visitors: ~[],
1107
        in_trait_impl: false,
1108
        doc_hidden: false,
1109 1110 1111 1112
    };

    // Install defaults.
    for cx.dict.each_value |spec| {
1113
        cx.set_level(spec.lint, spec.default, Default);
1114 1115 1116
    }

    // Install command-line options, overriding defaults.
1117
    for tcx.sess.opts.lint_opts.iter().advance |&(lint, level)| {
1118
        cx.set_level(lint, level, CommandLine);
1119 1120
    }

1121
    // Register each of the lint passes with the context
1122 1123 1124 1125 1126 1127 1128 1129
    cx.add_lint(lint_while_true());
    cx.add_lint(lint_path_statement());
    cx.add_lint(lint_heap());
    cx.add_lint(lint_type_limits());
    cx.add_lint(lint_unused_unsafe());
    cx.add_lint(lint_unused_mut());
    cx.add_lint(lint_session());
    cx.add_lint(lint_unnecessary_allocations());
1130
    cx.add_lint(lint_missing_doc());
1131

1132
    // Actually perform the lint checks (iterating the ast)
1133
    do cx.with_lint_attrs(crate.node.attrs) {
1134
        cx.process(Crate(crate));
1135

1136 1137
        visit::visit_crate(crate, (cx, visit::mk_vt(@visit::Visitor {
            visit_item: |it, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
1138
                do cx.with_lint_attrs(it.attrs) {
1139 1140 1141 1142 1143 1144
                    match it.node {
                        ast::item_impl(_, Some(*), _, _) => {
                            cx.in_trait_impl = true;
                        }
                        _ => {}
                    }
1145 1146 1147 1148 1149 1150
                    check_item_ctypes(cx, it);
                    check_item_non_camel_case_types(cx, it);
                    check_item_default_methods(cx, it);
                    check_item_heap(cx, it);

                    cx.process(Item(it));
1151
                    visit::visit_item(it, (cx, vt));
1152
                    cx.in_trait_impl = false;
1153 1154
                }
            },
1155
            visit_fn: |fk, decl, body, span, id, (cx, vt)| {
1156 1157 1158
                match *fk {
                    visit::fk_method(_, _, m) => {
                        do cx.with_lint_attrs(m.attrs) {
1159
                            cx.process(Method(m));
1160
                            visit::visit_fn(fk, decl, body, span, id, (cx, vt));
1161 1162 1163
                        }
                    }
                    _ => {
1164
                        visit::visit_fn(fk, decl, body, span, id, (cx, vt));
1165 1166 1167 1168
                    }
                }
            },
            .. *visit::default_visitor()
1169
        })));
1170 1171
    }

1172 1173
    // If we missed any lints added to the session, then there's a bug somewhere
    // in the iteration code.
1174
    for tcx.sess.lints.each |_, v| {
1175
        for v.iter().advance |t| {
1176 1177 1178 1179 1180 1181 1182
            match *t {
                (lint, span, ref msg) =>
                    tcx.sess.span_bug(span, fmt!("unprocessed lint %?: %s",
                                                 lint, *msg))
            }
        }
    }
1183

1184
    tcx.sess.abort_if_errors();
1185
}