lint.rs 38.3 KB
Newer Older
1 2 3 4 5 6 7 8 9 10
// Copyright 2012 The Rust Project Developers. See the COPYRIGHT
// file at the top-level directory of this distribution and at
// http://rust-lang.org/COPYRIGHT.
//
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
// option. This file may not be copied, modified, or distributed
// except according to those terms.

11

12
use driver::session;
P
Patrick Walton 已提交
13
use middle::ty;
14
use middle::pat_util;
P
Patrick Walton 已提交
15
use util::ppaux::{ty_to_str};
16

17 18 19 20 21 22 23 24 25 26 27 28
use std::char;
use std::cmp;
use std::hashmap::HashMap;
use std::i16;
use std::i32;
use std::i64;
use std::i8;
use std::u16;
use std::u32;
use std::u64;
use std::u8;
use std::vec;
29
use extra::smallintmap::SmallIntMap;
30 31
use syntax::attr;
use syntax::codemap::span;
J
John Clements 已提交
32
use syntax::codemap;
33
use syntax::{ast, visit, ast_util};
34

35 36 37 38 39 40 41
/**
 * A 'lint' check is a kind of miscellaneous constraint that a user _might_
 * want to enforce, but might reasonably want to permit as well, on a
 * module-by-module basis. They contrast with static constraints enforced by
 * other phases of the compiler, which are generally required to hold in order
 * to compile the program at all.
 *
42 43 44 45 46
 * The lint checking is all consolidated into one pass which runs just before
 * translation to LLVM bytecode. Throughout compilation, lint warnings can be
 * added via the `add_lint` method on the Session structure. This requires a
 * span and an id of the node that the lint is being added to. The lint isn't
 * actually emitted at that time because it is unknown what the actual lint
47
 * level at that location is.
48
 *
49 50 51 52 53 54
 * To actually emit lint warnings/errors, a separate pass is used just before
 * translation. A context keeps track of the current state of all lint levels.
 * Upon entering a node of the ast which can modify the lint settings, the
 * previous lint state is pushed onto a stack and the ast is then recursed upon.
 * As the ast is traversed, this keeps track of the current lint level for all
 * lint attributes.
55
 *
56 57 58 59 60 61 62 63 64 65 66 67 68 69
 * At each node of the ast which can modify lint attributes, all known lint
 * passes are also applied.  Each lint pass is a visit::vt<()> structure. These
 * visitors are constructed via the lint_*() functions below. There are also
 * some lint checks which operate directly on ast nodes (such as @ast::item),
 * and those are organized as check_item_*(). Each visitor added to the lint
 * context is modified to stop once it reaches a node which could alter the lint
 * levels. This means that everything is looked at once and only once by every
 * lint pass.
 *
 * With this all in place, to add a new lint warning, all you need to do is to
 * either invoke `add_lint` on the session at the appropriate time, or write a
 * lint pass in this module which is just an ast visitor. The context used when
 * traversing the ast has a `span_lint` method which only needs the span of the
 * item that's being warned about.
70
 */
71

72
#[deriving(Eq)]
73
pub enum lint {
P
Patrick Walton 已提交
74
    ctypes,
75
    unused_imports,
76 77
    while_true,
    path_statement,
78
    implicit_copies,
79
    unrecognized_lint,
80
    non_implicitly_copyable_typarams,
81
    deprecated_pattern,
82
    non_camel_case_types,
83
    type_limits,
84
    default_methods,
85
    unused_unsafe,
86

87 88 89 90
    managed_heap_memory,
    owned_heap_memory,
    heap_memory,

91 92
    unused_variable,
    dead_assignment,
93
    unused_mut,
94
    unnecessary_allocation,
95

96
    missing_doc,
97
    unreachable_code,
98 99

    warnings,
100 101
}

102
pub fn level_to_str(lv: level) -> &'static str {
103
    match lv {
104 105 106 107
      allow => "allow",
      warn => "warn",
      deny => "deny",
      forbid => "forbid"
108 109 110
    }
}

111
#[deriving(Eq)]
112
pub enum level {
113
    allow, warn, deny, forbid
114 115
}

116 117
struct LintSpec {
    lint: lint,
118
    desc: &'static str,
119
    default: level
120
}
121

122
pub type LintDict = HashMap<&'static str, LintSpec>;
123 124 125 126 127 128

enum AttributedNode<'self> {
    Item(@ast::item),
    Method(&'self ast::method),
    Crate(@ast::crate),
}
129

130 131 132 133 134 135 136
#[deriving(Eq)]
enum LintSource {
    Node(span),
    Default,
    CommandLine
}

S
Sangeun Kim 已提交
137 138 139 140
static lint_table: &'static [(&'static str, LintSpec)] = &[
    ("ctypes",
     LintSpec {
        lint: ctypes,
141
        desc: "proper use of std::libc types in foreign modules",
S
Sangeun Kim 已提交
142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262
        default: warn
     }),

    ("unused_imports",
     LintSpec {
        lint: unused_imports,
        desc: "imports that are never used",
        default: warn
     }),

    ("while_true",
     LintSpec {
        lint: while_true,
        desc: "suggest using loop { } instead of while(true) { }",
        default: warn
     }),

    ("path_statement",
     LintSpec {
        lint: path_statement,
        desc: "path statements with no effect",
        default: warn
     }),

    ("unrecognized_lint",
     LintSpec {
        lint: unrecognized_lint,
        desc: "unrecognized lint attribute",
        default: warn
     }),

    ("non_implicitly_copyable_typarams",
     LintSpec {
        lint: non_implicitly_copyable_typarams,
        desc: "passing non implicitly copyable types as copy type params",
        default: warn
     }),

    ("implicit_copies",
     LintSpec {
        lint: implicit_copies,
        desc: "implicit copies of non implicitly copyable data",
        default: warn
     }),

    ("deprecated_pattern",
     LintSpec {
        lint: deprecated_pattern,
        desc: "warn about deprecated uses of pattern bindings",
        default: allow
     }),

    ("non_camel_case_types",
     LintSpec {
        lint: non_camel_case_types,
        desc: "types, variants and traits should have camel case names",
        default: allow
     }),

    ("managed_heap_memory",
     LintSpec {
        lint: managed_heap_memory,
        desc: "use of managed (@ type) heap memory",
        default: allow
     }),

    ("owned_heap_memory",
     LintSpec {
        lint: owned_heap_memory,
        desc: "use of owned (~ type) heap memory",
        default: allow
     }),

    ("heap_memory",
     LintSpec {
        lint: heap_memory,
        desc: "use of any (~ type or @ type) heap memory",
        default: allow
     }),

    ("type_limits",
     LintSpec {
        lint: type_limits,
        desc: "comparisons made useless by limits of the types involved",
        default: warn
     }),

    ("default_methods",
     LintSpec {
        lint: default_methods,
        desc: "allow default methods",
        default: deny
     }),

    ("unused_unsafe",
     LintSpec {
        lint: unused_unsafe,
        desc: "unnecessary use of an `unsafe` block",
        default: warn
    }),

    ("unused_variable",
     LintSpec {
        lint: unused_variable,
        desc: "detect variables which are not used in any way",
        default: warn
    }),

    ("dead_assignment",
     LintSpec {
        lint: dead_assignment,
        desc: "detect assignments that will never be read",
        default: warn
    }),

    ("unused_mut",
     LintSpec {
        lint: unused_mut,
        desc: "detect mut variables which don't need to be mutable",
        default: warn
    }),
263 264 265 266 267 268 269

    ("unnecessary_allocation",
     LintSpec {
        lint: unnecessary_allocation,
        desc: "detects unnecessary allocations that can be eliminated",
        default: warn
    }),
270

271
    ("missing_doc",
272
     LintSpec {
273 274
        lint: missing_doc,
        desc: "detects missing documentation for public members",
275 276
        default: allow
    }),
277 278 279 280 281 282 283

    ("unreachable_code",
     LintSpec {
        lint: unreachable_code,
        desc: "detects unreachable code",
        default: warn
    }),
284 285 286 287 288 289 290

    ("warnings",
     LintSpec {
        lint: warnings,
        desc: "mass-change the level for lints which produce warnings",
        default: warn
    }),
S
Sangeun Kim 已提交
291 292
];

293 294 295 296
/*
  Pass names should not contain a '-', as the compiler normalizes
  '-' to '_' in command-line flags
 */
297
pub fn get_lint_dict() -> LintDict {
298
    let mut map = HashMap::new();
299
    for lint_table.iter().advance |&(k, v)| {
300
        map.insert(k, v);
301
    }
302
    return map;
303 304
}

305
struct Context {
306 307 308
    // All known lint modes (string versions)
    dict: @LintDict,
    // Current levels of each lint warning
309
    curr: SmallIntMap<(level, LintSource)>,
310 311
    // context we're checking in (used to access fields like sess)
    tcx: ty::ctxt,
312 313 314
    // Just a simple flag if we're currently recursing into a trait
    // implementation. This is only used by the lint_missing_doc() pass
    in_trait_impl: bool,
315 316 317 318
    // Another flag for doc lint emissions. Does some parent of the current node
    // have the doc(hidden) attribute? Treating this as allow(missing_doc) would
    // play badly with forbid(missing_doc) when it shouldn't.
    doc_hidden: bool,
319 320 321
    // When recursing into an attributed node of the ast which modifies lint
    // levels, this stack keeps track of the previous lint levels of whatever
    // was modified.
322
    lint_stack: ~[(lint, level, LintSource)],
323 324 325 326 327
    // Each of these visitors represents a lint pass. A number of the lint
    // attributes are registered by adding a visitor to iterate over the ast.
    // Others operate directly on @ast::item structures (or similar). Finally,
    // others still are added to the Session object via `add_lint`, and these
    // are all passed with the lint_session visitor.
328 329 330 331 332 333 334 335 336
    //
    // This is a pair so every visitor can visit every node. When a lint pass is
    // registered, another visitor is created which stops at all items which can
    // alter the attributes of the ast. This "item stopping visitor" is the
    // second element of the pair, while the original visitor is the first
    // element. This means that when visiting a node, the original recursive
    // call can used the original visitor's method, although the recursing
    // visitor supplied to the method is the item stopping visitor.
    visitors: ~[(visit::vt<@mut Context>, visit::vt<@mut Context>)],
337
}
338

339
impl Context {
340
    fn get_level(&self, lint: lint) -> level {
341
        match self.curr.find(&(lint as uint)) {
342
          Some(&(lvl, _)) => lvl,
343 344
          None => allow
        }
345 346
    }

347 348 349 350 351 352 353 354
    fn get_source(&self, lint: lint) -> LintSource {
        match self.curr.find(&(lint as uint)) {
          Some(&(_, src)) => src,
          None => Default
        }
    }

    fn set_level(&mut self, lint: lint, level: level, src: LintSource) {
355
        if level == allow {
D
Daniel Micay 已提交
356
            self.curr.remove(&(lint as uint));
357
        } else {
358 359 360 361
            self.curr.insert(lint as uint, (level, src));
        }
    }

362
    fn lint_to_str(&self, lint: lint) -> &'static str {
363
        for self.dict.iter().advance |(k, v)| {
364
            if v.lint == lint {
365
                return *k;
366
            }
367
        }
368
        fail!("unregistered lint %?", lint);
369 370
    }

371
    fn span_lint(&self, lint: lint, span: span, msg: &str) {
372
        let (level, src) = match self.curr.find(&(lint as uint)) {
373 374
            None => { return }
            Some(&(warn, src)) => (self.get_level(warnings), src),
375 376
            Some(&pair) => pair,
        };
377
        if level == allow { return }
378 379 380 381 382 383 384

        let mut note = None;
        let msg = match src {
            Default | CommandLine => {
                fmt!("%s [-%c %s%s]", msg, match level {
                        warn => 'W', deny => 'D', forbid => 'F',
                        allow => fail!()
385
                    }, self.lint_to_str(lint).replace("_", "-"),
386 387 388 389 390 391 392 393 394 395 396 397 398
                    if src == Default { " (default)" } else { "" })
            },
            Node(src) => {
                note = Some(src);
                msg.to_str()
            }
        };
        match level {
            warn =>          { self.tcx.sess.span_warn(span, msg); }
            deny | forbid => { self.tcx.sess.span_err(span, msg);  }
            allow => fail!(),
        }

399
        for note.iter().advance |&span| {
400 401
            self.tcx.sess.span_note(span, "lint level defined here");
        }
402 403
    }

404
    /**
405
     * Merge the lints specified by any lint attributes into the
406
     * current lint context, call the provided function, then reset the
407
     * lints in effect to their previous state.
408
     */
409 410 411 412 413 414
    fn with_lint_attrs(@mut self, attrs: &[ast::attribute], f: &fn()) {
        // Parse all of the lint attributes, and then add them all to the
        // current dictionary of lint information. Along the way, keep a history
        // of what we changed so we can roll everything back after invoking the
        // specified closure
        let mut pushed = 0u;
415
        for each_lint(self.tcx.sess, attrs) |meta, level, lintname| {
416
            let lint = match self.dict.find_equiv(&lintname) {
B
Brian Anderson 已提交
417
              None => {
418
                self.span_lint(
419
                    unrecognized_lint,
420
                    meta.span,
P
Paul Stansifer 已提交
421
                    fmt!("unknown `%s` attribute: `%s`",
422
                         level_to_str(level), lintname));
423
                loop
424
              }
425 426
              Some(lint) => { lint.lint }
            };
427

428 429 430 431 432
            let now = self.get_level(lint);
            if now == forbid && level != forbid {
                self.tcx.sess.span_err(meta.span,
                    fmt!("%s(%s) overruled by outer forbid(%s)",
                         level_to_str(level),
433
                         lintname, lintname));
434
                loop;
435
            }
436

437
            if now != level {
438 439
                let src = self.get_source(lint);
                self.lint_stack.push((lint, now, src));
440
                pushed += 1;
441
                self.set_level(lint, level, Node(meta.span));
442
            }
443
        }
444

445 446
        // detect doc(hidden)
        let mut doc_hidden = false;
447 448
        let r = attr::find_attrs_by_name(attrs, "doc");
        for r.iter().advance |attr| {
449 450 451 452 453 454 455 456 457 458 459 460 461 462 463
            match attr::get_meta_item_list(attr.node.value) {
                Some(s) => {
                    if attr::find_meta_items_by_name(s, "hidden").len() > 0 {
                        doc_hidden = true;
                    }
                }
                None => {}
            }
        }
        if doc_hidden && !self.doc_hidden {
            self.doc_hidden = true;
        } else {
            doc_hidden = false;
        }

464
        f();
465

466
        // rollback
467 468 469
        if doc_hidden && self.doc_hidden {
            self.doc_hidden = false;
        }
470
        for pushed.times {
471 472
            let (lint, lvl, src) = self.lint_stack.pop();
            self.set_level(lint, lvl, src);
473
        }
474 475
    }

476
    fn add_lint(&mut self, v: visit::vt<@mut Context>) {
477
        self.visitors.push((v, item_stopping_visitor(v)));
478 479
    }

480
    fn process(@mut self, n: AttributedNode) {
481 482
        // see comment of the `visitors` field in the struct for why there's a
        // pair instead of just one visitor.
483
        match n {
484
            Item(it) => {
485
                for self.visitors.iter().advance |&(orig, stopping)| {
486
                    (orig.visit_item)(it, (self, stopping));
487 488 489
                }
            }
            Crate(c) => {
490
                for self.visitors.iter().advance |&(_, stopping)| {
491
                    visit::visit_crate(c, (self, stopping));
492 493
                }
            }
494 495 496
            // Can't use visit::visit_method_helper because the
            // item_stopping_visitor has overridden visit_fn(&fk_method(... ))
            // to be a no-op, so manually invoke visit_fn.
497 498
            Method(m) => {
                let fk = visit::fk_method(copy m.ident, &m.generics, m);
499
                for self.visitors.iter().advance |&(orig, stopping)| {
500
                    (orig.visit_fn)(&fk, &m.decl, &m.body, m.span, m.id,
501
                                    (self, stopping));
502 503
                }
            }
504 505 506 507
        }
    }
}

508 509
pub fn each_lint(sess: session::Session,
                 attrs: &[ast::attribute],
510 511 512
                 f: &fn(@ast::meta_item, level, @str) -> bool) -> bool {
    let xs = [allow, warn, deny, forbid];
    for xs.iter().advance |&level| {
513 514
        let level_name = level_to_str(level);
        let attrs = attr::find_attrs_by_name(attrs, level_name);
515
        for attrs.iter().advance |attr| {
516 517 518 519
            let meta = attr.node.value;
            let metas = match meta.node {
                ast::meta_list(_, ref metas) => metas,
                _ => {
520
                    sess.span_err(meta.span, "malformed lint attribute");
521 522 523
                    loop;
                }
            };
524
            for metas.iter().advance |meta| {
525 526 527 528 529 530 531
                match meta.node {
                    ast::meta_word(lintname) => {
                        if !f(*meta, level, lintname) {
                            return false;
                        }
                    }
                    _ => {
532
                        sess.span_err(meta.span, "malformed lint attribute");
533 534 535 536 537
                    }
                }
            }
        }
    }
538
    true
539 540
}

541 542 543 544
// Take a visitor, and modify it so that it will not proceed past subitems.
// This is used to make the simple visitors used for the lint passes
// not traverse into subitems, since that is handled by the outer
// lint visitor.
545
fn item_stopping_visitor<E: Copy>(outer: visit::vt<E>) -> visit::vt<E> {
546
    visit::mk_vt(@visit::Visitor {
547 548
        visit_item: |_i, (_e, _v)| { },
        visit_fn: |fk, fd, b, s, id, (e, v)| {
549 550
            match *fk {
                visit::fk_method(*) => {}
551
                _ => (outer.visit_fn)(fk, fd, b, s, id, (e, v))
552 553
            }
        },
554
    .. **(ty_stopping_visitor(outer))})
555 556 557
}

fn ty_stopping_visitor<E>(v: visit::vt<E>) -> visit::vt<E> {
558
    visit::mk_vt(@visit::Visitor {visit_ty: |_t, (_e, _v)| { },.. **v})
559 560
}

561 562
fn lint_while_true() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
563
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
564 565 566 567 568 569 570 571 572
            match e.node {
                ast::expr_while(cond, _) => {
                    match cond.node {
                        ast::expr_lit(@codemap::spanned {
                            node: ast::lit_bool(true), _}) =>
                        {
                            cx.span_lint(while_true, e.span,
                                         "denote infinite loops with \
                                          loop { ... }");
573
                        }
574
                        _ => ()
575 576
                    }
                }
577 578
                _ => ()
            }
579
            visit::visit_expr(e, (cx, vt));
580
        },
581
        .. *visit::default_visitor()
582
    })
V
Viktor Dahl 已提交
583 584
}

585
fn lint_type_limits() -> visit::vt<@mut Context> {
586
    fn is_valid<T:cmp::Ord>(binop: ast::binop, v: T,
587 588 589 590 591 592 593
            min: T, max: T) -> bool {
        match binop {
            ast::lt => v <= max,
            ast::le => v < max,
            ast::gt => v >= min,
            ast::ge => v > min,
            ast::eq | ast::ne => v >= min && v <= max,
594
            _ => fail!()
595 596 597
        }
    }

598
    fn rev_binop(binop: ast::binop) -> ast::binop {
599 600 601 602 603 604 605 606 607
        match binop {
            ast::lt => ast::gt,
            ast::le => ast::ge,
            ast::gt => ast::lt,
            ast::ge => ast::le,
            _ => binop
        }
    }

608 609
    // for int & uint, be conservative with the warnings, so that the
    // warnings are consistent between 32- and 64-bit platforms
610
    fn int_ty_range(int_ty: ast::int_ty) -> (i64, i64) {
611
        match int_ty {
612
            ast::ty_i =>    (i64::min_value,        i64::max_value),
613 614 615 616 617 618 619 620
            ast::ty_char => (u32::min_value as i64, u32::max_value as i64),
            ast::ty_i8 =>   (i8::min_value  as i64, i8::max_value  as i64),
            ast::ty_i16 =>  (i16::min_value as i64, i16::max_value as i64),
            ast::ty_i32 =>  (i32::min_value as i64, i32::max_value as i64),
            ast::ty_i64 =>  (i64::min_value,        i64::max_value)
        }
    }

621
    fn uint_ty_range(uint_ty: ast::uint_ty) -> (u64, u64) {
622
        match uint_ty {
623
            ast::ty_u =>   (u64::min_value,         u64::max_value),
624 625 626 627 628 629 630
            ast::ty_u8 =>  (u8::min_value   as u64, u8::max_value   as u64),
            ast::ty_u16 => (u16::min_value  as u64, u16::max_value  as u64),
            ast::ty_u32 => (u32::min_value  as u64, u32::max_value  as u64),
            ast::ty_u64 => (u64::min_value,         u64::max_value)
        }
    }

631
    fn check_limits(cx: &Context, binop: ast::binop, l: &ast::expr,
632
                    r: &ast::expr) -> bool {
633 634 635
        let (lit, expr, swap) = match (&l.node, &r.node) {
            (&ast::expr_lit(_), _) => (l, r, true),
            (_, &ast::expr_lit(_)) => (r, l, false),
636 637 638 639
            _ => return true
        };
        // Normalize the binop so that the literal is always on the RHS in
        // the comparison
640
        let norm_binop = if swap {
641 642 643 644
            rev_binop(binop)
        } else {
            binop
        };
645
        match ty::get(ty::expr_ty(cx.tcx, @/*bad*/copy *expr)).sty {
646 647 648 649 650 651 652 653 654
            ty::ty_int(int_ty) => {
                let (min, max) = int_ty_range(int_ty);
                let lit_val: i64 = match lit.node {
                    ast::expr_lit(@li) => match li.node {
                        ast::lit_int(v, _) => v,
                        ast::lit_uint(v, _) => v as i64,
                        ast::lit_int_unsuffixed(v) => v,
                        _ => return true
                    },
655
                    _ => fail!()
656 657 658 659 660 661 662 663 664 665 666 667
                };
                is_valid(norm_binop, lit_val, min, max)
            }
            ty::ty_uint(uint_ty) => {
                let (min, max): (u64, u64) = uint_ty_range(uint_ty);
                let lit_val: u64 = match lit.node {
                    ast::expr_lit(@li) => match li.node {
                        ast::lit_int(v, _) => v as u64,
                        ast::lit_uint(v, _) => v,
                        ast::lit_int_unsuffixed(v) => v as u64,
                        _ => return true
                    },
668
                    _ => fail!()
669 670 671 672 673 674 675
                };
                is_valid(norm_binop, lit_val, min, max)
            }
            _ => true
        }
    }

676
    fn is_comparison(binop: ast::binop) -> bool {
677 678 679 680 681 682 683
        match binop {
            ast::eq | ast::lt | ast::le |
            ast::ne | ast::ge | ast::gt => true,
            _ => false
        }
    }

684
    visit::mk_vt(@visit::Visitor {
685
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
686
            match e.node {
687
                ast::expr_binary(_, ref binop, @ref l, @ref r) => {
688 689 690 691 692
                    if is_comparison(*binop)
                        && !check_limits(cx, *binop, l, r) {
                        cx.span_lint(type_limits, e.span,
                                     "comparison is useless due to type limits");
                    }
693
                }
694
                _ => ()
695
            }
696
            visit::visit_expr(e, (cx, vt));
697
        },
698

699
        .. *visit::default_visitor()
700
    })
701 702
}

703
fn check_item_default_methods(cx: &Context, item: &ast::item) {
704 705
    match item.node {
        ast::item_trait(_, _, ref methods) => {
706
            for methods.iter().advance |method| {
707 708 709
                match *method {
                    ast::required(*) => {}
                    ast::provided(*) => {
710 711
                        cx.span_lint(default_methods, item.span,
                                     "default methods are experimental");
712 713 714 715 716 717 718 719
                    }
                }
            }
        }
        _ => {}
    }
}

720 721
fn check_item_ctypes(cx: &Context, it: &ast::item) {
    fn check_ty(cx: &Context, ty: &ast::Ty) {
722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740
        match ty.node {
            ast::ty_path(_, _, id) => {
                match cx.tcx.def_map.get_copy(&id) {
                    ast::def_prim_ty(ast::ty_int(ast::ty_i)) => {
                        cx.span_lint(ctypes, ty.span,
                                "found rust type `int` in foreign module, while \
                                libc::c_int or libc::c_long should be used");
                    }
                    ast::def_prim_ty(ast::ty_uint(ast::ty_u)) => {
                        cx.span_lint(ctypes, ty.span,
                                "found rust type `uint` in foreign module, while \
                                libc::c_uint or libc::c_ulong should be used");
                    }
                    _ => ()
                }
            }
            _ => ()
        }
    }
741

742
    fn check_foreign_fn(cx: &Context, decl: &ast::fn_decl) {
B
Brian Anderson 已提交
743
        let tys = vec::map(decl.inputs, |a| a.ty );
744 745
        let r = vec::append_one(tys, decl.output);
        for r.iter().advance |ty| {
746
            check_ty(cx, *ty);
747 748 749
        }
    }

750
    match it.node {
751
      ast::item_foreign_mod(ref nmod) if !nmod.abis.is_intrinsic() => {
752
        for nmod.items.iter().advance |ni| {
753
            match ni.node {
754 755 756 757
                ast::foreign_item_fn(ref decl, _, _) => {
                    check_foreign_fn(cx, decl);
                }
                ast::foreign_item_static(t, _) => { check_ty(cx, t); }
758 759
            }
        }
760
      }
B
Brian Anderson 已提交
761
      _ => {/* nothing to do */ }
762 763
    }
}
764

765
fn check_type_for_lint(cx: &Context, lint: lint, span: span, ty: ty::t) {
766
    if cx.get_level(lint) == allow { return }
767

768 769 770 771 772 773 774 775 776 777
    let mut n_box = 0;
    let mut n_uniq = 0;
    ty::fold_ty(cx.tcx, ty, |t| {
        match ty::get(t).sty {
          ty::ty_box(_) => n_box += 1,
          ty::ty_uniq(_) => n_uniq += 1,
          _ => ()
        };
        t
    });
778

779 780 781 782 783
    if n_uniq > 0 && lint != managed_heap_memory {
        let s = ty_to_str(cx.tcx, ty);
        let m = ~"type uses owned (~ type) pointers: " + s;
        cx.span_lint(lint, span, m);
    }
784

785 786 787 788
    if n_box > 0 && lint != owned_heap_memory {
        let s = ty_to_str(cx.tcx, ty);
        let m = ~"type uses managed (@ type) pointers: " + s;
        cx.span_lint(lint, span, m);
789
    }
790
}
791

792
fn check_type(cx: &Context, span: span, ty: ty::t) {
793 794
    let xs = [managed_heap_memory, owned_heap_memory, heap_memory];
    for xs.iter().advance |lint| {
795
        check_type_for_lint(cx, *lint, span, ty);
796
    }
797
}
798

799
fn check_item_heap(cx: &Context, it: &ast::item) {
800 801 802 803 804 805 806 807 808
    match it.node {
      ast::item_fn(*) |
      ast::item_ty(*) |
      ast::item_enum(*) |
      ast::item_struct(*) => check_type(cx, it.span,
                                        ty::node_id_to_type(cx.tcx,
                                                            it.id)),
      _ => ()
    }
809

810 811 812
    // If it's a struct, we also have to check the fields' types
    match it.node {
        ast::item_struct(struct_def, _) => {
813
            for struct_def.fields.iter().advance |struct_field| {
814 815 816
                check_type(cx, struct_field.span,
                           ty::node_id_to_type(cx.tcx,
                                               struct_field.node.id));
817 818 819 820
            }
        }
        _ => ()
    }
821
}
822

823 824
fn lint_heap() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
825
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
826 827
            let ty = ty::expr_ty(cx.tcx, e);
            check_type(cx, e.span, ty);
828
            visit::visit_expr(e, (cx, vt));
829
        },
830
        .. *visit::default_visitor()
831
    })
832 833
}

834 835
fn lint_path_statement() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
836
        visit_stmt: |s, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
837 838 839 840 841 842 843
            match s.node {
                ast::stmt_semi(
                    @ast::expr { node: ast::expr_path(_), _ },
                    _
                ) => {
                    cx.span_lint(path_statement, s.span,
                                 "path statement with no effect");
844
                }
845 846
                _ => ()
            }
847
            visit::visit_stmt(s, (cx, vt));
848
        },
849
        .. *visit::default_visitor()
850
    })
851 852
}

853
fn check_item_non_camel_case_types(cx: &Context, it: &ast::item) {
P
Paul Stansifer 已提交
854 855
    fn is_camel_case(cx: ty::ctxt, ident: ast::ident) -> bool {
        let ident = cx.sess.str_of(ident);
P
Patrick Walton 已提交
856
        assert!(!ident.is_empty());
857
        let ident = ident.trim_chars(&'_');
858
        char::is_uppercase(ident.char_at(0)) &&
859 860 861
            !ident.contains_char('_')
    }

862
    fn check_case(cx: &Context, ident: ast::ident, span: span) {
863 864 865 866
        if !is_camel_case(cx.tcx, ident) {
            cx.span_lint(non_camel_case_types, span,
                         "type, variant, or trait should have \
                          a camel case identifier");
867 868 869
        }
    }

870
    match it.node {
E
Erick Tryzelaar 已提交
871 872
        ast::item_ty(*) | ast::item_struct(*) |
        ast::item_trait(*) => {
873
            check_case(cx, it.ident, it.span)
874
        }
E
Erick Tryzelaar 已提交
875
        ast::item_enum(ref enum_definition, _) => {
876
            check_case(cx, it.ident, it.span);
877
            for enum_definition.variants.iter().advance |variant| {
878
                check_case(cx, variant.node.name, variant.span);
E
Erick Tryzelaar 已提交
879 880 881
            }
        }
        _ => ()
882 883 884
    }
}

885 886
fn lint_unused_unsafe() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
887
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
888 889 890 891 892 893
            match e.node {
                ast::expr_block(ref blk) if blk.node.rules == ast::unsafe_blk => {
                    if !cx.tcx.used_unsafe.contains(&blk.node.id) {
                        cx.span_lint(unused_unsafe, blk.span,
                                     "unnecessary `unsafe` block");
                    }
894
                }
895
                _ => ()
896
            }
897
            visit::visit_expr(e, (cx, vt));
898 899
        },
        .. *visit::default_visitor()
900
    })
901 902
}

903 904
fn lint_unused_mut() -> visit::vt<@mut Context> {
    fn check_pat(cx: &Context, p: @ast::pat) {
905 906
        let mut used = false;
        let mut bindings = 0;
907 908
        do pat_util::pat_bindings(cx.tcx.def_map, p) |_, id, _, _| {
            used = used || cx.tcx.used_mut_nodes.contains(&id);
909 910 911 912
            bindings += 1;
        }
        if !used {
            let msg = if bindings == 1 {
S
Seo Sanghyeon 已提交
913
                "variable does not need to be mutable"
914
            } else {
S
Seo Sanghyeon 已提交
915
                "variables do not need to be mutable"
916
            };
917
            cx.span_lint(unused_mut, p.span, msg);
918
        }
919
    }
920

921
    fn visit_fn_decl(cx: &Context, fd: &ast::fn_decl) {
922
        for fd.inputs.iter().advance |arg| {
923
            if arg.is_mutbl {
924
                check_pat(cx, arg.pat);
925 926
            }
        }
927
    }
928

929
    visit::mk_vt(@visit::Visitor {
930
        visit_local: |l, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
931
            if l.node.is_mutbl {
932
                check_pat(cx, l.node.pat);
933
            }
934
            visit::visit_local(l, (cx, vt));
935
        },
936
        visit_fn: |a, fd, b, c, d, (cx, vt)| {
937
            visit_fn_decl(cx, fd);
938
            visit::visit_fn(a, fd, b, c, d, (cx, vt));
939
        },
940
        visit_ty_method: |tm, (cx, vt)| {
941
            visit_fn_decl(cx, &tm.decl);
942
            visit::visit_ty_method(tm, (cx, vt));
943
        },
944
        visit_struct_method: |sm, (cx, vt)| {
945
            visit_fn_decl(cx, &sm.decl);
946
            visit::visit_struct_method(sm, (cx, vt));
947
        },
948
        visit_trait_method: |tm, (cx, vt)| {
949
            match *tm {
950 951
                ast::required(ref tm) => visit_fn_decl(cx, &tm.decl),
                ast::provided(m) => visit_fn_decl(cx, &m.decl)
952
            }
953
            visit::visit_trait_method(tm, (cx, vt));
954
        },
955
        .. *visit::default_visitor()
956
    })
957 958
}

959 960
fn lint_session() -> visit::vt<@mut Context> {
    ast_util::id_visitor(|id, cx: @mut Context| {
961 962 963 964 965
        match cx.tcx.sess.lints.pop(&id) {
            None => {},
            Some(l) => {
                do vec::consume(l) |_, (lint, span, msg)| {
                    cx.span_lint(lint, span, msg)
966
                }
967 968
            }
        }
969
    })
970 971
}

972
fn lint_unnecessary_allocations() -> visit::vt<@mut Context> {
973 974
    // Warn if string and vector literals with sigils are immediately borrowed.
    // Those can have the sigil removed.
975
    fn check(cx: &Context, e: &ast::expr) {
976 977 978 979 980 981 982 983 984 985 986 987 988 989
        match e.node {
            ast::expr_vstore(e2, ast::expr_vstore_uniq) |
            ast::expr_vstore(e2, ast::expr_vstore_box) => {
                match e2.node {
                    ast::expr_lit(@codemap::spanned{
                            node: ast::lit_str(*), _}) |
                    ast::expr_vec(*) => {}
                    _ => return
                }
            }

            _ => return
        }

990 991 992
        match cx.tcx.adjustments.find_copy(&e.id) {
            Some(@ty::AutoDerefRef(ty::AutoDerefRef {
                autoref: Some(ty::AutoBorrowVec(*)), _ })) => {
993 994 995 996 997 998 999 1000 1001
                cx.span_lint(unnecessary_allocation,
                             e.span, "unnecessary allocation, the sigil can be \
                                      removed");
            }

            _ => ()
        }
    }

1002
    visit::mk_vt(@visit::Visitor {
1003
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
1004
            check(cx, e);
1005
            visit::visit_expr(e, (cx, vt));
1006 1007
        },
        .. *visit::default_visitor()
1008 1009 1010
    })
}

1011 1012 1013
fn lint_missing_doc() -> visit::vt<@mut Context> {
    fn check_attrs(cx: @mut Context, attrs: &[ast::attribute],
                   sp: span, msg: &str) {
1014 1015 1016 1017 1018 1019
        // If we're building a test harness, then warning about documentation is
        // probably not really relevant right now
        if cx.tcx.sess.opts.test { return }
        // If we have doc(hidden), nothing to do
        if cx.doc_hidden { return }
        // If we're documented, nothing to do
1020
        if attrs.iter().any_(|a| a.node.is_sugared_doc) { return }
1021 1022 1023

        // otherwise, warn!
        cx.span_lint(missing_doc, sp, msg);
1024 1025
    }

1026
    visit::mk_vt(@visit::Visitor {
1027
        visit_struct_method: |m, (cx, vt)| {
1028 1029 1030 1031
            if m.vis == ast::public {
                check_attrs(cx, m.attrs, m.span,
                            "missing documentation for a method");
            }
1032
            visit::visit_struct_method(m, (cx, vt));
1033 1034
        },

1035
        visit_ty_method: |m, (cx, vt)| {
1036 1037 1038 1039
            // All ty_method objects are linted about because they're part of a
            // trait (no visibility)
            check_attrs(cx, m.attrs, m.span,
                        "missing documentation for a method");
1040
            visit::visit_ty_method(m, (cx, vt));
1041
        },
1042

1043
        visit_fn: |fk, d, b, sp, id, (cx, vt)| {
1044 1045 1046 1047 1048 1049 1050 1051 1052
            // Only warn about explicitly public methods. Soon implicit
            // public-ness will hopefully be going away.
            match *fk {
                visit::fk_method(_, _, m) if m.vis == ast::public => {
                    // If we're in a trait implementation, no need to duplicate
                    // documentation
                    if !cx.in_trait_impl {
                        check_attrs(cx, m.attrs, sp,
                                    "missing documentation for a method");
1053 1054
                    }
                }
1055

1056 1057
                _ => {}
            }
1058
            visit::visit_fn(fk, d, b, sp, id, (cx, vt));
1059 1060
        },

1061
        visit_item: |it, (cx, vt)| {
1062 1063 1064 1065 1066 1067 1068
            match it.node {
                // Go ahead and match the fields here instead of using
                // visit_struct_field while we have access to the enclosing
                // struct's visibility
                ast::item_struct(sdef, _) if it.vis == ast::public => {
                    check_attrs(cx, it.attrs, it.span,
                                "missing documentation for a struct");
1069
                    for sdef.fields.iter().advance |field| {
1070 1071 1072 1073
                        match field.node.kind {
                            ast::named_field(_, vis) if vis != ast::private => {
                                check_attrs(cx, field.node.attrs, field.span,
                                            "missing documentation for a field");
1074
                            }
1075
                            ast::unnamed_field | ast::named_field(*) => {}
1076 1077 1078
                        }
                    }
                }
1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090

                ast::item_trait(*) if it.vis == ast::public => {
                    check_attrs(cx, it.attrs, it.span,
                                "missing documentation for a trait");
                }

                ast::item_fn(*) if it.vis == ast::public => {
                    check_attrs(cx, it.attrs, it.span,
                                "missing documentation for a function");
                }

                _ => {}
1091
            };
1092

1093
            visit::visit_item(it, (cx, vt));
1094
        },
1095

1096
        .. *visit::default_visitor()
1097 1098 1099
    })
}

1100
pub fn check_crate(tcx: ty::ctxt, crate: @ast::crate) {
1101 1102 1103 1104 1105
    let cx = @mut Context {
        dict: @get_lint_dict(),
        curr: SmallIntMap::new(),
        tcx: tcx,
        lint_stack: ~[],
1106
        visitors: ~[],
1107
        in_trait_impl: false,
1108
        doc_hidden: false,
1109 1110 1111 1112
    };

    // Install defaults.
    for cx.dict.each_value |spec| {
1113
        cx.set_level(spec.lint, spec.default, Default);
1114 1115 1116
    }

    // Install command-line options, overriding defaults.
1117
    for tcx.sess.opts.lint_opts.iter().advance |&(lint, level)| {
1118
        cx.set_level(lint, level, CommandLine);
1119 1120
    }

1121
    // Register each of the lint passes with the context
1122 1123 1124 1125 1126 1127 1128 1129
    cx.add_lint(lint_while_true());
    cx.add_lint(lint_path_statement());
    cx.add_lint(lint_heap());
    cx.add_lint(lint_type_limits());
    cx.add_lint(lint_unused_unsafe());
    cx.add_lint(lint_unused_mut());
    cx.add_lint(lint_session());
    cx.add_lint(lint_unnecessary_allocations());
1130
    cx.add_lint(lint_missing_doc());
1131

1132
    // Actually perform the lint checks (iterating the ast)
1133
    do cx.with_lint_attrs(crate.node.attrs) {
1134
        cx.process(Crate(crate));
1135

1136 1137
        visit::visit_crate(crate, (cx, visit::mk_vt(@visit::Visitor {
            visit_item: |it, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
1138
                do cx.with_lint_attrs(it.attrs) {
1139 1140 1141 1142 1143 1144
                    match it.node {
                        ast::item_impl(_, Some(*), _, _) => {
                            cx.in_trait_impl = true;
                        }
                        _ => {}
                    }
1145 1146 1147 1148 1149 1150
                    check_item_ctypes(cx, it);
                    check_item_non_camel_case_types(cx, it);
                    check_item_default_methods(cx, it);
                    check_item_heap(cx, it);

                    cx.process(Item(it));
1151
                    visit::visit_item(it, (cx, vt));
1152
                    cx.in_trait_impl = false;
1153 1154
                }
            },
1155
            visit_fn: |fk, decl, body, span, id, (cx, vt)| {
1156 1157 1158
                match *fk {
                    visit::fk_method(_, _, m) => {
                        do cx.with_lint_attrs(m.attrs) {
1159
                            cx.process(Method(m));
1160
                            visit::visit_fn(fk, decl, body, span, id, (cx, vt));
1161 1162 1163
                        }
                    }
                    _ => {
1164
                        visit::visit_fn(fk, decl, body, span, id, (cx, vt));
1165 1166 1167 1168
                    }
                }
            },
            .. *visit::default_visitor()
1169
        })));
1170 1171
    }

1172 1173
    // If we missed any lints added to the session, then there's a bug somewhere
    // in the iteration code.
1174
    for tcx.sess.lints.iter().advance |(_, v)| {
1175
        for v.iter().advance |t| {
1176 1177 1178 1179 1180 1181 1182
            match *t {
                (lint, span, ref msg) =>
                    tcx.sess.span_bug(span, fmt!("unprocessed lint %?: %s",
                                                 lint, *msg))
            }
        }
    }
1183

1184
    tcx.sess.abort_if_errors();
1185
}