lint.rs 37.7 KB
Newer Older
1 2 3 4 5 6 7 8 9 10
// Copyright 2012 The Rust Project Developers. See the COPYRIGHT
// file at the top-level directory of this distribution and at
// http://rust-lang.org/COPYRIGHT.
//
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
// option. This file may not be copied, modified, or distributed
// except according to those terms.

11

12
use driver::session;
P
Patrick Walton 已提交
13
use middle::ty;
14
use middle::pat_util;
P
Patrick Walton 已提交
15
use util::ppaux::{ty_to_str};
16

17 18 19 20 21 22 23 24 25 26
use std::cmp;
use std::hashmap::HashMap;
use std::i16;
use std::i32;
use std::i64;
use std::i8;
use std::u16;
use std::u32;
use std::u64;
use std::u8;
27
use extra::smallintmap::SmallIntMap;
28
use syntax::attr;
29
use syntax::attr::AttrMetaMethods;
30
use syntax::codemap::span;
J
John Clements 已提交
31
use syntax::codemap;
32
use syntax::{ast, visit, ast_util};
33

34 35 36 37 38 39 40
/**
 * A 'lint' check is a kind of miscellaneous constraint that a user _might_
 * want to enforce, but might reasonably want to permit as well, on a
 * module-by-module basis. They contrast with static constraints enforced by
 * other phases of the compiler, which are generally required to hold in order
 * to compile the program at all.
 *
41 42 43 44 45
 * The lint checking is all consolidated into one pass which runs just before
 * translation to LLVM bytecode. Throughout compilation, lint warnings can be
 * added via the `add_lint` method on the Session structure. This requires a
 * span and an id of the node that the lint is being added to. The lint isn't
 * actually emitted at that time because it is unknown what the actual lint
46
 * level at that location is.
47
 *
48 49 50 51 52 53
 * To actually emit lint warnings/errors, a separate pass is used just before
 * translation. A context keeps track of the current state of all lint levels.
 * Upon entering a node of the ast which can modify the lint settings, the
 * previous lint state is pushed onto a stack and the ast is then recursed upon.
 * As the ast is traversed, this keeps track of the current lint level for all
 * lint attributes.
54
 *
55 56 57 58 59 60 61 62 63 64 65 66 67 68
 * At each node of the ast which can modify lint attributes, all known lint
 * passes are also applied.  Each lint pass is a visit::vt<()> structure. These
 * visitors are constructed via the lint_*() functions below. There are also
 * some lint checks which operate directly on ast nodes (such as @ast::item),
 * and those are organized as check_item_*(). Each visitor added to the lint
 * context is modified to stop once it reaches a node which could alter the lint
 * levels. This means that everything is looked at once and only once by every
 * lint pass.
 *
 * With this all in place, to add a new lint warning, all you need to do is to
 * either invoke `add_lint` on the session at the appropriate time, or write a
 * lint pass in this module which is just an ast visitor. The context used when
 * traversing the ast has a `span_lint` method which only needs the span of the
 * item that's being warned about.
69
 */
70

71
#[deriving(Clone, Eq)]
72
pub enum lint {
P
Patrick Walton 已提交
73
    ctypes,
74
    unused_imports,
75
    unnecessary_qualification,
76 77
    while_true,
    path_statement,
78
    unrecognized_lint,
79
    non_camel_case_types,
80
    non_uppercase_statics,
81
    type_limits,
82
    unused_unsafe,
83

84 85 86 87
    managed_heap_memory,
    owned_heap_memory,
    heap_memory,

88 89
    unused_variable,
    dead_assignment,
90
    unused_mut,
91
    unnecessary_allocation,
92

93
    missing_doc,
94
    unreachable_code,
95 96

    warnings,
97 98
}

99
pub fn level_to_str(lv: level) -> &'static str {
100
    match lv {
101 102 103 104
      allow => "allow",
      warn => "warn",
      deny => "deny",
      forbid => "forbid"
105 106 107
    }
}

108
#[deriving(Clone, Eq, Ord)]
109
pub enum level {
110
    allow, warn, deny, forbid
111 112
}

113
#[deriving(Clone, Eq)]
114
pub struct LintSpec {
115
    lint: lint,
116
    desc: &'static str,
117
    default: level
118
}
119

120 121 122 123
impl Ord for LintSpec {
    fn lt(&self, other: &LintSpec) -> bool { self.default < other.default }
}

124
pub type LintDict = HashMap<&'static str, LintSpec>;
125 126 127 128

enum AttributedNode<'self> {
    Item(@ast::item),
    Method(&'self ast::method),
129
    Crate(@ast::Crate),
130
}
131

132 133 134 135 136 137 138
#[deriving(Eq)]
enum LintSource {
    Node(span),
    Default,
    CommandLine
}

S
Sangeun Kim 已提交
139 140 141 142
static lint_table: &'static [(&'static str, LintSpec)] = &[
    ("ctypes",
     LintSpec {
        lint: ctypes,
143
        desc: "proper use of std::libc types in foreign modules",
S
Sangeun Kim 已提交
144 145 146 147 148 149 150 151 152 153
        default: warn
     }),

    ("unused_imports",
     LintSpec {
        lint: unused_imports,
        desc: "imports that are never used",
        default: warn
     }),

154 155 156 157 158 159 160
    ("unnecessary_qualification",
     LintSpec {
        lint: unnecessary_qualification,
        desc: "detects unnecessarily qualified names",
        default: allow
     }),

S
Sangeun Kim 已提交
161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188
    ("while_true",
     LintSpec {
        lint: while_true,
        desc: "suggest using loop { } instead of while(true) { }",
        default: warn
     }),

    ("path_statement",
     LintSpec {
        lint: path_statement,
        desc: "path statements with no effect",
        default: warn
     }),

    ("unrecognized_lint",
     LintSpec {
        lint: unrecognized_lint,
        desc: "unrecognized lint attribute",
        default: warn
     }),

    ("non_camel_case_types",
     LintSpec {
        lint: non_camel_case_types,
        desc: "types, variants and traits should have camel case names",
        default: allow
     }),

189 190 191 192
    ("non_uppercase_statics",
     LintSpec {
         lint: non_uppercase_statics,
         desc: "static constants should have uppercase identifiers",
193
         default: allow
194 195
     }),

S
Sangeun Kim 已提交
196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250
    ("managed_heap_memory",
     LintSpec {
        lint: managed_heap_memory,
        desc: "use of managed (@ type) heap memory",
        default: allow
     }),

    ("owned_heap_memory",
     LintSpec {
        lint: owned_heap_memory,
        desc: "use of owned (~ type) heap memory",
        default: allow
     }),

    ("heap_memory",
     LintSpec {
        lint: heap_memory,
        desc: "use of any (~ type or @ type) heap memory",
        default: allow
     }),

    ("type_limits",
     LintSpec {
        lint: type_limits,
        desc: "comparisons made useless by limits of the types involved",
        default: warn
     }),

    ("unused_unsafe",
     LintSpec {
        lint: unused_unsafe,
        desc: "unnecessary use of an `unsafe` block",
        default: warn
    }),

    ("unused_variable",
     LintSpec {
        lint: unused_variable,
        desc: "detect variables which are not used in any way",
        default: warn
    }),

    ("dead_assignment",
     LintSpec {
        lint: dead_assignment,
        desc: "detect assignments that will never be read",
        default: warn
    }),

    ("unused_mut",
     LintSpec {
        lint: unused_mut,
        desc: "detect mut variables which don't need to be mutable",
        default: warn
    }),
251 252 253 254 255 256 257

    ("unnecessary_allocation",
     LintSpec {
        lint: unnecessary_allocation,
        desc: "detects unnecessary allocations that can be eliminated",
        default: warn
    }),
258

259
    ("missing_doc",
260
     LintSpec {
261 262
        lint: missing_doc,
        desc: "detects missing documentation for public members",
263 264
        default: allow
    }),
265 266 267 268 269 270 271

    ("unreachable_code",
     LintSpec {
        lint: unreachable_code,
        desc: "detects unreachable code",
        default: warn
    }),
272 273 274 275 276 277 278

    ("warnings",
     LintSpec {
        lint: warnings,
        desc: "mass-change the level for lints which produce warnings",
        default: warn
    }),
S
Sangeun Kim 已提交
279 280
];

281 282 283 284
/*
  Pass names should not contain a '-', as the compiler normalizes
  '-' to '_' in command-line flags
 */
285
pub fn get_lint_dict() -> LintDict {
286
    let mut map = HashMap::new();
287
    for lint_table.iter().advance |&(k, v)| {
288
        map.insert(k, v);
289
    }
290
    return map;
291 292
}

293
struct Context {
294 295 296
    // All known lint modes (string versions)
    dict: @LintDict,
    // Current levels of each lint warning
297
    curr: SmallIntMap<(level, LintSource)>,
298 299
    // context we're checking in (used to access fields like sess)
    tcx: ty::ctxt,
300 301 302
    // Just a simple flag if we're currently recursing into a trait
    // implementation. This is only used by the lint_missing_doc() pass
    in_trait_impl: bool,
303 304 305 306
    // Another flag for doc lint emissions. Does some parent of the current node
    // have the doc(hidden) attribute? Treating this as allow(missing_doc) would
    // play badly with forbid(missing_doc) when it shouldn't.
    doc_hidden: bool,
307 308 309
    // When recursing into an attributed node of the ast which modifies lint
    // levels, this stack keeps track of the previous lint levels of whatever
    // was modified.
310
    lint_stack: ~[(lint, level, LintSource)],
311 312 313 314 315
    // Each of these visitors represents a lint pass. A number of the lint
    // attributes are registered by adding a visitor to iterate over the ast.
    // Others operate directly on @ast::item structures (or similar). Finally,
    // others still are added to the Session object via `add_lint`, and these
    // are all passed with the lint_session visitor.
316 317 318 319 320 321 322 323 324
    //
    // This is a pair so every visitor can visit every node. When a lint pass is
    // registered, another visitor is created which stops at all items which can
    // alter the attributes of the ast. This "item stopping visitor" is the
    // second element of the pair, while the original visitor is the first
    // element. This means that when visiting a node, the original recursive
    // call can used the original visitor's method, although the recursing
    // visitor supplied to the method is the item stopping visitor.
    visitors: ~[(visit::vt<@mut Context>, visit::vt<@mut Context>)],
325
}
326

327
impl Context {
328
    fn get_level(&self, lint: lint) -> level {
329
        match self.curr.find(&(lint as uint)) {
330
          Some(&(lvl, _)) => lvl,
331 332
          None => allow
        }
333 334
    }

335 336 337 338 339 340 341 342
    fn get_source(&self, lint: lint) -> LintSource {
        match self.curr.find(&(lint as uint)) {
          Some(&(_, src)) => src,
          None => Default
        }
    }

    fn set_level(&mut self, lint: lint, level: level, src: LintSource) {
343
        if level == allow {
D
Daniel Micay 已提交
344
            self.curr.remove(&(lint as uint));
345
        } else {
346 347 348 349
            self.curr.insert(lint as uint, (level, src));
        }
    }

350
    fn lint_to_str(&self, lint: lint) -> &'static str {
351
        for self.dict.iter().advance |(k, v)| {
352
            if v.lint == lint {
353
                return *k;
354
            }
355
        }
356
        fail!("unregistered lint %?", lint);
357 358
    }

359
    fn span_lint(&self, lint: lint, span: span, msg: &str) {
360
        let (level, src) = match self.curr.find(&(lint as uint)) {
361 362
            None => { return }
            Some(&(warn, src)) => (self.get_level(warnings), src),
363 364
            Some(&pair) => pair,
        };
365
        if level == allow { return }
366 367 368 369 370 371 372

        let mut note = None;
        let msg = match src {
            Default | CommandLine => {
                fmt!("%s [-%c %s%s]", msg, match level {
                        warn => 'W', deny => 'D', forbid => 'F',
                        allow => fail!()
373
                    }, self.lint_to_str(lint).replace("_", "-"),
374 375 376 377 378 379 380 381 382 383 384 385 386
                    if src == Default { " (default)" } else { "" })
            },
            Node(src) => {
                note = Some(src);
                msg.to_str()
            }
        };
        match level {
            warn =>          { self.tcx.sess.span_warn(span, msg); }
            deny | forbid => { self.tcx.sess.span_err(span, msg);  }
            allow => fail!(),
        }

387
        for note.iter().advance |&span| {
388 389
            self.tcx.sess.span_note(span, "lint level defined here");
        }
390 391
    }

392
    /**
393
     * Merge the lints specified by any lint attributes into the
394
     * current lint context, call the provided function, then reset the
395
     * lints in effect to their previous state.
396
     */
397
    fn with_lint_attrs(@mut self, attrs: &[ast::Attribute], f: &fn()) {
398 399 400 401 402
        // Parse all of the lint attributes, and then add them all to the
        // current dictionary of lint information. Along the way, keep a history
        // of what we changed so we can roll everything back after invoking the
        // specified closure
        let mut pushed = 0u;
403
        for each_lint(self.tcx.sess, attrs) |meta, level, lintname| {
404
            let lint = match self.dict.find_equiv(&lintname) {
B
Brian Anderson 已提交
405
              None => {
406
                self.span_lint(
407
                    unrecognized_lint,
408
                    meta.span,
P
Paul Stansifer 已提交
409
                    fmt!("unknown `%s` attribute: `%s`",
410
                         level_to_str(level), lintname));
411
                loop
412
              }
413 414
              Some(lint) => { lint.lint }
            };
415

416 417 418 419 420
            let now = self.get_level(lint);
            if now == forbid && level != forbid {
                self.tcx.sess.span_err(meta.span,
                    fmt!("%s(%s) overruled by outer forbid(%s)",
                         level_to_str(level),
421
                         lintname, lintname));
422
                loop;
423
            }
424

425
            if now != level {
426 427
                let src = self.get_source(lint);
                self.lint_stack.push((lint, now, src));
428
                pushed += 1;
429
                self.set_level(lint, level, Node(meta.span));
430
            }
431
        }
432

433
        // detect doc(hidden)
434 435 436 437 438
        let mut doc_hidden = do attrs.iter().any |attr| {
            "doc" == attr.name() &&
                match attr.meta_item_list() {
                    Some(l) => attr::contains_name(l, "hidden"),
                    None    => false // not of the form #[doc(...)]
439
                }
440 441
        };

442 443 444 445 446 447
        if doc_hidden && !self.doc_hidden {
            self.doc_hidden = true;
        } else {
            doc_hidden = false;
        }

448
        f();
449

450
        // rollback
451 452 453
        if doc_hidden && self.doc_hidden {
            self.doc_hidden = false;
        }
454
        for pushed.times {
455 456
            let (lint, lvl, src) = self.lint_stack.pop();
            self.set_level(lint, lvl, src);
457
        }
458 459
    }

460
    fn add_lint(&mut self, v: visit::vt<@mut Context>) {
461
        self.visitors.push((v, item_stopping_visitor(v)));
462 463
    }

464
    fn process(@mut self, n: AttributedNode) {
465 466
        // see comment of the `visitors` field in the struct for why there's a
        // pair instead of just one visitor.
467
        match n {
468
            Item(it) => {
469
                for self.visitors.iter().advance |&(orig, stopping)| {
470
                    (orig.visit_item)(it, (self, stopping));
471 472 473
                }
            }
            Crate(c) => {
474
                for self.visitors.iter().advance |&(_, stopping)| {
475
                    visit::visit_crate(c, (self, stopping));
476 477
                }
            }
478 479 480
            // Can't use visit::visit_method_helper because the
            // item_stopping_visitor has overridden visit_fn(&fk_method(... ))
            // to be a no-op, so manually invoke visit_fn.
481
            Method(m) => {
482
                let fk = visit::fk_method(m.ident, &m.generics, m);
483
                for self.visitors.iter().advance |&(orig, stopping)| {
484
                    (orig.visit_fn)(&fk, &m.decl, &m.body, m.span, m.id,
485
                                    (self, stopping));
486 487
                }
            }
488 489 490 491
        }
    }
}

492
pub fn each_lint(sess: session::Session,
493 494
                 attrs: &[ast::Attribute],
                 f: &fn(@ast::MetaItem, level, @str) -> bool) -> bool {
495 496
    let xs = [allow, warn, deny, forbid];
    for xs.iter().advance |&level| {
497
        let level_name = level_to_str(level);
498
        for attrs.iter().filter(|m| level_name == m.name()).advance |attr| {
499 500
            let meta = attr.node.value;
            let metas = match meta.node {
501
                ast::MetaList(_, ref metas) => metas,
502
                _ => {
503
                    sess.span_err(meta.span, "malformed lint attribute");
504 505 506
                    loop;
                }
            };
507
            for metas.iter().advance |meta| {
508
                match meta.node {
509
                    ast::MetaWord(lintname) => {
510 511 512 513 514
                        if !f(*meta, level, lintname) {
                            return false;
                        }
                    }
                    _ => {
515
                        sess.span_err(meta.span, "malformed lint attribute");
516 517 518 519 520
                    }
                }
            }
        }
    }
521
    true
522 523
}

524 525 526 527
// Take a visitor, and modify it so that it will not proceed past subitems.
// This is used to make the simple visitors used for the lint passes
// not traverse into subitems, since that is handled by the outer
// lint visitor.
528
fn item_stopping_visitor<E>(outer: visit::vt<E>) -> visit::vt<E> {
529
    visit::mk_vt(@visit::Visitor {
530 531
        visit_item: |_i, (_e, _v)| { },
        visit_fn: |fk, fd, b, s, id, (e, v)| {
532 533
            match *fk {
                visit::fk_method(*) => {}
534
                _ => (outer.visit_fn)(fk, fd, b, s, id, (e, v))
535 536
            }
        },
537
    .. **outer})
538 539
}

540 541
fn lint_while_true() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
542
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
543 544 545 546 547 548 549 550 551
            match e.node {
                ast::expr_while(cond, _) => {
                    match cond.node {
                        ast::expr_lit(@codemap::spanned {
                            node: ast::lit_bool(true), _}) =>
                        {
                            cx.span_lint(while_true, e.span,
                                         "denote infinite loops with \
                                          loop { ... }");
552
                        }
553
                        _ => ()
554 555
                    }
                }
556 557
                _ => ()
            }
558
            visit::visit_expr(e, (cx, vt));
559
        },
560
        .. *visit::default_visitor()
561
    })
V
Viktor Dahl 已提交
562 563
}

564
fn lint_type_limits() -> visit::vt<@mut Context> {
565
    fn is_valid<T:cmp::Ord>(binop: ast::binop, v: T,
566 567 568 569 570 571 572
            min: T, max: T) -> bool {
        match binop {
            ast::lt => v <= max,
            ast::le => v < max,
            ast::gt => v >= min,
            ast::ge => v > min,
            ast::eq | ast::ne => v >= min && v <= max,
573
            _ => fail!()
574 575 576
        }
    }

577
    fn rev_binop(binop: ast::binop) -> ast::binop {
578 579 580 581 582 583 584 585 586
        match binop {
            ast::lt => ast::gt,
            ast::le => ast::ge,
            ast::gt => ast::lt,
            ast::ge => ast::le,
            _ => binop
        }
    }

587 588
    // for int & uint, be conservative with the warnings, so that the
    // warnings are consistent between 32- and 64-bit platforms
589
    fn int_ty_range(int_ty: ast::int_ty) -> (i64, i64) {
590
        match int_ty {
591
            ast::ty_i =>    (i64::min_value,        i64::max_value),
592 593 594 595 596 597 598 599
            ast::ty_char => (u32::min_value as i64, u32::max_value as i64),
            ast::ty_i8 =>   (i8::min_value  as i64, i8::max_value  as i64),
            ast::ty_i16 =>  (i16::min_value as i64, i16::max_value as i64),
            ast::ty_i32 =>  (i32::min_value as i64, i32::max_value as i64),
            ast::ty_i64 =>  (i64::min_value,        i64::max_value)
        }
    }

600
    fn uint_ty_range(uint_ty: ast::uint_ty) -> (u64, u64) {
601
        match uint_ty {
602
            ast::ty_u =>   (u64::min_value,         u64::max_value),
603 604 605 606 607 608 609
            ast::ty_u8 =>  (u8::min_value   as u64, u8::max_value   as u64),
            ast::ty_u16 => (u16::min_value  as u64, u16::max_value  as u64),
            ast::ty_u32 => (u32::min_value  as u64, u32::max_value  as u64),
            ast::ty_u64 => (u64::min_value,         u64::max_value)
        }
    }

610 611 612 613 614
    fn check_limits(cx: &Context,
                    binop: ast::binop,
                    l: @ast::expr,
                    r: @ast::expr)
                    -> bool {
615 616 617
        let (lit, expr, swap) = match (&l.node, &r.node) {
            (&ast::expr_lit(_), _) => (l, r, true),
            (_, &ast::expr_lit(_)) => (r, l, false),
618 619 620 621
            _ => return true
        };
        // Normalize the binop so that the literal is always on the RHS in
        // the comparison
622
        let norm_binop = if swap {
623 624 625 626
            rev_binop(binop)
        } else {
            binop
        };
627
        match ty::get(ty::expr_ty(cx.tcx, expr)).sty {
628 629 630 631 632 633 634 635 636
            ty::ty_int(int_ty) => {
                let (min, max) = int_ty_range(int_ty);
                let lit_val: i64 = match lit.node {
                    ast::expr_lit(@li) => match li.node {
                        ast::lit_int(v, _) => v,
                        ast::lit_uint(v, _) => v as i64,
                        ast::lit_int_unsuffixed(v) => v,
                        _ => return true
                    },
637
                    _ => fail!()
638 639 640 641 642 643 644 645 646 647 648 649
                };
                is_valid(norm_binop, lit_val, min, max)
            }
            ty::ty_uint(uint_ty) => {
                let (min, max): (u64, u64) = uint_ty_range(uint_ty);
                let lit_val: u64 = match lit.node {
                    ast::expr_lit(@li) => match li.node {
                        ast::lit_int(v, _) => v as u64,
                        ast::lit_uint(v, _) => v,
                        ast::lit_int_unsuffixed(v) => v as u64,
                        _ => return true
                    },
650
                    _ => fail!()
651 652 653 654 655 656 657
                };
                is_valid(norm_binop, lit_val, min, max)
            }
            _ => true
        }
    }

658
    fn is_comparison(binop: ast::binop) -> bool {
659 660 661 662 663 664 665
        match binop {
            ast::eq | ast::lt | ast::le |
            ast::ne | ast::ge | ast::gt => true,
            _ => false
        }
    }

666
    visit::mk_vt(@visit::Visitor {
667
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
668
            match e.node {
669
                ast::expr_binary(_, ref binop, l, r) => {
670 671 672 673 674
                    if is_comparison(*binop)
                        && !check_limits(cx, *binop, l, r) {
                        cx.span_lint(type_limits, e.span,
                                     "comparison is useless due to type limits");
                    }
675
                }
676
                _ => ()
677
            }
678
            visit::visit_expr(e, (cx, vt));
679
        },
680

681
        .. *visit::default_visitor()
682
    })
683 684
}

685 686
fn check_item_ctypes(cx: &Context, it: &ast::item) {
    fn check_ty(cx: &Context, ty: &ast::Ty) {
687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702
        match ty.node {
            ast::ty_path(_, _, id) => {
                match cx.tcx.def_map.get_copy(&id) {
                    ast::def_prim_ty(ast::ty_int(ast::ty_i)) => {
                        cx.span_lint(ctypes, ty.span,
                                "found rust type `int` in foreign module, while \
                                libc::c_int or libc::c_long should be used");
                    }
                    ast::def_prim_ty(ast::ty_uint(ast::ty_u)) => {
                        cx.span_lint(ctypes, ty.span,
                                "found rust type `uint` in foreign module, while \
                                libc::c_uint or libc::c_ulong should be used");
                    }
                    _ => ()
                }
            }
703
            ast::ty_ptr(ref mt) => { check_ty(cx, mt.ty) }
704 705 706
            _ => ()
        }
    }
707

708
    fn check_foreign_fn(cx: &Context, decl: &ast::fn_decl) {
709
        for decl.inputs.iter().advance |in| {
J
James Miller 已提交
710
            check_ty(cx, &in.ty);
711
        }
J
James Miller 已提交
712
        check_ty(cx, &decl.output)
713 714
    }

715
    match it.node {
716
      ast::item_foreign_mod(ref nmod) if !nmod.abis.is_intrinsic() => {
717
        for nmod.items.iter().advance |ni| {
718
            match ni.node {
719 720 721
                ast::foreign_item_fn(ref decl, _, _) => {
                    check_foreign_fn(cx, decl);
                }
J
James Miller 已提交
722
                ast::foreign_item_static(ref t, _) => { check_ty(cx, t); }
723 724
            }
        }
725
      }
B
Brian Anderson 已提交
726
      _ => {/* nothing to do */ }
727 728
    }
}
729

730
fn check_type_for_lint(cx: &Context, lint: lint, span: span, ty: ty::t) {
731
    if cx.get_level(lint) == allow { return }
732

733 734 735 736 737 738 739 740 741 742
    let mut n_box = 0;
    let mut n_uniq = 0;
    ty::fold_ty(cx.tcx, ty, |t| {
        match ty::get(t).sty {
          ty::ty_box(_) => n_box += 1,
          ty::ty_uniq(_) => n_uniq += 1,
          _ => ()
        };
        t
    });
743

744 745 746 747 748
    if n_uniq > 0 && lint != managed_heap_memory {
        let s = ty_to_str(cx.tcx, ty);
        let m = ~"type uses owned (~ type) pointers: " + s;
        cx.span_lint(lint, span, m);
    }
749

750 751 752 753
    if n_box > 0 && lint != owned_heap_memory {
        let s = ty_to_str(cx.tcx, ty);
        let m = ~"type uses managed (@ type) pointers: " + s;
        cx.span_lint(lint, span, m);
754
    }
755
}
756

757
fn check_type(cx: &Context, span: span, ty: ty::t) {
758 759
    let xs = [managed_heap_memory, owned_heap_memory, heap_memory];
    for xs.iter().advance |lint| {
760
        check_type_for_lint(cx, *lint, span, ty);
761
    }
762
}
763

764
fn check_item_heap(cx: &Context, it: &ast::item) {
765 766 767 768 769 770 771 772 773
    match it.node {
      ast::item_fn(*) |
      ast::item_ty(*) |
      ast::item_enum(*) |
      ast::item_struct(*) => check_type(cx, it.span,
                                        ty::node_id_to_type(cx.tcx,
                                                            it.id)),
      _ => ()
    }
774

775 776 777
    // If it's a struct, we also have to check the fields' types
    match it.node {
        ast::item_struct(struct_def, _) => {
778
            for struct_def.fields.iter().advance |struct_field| {
779 780 781
                check_type(cx, struct_field.span,
                           ty::node_id_to_type(cx.tcx,
                                               struct_field.node.id));
782 783 784 785
            }
        }
        _ => ()
    }
786
}
787

788 789
fn lint_heap() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
790
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
791 792
            let ty = ty::expr_ty(cx.tcx, e);
            check_type(cx, e.span, ty);
793
            visit::visit_expr(e, (cx, vt));
794
        },
795
        .. *visit::default_visitor()
796
    })
797 798
}

799 800
fn lint_path_statement() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
801
        visit_stmt: |s, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
802 803 804 805 806 807 808
            match s.node {
                ast::stmt_semi(
                    @ast::expr { node: ast::expr_path(_), _ },
                    _
                ) => {
                    cx.span_lint(path_statement, s.span,
                                 "path statement with no effect");
809
                }
810 811
                _ => ()
            }
812
            visit::visit_stmt(s, (cx, vt));
813
        },
814
        .. *visit::default_visitor()
815
    })
816 817
}

818
fn check_item_non_camel_case_types(cx: &Context, it: &ast::item) {
P
Paul Stansifer 已提交
819 820
    fn is_camel_case(cx: ty::ctxt, ident: ast::ident) -> bool {
        let ident = cx.sess.str_of(ident);
P
Patrick Walton 已提交
821
        assert!(!ident.is_empty());
822
        let ident = ident.trim_chars(&'_');
823 824 825 826

        // start with a non-lowercase letter rather than non-uppercase
        // ones (some scripts don't have a concept of upper/lowercase)
        !ident.char_at(0).is_lowercase() &&
827 828 829
            !ident.contains_char('_')
    }

830
    fn check_case(cx: &Context, sort: &str, ident: ast::ident, span: span) {
831
        if !is_camel_case(cx.tcx, ident) {
832 833 834 835
            cx.span_lint(
                non_camel_case_types, span,
                fmt!("%s `%s` should have a camel case identifier",
                    sort, cx.tcx.sess.str_of(ident)));
836 837 838
        }
    }

839
    match it.node {
840 841 842
        ast::item_ty(*) | ast::item_struct(*) => {
            check_case(cx, "type", it.ident, it.span)
        }
E
Erick Tryzelaar 已提交
843
        ast::item_trait(*) => {
844
            check_case(cx, "trait", it.ident, it.span)
845
        }
E
Erick Tryzelaar 已提交
846
        ast::item_enum(ref enum_definition, _) => {
847
            check_case(cx, "type", it.ident, it.span);
848
            for enum_definition.variants.iter().advance |variant| {
849
                check_case(cx, "variant", variant.node.name, variant.span);
E
Erick Tryzelaar 已提交
850 851 852
            }
        }
        _ => ()
853 854 855
    }
}

856 857 858 859 860 861 862 863
fn check_item_non_uppercase_statics(cx: &Context, it: &ast::item) {
    match it.node {
        // only check static constants
        ast::item_static(_, ast::m_imm, _) => {
            let s = cx.tcx.sess.str_of(it.ident);
            // check for lowercase letters rather than non-uppercase
            // ones (some scripts don't have a concept of
            // upper/lowercase)
864
            if s.iter().any(|c| c.is_lowercase()) {
865 866 867 868 869 870 871 872
                cx.span_lint(non_uppercase_statics, it.span,
                             "static constant should have an uppercase identifier");
            }
        }
        _ => {}
    }
}

873 874
fn lint_unused_unsafe() -> visit::vt<@mut Context> {
    visit::mk_vt(@visit::Visitor {
875
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
876
            match e.node {
877
                ast::expr_block(ref blk) if blk.rules == ast::UnsafeBlock => {
878
                    if !cx.tcx.used_unsafe.contains(&blk.id) {
879 880 881
                        cx.span_lint(unused_unsafe, blk.span,
                                     "unnecessary `unsafe` block");
                    }
882
                }
883
                _ => ()
884
            }
885
            visit::visit_expr(e, (cx, vt));
886 887
        },
        .. *visit::default_visitor()
888
    })
889 890
}

891 892
fn lint_unused_mut() -> visit::vt<@mut Context> {
    fn check_pat(cx: &Context, p: @ast::pat) {
893 894
        let mut used = false;
        let mut bindings = 0;
895 896
        do pat_util::pat_bindings(cx.tcx.def_map, p) |_, id, _, _| {
            used = used || cx.tcx.used_mut_nodes.contains(&id);
897 898 899 900
            bindings += 1;
        }
        if !used {
            let msg = if bindings == 1 {
S
Seo Sanghyeon 已提交
901
                "variable does not need to be mutable"
902
            } else {
S
Seo Sanghyeon 已提交
903
                "variables do not need to be mutable"
904
            };
905
            cx.span_lint(unused_mut, p.span, msg);
906
        }
907
    }
908

909
    fn visit_fn_decl(cx: &Context, fd: &ast::fn_decl) {
910
        for fd.inputs.iter().advance |arg| {
911
            if arg.is_mutbl {
912
                check_pat(cx, arg.pat);
913 914
            }
        }
915
    }
916

917
    visit::mk_vt(@visit::Visitor {
918
        visit_local: |l, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
919 920
            if l.is_mutbl {
                check_pat(cx, l.pat);
921
            }
922
            visit::visit_local(l, (cx, vt));
923
        },
924
        visit_fn: |a, fd, b, c, d, (cx, vt)| {
925
            visit_fn_decl(cx, fd);
926
            visit::visit_fn(a, fd, b, c, d, (cx, vt));
927
        },
928
        visit_ty_method: |tm, (cx, vt)| {
929
            visit_fn_decl(cx, &tm.decl);
930
            visit::visit_ty_method(tm, (cx, vt));
931
        },
932
        visit_trait_method: |tm, (cx, vt)| {
933
            match *tm {
934 935
                ast::required(ref tm) => visit_fn_decl(cx, &tm.decl),
                ast::provided(m) => visit_fn_decl(cx, &m.decl)
936
            }
937
            visit::visit_trait_method(tm, (cx, vt));
938
        },
939
        .. *visit::default_visitor()
940
    })
941 942
}

943 944
fn lint_session() -> visit::vt<@mut Context> {
    ast_util::id_visitor(|id, cx: @mut Context| {
945 946 947
        match cx.tcx.sess.lints.pop(&id) {
            None => {},
            Some(l) => {
948
                for l.consume_iter().advance |(lint, span, msg)| {
949
                    cx.span_lint(lint, span, msg)
950
                }
951 952
            }
        }
953
    })
954 955
}

956
fn lint_unnecessary_allocations() -> visit::vt<@mut Context> {
957 958
    // Warn if string and vector literals with sigils are immediately borrowed.
    // Those can have the sigil removed.
959
    fn check(cx: &Context, e: &ast::expr) {
960 961 962 963 964 965 966 967 968 969 970 971 972 973
        match e.node {
            ast::expr_vstore(e2, ast::expr_vstore_uniq) |
            ast::expr_vstore(e2, ast::expr_vstore_box) => {
                match e2.node {
                    ast::expr_lit(@codemap::spanned{
                            node: ast::lit_str(*), _}) |
                    ast::expr_vec(*) => {}
                    _ => return
                }
            }

            _ => return
        }

974 975 976
        match cx.tcx.adjustments.find_copy(&e.id) {
            Some(@ty::AutoDerefRef(ty::AutoDerefRef {
                autoref: Some(ty::AutoBorrowVec(*)), _ })) => {
977 978 979 980 981 982 983 984 985
                cx.span_lint(unnecessary_allocation,
                             e.span, "unnecessary allocation, the sigil can be \
                                      removed");
            }

            _ => ()
        }
    }

986
    visit::mk_vt(@visit::Visitor {
987
        visit_expr: |e, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
988
            check(cx, e);
989
            visit::visit_expr(e, (cx, vt));
990 991
        },
        .. *visit::default_visitor()
992 993 994
    })
}

995
fn lint_missing_doc() -> visit::vt<@mut Context> {
996
    fn check_attrs(cx: @mut Context, attrs: &[ast::Attribute],
997
                   sp: span, msg: &str) {
998 999 1000 1001 1002 1003
        // If we're building a test harness, then warning about documentation is
        // probably not really relevant right now
        if cx.tcx.sess.opts.test { return }
        // If we have doc(hidden), nothing to do
        if cx.doc_hidden { return }
        // If we're documented, nothing to do
1004
        if attrs.iter().any(|a| a.node.is_sugared_doc) { return }
1005 1006 1007

        // otherwise, warn!
        cx.span_lint(missing_doc, sp, msg);
1008 1009
    }

1010
    visit::mk_vt(@visit::Visitor {
1011
        visit_ty_method: |m, (cx, vt)| {
1012 1013 1014 1015
            // All ty_method objects are linted about because they're part of a
            // trait (no visibility)
            check_attrs(cx, m.attrs, m.span,
                        "missing documentation for a method");
1016
            visit::visit_ty_method(m, (cx, vt));
1017
        },
1018

1019
        visit_fn: |fk, d, b, sp, id, (cx, vt)| {
1020 1021 1022 1023 1024 1025 1026 1027 1028
            // Only warn about explicitly public methods. Soon implicit
            // public-ness will hopefully be going away.
            match *fk {
                visit::fk_method(_, _, m) if m.vis == ast::public => {
                    // If we're in a trait implementation, no need to duplicate
                    // documentation
                    if !cx.in_trait_impl {
                        check_attrs(cx, m.attrs, sp,
                                    "missing documentation for a method");
1029 1030
                    }
                }
1031

1032 1033
                _ => {}
            }
1034
            visit::visit_fn(fk, d, b, sp, id, (cx, vt));
1035 1036
        },

1037
        visit_item: |it, (cx, vt)| {
1038 1039 1040 1041 1042 1043 1044
            match it.node {
                // Go ahead and match the fields here instead of using
                // visit_struct_field while we have access to the enclosing
                // struct's visibility
                ast::item_struct(sdef, _) if it.vis == ast::public => {
                    check_attrs(cx, it.attrs, it.span,
                                "missing documentation for a struct");
1045
                    for sdef.fields.iter().advance |field| {
1046 1047 1048 1049
                        match field.node.kind {
                            ast::named_field(_, vis) if vis != ast::private => {
                                check_attrs(cx, field.node.attrs, field.span,
                                            "missing documentation for a field");
1050
                            }
1051
                            ast::unnamed_field | ast::named_field(*) => {}
1052 1053 1054
                        }
                    }
                }
1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066

                ast::item_trait(*) if it.vis == ast::public => {
                    check_attrs(cx, it.attrs, it.span,
                                "missing documentation for a trait");
                }

                ast::item_fn(*) if it.vis == ast::public => {
                    check_attrs(cx, it.attrs, it.span,
                                "missing documentation for a function");
                }

                _ => {}
1067
            };
1068

1069
            visit::visit_item(it, (cx, vt));
1070
        },
1071

1072
        .. *visit::default_visitor()
1073 1074 1075
    })
}

1076
pub fn check_crate(tcx: ty::ctxt, crate: @ast::Crate) {
1077 1078 1079 1080 1081
    let cx = @mut Context {
        dict: @get_lint_dict(),
        curr: SmallIntMap::new(),
        tcx: tcx,
        lint_stack: ~[],
1082
        visitors: ~[],
1083
        in_trait_impl: false,
1084
        doc_hidden: false,
1085 1086 1087 1088
    };

    // Install defaults.
    for cx.dict.each_value |spec| {
1089
        cx.set_level(spec.lint, spec.default, Default);
1090 1091 1092
    }

    // Install command-line options, overriding defaults.
1093
    for tcx.sess.opts.lint_opts.iter().advance |&(lint, level)| {
1094
        cx.set_level(lint, level, CommandLine);
1095 1096
    }

1097
    // Register each of the lint passes with the context
1098 1099 1100 1101 1102 1103 1104 1105
    cx.add_lint(lint_while_true());
    cx.add_lint(lint_path_statement());
    cx.add_lint(lint_heap());
    cx.add_lint(lint_type_limits());
    cx.add_lint(lint_unused_unsafe());
    cx.add_lint(lint_unused_mut());
    cx.add_lint(lint_session());
    cx.add_lint(lint_unnecessary_allocations());
1106
    cx.add_lint(lint_missing_doc());
1107

1108
    // Actually perform the lint checks (iterating the ast)
1109
    do cx.with_lint_attrs(crate.attrs) {
1110
        cx.process(Crate(crate));
1111

1112 1113
        visit::visit_crate(crate, (cx, visit::mk_vt(@visit::Visitor {
            visit_item: |it, (cx, vt): (@mut Context, visit::vt<@mut Context>)| {
1114
                do cx.with_lint_attrs(it.attrs) {
1115 1116 1117 1118 1119 1120
                    match it.node {
                        ast::item_impl(_, Some(*), _, _) => {
                            cx.in_trait_impl = true;
                        }
                        _ => {}
                    }
1121 1122
                    check_item_ctypes(cx, it);
                    check_item_non_camel_case_types(cx, it);
1123
                    check_item_non_uppercase_statics(cx, it);
1124 1125 1126
                    check_item_heap(cx, it);

                    cx.process(Item(it));
1127
                    visit::visit_item(it, (cx, vt));
1128
                    cx.in_trait_impl = false;
1129 1130
                }
            },
1131
            visit_fn: |fk, decl, body, span, id, (cx, vt)| {
1132 1133 1134
                match *fk {
                    visit::fk_method(_, _, m) => {
                        do cx.with_lint_attrs(m.attrs) {
1135
                            cx.process(Method(m));
1136
                            visit::visit_fn(fk, decl, body, span, id, (cx, vt));
1137 1138 1139
                        }
                    }
                    _ => {
1140
                        visit::visit_fn(fk, decl, body, span, id, (cx, vt));
1141 1142 1143 1144
                    }
                }
            },
            .. *visit::default_visitor()
1145
        })));
1146 1147
    }

1148 1149
    // If we missed any lints added to the session, then there's a bug somewhere
    // in the iteration code.
1150
    for tcx.sess.lints.iter().advance |(_, v)| {
1151
        for v.iter().advance |t| {
1152 1153 1154 1155 1156 1157 1158
            match *t {
                (lint, span, ref msg) =>
                    tcx.sess.span_bug(span, fmt!("unprocessed lint %?: %s",
                                                 lint, *msg))
            }
        }
    }
1159

1160
    tcx.sess.abort_if_errors();
1161
}