1use std::fmt::Write;
17
18use ast::token::TokenKind;
19use rustc_abi::BackendRepr;
20use rustc_ast::tokenstream::{TokenStream, TokenTree};
21use rustc_ast::visit::{FnCtxt, FnKind};
22use rustc_ast::{self as ast, *};
23use rustc_ast_pretty::pprust::expr_to_string;
24use rustc_attr_parsing::AttributeParser;
25use rustc_errors::{Applicability, LintDiagnostic, msg};
26use rustc_feature::GateIssue;
27use rustc_hir as hir;
28use rustc_hir::attrs::{AttributeKind, DocAttribute};
29use rustc_hir::def::{DefKind, Res};
30use rustc_hir::def_id::{CRATE_DEF_ID, DefId, LocalDefId};
31use rustc_hir::intravisit::FnKind as HirFnKind;
32use rustc_hir::{Body, FnDecl, ImplItemImplKind, PatKind, PredicateOrigin, find_attr};
33use rustc_middle::bug;
34use rustc_middle::lint::LevelAndSource;
35use rustc_middle::ty::layout::LayoutOf;
36use rustc_middle::ty::print::with_no_trimmed_paths;
37use rustc_middle::ty::{self, AssocContainer, Ty, TyCtxt, TypeVisitableExt, Upcast, VariantDef};
38pub use rustc_session::lint::builtin::*;
40use rustc_session::lint::fcw;
41use rustc_session::{declare_lint, declare_lint_pass, impl_lint_pass};
42use rustc_span::edition::Edition;
43use rustc_span::source_map::Spanned;
44use rustc_span::{DUMMY_SP, Ident, InnerSpan, Span, Symbol, kw, sym};
45use rustc_target::asm::InlineAsmArch;
46use rustc_trait_selection::infer::{InferCtxtExt, TyCtxtInferExt};
47use rustc_trait_selection::traits::misc::type_allowed_to_implement_copy;
48use rustc_trait_selection::traits::query::evaluate_obligation::InferCtxtExt as _;
49use rustc_trait_selection::traits::{self};
50
51use crate::errors::BuiltinEllipsisInclusiveRangePatterns;
52use crate::lints::{
53 BuiltinAnonymousParams, BuiltinConstNoMangle, BuiltinDerefNullptr, BuiltinDoubleNegations,
54 BuiltinDoubleNegationsAddParens, BuiltinEllipsisInclusiveRangePatternsLint,
55 BuiltinExplicitOutlives, BuiltinExplicitOutlivesSuggestion, BuiltinFeatureIssueNote,
56 BuiltinIncompleteFeatures, BuiltinIncompleteFeaturesHelp, BuiltinInternalFeatures,
57 BuiltinKeywordIdents, BuiltinMissingCopyImpl, BuiltinMissingDebugImpl, BuiltinMissingDoc,
58 BuiltinMutablesTransmutes, BuiltinNoMangleGeneric, BuiltinNonShorthandFieldPatterns,
59 BuiltinSpecialModuleNameUsed, BuiltinTrivialBounds, BuiltinTypeAliasBounds,
60 BuiltinUngatedAsyncFnTrackCaller, BuiltinUnpermittedTypeInit, BuiltinUnpermittedTypeInitSub,
61 BuiltinUnreachablePub, BuiltinUnsafe, BuiltinUnstableFeatures, BuiltinUnusedDocComment,
62 BuiltinUnusedDocCommentSub, BuiltinWhileTrue, InvalidAsmLabel,
63};
64use crate::{EarlyContext, EarlyLintPass, LateContext, LateLintPass, Level, LintContext};
65#[doc = r" The `while_true` lint detects `while true { }`."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,no_run"]
#[doc = r" while true {"]
#[doc = r""]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" `while true` should be replaced with `loop`. A `loop` expression is"]
#[doc =
r" the preferred way to write an infinite loop because it more directly"]
#[doc = r" expresses the intent of the loop."]
static WHILE_TRUE: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "WHILE_TRUE",
default_level: ::rustc_lint_defs::Warn,
desc: "suggest using `loop { }` instead of `while true { }`",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
66 WHILE_TRUE,
84 Warn,
85 "suggest using `loop { }` instead of `while true { }`"
86}
87
88pub struct WhileTrue;
#[automatically_derived]
impl ::core::marker::Copy for WhileTrue { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for WhileTrue { }
#[automatically_derived]
impl ::core::clone::Clone for WhileTrue {
#[inline]
fn clone(&self) -> WhileTrue { *self }
}
impl ::rustc_lint_defs::LintPass for WhileTrue {
fn name(&self) -> &'static str { "WhileTrue" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[WHILE_TRUE]))
}
}
impl WhileTrue {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[WHILE_TRUE]))
}
}declare_lint_pass!(WhileTrue => [WHILE_TRUE]);
89
90impl EarlyLintPass for WhileTrue {
91 #[inline]
92 fn check_expr(&mut self, cx: &EarlyContext<'_>, e: &ast::Expr) {
93 if let ast::ExprKind::While(cond, _, label) = &e.kind
94 && let ast::ExprKind::Lit(token_lit) = cond.peel_parens().kind
95 && let token::Lit { kind: token::Bool, symbol: kw::True, .. } = token_lit
96 && !cond.span.from_expansion()
97 {
98 let condition_span = e.span.with_hi(cond.span.hi());
99 let replace = ::alloc::__export::must_use({
::alloc::fmt::format(format_args!("{0}loop",
label.map_or_else(String::new,
|label|
::alloc::__export::must_use({
::alloc::fmt::format(format_args!("{0}: ", label.ident))
}))))
})format!(
100 "{}loop",
101 label.map_or_else(String::new, |label| format!("{}: ", label.ident,))
102 );
103 cx.emit_span_lint(
104 WHILE_TRUE,
105 condition_span,
106 BuiltinWhileTrue { suggestion: condition_span, replace },
107 );
108 }
109 }
110}
111
112#[doc =
r" The `non_shorthand_field_patterns` lint detects using `Struct { x: x }`"]
#[doc = r" instead of `Struct { x }` in a pattern."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust"]
#[doc = r" struct Point {"]
#[doc = r" x: i32,"]
#[doc = r" y: i32,"]
#[doc = r" }"]
#[doc = r""]
#[doc = r""]
#[doc = r" fn main() {"]
#[doc = r" let p = Point {"]
#[doc = r" x: 5,"]
#[doc = r" y: 5,"]
#[doc = r" };"]
#[doc = r""]
#[doc = r" match p {"]
#[doc = r" Point { x: x, y: y } => (),"]
#[doc = r" }"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" The preferred style is to avoid the repetition of specifying both the"]
#[doc = r" field name and the binding name if both identifiers are the same."]
static NON_SHORTHAND_FIELD_PATTERNS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "NON_SHORTHAND_FIELD_PATTERNS",
default_level: ::rustc_lint_defs::Warn,
desc: "using `Struct { x: x }` instead of `Struct { x }` in a pattern",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
113 NON_SHORTHAND_FIELD_PATTERNS,
144 Warn,
145 "using `Struct { x: x }` instead of `Struct { x }` in a pattern"
146}
147
148pub struct NonShorthandFieldPatterns;
#[automatically_derived]
impl ::core::marker::Copy for NonShorthandFieldPatterns { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for NonShorthandFieldPatterns { }
#[automatically_derived]
impl ::core::clone::Clone for NonShorthandFieldPatterns {
#[inline]
fn clone(&self) -> NonShorthandFieldPatterns { *self }
}
impl ::rustc_lint_defs::LintPass for NonShorthandFieldPatterns {
fn name(&self) -> &'static str { "NonShorthandFieldPatterns" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[NON_SHORTHAND_FIELD_PATTERNS]))
}
}
impl NonShorthandFieldPatterns {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[NON_SHORTHAND_FIELD_PATTERNS]))
}
}declare_lint_pass!(NonShorthandFieldPatterns => [NON_SHORTHAND_FIELD_PATTERNS]);
149
150impl<'tcx> LateLintPass<'tcx> for NonShorthandFieldPatterns {
151 fn check_pat(&mut self, cx: &LateContext<'_>, pat: &hir::Pat<'_>) {
152 if let PatKind::Struct(ref qpath, field_pats, _) = pat.kind
154 && cx.typeck_results().tainted_by_errors.is_none()
155 {
156 let variant = cx
157 .typeck_results()
158 .pat_ty(pat)
159 .ty_adt_def()
160 .expect("struct pattern type is not an ADT")
161 .variant_of_res(cx.qpath_res(qpath, pat.hir_id));
162 for fieldpat in field_pats {
163 if fieldpat.is_shorthand {
164 continue;
165 }
166 if fieldpat.span.from_expansion() {
167 continue;
171 }
172 if let PatKind::Binding(binding_annot, _, ident, None) = fieldpat.pat.kind {
173 if cx.tcx.find_field_index(ident, variant)
174 == Some(cx.typeck_results().field_index(fieldpat.hir_id))
175 {
176 cx.emit_span_lint(
177 NON_SHORTHAND_FIELD_PATTERNS,
178 fieldpat.span,
179 BuiltinNonShorthandFieldPatterns {
180 ident,
181 suggestion: fieldpat.span,
182 prefix: binding_annot.prefix_str(),
183 },
184 );
185 }
186 }
187 }
188 }
189 }
190}
191
192#[doc = r" The `unsafe_code` lint catches usage of `unsafe` code and other"]
#[doc = r" potentially unsound constructs like `no_mangle`, `export_name`,"]
#[doc = r" and `link_section`."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,compile_fail"]
#[doc = r" #![deny(unsafe_code)]"]
#[doc = r" fn main() {"]
#[doc = r" unsafe {"]
#[doc = r""]
#[doc = r" }"]
#[doc = r" }"]
#[doc = r""]
#[doc = r" #[no_mangle]"]
#[doc = r" fn func_0() { }"]
#[doc = r""]
#[doc = r#" #[export_name = "exported_symbol_name"]"#]
#[doc = r" pub fn name_in_rust() { }"]
#[doc = r""]
#[doc = r" #[no_mangle]"]
#[doc = r#" #[link_section = ".example_section"]"#]
#[doc = r" pub static VAR1: u32 = 1;"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" This lint is intended to restrict the usage of `unsafe` blocks and other"]
#[doc =
r" constructs (including, but not limited to `no_mangle`, `link_section`"]
#[doc =
r" and `export_name` attributes) wrong usage of which causes undefined"]
#[doc = r" behavior."]
static UNSAFE_CODE: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "UNSAFE_CODE",
default_level: ::rustc_lint_defs::Allow,
desc: "usage of `unsafe` code and other potentially unsound constructs",
is_externally_loaded: false,
eval_always: true,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
193 UNSAFE_CODE,
227 Allow,
228 "usage of `unsafe` code and other potentially unsound constructs",
229 @eval_always = true
230}
231
232pub struct UnsafeCode;
#[automatically_derived]
impl ::core::marker::Copy for UnsafeCode { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for UnsafeCode { }
#[automatically_derived]
impl ::core::clone::Clone for UnsafeCode {
#[inline]
fn clone(&self) -> UnsafeCode { *self }
}
impl ::rustc_lint_defs::LintPass for UnsafeCode {
fn name(&self) -> &'static str { "UnsafeCode" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[UNSAFE_CODE]))
}
}
impl UnsafeCode {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[UNSAFE_CODE]))
}
}declare_lint_pass!(UnsafeCode => [UNSAFE_CODE]);
233
234impl UnsafeCode {
235 fn report_unsafe(
236 &self,
237 cx: &EarlyContext<'_>,
238 span: Span,
239 decorate: impl for<'a> LintDiagnostic<'a, ()>,
240 ) {
241 if span.allows_unsafe() {
243 return;
244 }
245
246 cx.emit_span_lint(UNSAFE_CODE, span, decorate);
247 }
248}
249
250impl EarlyLintPass for UnsafeCode {
251 #[inline]
252 fn check_expr(&mut self, cx: &EarlyContext<'_>, e: &ast::Expr) {
253 if let ast::ExprKind::Block(ref blk, _) = e.kind {
254 if blk.rules == ast::BlockCheckMode::Unsafe(ast::UserProvided) {
256 self.report_unsafe(cx, blk.span, BuiltinUnsafe::UnsafeBlock);
257 }
258 }
259 }
260
261 fn check_item(&mut self, cx: &EarlyContext<'_>, it: &ast::Item) {
262 match it.kind {
263 ast::ItemKind::Trait(box ast::Trait { safety: ast::Safety::Unsafe(_), .. }) => {
264 self.report_unsafe(cx, it.span, BuiltinUnsafe::UnsafeTrait);
265 }
266
267 ast::ItemKind::Impl(ast::Impl {
268 of_trait: Some(box ast::TraitImplHeader { safety: ast::Safety::Unsafe(_), .. }),
269 ..
270 }) => {
271 self.report_unsafe(cx, it.span, BuiltinUnsafe::UnsafeImpl);
272 }
273
274 ast::ItemKind::Fn(..) => {
275 if let Some(attr) = attr::find_by_name(&it.attrs, sym::no_mangle) {
276 self.report_unsafe(cx, attr.span, BuiltinUnsafe::NoMangleFn);
277 }
278
279 if let Some(attr) = attr::find_by_name(&it.attrs, sym::export_name) {
280 self.report_unsafe(cx, attr.span, BuiltinUnsafe::ExportNameFn);
281 }
282
283 if let Some(attr) = attr::find_by_name(&it.attrs, sym::link_section) {
284 self.report_unsafe(cx, attr.span, BuiltinUnsafe::LinkSectionFn);
285 }
286 }
287
288 ast::ItemKind::Static(..) => {
289 if let Some(attr) = attr::find_by_name(&it.attrs, sym::no_mangle) {
290 self.report_unsafe(cx, attr.span, BuiltinUnsafe::NoMangleStatic);
291 }
292
293 if let Some(attr) = attr::find_by_name(&it.attrs, sym::export_name) {
294 self.report_unsafe(cx, attr.span, BuiltinUnsafe::ExportNameStatic);
295 }
296
297 if let Some(attr) = attr::find_by_name(&it.attrs, sym::link_section) {
298 self.report_unsafe(cx, attr.span, BuiltinUnsafe::LinkSectionStatic);
299 }
300 }
301
302 ast::ItemKind::GlobalAsm(..) => {
303 self.report_unsafe(cx, it.span, BuiltinUnsafe::GlobalAsm);
304 }
305
306 ast::ItemKind::ForeignMod(ForeignMod { safety, .. }) => {
307 if let Safety::Unsafe(_) = safety {
308 self.report_unsafe(cx, it.span, BuiltinUnsafe::UnsafeExternBlock);
309 }
310 }
311
312 ast::ItemKind::MacroDef(..) => {
313 if let Some(hir::Attribute::Parsed(AttributeKind::AllowInternalUnsafe(span))) =
314 AttributeParser::parse_limited(
315 cx.builder.sess(),
316 &it.attrs,
317 sym::allow_internal_unsafe,
318 it.span,
319 DUMMY_NODE_ID,
320 Some(cx.builder.features()),
321 )
322 {
323 self.report_unsafe(cx, span, BuiltinUnsafe::AllowInternalUnsafe);
324 }
325 }
326
327 _ => {}
328 }
329 }
330
331 fn check_impl_item(&mut self, cx: &EarlyContext<'_>, it: &ast::AssocItem) {
332 if let ast::AssocItemKind::Fn(..) = it.kind {
333 if let Some(attr) = attr::find_by_name(&it.attrs, sym::no_mangle) {
334 self.report_unsafe(cx, attr.span, BuiltinUnsafe::NoMangleMethod);
335 }
336 if let Some(attr) = attr::find_by_name(&it.attrs, sym::export_name) {
337 self.report_unsafe(cx, attr.span, BuiltinUnsafe::ExportNameMethod);
338 }
339 }
340 }
341
342 fn check_fn(&mut self, cx: &EarlyContext<'_>, fk: FnKind<'_>, span: Span, _: ast::NodeId) {
343 if let FnKind::Fn(
344 ctxt,
345 _,
346 ast::Fn {
347 sig: ast::FnSig { header: ast::FnHeader { safety: ast::Safety::Unsafe(_), .. }, .. },
348 body,
349 ..
350 },
351 ) = fk
352 {
353 let decorator = match ctxt {
354 FnCtxt::Foreign => return,
355 FnCtxt::Free => BuiltinUnsafe::DeclUnsafeFn,
356 FnCtxt::Assoc(_) if body.is_none() => BuiltinUnsafe::DeclUnsafeMethod,
357 FnCtxt::Assoc(_) => BuiltinUnsafe::ImplUnsafeMethod,
358 };
359 self.report_unsafe(cx, span, decorator);
360 }
361 }
362}
363
364#[doc =
r" The `missing_docs` lint detects missing documentation for public items."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,compile_fail"]
#[doc = r" #![deny(missing_docs)]"]
#[doc = r" pub fn foo() {}"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" This lint is intended to ensure that a library is well-documented."]
#[doc =
r" Items without documentation can be difficult for users to understand"]
#[doc = r" how to use properly."]
#[doc = r""]
#[doc =
r#" This lint is "allow" by default because it can be noisy, and not all"#]
#[doc = r" projects may want to enforce everything to be documented."]
pub static MISSING_DOCS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "MISSING_DOCS",
default_level: ::rustc_lint_defs::Allow,
desc: "detects missing documentation for public members",
is_externally_loaded: false,
report_in_external_macro: true,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
365 pub MISSING_DOCS,
385 Allow,
386 "detects missing documentation for public members",
387 report_in_external_macro
388}
389
390#[derive(#[automatically_derived]
impl ::core::default::Default for MissingDoc {
#[inline]
fn default() -> MissingDoc { MissingDoc {} }
}Default)]
391pub struct MissingDoc;
392
393impl ::rustc_lint_defs::LintPass for MissingDoc {
fn name(&self) -> &'static str { "MissingDoc" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[MISSING_DOCS]))
}
}
impl MissingDoc {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[MISSING_DOCS]))
}
}impl_lint_pass!(MissingDoc => [MISSING_DOCS]);
394
395fn has_doc(attr: &hir::Attribute) -> bool {
396 if #[allow(non_exhaustive_omitted_patterns)] match attr {
hir::Attribute::Parsed(AttributeKind::DocComment { .. }) => true,
_ => false,
}matches!(attr, hir::Attribute::Parsed(AttributeKind::DocComment { .. })) {
397 return true;
398 }
399
400 if let hir::Attribute::Parsed(AttributeKind::Doc(d)) = attr
401 && #[allow(non_exhaustive_omitted_patterns)] match d.as_ref() {
DocAttribute { hidden: Some(..), .. } => true,
_ => false,
}matches!(d.as_ref(), DocAttribute { hidden: Some(..), .. })
402 {
403 return true;
404 }
405
406 false
407}
408
409impl MissingDoc {
410 fn check_missing_docs_attrs(
411 &self,
412 cx: &LateContext<'_>,
413 def_id: LocalDefId,
414 article: &'static str,
415 desc: &'static str,
416 ) {
417 if def_id != CRATE_DEF_ID && !cx.effective_visibilities.is_exported(def_id) {
421 return;
422 }
423
424 let attrs = cx.tcx.hir_attrs(cx.tcx.local_def_id_to_hir_id(def_id));
425 let has_doc = attrs.iter().any(has_doc);
426 if !has_doc {
427 cx.emit_span_lint(
428 MISSING_DOCS,
429 cx.tcx.def_span(def_id),
430 BuiltinMissingDoc { article, desc },
431 );
432 }
433 }
434}
435
436impl<'tcx> LateLintPass<'tcx> for MissingDoc {
437 fn check_crate(&mut self, cx: &LateContext<'_>) {
438 self.check_missing_docs_attrs(cx, CRATE_DEF_ID, "the", "crate");
439 }
440
441 fn check_item(&mut self, cx: &LateContext<'_>, it: &hir::Item<'_>) {
442 if let hir::ItemKind::Impl(..) | hir::ItemKind::Use(..) | hir::ItemKind::ExternCrate(..) =
447 it.kind
448 {
449 return;
450 }
451
452 let (article, desc) = cx.tcx.article_and_description(it.owner_id.to_def_id());
453 self.check_missing_docs_attrs(cx, it.owner_id.def_id, article, desc);
454 }
455
456 fn check_trait_item(&mut self, cx: &LateContext<'_>, trait_item: &hir::TraitItem<'_>) {
457 let (article, desc) = cx.tcx.article_and_description(trait_item.owner_id.to_def_id());
458
459 self.check_missing_docs_attrs(cx, trait_item.owner_id.def_id, article, desc);
460 }
461
462 fn check_impl_item(&mut self, cx: &LateContext<'_>, impl_item: &hir::ImplItem<'_>) {
463 let container = cx.tcx.associated_item(impl_item.owner_id.def_id).container;
464
465 match container {
466 AssocContainer::TraitImpl(_) => return,
468 AssocContainer::Trait => {}
469 AssocContainer::InherentImpl => {
471 let parent = cx.tcx.hir_get_parent_item(impl_item.hir_id());
472 let impl_ty = cx.tcx.type_of(parent).instantiate_identity();
473 let outerdef = match impl_ty.kind() {
474 ty::Adt(def, _) => Some(def.did()),
475 ty::Foreign(def_id) => Some(*def_id),
476 _ => None,
477 };
478 let is_hidden = match outerdef {
479 Some(id) => cx.tcx.is_doc_hidden(id),
480 None => false,
481 };
482 if is_hidden {
483 return;
484 }
485 }
486 }
487
488 let (article, desc) = cx.tcx.article_and_description(impl_item.owner_id.to_def_id());
489 self.check_missing_docs_attrs(cx, impl_item.owner_id.def_id, article, desc);
490 }
491
492 fn check_foreign_item(&mut self, cx: &LateContext<'_>, foreign_item: &hir::ForeignItem<'_>) {
493 let (article, desc) = cx.tcx.article_and_description(foreign_item.owner_id.to_def_id());
494 self.check_missing_docs_attrs(cx, foreign_item.owner_id.def_id, article, desc);
495 }
496
497 fn check_field_def(&mut self, cx: &LateContext<'_>, sf: &hir::FieldDef<'_>) {
498 if !sf.is_positional() {
499 self.check_missing_docs_attrs(cx, sf.def_id, "a", "struct field")
500 }
501 }
502
503 fn check_variant(&mut self, cx: &LateContext<'_>, v: &hir::Variant<'_>) {
504 self.check_missing_docs_attrs(cx, v.def_id, "a", "variant");
505 }
506}
507
508#[doc =
r" The `missing_copy_implementations` lint detects potentially-forgotten"]
#[doc = r" implementations of [`Copy`] for public types."]
#[doc = r""]
#[doc = r" [`Copy`]: https://doc.rust-lang.org/std/marker/trait.Copy.html"]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,compile_fail"]
#[doc = r" #![deny(missing_copy_implementations)]"]
#[doc = r" pub struct Foo {"]
#[doc = r" pub field: i32"]
#[doc = r" }"]
#[doc = r" # fn main() {}"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" Historically (before 1.0), types were automatically marked as `Copy`"]
#[doc =
r" if possible. This was changed so that it required an explicit opt-in"]
#[doc =
r" by implementing the `Copy` trait. As part of this change, a lint was"]
#[doc = r" added to alert if a copyable type was not marked `Copy`."]
#[doc = r""]
#[doc =
r#" This lint is "allow" by default because this code isn't bad; it is"#]
#[doc =
r" common to write newtypes like this specifically so that a `Copy` type"]
#[doc =
r" is no longer `Copy`. `Copy` types can result in unintended copies of"]
#[doc = r" large data which can impact performance."]
pub static MISSING_COPY_IMPLEMENTATIONS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "MISSING_COPY_IMPLEMENTATIONS",
default_level: ::rustc_lint_defs::Allow,
desc: "detects potentially-forgotten implementations of `Copy`",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
509 pub MISSING_COPY_IMPLEMENTATIONS,
538 Allow,
539 "detects potentially-forgotten implementations of `Copy`"
540}
541
542pub struct MissingCopyImplementations;
#[automatically_derived]
impl ::core::marker::Copy for MissingCopyImplementations { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for MissingCopyImplementations { }
#[automatically_derived]
impl ::core::clone::Clone for MissingCopyImplementations {
#[inline]
fn clone(&self) -> MissingCopyImplementations { *self }
}
impl ::rustc_lint_defs::LintPass for MissingCopyImplementations {
fn name(&self) -> &'static str { "MissingCopyImplementations" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[MISSING_COPY_IMPLEMENTATIONS]))
}
}
impl MissingCopyImplementations {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[MISSING_COPY_IMPLEMENTATIONS]))
}
}declare_lint_pass!(MissingCopyImplementations => [MISSING_COPY_IMPLEMENTATIONS]);
543
544impl<'tcx> LateLintPass<'tcx> for MissingCopyImplementations {
545 fn check_item(&mut self, cx: &LateContext<'_>, item: &hir::Item<'_>) {
546 if !cx.effective_visibilities.is_reachable(item.owner_id.def_id) {
547 return;
548 }
549 let (def, ty) = match item.kind {
550 hir::ItemKind::Struct(_, generics, _) => {
551 if !generics.params.is_empty() {
552 return;
553 }
554 let def = cx.tcx.adt_def(item.owner_id);
555 (def, Ty::new_adt(cx.tcx, def, ty::List::empty()))
556 }
557 hir::ItemKind::Union(_, generics, _) => {
558 if !generics.params.is_empty() {
559 return;
560 }
561 let def = cx.tcx.adt_def(item.owner_id);
562 (def, Ty::new_adt(cx.tcx, def, ty::List::empty()))
563 }
564 hir::ItemKind::Enum(_, generics, _) => {
565 if !generics.params.is_empty() {
566 return;
567 }
568 let def = cx.tcx.adt_def(item.owner_id);
569 (def, Ty::new_adt(cx.tcx, def, ty::List::empty()))
570 }
571 _ => return,
572 };
573 if def.has_dtor(cx.tcx) {
574 return;
575 }
576
577 for field in def.all_fields() {
580 let did = field.did;
581 if cx.tcx.type_of(did).instantiate_identity().is_raw_ptr() {
582 return;
583 }
584 }
585 if cx.type_is_copy_modulo_regions(ty) {
586 return;
587 }
588 if type_implements_negative_copy_modulo_regions(cx.tcx, ty, cx.typing_env()) {
589 return;
590 }
591 if def.is_variant_list_non_exhaustive()
592 || def.variants().iter().any(|variant| variant.is_field_list_non_exhaustive())
593 {
594 return;
595 }
596
597 if let Some(iter_trait) = cx.tcx.get_diagnostic_item(sym::Iterator)
600 && cx
601 .tcx
602 .infer_ctxt()
603 .build(cx.typing_mode())
604 .type_implements_trait(iter_trait, [ty], cx.param_env)
605 .must_apply_modulo_regions()
606 {
607 return;
608 }
609
610 const MAX_SIZE: u64 = 256;
612
613 if let Some(size) = cx.layout_of(ty).ok().map(|l| l.size.bytes()) {
614 if size > MAX_SIZE {
615 return;
616 }
617 }
618
619 if type_allowed_to_implement_copy(
620 cx.tcx,
621 cx.param_env,
622 ty,
623 traits::ObligationCause::misc(item.span, item.owner_id.def_id),
624 hir::Safety::Safe,
625 )
626 .is_ok()
627 {
628 cx.emit_span_lint(MISSING_COPY_IMPLEMENTATIONS, item.span, BuiltinMissingCopyImpl);
629 }
630 }
631}
632
633fn type_implements_negative_copy_modulo_regions<'tcx>(
635 tcx: TyCtxt<'tcx>,
636 ty: Ty<'tcx>,
637 typing_env: ty::TypingEnv<'tcx>,
638) -> bool {
639 let (infcx, param_env) = tcx.infer_ctxt().build_with_typing_env(typing_env);
640 let trait_ref =
641 ty::TraitRef::new(tcx, tcx.require_lang_item(hir::LangItem::Copy, DUMMY_SP), [ty]);
642 let pred = ty::TraitPredicate { trait_ref, polarity: ty::PredicatePolarity::Negative };
643 let obligation = traits::Obligation {
644 cause: traits::ObligationCause::dummy(),
645 param_env,
646 recursion_depth: 0,
647 predicate: pred.upcast(tcx),
648 };
649 infcx.predicate_must_hold_modulo_regions(&obligation)
650}
651
652#[doc = r" The `missing_debug_implementations` lint detects missing"]
#[doc = r" implementations of [`fmt::Debug`] for public types."]
#[doc = r""]
#[doc =
r" [`fmt::Debug`]: https://doc.rust-lang.org/std/fmt/trait.Debug.html"]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,compile_fail"]
#[doc = r" #![deny(missing_debug_implementations)]"]
#[doc = r" pub struct Foo;"]
#[doc = r" # fn main() {}"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc = r" Having a `Debug` implementation on all types can assist with"]
#[doc =
r" debugging, as it provides a convenient way to format and display a"]
#[doc = r" value. Using the `#[derive(Debug)]` attribute will automatically"]
#[doc =
r" generate a typical implementation, or a custom implementation can be"]
#[doc = r" added by manually implementing the `Debug` trait."]
#[doc = r""]
#[doc =
r#" This lint is "allow" by default because adding `Debug` to all types can"#]
#[doc =
r" have a negative impact on compile time and code size. It also requires"]
#[doc =
r" boilerplate to be added to every type, which can be an impediment."]
static MISSING_DEBUG_IMPLEMENTATIONS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "MISSING_DEBUG_IMPLEMENTATIONS",
default_level: ::rustc_lint_defs::Allow,
desc: "detects missing implementations of Debug",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
653 MISSING_DEBUG_IMPLEMENTATIONS,
680 Allow,
681 "detects missing implementations of Debug"
682}
683
684#[derive(#[automatically_derived]
impl ::core::default::Default for MissingDebugImplementations {
#[inline]
fn default() -> MissingDebugImplementations {
MissingDebugImplementations {}
}
}Default)]
685pub(crate) struct MissingDebugImplementations;
686
687impl ::rustc_lint_defs::LintPass for MissingDebugImplementations {
fn name(&self) -> &'static str { "MissingDebugImplementations" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[MISSING_DEBUG_IMPLEMENTATIONS]))
}
}
impl MissingDebugImplementations {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[MISSING_DEBUG_IMPLEMENTATIONS]))
}
}impl_lint_pass!(MissingDebugImplementations => [MISSING_DEBUG_IMPLEMENTATIONS]);
688
689impl<'tcx> LateLintPass<'tcx> for MissingDebugImplementations {
690 fn check_item(&mut self, cx: &LateContext<'_>, item: &hir::Item<'_>) {
691 if !cx.effective_visibilities.is_reachable(item.owner_id.def_id) {
692 return;
693 }
694
695 match item.kind {
696 hir::ItemKind::Struct(..) | hir::ItemKind::Union(..) | hir::ItemKind::Enum(..) => {}
697 _ => return,
698 }
699
700 let LevelAndSource { level, .. } =
702 cx.tcx.lint_level_at_node(MISSING_DEBUG_IMPLEMENTATIONS, item.hir_id());
703 if level == Level::Allow {
704 return;
705 }
706
707 let Some(debug) = cx.tcx.get_diagnostic_item(sym::Debug) else { return };
708
709 let has_impl = cx
710 .tcx
711 .non_blanket_impls_for_ty(debug, cx.tcx.type_of(item.owner_id).instantiate_identity())
712 .next()
713 .is_some();
714 if !has_impl {
715 cx.emit_span_lint(
716 MISSING_DEBUG_IMPLEMENTATIONS,
717 item.span,
718 BuiltinMissingDebugImpl { tcx: cx.tcx, def_id: debug },
719 );
720 }
721 }
722}
723
724#[doc =
r" The `anonymous_parameters` lint detects anonymous parameters in trait"]
#[doc = r" definitions."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,edition2015,compile_fail"]
#[doc = r" #![deny(anonymous_parameters)]"]
#[doc = r" // edition 2015"]
#[doc = r" pub trait Foo {"]
#[doc = r" fn foo(usize);"]
#[doc = r" }"]
#[doc = r" fn main() {}"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" This syntax is mostly a historical accident, and can be worked around"]
#[doc =
r" quite easily by adding an `_` pattern or a descriptive identifier:"]
#[doc = r""]
#[doc = r" ```rust"]
#[doc = r" trait Foo {"]
#[doc = r" fn foo(_: usize);"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" This syntax is now a hard error in the 2018 edition. In the 2015"]
#[doc = r#" edition, this lint is "warn" by default. This lint"#]
#[doc = r" enables the [`cargo fix`] tool with the `--edition` flag to"]
#[doc =
r" automatically transition old code from the 2015 edition to 2018. The"]
#[doc = r" tool will run this lint and automatically apply the"]
#[doc = r" suggested fix from the compiler (which is to add `_` to each"]
#[doc =
r" parameter). This provides a completely automated way to update old"]
#[doc = r" code for a new edition. See [issue #41686] for more details."]
#[doc = r""]
#[doc = r" [issue #41686]: https://github.com/rust-lang/rust/issues/41686"]
#[doc =
r" [`cargo fix`]: https://doc.rust-lang.org/cargo/commands/cargo-fix.html"]
pub static ANONYMOUS_PARAMETERS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "ANONYMOUS_PARAMETERS",
default_level: ::rustc_lint_defs::Warn,
desc: "detects anonymous parameters",
is_externally_loaded: false,
future_incompatible: Some(::rustc_lint_defs::FutureIncompatibleInfo {
reason: ::rustc_lint_defs::FutureIncompatibilityReason::EditionError(::rustc_lint_defs::EditionFcw {
edition: rustc_span::edition::Edition::Edition2018,
page_slug: "trait-fn-parameters",
}),
..::rustc_lint_defs::FutureIncompatibleInfo::default_fields_for_macro()
}),
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
725 pub ANONYMOUS_PARAMETERS,
764 Warn,
765 "detects anonymous parameters",
766 @future_incompatible = FutureIncompatibleInfo {
767 reason: fcw!(EditionError 2018 "trait-fn-parameters"),
768 };
769}
770
771#[doc = r" Checks for use of anonymous parameters (RFC 1685)."]
pub struct AnonymousParameters;
#[automatically_derived]
impl ::core::marker::Copy for AnonymousParameters { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for AnonymousParameters { }
#[automatically_derived]
impl ::core::clone::Clone for AnonymousParameters {
#[inline]
fn clone(&self) -> AnonymousParameters { *self }
}
impl ::rustc_lint_defs::LintPass for AnonymousParameters {
fn name(&self) -> &'static str { "AnonymousParameters" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[ANONYMOUS_PARAMETERS]))
}
}
impl AnonymousParameters {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[ANONYMOUS_PARAMETERS]))
}
}declare_lint_pass!(
772 AnonymousParameters => [ANONYMOUS_PARAMETERS]
774);
775
776impl EarlyLintPass for AnonymousParameters {
777 fn check_trait_item(&mut self, cx: &EarlyContext<'_>, it: &ast::AssocItem) {
778 if cx.sess().edition() != Edition::Edition2015 {
779 return;
781 }
782 if let ast::AssocItemKind::Fn(box Fn { ref sig, .. }) = it.kind {
783 for arg in sig.decl.inputs.iter() {
784 if let ast::PatKind::Missing = arg.pat.kind {
785 let ty_snip = cx.sess().source_map().span_to_snippet(arg.ty.span);
786
787 let (ty_snip, appl) = if let Ok(ref snip) = ty_snip {
788 (snip.as_str(), Applicability::MachineApplicable)
789 } else {
790 ("<type>", Applicability::HasPlaceholders)
791 };
792 cx.emit_span_lint(
793 ANONYMOUS_PARAMETERS,
794 arg.pat.span,
795 BuiltinAnonymousParams { suggestion: (arg.pat.span, appl), ty_snip },
796 );
797 }
798 }
799 }
800 }
801}
802
803fn warn_if_doc(cx: &EarlyContext<'_>, node_span: Span, node_kind: &str, attrs: &[ast::Attribute]) {
804 use rustc_ast::token::CommentKind;
805
806 let mut attrs = attrs.iter().peekable();
807
808 let mut sugared_span: Option<Span> = None;
810
811 while let Some(attr) = attrs.next() {
812 let (is_doc_comment, is_doc_attribute) = match &attr.kind {
813 AttrKind::DocComment(..) => (true, false),
814 AttrKind::Normal(normal) if normal.item.path == sym::doc => (true, true),
815 _ => (false, false),
816 };
817 if is_doc_comment {
818 sugared_span =
819 Some(sugared_span.map_or(attr.span, |span| span.with_hi(attr.span.hi())));
820 }
821
822 if !is_doc_attribute && attrs.peek().is_some_and(|next_attr| next_attr.is_doc_comment()) {
823 continue;
824 }
825
826 let span = sugared_span.take().unwrap_or(attr.span);
827
828 if is_doc_comment || is_doc_attribute {
829 let sub = match attr.kind {
830 AttrKind::DocComment(CommentKind::Line, _) | AttrKind::Normal(..) => {
831 BuiltinUnusedDocCommentSub::PlainHelp
832 }
833 AttrKind::DocComment(CommentKind::Block, _) => {
834 BuiltinUnusedDocCommentSub::BlockHelp
835 }
836 };
837 cx.emit_span_lint(
838 UNUSED_DOC_COMMENTS,
839 span,
840 BuiltinUnusedDocComment { kind: node_kind, label: node_span, sub },
841 );
842 }
843 }
844}
845
846impl EarlyLintPass for UnusedDocComment {
847 fn check_stmt(&mut self, cx: &EarlyContext<'_>, stmt: &ast::Stmt) {
848 let kind = match stmt.kind {
849 ast::StmtKind::Let(..) => "statements",
850 ast::StmtKind::Item(..) => return,
852 ast::StmtKind::Empty
854 | ast::StmtKind::Semi(_)
855 | ast::StmtKind::Expr(_)
856 | ast::StmtKind::MacCall(_) => return,
857 };
858
859 warn_if_doc(cx, stmt.span, kind, stmt.kind.attrs());
860 }
861
862 fn check_arm(&mut self, cx: &EarlyContext<'_>, arm: &ast::Arm) {
863 if let Some(body) = &arm.body {
864 let arm_span = arm.pat.span.with_hi(body.span.hi());
865 warn_if_doc(cx, arm_span, "match arms", &arm.attrs);
866 }
867 }
868
869 fn check_pat(&mut self, cx: &EarlyContext<'_>, pat: &ast::Pat) {
870 if let ast::PatKind::Struct(_, _, fields, _) = &pat.kind {
871 for field in fields {
872 warn_if_doc(cx, field.span, "pattern fields", &field.attrs);
873 }
874 }
875 }
876
877 fn check_expr(&mut self, cx: &EarlyContext<'_>, expr: &ast::Expr) {
878 warn_if_doc(cx, expr.span, "expressions", &expr.attrs);
879
880 if let ExprKind::Struct(s) = &expr.kind {
881 for field in &s.fields {
882 warn_if_doc(cx, field.span, "expression fields", &field.attrs);
883 }
884 }
885 }
886
887 fn check_generic_param(&mut self, cx: &EarlyContext<'_>, param: &ast::GenericParam) {
888 warn_if_doc(cx, param.ident.span, "generic parameters", ¶m.attrs);
889 }
890
891 fn check_block(&mut self, cx: &EarlyContext<'_>, block: &ast::Block) {
892 warn_if_doc(cx, block.span, "blocks", block.attrs());
893 }
894
895 fn check_item(&mut self, cx: &EarlyContext<'_>, item: &ast::Item) {
896 if let ast::ItemKind::ForeignMod(_) = item.kind {
897 warn_if_doc(cx, item.span, "extern blocks", &item.attrs);
898 }
899 }
900}
901
902#[doc =
r" The `no_mangle_const_items` lint detects any `const` items with the"]
#[doc = r" [`no_mangle` attribute]."]
#[doc = r""]
#[doc =
r" [`no_mangle` attribute]: https://doc.rust-lang.org/reference/abi.html#the-no_mangle-attribute"]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,compile_fail,edition2021"]
#[doc = r" #[no_mangle]"]
#[doc = r" const FOO: i32 = 5;"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc = r" Constants do not have their symbols exported, and therefore, this"]
#[doc = r" probably means you meant to use a [`static`], not a [`const`]."]
#[doc = r""]
#[doc =
r" [`static`]: https://doc.rust-lang.org/reference/items/static-items.html"]
#[doc =
r" [`const`]: https://doc.rust-lang.org/reference/items/constant-items.html"]
static NO_MANGLE_CONST_ITEMS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "NO_MANGLE_CONST_ITEMS",
default_level: ::rustc_lint_defs::Deny,
desc: "const items will not have their symbols exported",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
903 NO_MANGLE_CONST_ITEMS,
925 Deny,
926 "const items will not have their symbols exported"
927}
928
929#[doc =
r" The `no_mangle_generic_items` lint detects generic items that must be"]
#[doc = r" mangled."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust"]
#[doc = r" #[unsafe(no_mangle)]"]
#[doc = r" fn foo<T>(t: T) {}"]
#[doc = r""]
#[doc = r#" #[unsafe(export_name = "bar")]"#]
#[doc = r" fn bar<T>(t: T) {}"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" A function with generics must have its symbol mangled to accommodate"]
#[doc =
r" the generic parameter. The [`no_mangle`] and [`export_name`] attributes"]
#[doc = r" have no effect in this situation, and should be removed."]
#[doc = r""]
#[doc =
r" [`no_mangle`]: https://doc.rust-lang.org/reference/abi.html#the-no_mangle-attribute"]
#[doc =
r" [`export_name`]: https://doc.rust-lang.org/reference/abi.html#the-export_name-attribute"]
static NO_MANGLE_GENERIC_ITEMS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "NO_MANGLE_GENERIC_ITEMS",
default_level: ::rustc_lint_defs::Warn,
desc: "generic items must be mangled",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
930 NO_MANGLE_GENERIC_ITEMS,
954 Warn,
955 "generic items must be mangled"
956}
957
958pub struct InvalidNoMangleItems;
#[automatically_derived]
impl ::core::marker::Copy for InvalidNoMangleItems { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for InvalidNoMangleItems { }
#[automatically_derived]
impl ::core::clone::Clone for InvalidNoMangleItems {
#[inline]
fn clone(&self) -> InvalidNoMangleItems { *self }
}
impl ::rustc_lint_defs::LintPass for InvalidNoMangleItems {
fn name(&self) -> &'static str { "InvalidNoMangleItems" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[NO_MANGLE_CONST_ITEMS, NO_MANGLE_GENERIC_ITEMS]))
}
}
impl InvalidNoMangleItems {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[NO_MANGLE_CONST_ITEMS, NO_MANGLE_GENERIC_ITEMS]))
}
}declare_lint_pass!(InvalidNoMangleItems => [NO_MANGLE_CONST_ITEMS, NO_MANGLE_GENERIC_ITEMS]);
959
960impl InvalidNoMangleItems {
961 fn check_no_mangle_on_generic_fn(
962 &self,
963 cx: &LateContext<'_>,
964 attr_span: Span,
965 def_id: LocalDefId,
966 ) {
967 let generics = cx.tcx.generics_of(def_id);
968 if generics.requires_monomorphization(cx.tcx) {
969 cx.emit_span_lint(
970 NO_MANGLE_GENERIC_ITEMS,
971 cx.tcx.def_span(def_id),
972 BuiltinNoMangleGeneric { suggestion: attr_span },
973 );
974 }
975 }
976}
977
978impl<'tcx> LateLintPass<'tcx> for InvalidNoMangleItems {
979 fn check_item(&mut self, cx: &LateContext<'_>, it: &hir::Item<'_>) {
980 let attrs = cx.tcx.hir_attrs(it.hir_id());
981 match it.kind {
982 hir::ItemKind::Fn { .. } => {
983 if let Some(attr_span) =
984 {
'done:
{
for i in attrs {
let i: &rustc_hir::Attribute = i;
match i {
rustc_hir::Attribute::Parsed(AttributeKind::ExportName { span,
.. }) => {
break 'done Some(*span);
}
_ => {}
}
}
None
}
}find_attr!(attrs, AttributeKind::ExportName {span, ..} => *span)
985 .or_else(|| {
'done:
{
for i in attrs {
let i: &rustc_hir::Attribute = i;
match i {
rustc_hir::Attribute::Parsed(AttributeKind::NoMangle(span)) =>
{
break 'done Some(*span);
}
_ => {}
}
}
None
}
}find_attr!(attrs, AttributeKind::NoMangle(span) => *span))
986 {
987 self.check_no_mangle_on_generic_fn(cx, attr_span, it.owner_id.def_id);
988 }
989 }
990 hir::ItemKind::Const(ident, generics, ..) => {
991 if {
{
'done:
{
for i in attrs {
let i: &rustc_hir::Attribute = i;
match i {
rustc_hir::Attribute::Parsed(AttributeKind::NoMangle(..)) =>
{
break 'done Some(());
}
_ => {}
}
}
None
}
}.is_some()
}find_attr!(attrs, AttributeKind::NoMangle(..)) {
992 let suggestion =
993 if generics.params.is_empty() && generics.where_clause_span.is_empty() {
994 Some(it.span.until(ident.span))
996 } else {
997 None
998 };
999
1000 cx.emit_span_lint(
1003 NO_MANGLE_CONST_ITEMS,
1004 it.span,
1005 BuiltinConstNoMangle { suggestion },
1006 );
1007 }
1008 }
1009 _ => {}
1010 }
1011 }
1012
1013 fn check_impl_item(&mut self, cx: &LateContext<'_>, it: &hir::ImplItem<'_>) {
1014 let attrs = cx.tcx.hir_attrs(it.hir_id());
1015 match it.kind {
1016 hir::ImplItemKind::Fn { .. } => {
1017 if let Some(attr_span) =
1018 {
'done:
{
for i in attrs {
let i: &rustc_hir::Attribute = i;
match i {
rustc_hir::Attribute::Parsed(AttributeKind::ExportName { span,
.. }) => {
break 'done Some(*span);
}
_ => {}
}
}
None
}
}find_attr!(attrs, AttributeKind::ExportName {span, ..} => *span)
1019 .or_else(|| {
'done:
{
for i in attrs {
let i: &rustc_hir::Attribute = i;
match i {
rustc_hir::Attribute::Parsed(AttributeKind::NoMangle(span)) =>
{
break 'done Some(*span);
}
_ => {}
}
}
None
}
}find_attr!(attrs, AttributeKind::NoMangle(span) => *span))
1020 {
1021 self.check_no_mangle_on_generic_fn(cx, attr_span, it.owner_id.def_id);
1022 }
1023 }
1024 _ => {}
1025 }
1026 }
1027}
1028
1029#[doc =
r" The `mutable_transmutes` lint catches transmuting from `&T` to `&mut"]
#[doc = r" T` because it is [undefined behavior]."]
#[doc = r""]
#[doc =
r" [undefined behavior]: https://doc.rust-lang.org/reference/behavior-considered-undefined.html"]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,compile_fail"]
#[doc = r" unsafe {"]
#[doc = r" let y = std::mem::transmute::<&i32, &mut i32>(&5);"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" Certain assumptions are made about aliasing of data, and this transmute"]
#[doc =
r" violates those assumptions. Consider using [`UnsafeCell`] instead."]
#[doc = r""]
#[doc =
r" [`UnsafeCell`]: https://doc.rust-lang.org/std/cell/struct.UnsafeCell.html"]
static MUTABLE_TRANSMUTES: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "MUTABLE_TRANSMUTES",
default_level: ::rustc_lint_defs::Deny,
desc: "transmuting &T to &mut T is undefined behavior, even if the reference is unused",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
1030 MUTABLE_TRANSMUTES,
1052 Deny,
1053 "transmuting &T to &mut T is undefined behavior, even if the reference is unused"
1054}
1055
1056pub struct MutableTransmutes;
#[automatically_derived]
impl ::core::marker::Copy for MutableTransmutes { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for MutableTransmutes { }
#[automatically_derived]
impl ::core::clone::Clone for MutableTransmutes {
#[inline]
fn clone(&self) -> MutableTransmutes { *self }
}
impl ::rustc_lint_defs::LintPass for MutableTransmutes {
fn name(&self) -> &'static str { "MutableTransmutes" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[MUTABLE_TRANSMUTES]))
}
}
impl MutableTransmutes {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[MUTABLE_TRANSMUTES]))
}
}declare_lint_pass!(MutableTransmutes => [MUTABLE_TRANSMUTES]);
1057
1058impl<'tcx> LateLintPass<'tcx> for MutableTransmutes {
1059 fn check_expr(&mut self, cx: &LateContext<'_>, expr: &hir::Expr<'_>) {
1060 if let Some((&ty::Ref(_, _, from_mutbl), &ty::Ref(_, _, to_mutbl))) =
1061 get_transmute_from_to(cx, expr).map(|(ty1, ty2)| (ty1.kind(), ty2.kind()))
1062 {
1063 if from_mutbl < to_mutbl {
1064 cx.emit_span_lint(MUTABLE_TRANSMUTES, expr.span, BuiltinMutablesTransmutes);
1065 }
1066 }
1067
1068 fn get_transmute_from_to<'tcx>(
1069 cx: &LateContext<'tcx>,
1070 expr: &hir::Expr<'_>,
1071 ) -> Option<(Ty<'tcx>, Ty<'tcx>)> {
1072 let hir::ExprKind::Path(ref qpath) = expr.kind else { return None };
1073 let def = cx.qpath_res(qpath, expr.hir_id);
1074 if let Res::Def(DefKind::Fn, did) = def {
1075 if !def_id_is_transmute(cx, did) {
1076 return None;
1077 }
1078 let sig = cx.typeck_results().node_type(expr.hir_id).fn_sig(cx.tcx);
1079 let from = sig.inputs().skip_binder()[0];
1080 let to = sig.output().skip_binder();
1081 return Some((from, to));
1082 }
1083 None
1084 }
1085
1086 fn def_id_is_transmute(cx: &LateContext<'_>, def_id: DefId) -> bool {
1087 cx.tcx.is_intrinsic(def_id, sym::transmute)
1088 }
1089 }
1090}
1091
1092#[doc = r" The `unstable_features` lint detects uses of `#![feature]`."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,compile_fail"]
#[doc = r" #![deny(unstable_features)]"]
#[doc = r" #![feature(test)]"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc = r" In larger nightly-based projects which"]
#[doc = r""]
#[doc =
r" * consist of a multitude of crates where a subset of crates has to compile on"]
#[doc =
r" stable either unconditionally or depending on a `cfg` flag to for example"]
#[doc = r" allow stable users to depend on them,"]
#[doc =
r" * don't use nightly for experimental features but for, e.g., unstable options only,"]
#[doc = r""]
#[doc = r" this lint may come in handy to enforce policies of these kinds."]
static UNSTABLE_FEATURES: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "UNSTABLE_FEATURES",
default_level: ::rustc_lint_defs::Allow,
desc: "enabling unstable features",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
1093 UNSTABLE_FEATURES,
1115 Allow,
1116 "enabling unstable features"
1117}
1118
1119#[doc = r" Forbids using the `#[feature(...)]` attribute"]
pub struct UnstableFeatures;
#[automatically_derived]
impl ::core::marker::Copy for UnstableFeatures { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for UnstableFeatures { }
#[automatically_derived]
impl ::core::clone::Clone for UnstableFeatures {
#[inline]
fn clone(&self) -> UnstableFeatures { *self }
}
impl ::rustc_lint_defs::LintPass for UnstableFeatures {
fn name(&self) -> &'static str { "UnstableFeatures" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[UNSTABLE_FEATURES]))
}
}
impl UnstableFeatures {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[UNSTABLE_FEATURES]))
}
}declare_lint_pass!(
1120 UnstableFeatures => [UNSTABLE_FEATURES]
1122);
1123
1124impl<'tcx> LateLintPass<'tcx> for UnstableFeatures {
1125 fn check_attribute(&mut self, cx: &LateContext<'_>, attr: &hir::Attribute) {
1126 if attr.has_name(sym::feature)
1127 && let Some(items) = attr.meta_item_list()
1128 {
1129 for item in items {
1130 cx.emit_span_lint(UNSTABLE_FEATURES, item.span(), BuiltinUnstableFeatures);
1131 }
1132 }
1133 }
1134}
1135
1136#[doc = r" The `ungated_async_fn_track_caller` lint warns when the"]
#[doc = r" `#[track_caller]` attribute is used on an async function"]
#[doc = r" without enabling the corresponding unstable feature flag."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust"]
#[doc = r" #[track_caller]"]
#[doc = r" async fn foo() {}"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc = r" The attribute must be used in conjunction with the"]
#[doc =
r" [`async_fn_track_caller` feature flag]. Otherwise, the `#[track_caller]`"]
#[doc = r" annotation will function as a no-op."]
#[doc = r""]
#[doc =
r" [`async_fn_track_caller` feature flag]: https://doc.rust-lang.org/beta/unstable-book/language-features/async-fn-track-caller.html"]
static UNGATED_ASYNC_FN_TRACK_CALLER: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "UNGATED_ASYNC_FN_TRACK_CALLER",
default_level: ::rustc_lint_defs::Warn,
desc: "enabling track_caller on an async fn is a no-op unless the async_fn_track_caller feature is enabled",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
1137 UNGATED_ASYNC_FN_TRACK_CALLER,
1158 Warn,
1159 "enabling track_caller on an async fn is a no-op unless the async_fn_track_caller feature is enabled"
1160}
1161
1162#[doc =
r" Explains corresponding feature flag must be enabled for the `#[track_caller]` attribute to"]
#[doc = r" do anything"]
pub struct UngatedAsyncFnTrackCaller;
#[automatically_derived]
impl ::core::marker::Copy for UngatedAsyncFnTrackCaller { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for UngatedAsyncFnTrackCaller { }
#[automatically_derived]
impl ::core::clone::Clone for UngatedAsyncFnTrackCaller {
#[inline]
fn clone(&self) -> UngatedAsyncFnTrackCaller { *self }
}
impl ::rustc_lint_defs::LintPass for UngatedAsyncFnTrackCaller {
fn name(&self) -> &'static str { "UngatedAsyncFnTrackCaller" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[UNGATED_ASYNC_FN_TRACK_CALLER]))
}
}
impl UngatedAsyncFnTrackCaller {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[UNGATED_ASYNC_FN_TRACK_CALLER]))
}
}declare_lint_pass!(
1163 UngatedAsyncFnTrackCaller => [UNGATED_ASYNC_FN_TRACK_CALLER]
1166);
1167
1168impl<'tcx> LateLintPass<'tcx> for UngatedAsyncFnTrackCaller {
1169 fn check_fn(
1170 &mut self,
1171 cx: &LateContext<'_>,
1172 fn_kind: HirFnKind<'_>,
1173 _: &'tcx FnDecl<'_>,
1174 _: &'tcx Body<'_>,
1175 span: Span,
1176 def_id: LocalDefId,
1177 ) {
1178 if fn_kind.asyncness().is_async()
1179 && !cx.tcx.features().async_fn_track_caller()
1180 && let Some(attr_span) = {
'done:
{
for i in cx.tcx.get_all_attrs(def_id) {
let i: &rustc_hir::Attribute = i;
match i {
rustc_hir::Attribute::Parsed(AttributeKind::TrackCaller(span))
=> {
break 'done Some(*span);
}
_ => {}
}
}
None
}
}find_attr!(cx.tcx.get_all_attrs(def_id), AttributeKind::TrackCaller(span) => *span)
1182 {
1183 cx.emit_span_lint(
1184 UNGATED_ASYNC_FN_TRACK_CALLER,
1185 attr_span,
1186 BuiltinUngatedAsyncFnTrackCaller { label: span, session: &cx.tcx.sess },
1187 );
1188 }
1189 }
1190}
1191
1192#[doc =
r" The `unreachable_pub` lint triggers for `pub` items not reachable from other crates - that"]
#[doc =
r" means neither directly accessible, nor reexported (with `pub use`), nor leaked through"]
#[doc =
r" things like return types (which the [`unnameable_types`] lint can detect if desired)."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,compile_fail"]
#[doc = r" #![deny(unreachable_pub)]"]
#[doc = r" mod foo {"]
#[doc = r" pub mod bar {"]
#[doc = r""]
#[doc = r" }"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" The `pub` keyword both expresses an intent for an item to be publicly available, and also"]
#[doc =
r" signals to the compiler to make the item publicly accessible. The intent can only be"]
#[doc =
r" satisfied, however, if all items which contain this item are *also* publicly accessible."]
#[doc =
r" Thus, this lint serves to identify situations where the intent does not match the reality."]
#[doc = r""]
#[doc =
r" If you wish the item to be accessible elsewhere within the crate, but not outside it, the"]
#[doc =
r" `pub(crate)` visibility is recommended to be used instead. This more clearly expresses the"]
#[doc = r" intent that the item is only visible within its own crate."]
#[doc = r""]
#[doc =
r#" This lint is "allow" by default because it will trigger for a large amount of existing Rust code."#]
#[doc = r" Eventually it is desired for this to become warn-by-default."]
#[doc = r""]
#[doc = r" [`unnameable_types`]: #unnameable-types"]
pub static UNREACHABLE_PUB: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "UNREACHABLE_PUB",
default_level: ::rustc_lint_defs::Allow,
desc: "`pub` items not reachable from crate root",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
1193 pub UNREACHABLE_PUB,
1226 Allow,
1227 "`pub` items not reachable from crate root"
1228}
1229
1230#[doc =
r" Lint for items marked `pub` that aren't reachable from other crates."]
pub struct UnreachablePub;
#[automatically_derived]
impl ::core::marker::Copy for UnreachablePub { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for UnreachablePub { }
#[automatically_derived]
impl ::core::clone::Clone for UnreachablePub {
#[inline]
fn clone(&self) -> UnreachablePub { *self }
}
impl ::rustc_lint_defs::LintPass for UnreachablePub {
fn name(&self) -> &'static str { "UnreachablePub" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[UNREACHABLE_PUB]))
}
}
impl UnreachablePub {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[UNREACHABLE_PUB]))
}
}declare_lint_pass!(
1231 UnreachablePub => [UNREACHABLE_PUB]
1233);
1234
1235impl UnreachablePub {
1236 fn perform_lint(
1237 &self,
1238 cx: &LateContext<'_>,
1239 what: &str,
1240 def_id: LocalDefId,
1241 vis_span: Span,
1242 exportable: bool,
1243 ) {
1244 let mut applicability = Applicability::MachineApplicable;
1245 if cx.tcx.visibility(def_id).is_public() && !cx.effective_visibilities.is_reachable(def_id)
1246 {
1247 let new_vis = if let Some(ty::Visibility::Restricted(restricted_did)) =
1250 cx.effective_visibilities.effective_vis(def_id).map(|effective_vis| {
1251 effective_vis.at_level(rustc_middle::middle::privacy::Level::Reachable)
1252 })
1253 && let parent_parent = cx
1254 .tcx
1255 .parent_module_from_def_id(cx.tcx.parent_module_from_def_id(def_id).into())
1256 && *restricted_did == parent_parent.to_local_def_id()
1257 && !restricted_did.to_def_id().is_crate_root()
1258 {
1259 "pub(super)"
1260 } else {
1261 "pub(crate)"
1262 };
1263
1264 if vis_span.from_expansion() {
1265 applicability = Applicability::MaybeIncorrect;
1266 }
1267 let def_span = cx.tcx.def_span(def_id);
1268 cx.emit_span_lint(
1269 UNREACHABLE_PUB,
1270 def_span,
1271 BuiltinUnreachablePub {
1272 what,
1273 new_vis,
1274 suggestion: (vis_span, applicability),
1275 help: exportable,
1276 },
1277 );
1278 }
1279 }
1280}
1281
1282impl<'tcx> LateLintPass<'tcx> for UnreachablePub {
1283 fn check_item(&mut self, cx: &LateContext<'_>, item: &hir::Item<'_>) {
1284 if let hir::ItemKind::Use(_, hir::UseKind::ListStem) = &item.kind {
1286 return;
1287 }
1288 self.perform_lint(cx, "item", item.owner_id.def_id, item.vis_span, true);
1289 }
1290
1291 fn check_foreign_item(&mut self, cx: &LateContext<'_>, foreign_item: &hir::ForeignItem<'tcx>) {
1292 self.perform_lint(cx, "item", foreign_item.owner_id.def_id, foreign_item.vis_span, true);
1293 }
1294
1295 fn check_field_def(&mut self, _cx: &LateContext<'_>, _field: &hir::FieldDef<'_>) {
1296 }
1310
1311 fn check_impl_item(&mut self, cx: &LateContext<'_>, impl_item: &hir::ImplItem<'_>) {
1312 if let ImplItemImplKind::Inherent { vis_span } = impl_item.impl_kind {
1313 self.perform_lint(cx, "item", impl_item.owner_id.def_id, vis_span, false);
1314 }
1315 }
1316}
1317
1318#[doc = r" The `type_alias_bounds` lint detects bounds in type aliases."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust"]
#[doc = r" type SendVec<T: Send> = Vec<T>;"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" Trait and lifetime bounds on generic parameters and in where clauses of"]
#[doc =
r" type aliases are not checked at usage sites of the type alias. Moreover,"]
#[doc =
r" they are not thoroughly checked for correctness at their definition site"]
#[doc = r" either similar to the aliased type."]
#[doc = r""]
#[doc =
r" This is a known limitation of the type checker that may be lifted in a"]
#[doc =
r" future edition. Permitting such bounds in light of this was unintentional."]
#[doc = r""]
#[doc =
r" While these bounds may have secondary effects such as enabling the use of"]
#[doc =
r#" "shorthand" associated type paths[^1] and affecting the default trait"#]
#[doc =
r" object lifetime[^2] of trait object types passed to the type alias, this"]
#[doc =
r" should not have been allowed until the aforementioned restrictions of the"]
#[doc = r" type checker have been lifted."]
#[doc = r""]
#[doc =
r" Using such bounds is highly discouraged as they are actively misleading."]
#[doc = r""]
#[doc =
r" [^1]: I.e., paths of the form `T::Assoc` where `T` is a type parameter"]
#[doc =
r" bounded by trait `Trait` which defines an associated type called `Assoc`"]
#[doc =
r" as opposed to a fully qualified path of the form `<T as Trait>::Assoc`."]
#[doc =
r" [^2]: <https://doc.rust-lang.org/reference/lifetime-elision.html#default-trait-object-lifetimes>"]
static TYPE_ALIAS_BOUNDS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "TYPE_ALIAS_BOUNDS",
default_level: ::rustc_lint_defs::Warn,
desc: "bounds in type aliases are not enforced",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
1319 TYPE_ALIAS_BOUNDS,
1352 Warn,
1353 "bounds in type aliases are not enforced"
1354}
1355
1356pub struct TypeAliasBounds;
#[automatically_derived]
impl ::core::marker::Copy for TypeAliasBounds { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for TypeAliasBounds { }
#[automatically_derived]
impl ::core::clone::Clone for TypeAliasBounds {
#[inline]
fn clone(&self) -> TypeAliasBounds { *self }
}
impl ::rustc_lint_defs::LintPass for TypeAliasBounds {
fn name(&self) -> &'static str { "TypeAliasBounds" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[TYPE_ALIAS_BOUNDS]))
}
}
impl TypeAliasBounds {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[TYPE_ALIAS_BOUNDS]))
}
}declare_lint_pass!(TypeAliasBounds => [TYPE_ALIAS_BOUNDS]);
1357
1358impl TypeAliasBounds {
1359 pub(crate) fn affects_object_lifetime_defaults(pred: &hir::WherePredicate<'_>) -> bool {
1360 if let hir::WherePredicateKind::BoundPredicate(pred) = pred.kind
1362 && pred.bounds.iter().any(|bound| #[allow(non_exhaustive_omitted_patterns)] match bound {
hir::GenericBound::Outlives(_) => true,
_ => false,
}matches!(bound, hir::GenericBound::Outlives(_)))
1363 && pred.bound_generic_params.is_empty() && pred.bounded_ty.as_generic_param().is_some()
1365 {
1366 return true;
1367 }
1368 false
1369 }
1370}
1371
1372impl<'tcx> LateLintPass<'tcx> for TypeAliasBounds {
1373 fn check_item(&mut self, cx: &LateContext<'_>, item: &hir::Item<'_>) {
1374 let hir::ItemKind::TyAlias(_, generics, hir_ty) = item.kind else { return };
1375
1376 if generics.predicates.is_empty() {
1378 return;
1379 }
1380
1381 if cx.tcx.type_alias_is_lazy(item.owner_id) {
1383 return;
1384 }
1385
1386 let ty = cx.tcx.type_of(item.owner_id).instantiate_identity();
1389 if ty.has_type_flags(ty::TypeFlags::HAS_CT_PROJECTION)
1390 && cx.tcx.features().generic_const_exprs()
1391 {
1392 return;
1393 }
1394
1395 let mut where_spans = Vec::new();
1401 let mut inline_spans = Vec::new();
1402 let mut inline_sugg = Vec::new();
1403
1404 for p in generics.predicates {
1405 let span = p.span;
1406 if p.kind.in_where_clause() {
1407 where_spans.push(span);
1408 } else {
1409 for b in p.kind.bounds() {
1410 inline_spans.push(b.span());
1411 }
1412 inline_sugg.push((span, String::new()));
1413 }
1414 }
1415
1416 let mut ty = Some(hir_ty);
1417 let enable_feat_help = cx.tcx.sess.is_nightly_build();
1418
1419 if let [.., label_sp] = *where_spans {
1420 cx.emit_span_lint(
1421 TYPE_ALIAS_BOUNDS,
1422 where_spans,
1423 BuiltinTypeAliasBounds {
1424 in_where_clause: true,
1425 label: label_sp,
1426 enable_feat_help,
1427 suggestions: ::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[(generics.where_clause_span, String::new())]))vec![(generics.where_clause_span, String::new())],
1428 preds: generics.predicates,
1429 ty: ty.take(),
1430 },
1431 );
1432 }
1433 if let [.., label_sp] = *inline_spans {
1434 cx.emit_span_lint(
1435 TYPE_ALIAS_BOUNDS,
1436 inline_spans,
1437 BuiltinTypeAliasBounds {
1438 in_where_clause: false,
1439 label: label_sp,
1440 enable_feat_help,
1441 suggestions: inline_sugg,
1442 preds: generics.predicates,
1443 ty,
1444 },
1445 );
1446 }
1447 }
1448}
1449
1450pub(crate) struct ShorthandAssocTyCollector {
1451 pub(crate) qselves: Vec<Span>,
1452}
1453
1454impl hir::intravisit::Visitor<'_> for ShorthandAssocTyCollector {
1455 fn visit_qpath(&mut self, qpath: &hir::QPath<'_>, id: hir::HirId, _: Span) {
1456 if let hir::QPath::TypeRelative(qself, _) = qpath
1459 && qself.as_generic_param().is_some()
1460 {
1461 self.qselves.push(qself.span);
1462 }
1463 hir::intravisit::walk_qpath(self, qpath, id)
1464 }
1465}
1466
1467#[doc =
r" The `trivial_bounds` lint detects trait bounds that don't depend on"]
#[doc = r" any type parameters."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust"]
#[doc = r" #![feature(trivial_bounds)]"]
#[doc = r" pub struct A where i32: Copy;"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc = r" Usually you would not write a trait bound that you know is always"]
#[doc =
r" true, or never true. However, when using macros, the macro may not"]
#[doc =
r" know whether or not the constraint would hold or not at the time when"]
#[doc =
r" generating the code. Currently, the compiler does not alert you if the"]
#[doc =
r" constraint is always true, and generates an error if it is never true."]
#[doc = r" The `trivial_bounds` feature changes this to be a warning in both"]
#[doc =
r" cases, giving macros more freedom and flexibility to generate code,"]
#[doc = r" while still providing a signal when writing non-macro code that"]
#[doc = r" something is amiss."]
#[doc = r""]
#[doc = r" See [RFC 2056] for more details. This feature is currently only"]
#[doc = r" available on the nightly channel, see [tracking issue #48214]."]
#[doc = r""]
#[doc =
r" [RFC 2056]: https://github.com/rust-lang/rfcs/blob/master/text/2056-allow-trivial-where-clause-constraints.md"]
#[doc =
r" [tracking issue #48214]: https://github.com/rust-lang/rust/issues/48214"]
static TRIVIAL_BOUNDS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "TRIVIAL_BOUNDS",
default_level: ::rustc_lint_defs::Warn,
desc: "these bounds don't depend on an type parameters",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
1468 TRIVIAL_BOUNDS,
1498 Warn,
1499 "these bounds don't depend on an type parameters"
1500}
1501
1502#[doc =
r" Lint for trait and lifetime bounds that don't depend on type parameters"]
#[doc = r" which either do nothing, or stop the item from being used."]
pub struct TrivialConstraints;
#[automatically_derived]
impl ::core::marker::Copy for TrivialConstraints { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for TrivialConstraints { }
#[automatically_derived]
impl ::core::clone::Clone for TrivialConstraints {
#[inline]
fn clone(&self) -> TrivialConstraints { *self }
}
impl ::rustc_lint_defs::LintPass for TrivialConstraints {
fn name(&self) -> &'static str { "TrivialConstraints" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[TRIVIAL_BOUNDS]))
}
}
impl TrivialConstraints {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[TRIVIAL_BOUNDS]))
}
}declare_lint_pass!(
1503 TrivialConstraints => [TRIVIAL_BOUNDS]
1506);
1507
1508impl<'tcx> LateLintPass<'tcx> for TrivialConstraints {
1509 fn check_item(&mut self, cx: &LateContext<'tcx>, item: &'tcx hir::Item<'tcx>) {
1510 use rustc_middle::ty::ClauseKind;
1511
1512 if cx.tcx.features().trivial_bounds() {
1513 let predicates = cx.tcx.predicates_of(item.owner_id);
1514 for &(predicate, span) in predicates.predicates {
1515 let predicate_kind_name = match predicate.kind().skip_binder() {
1516 ClauseKind::Trait(..) => "trait",
1517 ClauseKind::TypeOutlives(..) |
1518 ClauseKind::RegionOutlives(..) => "lifetime",
1519
1520 ClauseKind::UnstableFeature(_)
1521 | ClauseKind::ConstArgHasType(..)
1523 | ClauseKind::Projection(..)
1526 | ClauseKind::WellFormed(..)
1528 | ClauseKind::ConstEvaluatable(..)
1530 | ty::ClauseKind::HostEffect(..) => continue,
1532 };
1533 if predicate.is_global() {
1534 cx.emit_span_lint(
1535 TRIVIAL_BOUNDS,
1536 span,
1537 BuiltinTrivialBounds { predicate_kind_name, predicate },
1538 );
1539 }
1540 }
1541 }
1542 }
1543}
1544
1545#[doc =
r" The `double_negations` lint detects expressions of the form `--x`."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust"]
#[doc = r" fn main() {"]
#[doc = r" let x = 1;"]
#[doc = r" let _b = --x;"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" Negating something twice is usually the same as not negating it at all."]
#[doc =
r" However, a double negation in Rust can easily be confused with the"]
#[doc =
r" prefix decrement operator that exists in many languages derived from C."]
#[doc = r" Use `-(-x)` if you really wanted to negate the value twice."]
#[doc = r""]
#[doc = r" To decrement a value, use `x -= 1` instead."]
pub static DOUBLE_NEGATIONS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "DOUBLE_NEGATIONS",
default_level: ::rustc_lint_defs::Warn,
desc: "detects expressions of the form `--x`",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
1546 pub DOUBLE_NEGATIONS,
1568 Warn,
1569 "detects expressions of the form `--x`"
1570}
1571
1572#[doc =
r" Lint for expressions of the form `--x` that can be confused with C's"]
#[doc = r" prefix decrement operator."]
pub struct DoubleNegations;
#[automatically_derived]
impl ::core::marker::Copy for DoubleNegations { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for DoubleNegations { }
#[automatically_derived]
impl ::core::clone::Clone for DoubleNegations {
#[inline]
fn clone(&self) -> DoubleNegations { *self }
}
impl ::rustc_lint_defs::LintPass for DoubleNegations {
fn name(&self) -> &'static str { "DoubleNegations" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[DOUBLE_NEGATIONS]))
}
}
impl DoubleNegations {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[DOUBLE_NEGATIONS]))
}
}declare_lint_pass!(
1573 DoubleNegations => [DOUBLE_NEGATIONS]
1576);
1577
1578impl EarlyLintPass for DoubleNegations {
1579 #[inline]
1580 fn check_expr(&mut self, cx: &EarlyContext<'_>, expr: &ast::Expr) {
1581 if let ExprKind::Unary(UnOp::Neg, ref inner) = expr.kind
1584 && let ExprKind::Unary(UnOp::Neg, ref inner2) = inner.kind
1585 && !#[allow(non_exhaustive_omitted_patterns)] match inner2.kind {
ExprKind::Unary(UnOp::Neg, _) => true,
_ => false,
}matches!(inner2.kind, ExprKind::Unary(UnOp::Neg, _))
1586 && expr.span.eq_ctxt(inner.span)
1588 {
1589 cx.emit_span_lint(
1590 DOUBLE_NEGATIONS,
1591 expr.span,
1592 BuiltinDoubleNegations {
1593 add_parens: BuiltinDoubleNegationsAddParens {
1594 start_span: inner.span.shrink_to_lo(),
1595 end_span: inner.span.shrink_to_hi(),
1596 },
1597 },
1598 );
1599 }
1600 }
1601}
1602
1603#[doc = r" Does nothing as a lint pass, but registers some `Lint`s"]
#[doc = r" which are used by other parts of the compiler."]
pub struct SoftLints;
#[automatically_derived]
impl ::core::marker::Copy for SoftLints { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for SoftLints { }
#[automatically_derived]
impl ::core::clone::Clone for SoftLints {
#[inline]
fn clone(&self) -> SoftLints { *self }
}
impl ::rustc_lint_defs::LintPass for SoftLints {
fn name(&self) -> &'static str { "SoftLints" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[WHILE_TRUE, NON_SHORTHAND_FIELD_PATTERNS, UNSAFE_CODE,
MISSING_DOCS, MISSING_COPY_IMPLEMENTATIONS,
MISSING_DEBUG_IMPLEMENTATIONS, ANONYMOUS_PARAMETERS,
UNUSED_DOC_COMMENTS, NO_MANGLE_CONST_ITEMS,
NO_MANGLE_GENERIC_ITEMS, MUTABLE_TRANSMUTES,
UNSTABLE_FEATURES, UNREACHABLE_PUB, TYPE_ALIAS_BOUNDS,
TRIVIAL_BOUNDS, DOUBLE_NEGATIONS]))
}
}
impl SoftLints {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[WHILE_TRUE, NON_SHORTHAND_FIELD_PATTERNS, UNSAFE_CODE,
MISSING_DOCS, MISSING_COPY_IMPLEMENTATIONS,
MISSING_DEBUG_IMPLEMENTATIONS, ANONYMOUS_PARAMETERS,
UNUSED_DOC_COMMENTS, NO_MANGLE_CONST_ITEMS,
NO_MANGLE_GENERIC_ITEMS, MUTABLE_TRANSMUTES,
UNSTABLE_FEATURES, UNREACHABLE_PUB, TYPE_ALIAS_BOUNDS,
TRIVIAL_BOUNDS, DOUBLE_NEGATIONS]))
}
}declare_lint_pass!(
1604 SoftLints => [
1607 WHILE_TRUE,
1608 NON_SHORTHAND_FIELD_PATTERNS,
1609 UNSAFE_CODE,
1610 MISSING_DOCS,
1611 MISSING_COPY_IMPLEMENTATIONS,
1612 MISSING_DEBUG_IMPLEMENTATIONS,
1613 ANONYMOUS_PARAMETERS,
1614 UNUSED_DOC_COMMENTS,
1615 NO_MANGLE_CONST_ITEMS,
1616 NO_MANGLE_GENERIC_ITEMS,
1617 MUTABLE_TRANSMUTES,
1618 UNSTABLE_FEATURES,
1619 UNREACHABLE_PUB,
1620 TYPE_ALIAS_BOUNDS,
1621 TRIVIAL_BOUNDS,
1622 DOUBLE_NEGATIONS
1623 ]
1624);
1625
1626#[doc =
r" The `ellipsis_inclusive_range_patterns` lint detects the [`...` range"]
#[doc = r" pattern], which is deprecated."]
#[doc = r""]
#[doc =
r" [`...` range pattern]: https://doc.rust-lang.org/reference/patterns.html#range-patterns"]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,edition2018"]
#[doc = r" let x = 123;"]
#[doc = r" match x {"]
#[doc = r" 0...100 => {}"]
#[doc = r" _ => {}"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" The `...` range pattern syntax was changed to `..=` to avoid potential"]
#[doc =
r" confusion with the [`..` range expression]. Use the new form instead."]
#[doc = r""]
#[doc =
r" [`..` range expression]: https://doc.rust-lang.org/reference/expressions/range-expr.html"]
pub static ELLIPSIS_INCLUSIVE_RANGE_PATTERNS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "ELLIPSIS_INCLUSIVE_RANGE_PATTERNS",
default_level: ::rustc_lint_defs::Warn,
desc: "`...` range patterns are deprecated",
is_externally_loaded: false,
future_incompatible: Some(::rustc_lint_defs::FutureIncompatibleInfo {
reason: ::rustc_lint_defs::FutureIncompatibilityReason::EditionError(::rustc_lint_defs::EditionFcw {
edition: rustc_span::edition::Edition::Edition2021,
page_slug: "warnings-promoted-to-error",
}),
..::rustc_lint_defs::FutureIncompatibleInfo::default_fields_for_macro()
}),
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
1627 pub ELLIPSIS_INCLUSIVE_RANGE_PATTERNS,
1651 Warn,
1652 "`...` range patterns are deprecated",
1653 @future_incompatible = FutureIncompatibleInfo {
1654 reason: fcw!(EditionError 2021 "warnings-promoted-to-error"),
1655 };
1656}
1657
1658#[derive(#[automatically_derived]
impl ::core::default::Default for EllipsisInclusiveRangePatterns {
#[inline]
fn default() -> EllipsisInclusiveRangePatterns {
EllipsisInclusiveRangePatterns {
node_id: ::core::default::Default::default(),
}
}
}Default)]
1659pub struct EllipsisInclusiveRangePatterns {
1660 node_id: Option<ast::NodeId>,
1663}
1664
1665impl ::rustc_lint_defs::LintPass for EllipsisInclusiveRangePatterns {
fn name(&self) -> &'static str { "EllipsisInclusiveRangePatterns" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[ELLIPSIS_INCLUSIVE_RANGE_PATTERNS]))
}
}
impl EllipsisInclusiveRangePatterns {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[ELLIPSIS_INCLUSIVE_RANGE_PATTERNS]))
}
}impl_lint_pass!(EllipsisInclusiveRangePatterns => [ELLIPSIS_INCLUSIVE_RANGE_PATTERNS]);
1666
1667impl EarlyLintPass for EllipsisInclusiveRangePatterns {
1668 fn check_pat(&mut self, cx: &EarlyContext<'_>, pat: &ast::Pat) {
1669 if self.node_id.is_some() {
1670 return;
1672 }
1673
1674 use self::ast::PatKind;
1675 use self::ast::RangeSyntax::DotDotDot;
1676
1677 fn matches_ellipsis_pat(pat: &ast::Pat) -> Option<(Option<&Expr>, &Expr, Span)> {
1680 match &pat.kind {
1681 PatKind::Range(
1682 a,
1683 Some(b),
1684 Spanned { span, node: RangeEnd::Included(DotDotDot) },
1685 ) => Some((a.as_deref(), b, *span)),
1686 _ => None,
1687 }
1688 }
1689
1690 let (parentheses, endpoints) = match &pat.kind {
1691 PatKind::Ref(subpat, _, _) => (true, matches_ellipsis_pat(subpat)),
1692 _ => (false, matches_ellipsis_pat(pat)),
1693 };
1694
1695 if let Some((start, end, join)) = endpoints {
1696 if parentheses {
1697 self.node_id = Some(pat.id);
1698 let end = expr_to_string(end);
1699 let replace = match start {
1700 Some(start) => ::alloc::__export::must_use({
::alloc::fmt::format(format_args!("&({0}..={1})",
expr_to_string(start), end))
})format!("&({}..={})", expr_to_string(start), end),
1701 None => ::alloc::__export::must_use({
::alloc::fmt::format(format_args!("&(..={0})", end))
})format!("&(..={end})"),
1702 };
1703 if join.edition() >= Edition::Edition2021 {
1704 cx.sess().dcx().emit_err(BuiltinEllipsisInclusiveRangePatterns {
1705 span: pat.span,
1706 suggestion: pat.span,
1707 replace,
1708 });
1709 } else {
1710 cx.emit_span_lint(
1711 ELLIPSIS_INCLUSIVE_RANGE_PATTERNS,
1712 pat.span,
1713 BuiltinEllipsisInclusiveRangePatternsLint::Parenthesise {
1714 suggestion: pat.span,
1715 replace,
1716 },
1717 );
1718 }
1719 } else {
1720 let replace = "..=";
1721 if join.edition() >= Edition::Edition2021 {
1722 cx.sess().dcx().emit_err(BuiltinEllipsisInclusiveRangePatterns {
1723 span: pat.span,
1724 suggestion: join,
1725 replace: replace.to_string(),
1726 });
1727 } else {
1728 cx.emit_span_lint(
1729 ELLIPSIS_INCLUSIVE_RANGE_PATTERNS,
1730 join,
1731 BuiltinEllipsisInclusiveRangePatternsLint::NonParenthesise {
1732 suggestion: join,
1733 },
1734 );
1735 }
1736 };
1737 }
1738 }
1739
1740 fn check_pat_post(&mut self, _cx: &EarlyContext<'_>, pat: &ast::Pat) {
1741 if let Some(node_id) = self.node_id {
1742 if pat.id == node_id {
1743 self.node_id = None
1744 }
1745 }
1746 }
1747}
1748
1749#[doc =
r" The `keyword_idents_2018` lint detects edition keywords being used as an"]
#[doc = r" identifier."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,edition2015,compile_fail"]
#[doc = r" #![deny(keyword_idents_2018)]"]
#[doc = r" // edition 2015"]
#[doc = r" fn dyn() {}"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc = r" Rust [editions] allow the language to evolve without breaking"]
#[doc =
r" backwards compatibility. This lint catches code that uses new keywords"]
#[doc =
r" that are added to the language that are used as identifiers (such as a"]
#[doc =
r" variable name, function name, etc.). If you switch the compiler to a"]
#[doc =
r" new edition without updating the code, then it will fail to compile if"]
#[doc = r" you are using a new keyword as an identifier."]
#[doc = r""]
#[doc =
r" You can manually change the identifiers to a non-keyword, or use a"]
#[doc =
r" [raw identifier], for example `r#dyn`, to transition to a new edition."]
#[doc = r""]
#[doc =
r#" This lint solves the problem automatically. It is "allow" by default"#]
#[doc =
r" because the code is perfectly valid in older editions. The [`cargo"]
#[doc =
r#" fix`] tool with the `--edition` flag will switch this lint to "warn""#]
#[doc =
r" and automatically apply the suggested fix from the compiler (which is"]
#[doc =
r" to use a raw identifier). This provides a completely automated way to"]
#[doc = r" update old code for a new edition."]
#[doc = r""]
#[doc = r" [editions]: https://doc.rust-lang.org/edition-guide/"]
#[doc =
r" [raw identifier]: https://doc.rust-lang.org/reference/identifiers.html"]
#[doc =
r" [`cargo fix`]: https://doc.rust-lang.org/cargo/commands/cargo-fix.html"]
pub static KEYWORD_IDENTS_2018: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "KEYWORD_IDENTS_2018",
default_level: ::rustc_lint_defs::Allow,
desc: "detects edition keywords being used as an identifier",
is_externally_loaded: false,
future_incompatible: Some(::rustc_lint_defs::FutureIncompatibleInfo {
reason: ::rustc_lint_defs::FutureIncompatibilityReason::EditionError(::rustc_lint_defs::EditionFcw {
edition: rustc_span::edition::Edition::Edition2018,
page_slug: "new-keywords",
}),
..::rustc_lint_defs::FutureIncompatibleInfo::default_fields_for_macro()
}),
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
1750 pub KEYWORD_IDENTS_2018,
1786 Allow,
1787 "detects edition keywords being used as an identifier",
1788 @future_incompatible = FutureIncompatibleInfo {
1789 reason: fcw!(EditionError 2018 "new-keywords"),
1790 };
1791}
1792
1793#[doc =
r" The `keyword_idents_2024` lint detects edition keywords being used as an"]
#[doc = r" identifier."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,edition2015,compile_fail"]
#[doc = r" #![deny(keyword_idents_2024)]"]
#[doc = r" // edition 2015"]
#[doc = r" fn gen() {}"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc = r" Rust [editions] allow the language to evolve without breaking"]
#[doc =
r" backwards compatibility. This lint catches code that uses new keywords"]
#[doc =
r" that are added to the language that are used as identifiers (such as a"]
#[doc =
r" variable name, function name, etc.). If you switch the compiler to a"]
#[doc =
r" new edition without updating the code, then it will fail to compile if"]
#[doc = r" you are using a new keyword as an identifier."]
#[doc = r""]
#[doc =
r" You can manually change the identifiers to a non-keyword, or use a"]
#[doc =
r" [raw identifier], for example `r#gen`, to transition to a new edition."]
#[doc = r""]
#[doc =
r#" This lint solves the problem automatically. It is "allow" by default"#]
#[doc =
r" because the code is perfectly valid in older editions. The [`cargo"]
#[doc =
r#" fix`] tool with the `--edition` flag will switch this lint to "warn""#]
#[doc =
r" and automatically apply the suggested fix from the compiler (which is"]
#[doc =
r" to use a raw identifier). This provides a completely automated way to"]
#[doc = r" update old code for a new edition."]
#[doc = r""]
#[doc = r" [editions]: https://doc.rust-lang.org/edition-guide/"]
#[doc =
r" [raw identifier]: https://doc.rust-lang.org/reference/identifiers.html"]
#[doc =
r" [`cargo fix`]: https://doc.rust-lang.org/cargo/commands/cargo-fix.html"]
pub static KEYWORD_IDENTS_2024: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "KEYWORD_IDENTS_2024",
default_level: ::rustc_lint_defs::Allow,
desc: "detects edition keywords being used as an identifier",
is_externally_loaded: false,
future_incompatible: Some(::rustc_lint_defs::FutureIncompatibleInfo {
reason: ::rustc_lint_defs::FutureIncompatibilityReason::EditionError(::rustc_lint_defs::EditionFcw {
edition: rustc_span::edition::Edition::Edition2024,
page_slug: "gen-keyword",
}),
..::rustc_lint_defs::FutureIncompatibleInfo::default_fields_for_macro()
}),
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
1794 pub KEYWORD_IDENTS_2024,
1830 Allow,
1831 "detects edition keywords being used as an identifier",
1832 @future_incompatible = FutureIncompatibleInfo {
1833 reason: fcw!(EditionError 2024 "gen-keyword"),
1834 };
1835}
1836
1837#[doc = r" Check for uses of edition keywords used as an identifier."]
pub struct KeywordIdents;
#[automatically_derived]
impl ::core::marker::Copy for KeywordIdents { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for KeywordIdents { }
#[automatically_derived]
impl ::core::clone::Clone for KeywordIdents {
#[inline]
fn clone(&self) -> KeywordIdents { *self }
}
impl ::rustc_lint_defs::LintPass for KeywordIdents {
fn name(&self) -> &'static str { "KeywordIdents" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[KEYWORD_IDENTS_2018, KEYWORD_IDENTS_2024]))
}
}
impl KeywordIdents {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[KEYWORD_IDENTS_2018, KEYWORD_IDENTS_2024]))
}
}declare_lint_pass!(
1838 KeywordIdents => [KEYWORD_IDENTS_2018, KEYWORD_IDENTS_2024]
1840);
1841
1842struct UnderMacro(bool);
1843
1844impl KeywordIdents {
1845 fn check_tokens(&mut self, cx: &EarlyContext<'_>, tokens: &TokenStream) {
1846 let mut prev_dollar = false;
1848 for tt in tokens.iter() {
1849 match tt {
1850 TokenTree::Token(token, _) => {
1852 if let Some((ident, token::IdentIsRaw::No)) = token.ident() {
1853 if !prev_dollar {
1854 self.check_ident_token(cx, UnderMacro(true), ident, "");
1855 }
1856 } else if let Some((ident, token::IdentIsRaw::No)) = token.lifetime() {
1857 self.check_ident_token(
1858 cx,
1859 UnderMacro(true),
1860 ident.without_first_quote(),
1861 "'",
1862 );
1863 } else if token.kind == TokenKind::Dollar {
1864 prev_dollar = true;
1865 continue;
1866 }
1867 }
1868 TokenTree::Delimited(.., tts) => self.check_tokens(cx, tts),
1869 }
1870 prev_dollar = false;
1871 }
1872 }
1873
1874 fn check_ident_token(
1875 &mut self,
1876 cx: &EarlyContext<'_>,
1877 UnderMacro(under_macro): UnderMacro,
1878 ident: Ident,
1879 prefix: &'static str,
1880 ) {
1881 let (lint, edition) = match ident.name {
1882 kw::Async | kw::Await | kw::Try => (KEYWORD_IDENTS_2018, Edition::Edition2018),
1883
1884 kw::Dyn if !under_macro => (KEYWORD_IDENTS_2018, Edition::Edition2018),
1897
1898 kw::Gen => (KEYWORD_IDENTS_2024, Edition::Edition2024),
1899
1900 _ => return,
1901 };
1902
1903 if ident.span.edition() >= edition
1905 || cx.sess().psess.raw_identifier_spans.contains(ident.span)
1906 {
1907 return;
1908 }
1909
1910 cx.emit_span_lint(
1911 lint,
1912 ident.span,
1913 BuiltinKeywordIdents { kw: ident, next: edition, suggestion: ident.span, prefix },
1914 );
1915 }
1916}
1917
1918impl EarlyLintPass for KeywordIdents {
1919 fn check_mac_def(&mut self, cx: &EarlyContext<'_>, mac_def: &ast::MacroDef) {
1920 self.check_tokens(cx, &mac_def.body.tokens);
1921 }
1922 fn check_mac(&mut self, cx: &EarlyContext<'_>, mac: &ast::MacCall) {
1923 self.check_tokens(cx, &mac.args.tokens);
1924 }
1925 fn check_ident(&mut self, cx: &EarlyContext<'_>, ident: &Ident) {
1926 if ident.name.as_str().starts_with('\'') {
1927 self.check_ident_token(cx, UnderMacro(false), ident.without_first_quote(), "'");
1928 } else {
1929 self.check_ident_token(cx, UnderMacro(false), *ident, "");
1930 }
1931 }
1932}
1933
1934pub struct ExplicitOutlivesRequirements;
#[automatically_derived]
impl ::core::marker::Copy for ExplicitOutlivesRequirements { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for ExplicitOutlivesRequirements { }
#[automatically_derived]
impl ::core::clone::Clone for ExplicitOutlivesRequirements {
#[inline]
fn clone(&self) -> ExplicitOutlivesRequirements { *self }
}
impl ::rustc_lint_defs::LintPass for ExplicitOutlivesRequirements {
fn name(&self) -> &'static str { "ExplicitOutlivesRequirements" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[EXPLICIT_OUTLIVES_REQUIREMENTS]))
}
}
impl ExplicitOutlivesRequirements {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[EXPLICIT_OUTLIVES_REQUIREMENTS]))
}
}declare_lint_pass!(ExplicitOutlivesRequirements => [EXPLICIT_OUTLIVES_REQUIREMENTS]);
1935
1936impl ExplicitOutlivesRequirements {
1937 fn lifetimes_outliving_lifetime<'tcx>(
1938 tcx: TyCtxt<'tcx>,
1939 inferred_outlives: impl Iterator<Item = &'tcx (ty::Clause<'tcx>, Span)>,
1940 item: LocalDefId,
1941 lifetime: LocalDefId,
1942 ) -> Vec<ty::Region<'tcx>> {
1943 let item_generics = tcx.generics_of(item);
1944
1945 inferred_outlives
1946 .filter_map(|(clause, _)| match clause.kind().skip_binder() {
1947 ty::ClauseKind::RegionOutlives(ty::OutlivesPredicate(a, b)) => match a.kind() {
1948 ty::ReEarlyParam(ebr)
1949 if item_generics.region_param(ebr, tcx).def_id == lifetime.to_def_id() =>
1950 {
1951 Some(b)
1952 }
1953 _ => None,
1954 },
1955 _ => None,
1956 })
1957 .collect()
1958 }
1959
1960 fn lifetimes_outliving_type<'tcx>(
1961 inferred_outlives: impl Iterator<Item = &'tcx (ty::Clause<'tcx>, Span)>,
1962 index: u32,
1963 ) -> Vec<ty::Region<'tcx>> {
1964 inferred_outlives
1965 .filter_map(|(clause, _)| match clause.kind().skip_binder() {
1966 ty::ClauseKind::TypeOutlives(ty::OutlivesPredicate(a, b)) => {
1967 a.is_param(index).then_some(b)
1968 }
1969 _ => None,
1970 })
1971 .collect()
1972 }
1973
1974 fn collect_outlives_bound_spans<'tcx>(
1975 &self,
1976 tcx: TyCtxt<'tcx>,
1977 bounds: &hir::GenericBounds<'_>,
1978 inferred_outlives: &[ty::Region<'tcx>],
1979 predicate_span: Span,
1980 item: DefId,
1981 ) -> Vec<(usize, Span)> {
1982 use rustc_middle::middle::resolve_bound_vars::ResolvedArg;
1983
1984 let item_generics = tcx.generics_of(item);
1985
1986 bounds
1987 .iter()
1988 .enumerate()
1989 .filter_map(|(i, bound)| {
1990 let hir::GenericBound::Outlives(lifetime) = bound else {
1991 return None;
1992 };
1993
1994 let is_inferred = match tcx.named_bound_var(lifetime.hir_id) {
1995 Some(ResolvedArg::EarlyBound(def_id)) => inferred_outlives
1996 .iter()
1997 .any(|r| #[allow(non_exhaustive_omitted_patterns)] match r.kind() {
ty::ReEarlyParam(ebr) if
{ item_generics.region_param(ebr, tcx).def_id == def_id.to_def_id() }
=> true,
_ => false,
}matches!(r.kind(), ty::ReEarlyParam(ebr) if { item_generics.region_param(ebr, tcx).def_id == def_id.to_def_id() })),
1998 _ => false,
1999 };
2000
2001 if !is_inferred {
2002 return None;
2003 }
2004
2005 let span = bound.span().find_ancestor_inside(predicate_span)?;
2006 if span.in_external_macro(tcx.sess.source_map()) {
2007 return None;
2008 }
2009
2010 Some((i, span))
2011 })
2012 .collect()
2013 }
2014
2015 fn consolidate_outlives_bound_spans(
2016 &self,
2017 lo: Span,
2018 bounds: &hir::GenericBounds<'_>,
2019 bound_spans: Vec<(usize, Span)>,
2020 ) -> Vec<Span> {
2021 if bounds.is_empty() {
2022 return Vec::new();
2023 }
2024 if bound_spans.len() == bounds.len() {
2025 let (_, last_bound_span) = bound_spans[bound_spans.len() - 1];
2026 ::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[lo.to(last_bound_span)]))vec![lo.to(last_bound_span)]
2029 } else {
2030 let mut merged = Vec::new();
2031 let mut last_merged_i = None;
2032
2033 let mut from_start = true;
2034 for (i, bound_span) in bound_spans {
2035 match last_merged_i {
2036 None if i == 0 => {
2038 merged.push(bound_span.to(bounds[1].span().shrink_to_lo()));
2039 last_merged_i = Some(0);
2040 }
2041 Some(h) if i == h + 1 => {
2043 if let Some(tail) = merged.last_mut() {
2044 let to_span = if from_start && i < bounds.len() {
2047 bounds[i + 1].span().shrink_to_lo()
2048 } else {
2049 bound_span
2050 };
2051 *tail = tail.to(to_span);
2052 last_merged_i = Some(i);
2053 } else {
2054 ::rustc_middle::util::bug::bug_fmt(format_args!("another bound-span visited earlier"));bug!("another bound-span visited earlier");
2055 }
2056 }
2057 _ => {
2058 from_start = false;
2062 merged.push(bounds[i - 1].span().shrink_to_hi().to(bound_span));
2063 last_merged_i = Some(i);
2064 }
2065 }
2066 }
2067 merged
2068 }
2069 }
2070}
2071
2072impl<'tcx> LateLintPass<'tcx> for ExplicitOutlivesRequirements {
2073 fn check_item(&mut self, cx: &LateContext<'tcx>, item: &'tcx hir::Item<'_>) {
2074 use rustc_middle::middle::resolve_bound_vars::ResolvedArg;
2075
2076 let def_id = item.owner_id.def_id;
2077 if let hir::ItemKind::Struct(_, generics, _)
2078 | hir::ItemKind::Enum(_, generics, _)
2079 | hir::ItemKind::Union(_, generics, _) = item.kind
2080 {
2081 let inferred_outlives = cx.tcx.inferred_outlives_of(def_id);
2082 if inferred_outlives.is_empty() {
2083 return;
2084 }
2085
2086 let ty_generics = cx.tcx.generics_of(def_id);
2087 let num_where_predicates = generics
2088 .predicates
2089 .iter()
2090 .filter(|predicate| predicate.kind.in_where_clause())
2091 .count();
2092
2093 let mut bound_count = 0;
2094 let mut lint_spans = Vec::new();
2095 let mut where_lint_spans = Vec::new();
2096 let mut dropped_where_predicate_count = 0;
2097 for (i, where_predicate) in generics.predicates.iter().enumerate() {
2098 let (relevant_lifetimes, bounds, predicate_span, in_where_clause) =
2099 match where_predicate.kind {
2100 hir::WherePredicateKind::RegionPredicate(predicate) => {
2101 if let Some(ResolvedArg::EarlyBound(region_def_id)) =
2102 cx.tcx.named_bound_var(predicate.lifetime.hir_id)
2103 {
2104 (
2105 Self::lifetimes_outliving_lifetime(
2106 cx.tcx,
2107 inferred_outlives.iter().filter(|(_, span)| {
2110 !where_predicate.span.contains(*span)
2111 }),
2112 item.owner_id.def_id,
2113 region_def_id,
2114 ),
2115 &predicate.bounds,
2116 where_predicate.span,
2117 predicate.in_where_clause,
2118 )
2119 } else {
2120 continue;
2121 }
2122 }
2123 hir::WherePredicateKind::BoundPredicate(predicate) => {
2124 match predicate.bounded_ty.kind {
2127 hir::TyKind::Path(hir::QPath::Resolved(None, path)) => {
2128 let Res::Def(DefKind::TyParam, def_id) = path.res else {
2129 continue;
2130 };
2131 let index = ty_generics.param_def_id_to_index[&def_id];
2132 (
2133 Self::lifetimes_outliving_type(
2134 inferred_outlives.iter().filter(|(_, span)| {
2137 !where_predicate.span.contains(*span)
2138 }),
2139 index,
2140 ),
2141 &predicate.bounds,
2142 where_predicate.span,
2143 predicate.origin == PredicateOrigin::WhereClause,
2144 )
2145 }
2146 _ => {
2147 continue;
2148 }
2149 }
2150 }
2151 _ => continue,
2152 };
2153 if relevant_lifetimes.is_empty() {
2154 continue;
2155 }
2156
2157 let bound_spans = self.collect_outlives_bound_spans(
2158 cx.tcx,
2159 bounds,
2160 &relevant_lifetimes,
2161 predicate_span,
2162 item.owner_id.to_def_id(),
2163 );
2164 bound_count += bound_spans.len();
2165
2166 let drop_predicate = bound_spans.len() == bounds.len();
2167 if drop_predicate && in_where_clause {
2168 dropped_where_predicate_count += 1;
2169 }
2170
2171 if drop_predicate {
2172 if !in_where_clause {
2173 lint_spans.push(predicate_span);
2174 } else if predicate_span.from_expansion() {
2175 where_lint_spans.push(predicate_span);
2177 } else if i + 1 < num_where_predicates {
2178 let next_predicate_span = generics.predicates[i + 1].span;
2181 if next_predicate_span.from_expansion() {
2182 where_lint_spans.push(predicate_span);
2183 } else {
2184 where_lint_spans
2185 .push(predicate_span.to(next_predicate_span.shrink_to_lo()));
2186 }
2187 } else {
2188 let where_span = generics.where_clause_span;
2190 if where_span.from_expansion() {
2191 where_lint_spans.push(predicate_span);
2192 } else {
2193 where_lint_spans.push(predicate_span.to(where_span.shrink_to_hi()));
2194 }
2195 }
2196 } else {
2197 where_lint_spans.extend(self.consolidate_outlives_bound_spans(
2198 predicate_span.shrink_to_lo(),
2199 bounds,
2200 bound_spans,
2201 ));
2202 }
2203 }
2204
2205 if generics.has_where_clause_predicates
2208 && dropped_where_predicate_count == num_where_predicates
2209 {
2210 let where_span = generics.where_clause_span;
2211 let full_where_span =
2215 if let hir::ItemKind::Struct(_, _, hir::VariantData::Tuple(..)) = item.kind {
2216 where_span
2217 } else {
2218 generics.span.shrink_to_hi().to(where_span)
2219 };
2220
2221 if where_lint_spans.iter().all(|&sp| full_where_span.contains(sp)) {
2224 lint_spans.push(full_where_span);
2225 } else {
2226 lint_spans.extend(where_lint_spans);
2227 }
2228 } else {
2229 lint_spans.extend(where_lint_spans);
2230 }
2231
2232 if !lint_spans.is_empty() {
2233 let applicability = if lint_spans.iter().all(|sp| sp.can_be_used_for_suggestions())
2235 {
2236 Applicability::MachineApplicable
2237 } else {
2238 Applicability::MaybeIncorrect
2239 };
2240
2241 lint_spans.sort_unstable();
2244 lint_spans.dedup();
2245
2246 cx.emit_span_lint(
2247 EXPLICIT_OUTLIVES_REQUIREMENTS,
2248 lint_spans.clone(),
2249 BuiltinExplicitOutlives {
2250 count: bound_count,
2251 suggestion: BuiltinExplicitOutlivesSuggestion {
2252 spans: lint_spans,
2253 applicability,
2254 },
2255 },
2256 );
2257 }
2258 }
2259 }
2260}
2261
2262#[doc =
r" The `incomplete_features` lint detects unstable features enabled with"]
#[doc =
r" the [`feature` attribute] that may function improperly in some or all"]
#[doc = r" cases."]
#[doc = r""]
#[doc =
r" [`feature` attribute]: https://doc.rust-lang.org/nightly/unstable-book/"]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust"]
#[doc = r" #![feature(generic_const_exprs)]"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc = r" Although it is encouraged for people to experiment with unstable"]
#[doc =
r" features, some of them are known to be incomplete or faulty. This lint"]
#[doc =
r" is a signal that the feature has not yet been finished, and you may"]
#[doc = r" experience problems with it."]
pub static INCOMPLETE_FEATURES: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "INCOMPLETE_FEATURES",
default_level: ::rustc_lint_defs::Warn,
desc: "incomplete features that may function improperly in some or all cases",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
2263 pub INCOMPLETE_FEATURES,
2284 Warn,
2285 "incomplete features that may function improperly in some or all cases"
2286}
2287
2288#[doc =
r" The `internal_features` lint detects unstable features enabled with"]
#[doc =
r" the [`feature` attribute] that are internal to the compiler or standard"]
#[doc = r" library."]
#[doc = r""]
#[doc =
r" [`feature` attribute]: https://doc.rust-lang.org/nightly/unstable-book/"]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust"]
#[doc = r" #![feature(rustc_attrs)]"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" These features are an implementation detail of the compiler and standard"]
#[doc = r" library and are not supposed to be used in user code."]
pub static INTERNAL_FEATURES: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "INTERNAL_FEATURES",
default_level: ::rustc_lint_defs::Warn,
desc: "internal features are not supposed to be used",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
2289 pub INTERNAL_FEATURES,
2308 Warn,
2309 "internal features are not supposed to be used"
2310}
2311
2312#[doc =
r" Check for used feature gates in `INCOMPLETE_FEATURES` in `rustc_feature/src/unstable.rs`."]
pub struct IncompleteInternalFeatures;
#[automatically_derived]
impl ::core::marker::Copy for IncompleteInternalFeatures { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for IncompleteInternalFeatures { }
#[automatically_derived]
impl ::core::clone::Clone for IncompleteInternalFeatures {
#[inline]
fn clone(&self) -> IncompleteInternalFeatures { *self }
}
impl ::rustc_lint_defs::LintPass for IncompleteInternalFeatures {
fn name(&self) -> &'static str { "IncompleteInternalFeatures" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[INCOMPLETE_FEATURES, INTERNAL_FEATURES]))
}
}
impl IncompleteInternalFeatures {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[INCOMPLETE_FEATURES, INTERNAL_FEATURES]))
}
}declare_lint_pass!(
2313 IncompleteInternalFeatures => [INCOMPLETE_FEATURES, INTERNAL_FEATURES]
2315);
2316
2317impl EarlyLintPass for IncompleteInternalFeatures {
2318 fn check_crate(&mut self, cx: &EarlyContext<'_>, _: &ast::Crate) {
2319 let features = cx.builder.features();
2320
2321 features
2322 .enabled_features_iter_stable_order()
2323 .filter(|(name, _)| features.incomplete(*name) || features.internal(*name))
2324 .for_each(|(name, span)| {
2325 if features.incomplete(name) {
2326 let note = rustc_feature::find_feature_issue(name, GateIssue::Language)
2327 .map(|n| BuiltinFeatureIssueNote { n });
2328 let help =
2329 HAS_MIN_FEATURES.contains(&name).then_some(BuiltinIncompleteFeaturesHelp);
2330
2331 cx.emit_span_lint(
2332 INCOMPLETE_FEATURES,
2333 span,
2334 BuiltinIncompleteFeatures { name, note, help },
2335 );
2336 } else {
2337 cx.emit_span_lint(INTERNAL_FEATURES, span, BuiltinInternalFeatures { name });
2338 }
2339 });
2340 }
2341}
2342
2343const HAS_MIN_FEATURES: &[Symbol] = &[sym::specialization];
2344
2345#[doc =
r" The `invalid_value` lint detects creating a value that is not valid,"]
#[doc = r" such as a null reference."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,no_run"]
#[doc = r" # #![allow(unused)]"]
#[doc = r" unsafe {"]
#[doc = r" let x: &'static i32 = std::mem::zeroed();"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" In some situations the compiler can detect that the code is creating"]
#[doc = r" an invalid value, which should be avoided."]
#[doc = r""]
#[doc = r" In particular, this lint will check for improper use of"]
#[doc = r" [`mem::zeroed`], [`mem::uninitialized`], [`mem::transmute`], and"]
#[doc =
r" [`MaybeUninit::assume_init`] that can cause [undefined behavior]. The"]
#[doc =
r" lint should provide extra information to indicate what the problem is"]
#[doc = r" and a possible solution."]
#[doc = r""]
#[doc = r" [`mem::zeroed`]: https://doc.rust-lang.org/std/mem/fn.zeroed.html"]
#[doc =
r" [`mem::uninitialized`]: https://doc.rust-lang.org/std/mem/fn.uninitialized.html"]
#[doc =
r" [`mem::transmute`]: https://doc.rust-lang.org/std/mem/fn.transmute.html"]
#[doc =
r" [`MaybeUninit::assume_init`]: https://doc.rust-lang.org/std/mem/union.MaybeUninit.html#method.assume_init"]
#[doc =
r" [undefined behavior]: https://doc.rust-lang.org/reference/behavior-considered-undefined.html"]
pub static INVALID_VALUE: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "INVALID_VALUE",
default_level: ::rustc_lint_defs::Warn,
desc: "an invalid value is being created (such as a null reference)",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
2346 pub INVALID_VALUE,
2377 Warn,
2378 "an invalid value is being created (such as a null reference)"
2379}
2380
2381pub struct InvalidValue;
#[automatically_derived]
impl ::core::marker::Copy for InvalidValue { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for InvalidValue { }
#[automatically_derived]
impl ::core::clone::Clone for InvalidValue {
#[inline]
fn clone(&self) -> InvalidValue { *self }
}
impl ::rustc_lint_defs::LintPass for InvalidValue {
fn name(&self) -> &'static str { "InvalidValue" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[INVALID_VALUE]))
}
}
impl InvalidValue {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[INVALID_VALUE]))
}
}declare_lint_pass!(InvalidValue => [INVALID_VALUE]);
2382
2383pub struct InitError {
2385 pub(crate) message: String,
2386 pub(crate) span: Option<Span>,
2388 pub(crate) nested: Option<Box<InitError>>,
2390}
2391impl InitError {
2392 fn spanned(self, span: Span) -> InitError {
2393 Self { span: Some(span), ..self }
2394 }
2395
2396 fn nested(self, nested: impl Into<Option<InitError>>) -> InitError {
2397 if !self.nested.is_none() {
::core::panicking::panic("assertion failed: self.nested.is_none()")
};assert!(self.nested.is_none());
2398 Self { nested: nested.into().map(Box::new), ..self }
2399 }
2400}
2401
2402impl<'a> From<&'a str> for InitError {
2403 fn from(s: &'a str) -> Self {
2404 s.to_owned().into()
2405 }
2406}
2407impl From<String> for InitError {
2408 fn from(message: String) -> Self {
2409 Self { message, span: None, nested: None }
2410 }
2411}
2412
2413impl<'tcx> LateLintPass<'tcx> for InvalidValue {
2414 fn check_expr(&mut self, cx: &LateContext<'tcx>, expr: &hir::Expr<'_>) {
2415 #[derive(#[automatically_derived]
impl ::core::fmt::Debug for InitKind {
#[inline]
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
::core::fmt::Formatter::write_str(f,
match self {
InitKind::Zeroed => "Zeroed",
InitKind::Uninit => "Uninit",
})
}
}Debug, #[automatically_derived]
impl ::core::marker::Copy for InitKind { }Copy, #[automatically_derived]
impl ::core::clone::Clone for InitKind {
#[inline]
fn clone(&self) -> InitKind { *self }
}Clone, #[automatically_derived]
impl ::core::cmp::PartialEq for InitKind {
#[inline]
fn eq(&self, other: &InitKind) -> bool {
let __self_discr = ::core::intrinsics::discriminant_value(self);
let __arg1_discr = ::core::intrinsics::discriminant_value(other);
__self_discr == __arg1_discr
}
}PartialEq)]
2416 enum InitKind {
2417 Zeroed,
2418 Uninit,
2419 }
2420
2421 fn is_zero(expr: &hir::Expr<'_>) -> bool {
2423 use hir::ExprKind::*;
2424 use rustc_ast::LitKind::*;
2425 match &expr.kind {
2426 Lit(lit) => {
2427 if let Int(i, _) = lit.node {
2428 i == 0
2429 } else {
2430 false
2431 }
2432 }
2433 Tup(tup) => tup.iter().all(is_zero),
2434 _ => false,
2435 }
2436 }
2437
2438 fn is_dangerous_init(cx: &LateContext<'_>, expr: &hir::Expr<'_>) -> Option<InitKind> {
2440 if let hir::ExprKind::Call(path_expr, args) = expr.kind
2441 && let hir::ExprKind::Path(ref qpath) = path_expr.kind
2443 {
2444 let def_id = cx.qpath_res(qpath, path_expr.hir_id).opt_def_id()?;
2445 match cx.tcx.get_diagnostic_name(def_id) {
2446 Some(sym::mem_zeroed) => return Some(InitKind::Zeroed),
2447 Some(sym::mem_uninitialized) => return Some(InitKind::Uninit),
2448 Some(sym::transmute) if is_zero(&args[0]) => return Some(InitKind::Zeroed),
2449 _ => {}
2450 }
2451 } else if let hir::ExprKind::MethodCall(_, receiver, ..) = expr.kind {
2452 let def_id = cx.typeck_results().type_dependent_def_id(expr.hir_id)?;
2454 if cx.tcx.is_diagnostic_item(sym::assume_init, def_id) {
2455 if let hir::ExprKind::Call(path_expr, _) = receiver.kind
2458 && let hir::ExprKind::Path(ref qpath) = path_expr.kind
2459 {
2460 let def_id = cx.qpath_res(qpath, path_expr.hir_id).opt_def_id()?;
2461 match cx.tcx.get_diagnostic_name(def_id) {
2462 Some(sym::maybe_uninit_zeroed) => return Some(InitKind::Zeroed),
2463 Some(sym::maybe_uninit_uninit) => return Some(InitKind::Uninit),
2464 _ => {}
2465 }
2466 }
2467 }
2468 }
2469
2470 None
2471 }
2472
2473 fn variant_find_init_error<'tcx>(
2474 cx: &LateContext<'tcx>,
2475 ty: Ty<'tcx>,
2476 variant: &VariantDef,
2477 args: ty::GenericArgsRef<'tcx>,
2478 descr: &str,
2479 init: InitKind,
2480 ) -> Option<InitError> {
2481 let mut field_err = variant.fields.iter().find_map(|field| {
2482 ty_find_init_error(cx, field.ty(cx.tcx, args), init).map(|mut err| {
2483 if !field.did.is_local() {
2484 err
2485 } else if err.span.is_none() {
2486 err.span = Some(cx.tcx.def_span(field.did));
2487 (&mut err.message).write_fmt(format_args!(" (in this {0})", descr))write!(&mut err.message, " (in this {descr})").unwrap();
2488 err
2489 } else {
2490 InitError::from(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("in this {0}", descr))
})format!("in this {descr}"))
2491 .spanned(cx.tcx.def_span(field.did))
2492 .nested(err)
2493 }
2494 })
2495 });
2496
2497 if let Ok(layout) = cx.tcx.layout_of(cx.typing_env().as_query_input(ty)) {
2499 if let BackendRepr::Scalar(scalar) | BackendRepr::ScalarPair(scalar, _) =
2500 &layout.backend_repr
2501 {
2502 let range = scalar.valid_range(cx);
2503 let msg = if !range.contains(0) {
2504 "must be non-null"
2505 } else if init == InitKind::Uninit && !scalar.is_always_valid(cx) {
2506 "must be initialized inside its custom valid range"
2511 } else {
2512 return field_err;
2513 };
2514 if let Some(field_err) = &mut field_err {
2515 if field_err.message.contains(msg) {
2518 field_err.message = ::alloc::__export::must_use({
::alloc::fmt::format(format_args!("because {0}", field_err.message))
})format!("because {}", field_err.message);
2519 }
2520 }
2521 return Some(InitError::from(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("`{0}` {1}", ty, msg))
})format!("`{ty}` {msg}")).nested(field_err));
2522 }
2523 }
2524 field_err
2525 }
2526
2527 fn ty_find_init_error<'tcx>(
2530 cx: &LateContext<'tcx>,
2531 ty: Ty<'tcx>,
2532 init: InitKind,
2533 ) -> Option<InitError> {
2534 let ty = cx.tcx.try_normalize_erasing_regions(cx.typing_env(), ty).unwrap_or(ty);
2535
2536 match ty.kind() {
2537 ty::Ref(..) => Some("references must be non-null".into()),
2539 ty::Adt(..) if ty.is_box() => Some("`Box` must be non-null".into()),
2540 ty::FnPtr(..) => Some("function pointers must be non-null".into()),
2541 ty::Never => Some("the `!` type has no valid value".into()),
2542 ty::RawPtr(ty, _) if #[allow(non_exhaustive_omitted_patterns)] match ty.kind() {
ty::Dynamic(..) => true,
_ => false,
}matches!(ty.kind(), ty::Dynamic(..)) =>
2543 {
2545 Some("the vtable of a wide raw pointer must be non-null".into())
2546 }
2547 ty::Bool if init == InitKind::Uninit => {
2549 Some("booleans must be either `true` or `false`".into())
2550 }
2551 ty::Char if init == InitKind::Uninit => {
2552 Some("characters must be a valid Unicode codepoint".into())
2553 }
2554 ty::Int(_) | ty::Uint(_) if init == InitKind::Uninit => {
2555 Some("integers must be initialized".into())
2556 }
2557 ty::Float(_) if init == InitKind::Uninit => {
2558 Some("floats must be initialized".into())
2559 }
2560 ty::RawPtr(_, _) if init == InitKind::Uninit => {
2561 Some("raw pointers must be initialized".into())
2562 }
2563 ty::Adt(adt_def, args) if !adt_def.is_union() => {
2565 if adt_def.is_struct() {
2567 return variant_find_init_error(
2568 cx,
2569 ty,
2570 adt_def.non_enum_variant(),
2571 args,
2572 "struct field",
2573 init,
2574 );
2575 }
2576 let span = cx.tcx.def_span(adt_def.did());
2578 let mut potential_variants = adt_def.variants().iter().filter_map(|variant| {
2579 let definitely_inhabited = match variant
2580 .inhabited_predicate(cx.tcx, *adt_def)
2581 .instantiate(cx.tcx, args)
2582 .apply_any_module(cx.tcx, cx.typing_env())
2583 {
2584 Some(false) => return None,
2586 Some(true) => true,
2588 None => false,
2589 };
2590 Some((variant, definitely_inhabited))
2591 });
2592 let Some(first_variant) = potential_variants.next() else {
2593 return Some(
2594 InitError::from("enums with no inhabited variants have no valid value")
2595 .spanned(span),
2596 );
2597 };
2598 let Some(second_variant) = potential_variants.next() else {
2600 return variant_find_init_error(
2603 cx,
2604 ty,
2605 first_variant.0,
2606 args,
2607 "field of the only potentially inhabited enum variant",
2608 init,
2609 );
2610 };
2611 if init == InitKind::Uninit {
2616 let definitely_inhabited = (first_variant.1 as usize)
2617 + (second_variant.1 as usize)
2618 + potential_variants
2619 .filter(|(_variant, definitely_inhabited)| *definitely_inhabited)
2620 .count();
2621 if definitely_inhabited > 1 {
2622 return Some(InitError::from(
2623 "enums with multiple inhabited variants have to be initialized to a variant",
2624 ).spanned(span));
2625 }
2626 }
2627 None
2629 }
2630 ty::Tuple(..) => {
2631 ty.tuple_fields().iter().find_map(|field| ty_find_init_error(cx, field, init))
2633 }
2634 ty::Array(ty, len) => {
2635 if #[allow(non_exhaustive_omitted_patterns)] match len.try_to_target_usize(cx.tcx)
{
Some(v) if v > 0 => true,
_ => false,
}matches!(len.try_to_target_usize(cx.tcx), Some(v) if v > 0) {
2636 ty_find_init_error(cx, *ty, init)
2638 } else {
2639 None
2641 }
2642 }
2643 _ => None,
2645 }
2646 }
2647
2648 if let Some(init) = is_dangerous_init(cx, expr) {
2649 let conjured_ty = cx.typeck_results().expr_ty(expr);
2653 if let Some(err) = {
let _guard = NoTrimmedGuard::new();
ty_find_init_error(cx, conjured_ty, init)
}with_no_trimmed_paths!(ty_find_init_error(cx, conjured_ty, init)) {
2654 let msg = match init {
2655 InitKind::Zeroed => {
2656 rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("the type `{$ty}` does not permit zero-initialization"))msg!("the type `{$ty}` does not permit zero-initialization")
2657 }
2658 InitKind::Uninit => {
2659 rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("the type `{$ty}` does not permit being left uninitialized"))msg!("the type `{$ty}` does not permit being left uninitialized")
2660 }
2661 };
2662 let sub = BuiltinUnpermittedTypeInitSub { err };
2663 cx.emit_span_lint(
2664 INVALID_VALUE,
2665 expr.span,
2666 BuiltinUnpermittedTypeInit {
2667 msg,
2668 ty: conjured_ty,
2669 label: expr.span,
2670 sub,
2671 tcx: cx.tcx,
2672 },
2673 );
2674 }
2675 }
2676 }
2677}
2678
2679#[doc =
r" The `deref_nullptr` lint detects when a null pointer is dereferenced,"]
#[doc = r" which causes [undefined behavior]."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,compile_fail"]
#[doc = r" # #![allow(unused)]"]
#[doc = r" use std::ptr;"]
#[doc = r" unsafe {"]
#[doc = r" let x = &*ptr::null::<i32>();"]
#[doc = r" let x = ptr::addr_of!(*ptr::null::<i32>());"]
#[doc = r" let x = *(0 as *const i32);"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" Dereferencing a null pointer causes [undefined behavior] if it is accessed"]
#[doc = r" (loaded from or stored to)."]
#[doc = r""]
#[doc =
r" [undefined behavior]: https://doc.rust-lang.org/reference/behavior-considered-undefined.html"]
pub static DEREF_NULLPTR: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "DEREF_NULLPTR",
default_level: ::rustc_lint_defs::Deny,
desc: "detects when an null pointer is dereferenced",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
2680 pub DEREF_NULLPTR,
2704 Deny,
2705 "detects when an null pointer is dereferenced"
2706}
2707
2708pub struct DerefNullPtr;
#[automatically_derived]
impl ::core::marker::Copy for DerefNullPtr { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for DerefNullPtr { }
#[automatically_derived]
impl ::core::clone::Clone for DerefNullPtr {
#[inline]
fn clone(&self) -> DerefNullPtr { *self }
}
impl ::rustc_lint_defs::LintPass for DerefNullPtr {
fn name(&self) -> &'static str { "DerefNullPtr" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[DEREF_NULLPTR]))
}
}
impl DerefNullPtr {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[DEREF_NULLPTR]))
}
}declare_lint_pass!(DerefNullPtr => [DEREF_NULLPTR]);
2709
2710impl<'tcx> LateLintPass<'tcx> for DerefNullPtr {
2711 fn check_expr(&mut self, cx: &LateContext<'tcx>, expr: &hir::Expr<'_>) {
2712 fn is_null_ptr(cx: &LateContext<'_>, expr: &hir::Expr<'_>) -> bool {
2714 let pointer_ty = cx.typeck_results().expr_ty(expr);
2715 let ty::RawPtr(pointee, _) = pointer_ty.kind() else {
2716 return false;
2717 };
2718 if let Ok(layout) = cx.tcx.layout_of(cx.typing_env().as_query_input(*pointee)) {
2719 if layout.layout.size() == rustc_abi::Size::ZERO {
2720 return false;
2721 }
2722 }
2723
2724 match &expr.kind {
2725 hir::ExprKind::Cast(expr, ty) => {
2726 if let hir::TyKind::Ptr(_) = ty.kind {
2727 return is_zero(expr) || is_null_ptr(cx, expr);
2728 }
2729 }
2730 hir::ExprKind::Call(path, _) => {
2732 if let hir::ExprKind::Path(ref qpath) = path.kind
2733 && let Some(def_id) = cx.qpath_res(qpath, path.hir_id).opt_def_id()
2734 {
2735 return #[allow(non_exhaustive_omitted_patterns)] match cx.tcx.get_diagnostic_name(def_id)
{
Some(sym::ptr_null | sym::ptr_null_mut) => true,
_ => false,
}matches!(
2736 cx.tcx.get_diagnostic_name(def_id),
2737 Some(sym::ptr_null | sym::ptr_null_mut)
2738 );
2739 }
2740 }
2741 _ => {}
2742 }
2743 false
2744 }
2745
2746 fn is_zero(expr: &hir::Expr<'_>) -> bool {
2748 match &expr.kind {
2749 hir::ExprKind::Lit(lit) => {
2750 if let LitKind::Int(a, _) = lit.node {
2751 return a == 0;
2752 }
2753 }
2754 _ => {}
2755 }
2756 false
2757 }
2758
2759 if let hir::ExprKind::Unary(hir::UnOp::Deref, expr_deref) = expr.kind
2760 && is_null_ptr(cx, expr_deref)
2761 {
2762 if let hir::Node::Expr(hir::Expr {
2763 kind: hir::ExprKind::AddrOf(hir::BorrowKind::Raw, ..),
2764 ..
2765 }) = cx.tcx.parent_hir_node(expr.hir_id)
2766 {
2767 } else {
2769 cx.emit_span_lint(
2770 DEREF_NULLPTR,
2771 expr.span,
2772 BuiltinDerefNullptr { label: expr.span },
2773 );
2774 }
2775 }
2776 }
2777}
2778
2779#[doc =
r" The `named_asm_labels` lint detects the use of named labels in the"]
#[doc = r" inline `asm!` macro."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,compile_fail"]
#[doc = r" # #![feature(asm_experimental_arch)]"]
#[doc = r" use std::arch::asm;"]
#[doc = r""]
#[doc = r" fn main() {"]
#[doc = r" unsafe {"]
#[doc = r#" asm!("foo: bar");"#]
#[doc = r" }"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc = r" LLVM is allowed to duplicate inline assembly blocks for any"]
#[doc =
r" reason, for example when it is in a function that gets inlined. Because"]
#[doc =
r" of this, GNU assembler [local labels] *must* be used instead of labels"]
#[doc =
r" with a name. Using named labels might cause assembler or linker errors."]
#[doc = r""]
#[doc = r" See the explanation in [Rust By Example] for more details."]
#[doc = r""]
#[doc =
r" [local labels]: https://sourceware.org/binutils/docs/as/Symbol-Names.html#Local-Labels"]
#[doc =
r" [Rust By Example]: https://doc.rust-lang.org/nightly/rust-by-example/unsafe/asm.html#labels"]
pub static NAMED_ASM_LABELS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "NAMED_ASM_LABELS",
default_level: ::rustc_lint_defs::Deny,
desc: "named labels in inline assembly",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
2780 pub NAMED_ASM_LABELS,
2810 Deny,
2811 "named labels in inline assembly",
2812}
2813
2814#[doc =
r" The `binary_asm_labels` lint detects the use of numeric labels containing only binary"]
#[doc = r" digits in the inline `asm!` macro."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,ignore (fails on non-x86_64)"]
#[doc = r#" #![cfg(target_arch = "x86_64")]"#]
#[doc = r""]
#[doc = r" use std::arch::asm;"]
#[doc = r""]
#[doc = r" fn main() {"]
#[doc = r" unsafe {"]
#[doc = r#" asm!("0: jmp 0b");"#]
#[doc = r" }"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" This will produce:"]
#[doc = r""]
#[doc = r" ```text"]
#[doc =
r" error: avoid using labels containing only the digits `0` and `1` in inline assembly"]
#[doc = r" --> <source>:7:15"]
#[doc = r" |"]
#[doc = r#" 7 | asm!("0: jmp 0b");"#]
#[doc =
r" | ^ use a different label that doesn't start with `0` or `1`"]
#[doc = r" |"]
#[doc = r" = help: start numbering with `2` instead"]
#[doc =
r" = note: an LLVM bug makes these labels ambiguous with a binary literal number on x86"]
#[doc =
r" = note: see <https://github.com/llvm/llvm-project/issues/99547> for more information"]
#[doc = r" = note: `#[deny(binary_asm_labels)]` on by default"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" An [LLVM bug] causes this code to fail to compile because it interprets the `0b` as a binary"]
#[doc =
r" literal instead of a reference to the previous local label `0`. To work around this bug,"]
#[doc = r" don't use labels that could be confused with a binary literal."]
#[doc = r""]
#[doc = r" This behavior is platform-specific to x86 and x86-64."]
#[doc = r""]
#[doc = r" See the explanation in [Rust By Example] for more details."]
#[doc = r""]
#[doc = r" [LLVM bug]: https://github.com/llvm/llvm-project/issues/99547"]
#[doc =
r" [Rust By Example]: https://doc.rust-lang.org/nightly/rust-by-example/unsafe/asm.html#labels"]
pub static BINARY_ASM_LABELS: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "BINARY_ASM_LABELS",
default_level: ::rustc_lint_defs::Deny,
desc: "labels in inline assembly containing only 0 or 1 digits",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
2815 pub BINARY_ASM_LABELS,
2860 Deny,
2861 "labels in inline assembly containing only 0 or 1 digits",
2862}
2863
2864pub struct AsmLabels;
#[automatically_derived]
impl ::core::marker::Copy for AsmLabels { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for AsmLabels { }
#[automatically_derived]
impl ::core::clone::Clone for AsmLabels {
#[inline]
fn clone(&self) -> AsmLabels { *self }
}
impl ::rustc_lint_defs::LintPass for AsmLabels {
fn name(&self) -> &'static str { "AsmLabels" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[NAMED_ASM_LABELS, BINARY_ASM_LABELS]))
}
}
impl AsmLabels {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[NAMED_ASM_LABELS, BINARY_ASM_LABELS]))
}
}declare_lint_pass!(AsmLabels => [NAMED_ASM_LABELS, BINARY_ASM_LABELS]);
2865
2866#[derive(#[automatically_derived]
impl ::core::fmt::Debug for AsmLabelKind {
#[inline]
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
::core::fmt::Formatter::write_str(f,
match self {
AsmLabelKind::Named => "Named",
AsmLabelKind::FormatArg => "FormatArg",
AsmLabelKind::Binary => "Binary",
})
}
}Debug, #[automatically_derived]
impl ::core::clone::Clone for AsmLabelKind {
#[inline]
fn clone(&self) -> AsmLabelKind { *self }
}Clone, #[automatically_derived]
impl ::core::marker::Copy for AsmLabelKind { }Copy, #[automatically_derived]
impl ::core::cmp::PartialEq for AsmLabelKind {
#[inline]
fn eq(&self, other: &AsmLabelKind) -> bool {
let __self_discr = ::core::intrinsics::discriminant_value(self);
let __arg1_discr = ::core::intrinsics::discriminant_value(other);
__self_discr == __arg1_discr
}
}PartialEq, #[automatically_derived]
impl ::core::cmp::Eq for AsmLabelKind {
#[inline]
#[doc(hidden)]
#[coverage(off)]
fn assert_receiver_is_total_eq(&self) {}
}Eq)]
2867enum AsmLabelKind {
2868 Named,
2869 FormatArg,
2870 Binary,
2871}
2872
2873pub fn is_hexagon_register_span(possible_label: &str) -> bool {
2880 if let Some(colon_idx) = possible_label.find(':') {
2882 let after_colon = &possible_label[colon_idx + 1..];
2883 is_hexagon_register_span_impl(&possible_label[..colon_idx], after_colon)
2884 } else {
2885 false
2886 }
2887}
2888
2889fn is_hexagon_register_span_context(
2891 possible_label: &str,
2892 statement: &str,
2893 colon_idx: usize,
2894) -> bool {
2895 let after_colon_start = colon_idx + 1;
2897 if after_colon_start >= statement.len() {
2898 return false;
2899 }
2900
2901 let after_colon_full = &statement[after_colon_start..];
2903 let after_colon = after_colon_full
2904 .chars()
2905 .take_while(|&c| c.is_ascii_alphanumeric() || c == '.')
2906 .collect::<String>();
2907
2908 is_hexagon_register_span_impl(possible_label, &after_colon)
2909}
2910
2911fn is_hexagon_register_span_impl(before_colon: &str, after_colon: &str) -> bool {
2913 if before_colon.len() < 1 || after_colon.is_empty() {
2914 return false;
2915 }
2916
2917 let mut chars = before_colon.chars();
2918 let start = chars.next().unwrap();
2919
2920 if !start.is_ascii_alphabetic() {
2922 return false;
2923 }
2924
2925 let rest = &before_colon[1..];
2926
2927 if rest.is_empty() || !rest.chars().all(|c| c.is_ascii_digit()) {
2929 return false;
2930 }
2931
2932 let digits_after = after_colon.chars().take_while(|c| c.is_ascii_digit()).collect::<String>();
2934
2935 !digits_after.is_empty()
2936}
2937
2938impl<'tcx> LateLintPass<'tcx> for AsmLabels {
2939 fn check_expr(&mut self, cx: &LateContext<'tcx>, expr: &'tcx hir::Expr<'tcx>) {
2940 if let hir::Expr {
2941 kind:
2942 hir::ExprKind::InlineAsm(hir::InlineAsm {
2943 asm_macro: asm_macro @ (AsmMacro::Asm | AsmMacro::NakedAsm),
2944 template_strs,
2945 options,
2946 ..
2947 }),
2948 ..
2949 } = expr
2950 {
2951 if *asm_macro == AsmMacro::NakedAsm {
2954 let def_id = expr.hir_id.owner.def_id;
2955 if !cx.tcx.generics_of(def_id).requires_monomorphization(cx.tcx) {
2956 return;
2957 }
2958 }
2959
2960 let raw = options.contains(InlineAsmOptions::RAW);
2962
2963 for (template_sym, template_snippet, template_span) in template_strs.iter() {
2964 let template_str = template_sym.as_str();
2965 let find_label_span = |needle: &str| -> Option<Span> {
2966 if let Some(template_snippet) = template_snippet {
2967 let snippet = template_snippet.as_str();
2968 if let Some(pos) = snippet.find(needle) {
2969 let end = pos
2970 + snippet[pos..]
2971 .find(|c| c == ':')
2972 .unwrap_or(snippet[pos..].len() - 1);
2973 let inner = InnerSpan::new(pos, end);
2974 return Some(template_span.from_inner(inner));
2975 }
2976 }
2977
2978 None
2979 };
2980
2981 let mut spans = Vec::new();
2983
2984 let statements = template_str.split(|c| #[allow(non_exhaustive_omitted_patterns)] match c {
'\n' | ';' => true,
_ => false,
}matches!(c, '\n' | ';'));
2987 for statement in statements {
2988 let statement = statement.find("//").map_or(statement, |idx| &statement[..idx]);
2990
2991 let mut start_idx = 0;
2993 'label_loop: for (idx, _) in statement.match_indices(':') {
2994 let possible_label = statement[start_idx..idx].trim();
2995 let mut chars = possible_label.chars();
2996
2997 let Some(start) = chars.next() else {
2998 break 'label_loop;
3001 };
3002
3003 let mut in_bracket = false;
3005 let mut label_kind = AsmLabelKind::Named;
3006
3007 if !raw && start == '{' {
3009 in_bracket = true;
3010 label_kind = AsmLabelKind::FormatArg;
3011 } else if #[allow(non_exhaustive_omitted_patterns)] match start {
'0' | '1' => true,
_ => false,
}matches!(start, '0' | '1') {
3012 label_kind = AsmLabelKind::Binary;
3014 } else if !(start.is_ascii_alphabetic() || #[allow(non_exhaustive_omitted_patterns)] match start {
'.' | '_' => true,
_ => false,
}matches!(start, '.' | '_')) {
3015 break 'label_loop;
3018 }
3019
3020 if #[allow(non_exhaustive_omitted_patterns)] match cx.tcx.sess.asm_arch {
Some(InlineAsmArch::Hexagon) => true,
_ => false,
}matches!(cx.tcx.sess.asm_arch, Some(InlineAsmArch::Hexagon))
3023 && is_hexagon_register_span_context(possible_label, statement, idx)
3024 {
3025 break 'label_loop;
3026 }
3027
3028 for c in chars {
3029 if !raw && in_bracket {
3035 if c == '{' {
3036 break 'label_loop;
3039 }
3040
3041 if c == '}' {
3042 in_bracket = false;
3044 }
3045 } else if !raw && c == '{' {
3046 in_bracket = true;
3048 label_kind = AsmLabelKind::FormatArg;
3049 } else {
3050 let can_continue = match label_kind {
3051 AsmLabelKind::Named | AsmLabelKind::FormatArg => {
3054 c.is_ascii_alphanumeric() || #[allow(non_exhaustive_omitted_patterns)] match c {
'_' | '$' => true,
_ => false,
}matches!(c, '_' | '$')
3055 }
3056 AsmLabelKind::Binary => #[allow(non_exhaustive_omitted_patterns)] match c {
'0' | '1' => true,
_ => false,
}matches!(c, '0' | '1'),
3057 };
3058
3059 if !can_continue {
3060 break 'label_loop;
3063 }
3064 }
3065 }
3066
3067 spans.push((find_label_span(possible_label), label_kind));
3069 start_idx = idx + 1;
3070 }
3071 }
3072
3073 for (span, label_kind) in spans {
3074 let missing_precise_span = span.is_none();
3075 let span = span.unwrap_or(*template_span);
3076 match label_kind {
3077 AsmLabelKind::Named => {
3078 cx.emit_span_lint(
3079 NAMED_ASM_LABELS,
3080 span,
3081 InvalidAsmLabel::Named { missing_precise_span },
3082 );
3083 }
3084 AsmLabelKind::FormatArg => {
3085 cx.emit_span_lint(
3086 NAMED_ASM_LABELS,
3087 span,
3088 InvalidAsmLabel::FormatArg { missing_precise_span },
3089 );
3090 }
3091 AsmLabelKind::Binary
3093 if !options.contains(InlineAsmOptions::ATT_SYNTAX)
3094 && #[allow(non_exhaustive_omitted_patterns)] match cx.tcx.sess.asm_arch {
Some(InlineAsmArch::X86 | InlineAsmArch::X86_64) | None => true,
_ => false,
}matches!(
3095 cx.tcx.sess.asm_arch,
3096 Some(InlineAsmArch::X86 | InlineAsmArch::X86_64) | None
3097 ) =>
3098 {
3099 cx.emit_span_lint(
3100 BINARY_ASM_LABELS,
3101 span,
3102 InvalidAsmLabel::Binary { missing_precise_span, span },
3103 )
3104 }
3105 AsmLabelKind::Binary => (),
3107 };
3108 }
3109 }
3110 }
3111 }
3112}
3113
3114#[doc = r" The `special_module_name` lint detects module"]
#[doc = r" declarations for files that have a special meaning."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,compile_fail"]
#[doc = r" mod lib;"]
#[doc = r""]
#[doc = r" fn main() {"]
#[doc = r" lib::run();"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc = r" Cargo recognizes `lib.rs` and `main.rs` as the root of a"]
#[doc = r" library or binary crate, so declaring them as modules"]
#[doc = r" will lead to miscompilation of the crate unless configured"]
#[doc = r" explicitly."]
#[doc = r""]
#[doc = r" To access a library from a binary target within the same crate,"]
#[doc = r" use `your_crate_name::` as the path instead of `lib::`:"]
#[doc = r""]
#[doc = r" ```rust,compile_fail"]
#[doc = r" // bar/src/lib.rs"]
#[doc = r" fn run() {"]
#[doc = r" // ..."]
#[doc = r" }"]
#[doc = r""]
#[doc = r" // bar/src/main.rs"]
#[doc = r" fn main() {"]
#[doc = r" bar::run();"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" Binary targets cannot be used as libraries and so declaring"]
#[doc = r" one as a module is not allowed."]
pub static SPECIAL_MODULE_NAME: &::rustc_lint_defs::Lint =
&::rustc_lint_defs::Lint {
name: "SPECIAL_MODULE_NAME",
default_level: ::rustc_lint_defs::Warn,
desc: "module declarations for files with a special meaning",
is_externally_loaded: false,
..::rustc_lint_defs::Lint::default_fields_for_macro()
};declare_lint! {
3115 pub SPECIAL_MODULE_NAME,
3155 Warn,
3156 "module declarations for files with a special meaning",
3157}
3158
3159pub struct SpecialModuleName;
#[automatically_derived]
impl ::core::marker::Copy for SpecialModuleName { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for SpecialModuleName { }
#[automatically_derived]
impl ::core::clone::Clone for SpecialModuleName {
#[inline]
fn clone(&self) -> SpecialModuleName { *self }
}
impl ::rustc_lint_defs::LintPass for SpecialModuleName {
fn name(&self) -> &'static str { "SpecialModuleName" }
fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[SPECIAL_MODULE_NAME]))
}
}
impl SpecialModuleName {
#[allow(unused)]
pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[SPECIAL_MODULE_NAME]))
}
}declare_lint_pass!(SpecialModuleName => [SPECIAL_MODULE_NAME]);
3160
3161impl EarlyLintPass for SpecialModuleName {
3162 fn check_crate(&mut self, cx: &EarlyContext<'_>, krate: &ast::Crate) {
3163 for item in &krate.items {
3164 if let ast::ItemKind::Mod(
3165 _,
3166 ident,
3167 ast::ModKind::Unloaded | ast::ModKind::Loaded(_, ast::Inline::No { .. }, _),
3168 ) = item.kind
3169 {
3170 if item.attrs.iter().any(|a| a.has_name(sym::path)) {
3171 continue;
3172 }
3173
3174 match ident.name.as_str() {
3175 "lib" => cx.emit_span_lint(
3176 SPECIAL_MODULE_NAME,
3177 item.span,
3178 BuiltinSpecialModuleNameUsed::Lib,
3179 ),
3180 "main" => cx.emit_span_lint(
3181 SPECIAL_MODULE_NAME,
3182 item.span,
3183 BuiltinSpecialModuleNameUsed::Main,
3184 ),
3185 _ => continue,
3186 }
3187 }
3188 }
3189 }
3190}