Skip to main content

rustc_lint/types/
improper_ctypes.rs

1use std::iter;
2use std::ops::ControlFlow;
3
4use bitflags::bitflags;
5use rustc_abi::VariantIdx;
6use rustc_data_structures::fx::FxHashSet;
7use rustc_errors::{DiagMessage, msg};
8use rustc_hir::def::CtorKind;
9use rustc_hir::intravisit::VisitorExt;
10use rustc_hir::{self as hir, AmbigArg};
11use rustc_middle::bug;
12use rustc_middle::ty::{
13    self, Adt, AdtDef, AdtKind, GenericArgsRef, Ty, TyCtxt, TypeSuperVisitable, TypeVisitable,
14    TypeVisitableExt, Unnormalized,
15};
16use rustc_session::{declare_lint, declare_lint_pass};
17use rustc_span::def_id::LocalDefId;
18use rustc_span::{Span, sym};
19use rustc_target::spec::Os;
20use tracing::debug;
21
22use super::repr_nullable_ptr;
23use crate::lints::{ImproperCTypes, UsesPowerAlignment};
24use crate::{LateContext, LateLintPass, LintContext};
25
26#[doc =
r" The `improper_ctypes` lint detects incorrect use of types in foreign"]
#[doc = r" modules."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust"]
#[doc = r#" unsafe extern "C" {"#]
#[doc = r"     static STATIC: String;"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" The compiler has several checks to verify that types used in `extern`"]
#[doc = r" blocks are safe and follow certain rules to ensure proper"]
#[doc =
r" compatibility with the foreign interfaces. This lint is issued when it"]
#[doc =
r" detects a probable mistake in a definition. The lint usually should"]
#[doc =
r" provide a description of the issue, along with possibly a hint on how"]
#[doc = r" to resolve it."]
static IMPROPER_CTYPES: &::rustc_lint_defs::Lint =
    &::rustc_lint_defs::Lint {
            name: "IMPROPER_CTYPES",
            default_level: ::rustc_lint_defs::Warn,
            desc: "proper use of libc types in foreign modules",
            is_externally_loaded: false,
            ..::rustc_lint_defs::Lint::default_fields_for_macro()
        };declare_lint! {
27    /// The `improper_ctypes` lint detects incorrect use of types in foreign
28    /// modules.
29    ///
30    /// ### Example
31    ///
32    /// ```rust
33    /// unsafe extern "C" {
34    ///     static STATIC: String;
35    /// }
36    /// ```
37    ///
38    /// {{produces}}
39    ///
40    /// ### Explanation
41    ///
42    /// The compiler has several checks to verify that types used in `extern`
43    /// blocks are safe and follow certain rules to ensure proper
44    /// compatibility with the foreign interfaces. This lint is issued when it
45    /// detects a probable mistake in a definition. The lint usually should
46    /// provide a description of the issue, along with possibly a hint on how
47    /// to resolve it.
48    IMPROPER_CTYPES,
49    Warn,
50    "proper use of libc types in foreign modules"
51}
52
53#[doc = r" The `improper_ctypes_definitions` lint detects incorrect use of"]
#[doc = r" [`extern` function] definitions."]
#[doc = r""]
#[doc =
r" [`extern` function]: https://doc.rust-lang.org/reference/items/functions.html#extern-function-qualifier"]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust"]
#[doc = r" # #![allow(unused)]"]
#[doc = r#" pub extern "C" fn str_type(p: &str) { }"#]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" {{produces}}"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc =
r" There are many parameter and return types that may be specified in an"]
#[doc =
r" `extern` function that are not compatible with the given ABI. This"]
#[doc =
r" lint is an alert that these types should not be used. The lint usually"]
#[doc =
r" should provide a description of the issue, along with possibly a hint"]
#[doc = r" on how to resolve it."]
static IMPROPER_CTYPES_DEFINITIONS: &::rustc_lint_defs::Lint =
    &::rustc_lint_defs::Lint {
            name: "IMPROPER_CTYPES_DEFINITIONS",
            default_level: ::rustc_lint_defs::Warn,
            desc: "proper use of libc types in foreign item definitions",
            is_externally_loaded: false,
            ..::rustc_lint_defs::Lint::default_fields_for_macro()
        };declare_lint! {
54    /// The `improper_ctypes_definitions` lint detects incorrect use of
55    /// [`extern` function] definitions.
56    ///
57    /// [`extern` function]: https://doc.rust-lang.org/reference/items/functions.html#extern-function-qualifier
58    ///
59    /// ### Example
60    ///
61    /// ```rust
62    /// # #![allow(unused)]
63    /// pub extern "C" fn str_type(p: &str) { }
64    /// ```
65    ///
66    /// {{produces}}
67    ///
68    /// ### Explanation
69    ///
70    /// There are many parameter and return types that may be specified in an
71    /// `extern` function that are not compatible with the given ABI. This
72    /// lint is an alert that these types should not be used. The lint usually
73    /// should provide a description of the issue, along with possibly a hint
74    /// on how to resolve it.
75    IMPROPER_CTYPES_DEFINITIONS,
76    Warn,
77    "proper use of libc types in foreign item definitions"
78}
79
80#[doc = r" The `uses_power_alignment` lint detects specific `repr(C)`"]
#[doc = r" aggregates on AIX."]
#[doc =
r#" In its platform C ABI, AIX uses the "power" (as in PowerPC) alignment"#]
#[doc =
r" rule (detailed in https://www.ibm.com/docs/en/xl-c-and-cpp-aix/16.1?topic=data-using-alignment-modes#alignment),"]
#[doc = r" which can also be set for XLC by `#pragma align(power)` or"]
#[doc = r" `-qalign=power`. Aggregates with a floating-point type as the"]
#[doc =
r#" recursively first field (as in "at offset 0") modify the layout of"#]
#[doc =
r" *subsequent* fields of the associated structs to use an alignment value"]
#[doc = r" where the floating-point type is aligned on a 4-byte boundary."]
#[doc = r""]
#[doc =
r" Effectively, subsequent floating-point fields act as-if they are `repr(packed(4))`. This"]
#[doc =
r" would be unsound to do in a `repr(C)` type without all the restrictions that come with"]
#[doc =
r" `repr(packed)`. Rust instead chooses a layout that maintains soundness of Rust code, at the"]
#[doc = r" expense of incompatibility with C code."]
#[doc = r""]
#[doc = r" ### Example"]
#[doc = r""]
#[doc = r" ```rust,ignore (fails on non-powerpc64-ibm-aix)"]
#[doc = r" #[repr(C)]"]
#[doc = r" pub struct Floats {"]
#[doc = r"     a: f64,"]
#[doc = r"     b: u8,"]
#[doc = r"     c: f64,"]
#[doc = r" }"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" This will produce:"]
#[doc = r""]
#[doc = r" ```text"]
#[doc =
r" warning: repr(C) does not follow the power alignment rule. This may affect platform C ABI compatibility for this type"]
#[doc = r"  --> <source>:5:3"]
#[doc = r"   |"]
#[doc = r" 5 |   c: f64,"]
#[doc = r"   |   ^^^^^^"]
#[doc = r"   |"]
#[doc = r"   = note: `#[warn(uses_power_alignment)]` on by default"]
#[doc = r" ```"]
#[doc = r""]
#[doc = r" ### Explanation"]
#[doc = r""]
#[doc = r" The power alignment rule specifies that the above struct has the"]
#[doc = r" following alignment:"]
#[doc = r"  - offset_of!(Floats, a) == 0"]
#[doc = r"  - offset_of!(Floats, b) == 8"]
#[doc = r"  - offset_of!(Floats, c) == 12"]
#[doc = r""]
#[doc =
r" However, Rust currently aligns `c` at `offset_of!(Floats, c) == 16`."]
#[doc =
r" Using offset 12 would be unsound since `f64` generally must be 8-aligned on this target."]
#[doc = r" Thus, a warning is produced for the above struct."]
static USES_POWER_ALIGNMENT: &::rustc_lint_defs::Lint =
    &::rustc_lint_defs::Lint {
            name: "USES_POWER_ALIGNMENT",
            default_level: ::rustc_lint_defs::Warn,
            desc: "Structs do not follow the power alignment rule under repr(C)",
            is_externally_loaded: false,
            ..::rustc_lint_defs::Lint::default_fields_for_macro()
        };declare_lint! {
81    /// The `uses_power_alignment` lint detects specific `repr(C)`
82    /// aggregates on AIX.
83    /// In its platform C ABI, AIX uses the "power" (as in PowerPC) alignment
84    /// rule (detailed in https://www.ibm.com/docs/en/xl-c-and-cpp-aix/16.1?topic=data-using-alignment-modes#alignment),
85    /// which can also be set for XLC by `#pragma align(power)` or
86    /// `-qalign=power`. Aggregates with a floating-point type as the
87    /// recursively first field (as in "at offset 0") modify the layout of
88    /// *subsequent* fields of the associated structs to use an alignment value
89    /// where the floating-point type is aligned on a 4-byte boundary.
90    ///
91    /// Effectively, subsequent floating-point fields act as-if they are `repr(packed(4))`. This
92    /// would be unsound to do in a `repr(C)` type without all the restrictions that come with
93    /// `repr(packed)`. Rust instead chooses a layout that maintains soundness of Rust code, at the
94    /// expense of incompatibility with C code.
95    ///
96    /// ### Example
97    ///
98    /// ```rust,ignore (fails on non-powerpc64-ibm-aix)
99    /// #[repr(C)]
100    /// pub struct Floats {
101    ///     a: f64,
102    ///     b: u8,
103    ///     c: f64,
104    /// }
105    /// ```
106    ///
107    /// This will produce:
108    ///
109    /// ```text
110    /// warning: repr(C) does not follow the power alignment rule. This may affect platform C ABI compatibility for this type
111    ///  --> <source>:5:3
112    ///   |
113    /// 5 |   c: f64,
114    ///   |   ^^^^^^
115    ///   |
116    ///   = note: `#[warn(uses_power_alignment)]` on by default
117    /// ```
118    ///
119    /// ### Explanation
120    ///
121    /// The power alignment rule specifies that the above struct has the
122    /// following alignment:
123    ///  - offset_of!(Floats, a) == 0
124    ///  - offset_of!(Floats, b) == 8
125    ///  - offset_of!(Floats, c) == 12
126    ///
127    /// However, Rust currently aligns `c` at `offset_of!(Floats, c) == 16`.
128    /// Using offset 12 would be unsound since `f64` generally must be 8-aligned on this target.
129    /// Thus, a warning is produced for the above struct.
130    USES_POWER_ALIGNMENT,
131    Warn,
132    "Structs do not follow the power alignment rule under repr(C)"
133}
134
135pub struct ImproperCTypesLint;
#[automatically_derived]
impl ::core::marker::Copy for ImproperCTypesLint { }
#[automatically_derived]
#[doc(hidden)]
unsafe impl ::core::clone::TrivialClone for ImproperCTypesLint { }
#[automatically_derived]
impl ::core::clone::Clone for ImproperCTypesLint {
    #[inline]
    fn clone(&self) -> ImproperCTypesLint { *self }
}
impl ::rustc_lint_defs::LintPass for ImproperCTypesLint {
    fn name(&self) -> &'static str { "ImproperCTypesLint" }
    fn get_lints(&self) -> ::rustc_lint_defs::LintVec {
        ::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
                [IMPROPER_CTYPES, IMPROPER_CTYPES_DEFINITIONS,
                        USES_POWER_ALIGNMENT]))
    }
}
impl ImproperCTypesLint {
    #[allow(unused)]
    pub fn lint_vec() -> ::rustc_lint_defs::LintVec {
        ::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
                [IMPROPER_CTYPES, IMPROPER_CTYPES_DEFINITIONS,
                        USES_POWER_ALIGNMENT]))
    }
}declare_lint_pass!(ImproperCTypesLint => [
136    IMPROPER_CTYPES,
137    IMPROPER_CTYPES_DEFINITIONS,
138    USES_POWER_ALIGNMENT
139]);
140
141/// A common pattern in this lint is to attempt normalize_erasing_regions,
142/// but keep the original type if it were to fail.
143/// This may or may not be supported in the logic behind the `Unnormalized` wrapper,
144/// (FIXME?)
145/// but it should be enough for non-wrapped types to be as normalised as this lint needs them to be.
146fn maybe_normalize_erasing_regions<'tcx>(
147    cx: &LateContext<'tcx>,
148    value: Unnormalized<'tcx, Ty<'tcx>>,
149) -> Ty<'tcx> {
150    cx.tcx.try_normalize_erasing_regions(cx.typing_env(), value).unwrap_or(value.skip_norm_wip())
151}
152
153/// Check a variant of a non-exhaustive enum for improper ctypes
154///
155/// We treat `#[non_exhaustive] enum` as "ensure that code will compile if new variants are added".
156/// This includes linting, on a best-effort basis. There are valid additions that are unlikely.
157///
158/// Adding a data-carrying variant to an existing C-like enum that is passed to C is "unlikely",
159/// so we don't need the lint to account for it.
160/// e.g. going from enum Foo { A, B, C } to enum Foo { A, B, C, D(u32) }.
161pub(crate) fn check_non_exhaustive_variant(
162    non_exhaustive_variant_list: bool,
163    variant: &ty::VariantDef,
164) -> ControlFlow<DiagMessage, ()> {
165    // non_exhaustive suggests it is possible that someone might break ABI
166    // see: https://github.com/rust-lang/rust/issues/44109#issuecomment-537583344
167    // so warn on complex enums being used outside their crate
168    if non_exhaustive_variant_list {
169        // which is why we only warn about really_tagged_union reprs from https://rust.tf/rfc2195
170        // with an enum like `#[repr(u8)] enum Enum { A(DataA), B(DataB), }`
171        // but exempt enums with unit ctors like C's (e.g. from rust-bindgen)
172        if variant_has_complex_ctor(variant) {
173            return ControlFlow::Break(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("this enum is non-exhaustive"))msg!("this enum is non-exhaustive"));
174        }
175    }
176
177    if variant.field_list_has_applicable_non_exhaustive() {
178        return ControlFlow::Break(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("this enum has non-exhaustive variants"))msg!("this enum has non-exhaustive variants"));
179    }
180
181    ControlFlow::Continue(())
182}
183
184fn variant_has_complex_ctor(variant: &ty::VariantDef) -> bool {
185    // CtorKind::Const means a "unit" ctor
186    !#[allow(non_exhaustive_omitted_patterns)] match variant.ctor_kind() {
    Some(CtorKind::Const) => true,
    _ => false,
}matches!(variant.ctor_kind(), Some(CtorKind::Const))
187}
188
189/// Per-struct-field function that checks if a struct definition follows
190/// the Power alignment Rule (see the `check_struct_for_power_alignment` function).
191fn check_arg_for_power_alignment<'tcx>(cx: &LateContext<'tcx>, ty: Ty<'tcx>) -> bool {
192    let tcx = cx.tcx;
193    if !(tcx.sess.target.os == Os::Aix) {
    ::core::panicking::panic("assertion failed: tcx.sess.target.os == Os::Aix")
};assert!(tcx.sess.target.os == Os::Aix);
194
195    // Structs (under repr(C)) follow the power alignment rule if:
196    //   - the first field of the struct is a floating-point type that
197    //     is greater than 4-bytes, or
198    //   - the first field of the struct is an aggregate whose
199    //     recursively first field is a floating-point type greater than
200    //     4 bytes.
201    if ty.is_floating_point() && ty.primitive_size(tcx).bytes() > 4 {
202        return true;
203    } else if let Adt(adt_def, _) = ty.kind()
204        && adt_def.is_struct()
205        && adt_def.repr().c()
206        && !adt_def.repr().packed()
207        && adt_def.repr().align.is_none()
208    {
209        let struct_variant = adt_def.variant(VariantIdx::ZERO);
210        // Within a nested struct, all fields are examined to correctly
211        // report if any fields after the nested struct within the
212        // original struct are misaligned.
213        for struct_field in &struct_variant.fields {
214            let field_ty = tcx.type_of(struct_field.did).instantiate_identity().skip_norm_wip();
215            if check_arg_for_power_alignment(cx, field_ty) {
216                return true;
217            }
218        }
219    }
220    return false;
221}
222
223/// Check a struct definition for respect of the Power alignment Rule (as in PowerPC),
224/// which should be respected in the "aix" target OS.
225/// To do so, we must follow one of the two following conditions:
226/// - The first field of the struct must be floating-point type that
227///    is greater than 4-bytes.
228///  - The first field of the struct must be an aggregate whose
229///    recursively first field is a floating-point type greater than
230///    4 bytes.
231fn check_struct_for_power_alignment<'tcx>(
232    cx: &LateContext<'tcx>,
233    item: &'tcx hir::Item<'tcx>,
234    adt_def: AdtDef<'tcx>,
235) {
236    let tcx = cx.tcx;
237
238    // Only consider structs (not enums or unions) on AIX.
239    if tcx.sess.target.os != Os::Aix || !adt_def.is_struct() {
240        return;
241    }
242
243    // The struct must be repr(C), but ignore it if it explicitly specifies its alignment with
244    // either `align(N)` or `packed(N)`.
245    if adt_def.repr().c() && !adt_def.repr().packed() && adt_def.repr().align.is_none() {
246        let struct_variant_data = item.expect_struct().2;
247        for field_def in struct_variant_data.fields().iter().skip(1) {
248            // Struct fields (after the first field) are checked for the
249            // power alignment rule, as fields after the first are likely
250            // to be the fields that are misaligned.
251            let ty = tcx.type_of(field_def.def_id).instantiate_identity().skip_norm_wip();
252            if check_arg_for_power_alignment(cx, ty) {
253                cx.emit_span_lint(USES_POWER_ALIGNMENT, field_def.span, UsesPowerAlignment);
254            }
255        }
256    }
257}
258
259/// Annotates whether we are in the context of an item *defined* in rust
260/// and exposed to an FFI boundary,
261/// or the context of an item from elsewhere, whose interface is re-*declared* in rust.
262#[derive(#[automatically_derived]
impl ::core::clone::Clone for CItemKind {
    #[inline]
    fn clone(&self) -> CItemKind { *self }
}Clone, #[automatically_derived]
impl ::core::marker::Copy for CItemKind { }Copy)]
263enum CItemKind {
264    Declaration,
265    Definition,
266}
267
268/// Annotates whether we are in the context of a function's argument types or return type.
269#[derive(#[automatically_derived]
impl ::core::clone::Clone for FnPos {
    #[inline]
    fn clone(&self) -> FnPos { *self }
}Clone, #[automatically_derived]
impl ::core::marker::Copy for FnPos { }Copy)]
270enum FnPos {
271    Arg,
272    Ret,
273}
274
275enum FfiResult<'tcx> {
276    FfiSafe,
277    FfiPhantom(Ty<'tcx>),
278    FfiUnsafe { ty: Ty<'tcx>, reason: DiagMessage, help: Option<DiagMessage> },
279}
280
281/// The result when a type has been checked but perhaps not completely. `None` indicates that
282/// FFI safety/unsafety has not yet been determined, `Some(res)` indicates that the safety/unsafety
283/// in the `FfiResult` is final.
284type PartialFfiResult<'tcx> = Option<FfiResult<'tcx>>;
285
286/// What type indirection points to a given type.
287#[derive(#[automatically_derived]
impl ::core::clone::Clone for IndirectionKind {
    #[inline]
    fn clone(&self) -> IndirectionKind { *self }
}Clone, #[automatically_derived]
impl ::core::marker::Copy for IndirectionKind { }Copy)]
288enum IndirectionKind {
289    /// Box (valid non-null pointer, owns pointee).
290    Box,
291    /// Ref (valid non-null pointer, borrows pointee).
292    Ref,
293    /// Raw pointer (not necessarily non-null or valid. no info on ownership).
294    RawPtr,
295}
296
297bitflags! {
298    /// VisitorState flags that are linked with the root type's use.
299    /// (These are the permanent part of the state, kept when visiting new Ty.)
300    #[derive(#[automatically_derived]
impl ::core::clone::Clone for RootUseFlags {
    #[inline]
    fn clone(&self) -> RootUseFlags {
        let _:
                ::core::clone::AssertParamIsClone<<RootUseFlags as
                ::bitflags::__private::PublicFlags>::Internal>;
        *self
    }
}
impl RootUseFlags {
    #[doc = r" For use in (externally-linked) static variables."]
    #[allow(deprecated, non_upper_case_globals,)]
    pub const STATIC: Self = Self::from_bits_retain(0b000001);
    #[doc = r" For use in functions in general."]
    #[allow(deprecated, non_upper_case_globals,)]
    pub const FUNC: Self = Self::from_bits_retain(0b000010);
    #[doc =
    r" For variables in function returns (implicitly: not for static variables)."]
    #[allow(deprecated, non_upper_case_globals,)]
    pub const FN_RETURN: Self = Self::from_bits_retain(0b000100);
    #[doc =
    r" For variables in functions/variables which are defined in rust."]
    #[allow(deprecated, non_upper_case_globals,)]
    pub const DEFINED: Self = Self::from_bits_retain(0b001000);
    #[doc = r" For times where we are only defining the type of something"]
    #[doc = r" (struct/enum/union definitions, FnPtrs)."]
    #[allow(deprecated, non_upper_case_globals,)]
    pub const THEORETICAL: Self = Self::from_bits_retain(0b010000);
}
impl ::bitflags::Flags for RootUseFlags {
    const FLAGS: &'static [::bitflags::Flag<RootUseFlags>] =
        &[{

                        #[allow(deprecated, non_upper_case_globals,)]
                        ::bitflags::Flag::new("STATIC", RootUseFlags::STATIC)
                    },
                    {

                        #[allow(deprecated, non_upper_case_globals,)]
                        ::bitflags::Flag::new("FUNC", RootUseFlags::FUNC)
                    },
                    {

                        #[allow(deprecated, non_upper_case_globals,)]
                        ::bitflags::Flag::new("FN_RETURN", RootUseFlags::FN_RETURN)
                    },
                    {

                        #[allow(deprecated, non_upper_case_globals,)]
                        ::bitflags::Flag::new("DEFINED", RootUseFlags::DEFINED)
                    },
                    {

                        #[allow(deprecated, non_upper_case_globals,)]
                        ::bitflags::Flag::new("THEORETICAL",
                            RootUseFlags::THEORETICAL)
                    }];
    type Bits = u8;
    fn bits(&self) -> u8 { RootUseFlags::bits(self) }
    fn from_bits_retain(bits: u8) -> RootUseFlags {
        RootUseFlags::from_bits_retain(bits)
    }
}
#[allow(dead_code, deprecated, unused_doc_comments, unused_attributes,
unused_mut, unused_imports, non_upper_case_globals, clippy ::
assign_op_pattern, clippy :: indexing_slicing, clippy :: same_name_method,
clippy :: iter_without_into_iter,)]
const _: () =
    {
        #[repr(transparent)]
        struct InternalBitFlags(u8);
        #[automatically_derived]
        #[doc(hidden)]
        unsafe impl ::core::clone::TrivialClone for InternalBitFlags { }
        #[automatically_derived]
        impl ::core::clone::Clone for InternalBitFlags {
            #[inline]
            fn clone(&self) -> InternalBitFlags {
                let _: ::core::clone::AssertParamIsClone<u8>;
                *self
            }
        }
        #[automatically_derived]
        impl ::core::marker::Copy for InternalBitFlags { }
        #[automatically_derived]
        impl ::core::marker::StructuralPartialEq for InternalBitFlags { }
        #[automatically_derived]
        impl ::core::cmp::PartialEq for InternalBitFlags {
            #[inline]
            fn eq(&self, other: &InternalBitFlags) -> bool {
                self.0 == other.0
            }
        }
        #[automatically_derived]
        impl ::core::cmp::Eq for InternalBitFlags {
            #[inline]
            #[doc(hidden)]
            #[coverage(off)]
            fn assert_fields_are_eq(&self) {
                let _: ::core::cmp::AssertParamIsEq<u8>;
            }
        }
        #[automatically_derived]
        impl ::core::cmp::PartialOrd for InternalBitFlags {
            #[inline]
            fn partial_cmp(&self, other: &InternalBitFlags)
                -> ::core::option::Option<::core::cmp::Ordering> {
                ::core::cmp::PartialOrd::partial_cmp(&self.0, &other.0)
            }
        }
        #[automatically_derived]
        impl ::core::cmp::Ord for InternalBitFlags {
            #[inline]
            fn cmp(&self, other: &InternalBitFlags) -> ::core::cmp::Ordering {
                ::core::cmp::Ord::cmp(&self.0, &other.0)
            }
        }
        #[automatically_derived]
        impl ::core::hash::Hash for InternalBitFlags {
            #[inline]
            fn hash<__H: ::core::hash::Hasher>(&self, state: &mut __H) {
                ::core::hash::Hash::hash(&self.0, state)
            }
        }
        impl ::bitflags::__private::PublicFlags for RootUseFlags {
            type Primitive = u8;
            type Internal = InternalBitFlags;
        }
        impl ::bitflags::__private::core::default::Default for
            InternalBitFlags {
            #[inline]
            fn default() -> Self { InternalBitFlags::empty() }
        }
        impl ::bitflags::__private::core::fmt::Debug for InternalBitFlags {
            fn fmt(&self,
                f: &mut ::bitflags::__private::core::fmt::Formatter<'_>)
                -> ::bitflags::__private::core::fmt::Result {
                if self.is_empty() {
                    f.write_fmt(format_args!("{0:#x}",
                            <u8 as ::bitflags::Bits>::EMPTY))
                } else {
                    ::bitflags::__private::core::fmt::Display::fmt(self, f)
                }
            }
        }
        impl ::bitflags::__private::core::fmt::Display for InternalBitFlags {
            fn fmt(&self,
                f: &mut ::bitflags::__private::core::fmt::Formatter<'_>)
                -> ::bitflags::__private::core::fmt::Result {
                ::bitflags::parser::to_writer(&RootUseFlags(*self), f)
            }
        }
        impl ::bitflags::__private::core::str::FromStr for InternalBitFlags {
            type Err = ::bitflags::parser::ParseError;
            fn from_str(s: &str)
                ->
                    ::bitflags::__private::core::result::Result<Self,
                    Self::Err> {
                ::bitflags::parser::from_str::<RootUseFlags>(s).map(|flags|
                        flags.0)
            }
        }
        impl ::bitflags::__private::core::convert::AsRef<u8> for
            InternalBitFlags {
            fn as_ref(&self) -> &u8 { &self.0 }
        }
        impl ::bitflags::__private::core::convert::From<u8> for
            InternalBitFlags {
            fn from(bits: u8) -> Self { Self::from_bits_retain(bits) }
        }
        #[allow(dead_code, deprecated, unused_attributes)]
        impl InternalBitFlags {
            /// Get a flags value with all bits unset.
            #[inline]
            pub const fn empty() -> Self {
                Self(<u8 as ::bitflags::Bits>::EMPTY)
            }
            /// Get a flags value with all known bits set.
            #[inline]
            pub const fn all() -> Self {
                let mut truncated = <u8 as ::bitflags::Bits>::EMPTY;
                let mut i = 0;
                {
                    {
                        let flag =
                            <RootUseFlags as
                                            ::bitflags::Flags>::FLAGS[i].value().bits();
                        truncated = truncated | flag;
                        i += 1;
                    }
                };
                {
                    {
                        let flag =
                            <RootUseFlags as
                                            ::bitflags::Flags>::FLAGS[i].value().bits();
                        truncated = truncated | flag;
                        i += 1;
                    }
                };
                {
                    {
                        let flag =
                            <RootUseFlags as
                                            ::bitflags::Flags>::FLAGS[i].value().bits();
                        truncated = truncated | flag;
                        i += 1;
                    }
                };
                {
                    {
                        let flag =
                            <RootUseFlags as
                                            ::bitflags::Flags>::FLAGS[i].value().bits();
                        truncated = truncated | flag;
                        i += 1;
                    }
                };
                {
                    {
                        let flag =
                            <RootUseFlags as
                                            ::bitflags::Flags>::FLAGS[i].value().bits();
                        truncated = truncated | flag;
                        i += 1;
                    }
                };
                let _ = i;
                Self(truncated)
            }
            /// Get the underlying bits value.
            ///
            /// The returned value is exactly the bits set in this flags value.
            #[inline]
            pub const fn bits(&self) -> u8 { self.0 }
            /// Convert from a bits value.
            ///
            /// This method will return `None` if any unknown bits are set.
            #[inline]
            pub const fn from_bits(bits: u8)
                -> ::bitflags::__private::core::option::Option<Self> {
                let truncated = Self::from_bits_truncate(bits).0;
                if truncated == bits {
                    ::bitflags::__private::core::option::Option::Some(Self(bits))
                } else { ::bitflags::__private::core::option::Option::None }
            }
            /// Convert from a bits value, unsetting any unknown bits.
            #[inline]
            pub const fn from_bits_truncate(bits: u8) -> Self {
                Self(bits & Self::all().0)
            }
            /// Convert from a bits value exactly.
            #[inline]
            pub const fn from_bits_retain(bits: u8) -> Self { Self(bits) }
            /// Get a flags value with the bits of a flag with the given name set.
            ///
            /// This method will return `None` if `name` is empty or doesn't
            /// correspond to any named flag.
            #[inline]
            pub fn from_name(name: &str)
                -> ::bitflags::__private::core::option::Option<Self> {
                {
                    if name == "STATIC" {
                        return ::bitflags::__private::core::option::Option::Some(Self(RootUseFlags::STATIC.bits()));
                    }
                };
                ;
                {
                    if name == "FUNC" {
                        return ::bitflags::__private::core::option::Option::Some(Self(RootUseFlags::FUNC.bits()));
                    }
                };
                ;
                {
                    if name == "FN_RETURN" {
                        return ::bitflags::__private::core::option::Option::Some(Self(RootUseFlags::FN_RETURN.bits()));
                    }
                };
                ;
                {
                    if name == "DEFINED" {
                        return ::bitflags::__private::core::option::Option::Some(Self(RootUseFlags::DEFINED.bits()));
                    }
                };
                ;
                {
                    if name == "THEORETICAL" {
                        return ::bitflags::__private::core::option::Option::Some(Self(RootUseFlags::THEORETICAL.bits()));
                    }
                };
                ;
                let _ = name;
                ::bitflags::__private::core::option::Option::None
            }
            /// Whether all bits in this flags value are unset.
            #[inline]
            pub const fn is_empty(&self) -> bool {
                self.0 == <u8 as ::bitflags::Bits>::EMPTY
            }
            /// Whether all known bits in this flags value are set.
            #[inline]
            pub const fn is_all(&self) -> bool {
                Self::all().0 | self.0 == self.0
            }
            /// Whether any set bits in a source flags value are also set in a target flags value.
            #[inline]
            pub const fn intersects(&self, other: Self) -> bool {
                self.0 & other.0 != <u8 as ::bitflags::Bits>::EMPTY
            }
            /// Whether all set bits in a source flags value are also set in a target flags value.
            #[inline]
            pub const fn contains(&self, other: Self) -> bool {
                self.0 & other.0 == other.0
            }
            /// The bitwise or (`|`) of the bits in two flags values.
            #[inline]
            pub fn insert(&mut self, other: Self) {
                *self = Self(self.0).union(other);
            }
            /// The intersection of a source flags value with the complement of a target flags
            /// value (`&!`).
            ///
            /// This method is not equivalent to `self & !other` when `other` has unknown bits set.
            /// `remove` won't truncate `other`, but the `!` operator will.
            #[inline]
            pub fn remove(&mut self, other: Self) {
                *self = Self(self.0).difference(other);
            }
            /// The bitwise exclusive-or (`^`) of the bits in two flags values.
            #[inline]
            pub fn toggle(&mut self, other: Self) {
                *self = Self(self.0).symmetric_difference(other);
            }
            /// Call `insert` when `value` is `true` or `remove` when `value` is `false`.
            #[inline]
            pub fn set(&mut self, other: Self, value: bool) {
                if value { self.insert(other); } else { self.remove(other); }
            }
            /// The bitwise and (`&`) of the bits in two flags values.
            #[inline]
            #[must_use]
            pub const fn intersection(self, other: Self) -> Self {
                Self(self.0 & other.0)
            }
            /// The bitwise or (`|`) of the bits in two flags values.
            #[inline]
            #[must_use]
            pub const fn union(self, other: Self) -> Self {
                Self(self.0 | other.0)
            }
            /// The intersection of a source flags value with the complement of a target flags
            /// value (`&!`).
            ///
            /// This method is not equivalent to `self & !other` when `other` has unknown bits set.
            /// `difference` won't truncate `other`, but the `!` operator will.
            #[inline]
            #[must_use]
            pub const fn difference(self, other: Self) -> Self {
                Self(self.0 & !other.0)
            }
            /// The bitwise exclusive-or (`^`) of the bits in two flags values.
            #[inline]
            #[must_use]
            pub const fn symmetric_difference(self, other: Self) -> Self {
                Self(self.0 ^ other.0)
            }
            /// The bitwise negation (`!`) of the bits in a flags value, truncating the result.
            #[inline]
            #[must_use]
            pub const fn complement(self) -> Self {
                Self::from_bits_truncate(!self.0)
            }
        }
        impl ::bitflags::__private::core::fmt::Binary for InternalBitFlags {
            fn fmt(&self, f: &mut ::bitflags::__private::core::fmt::Formatter)
                -> ::bitflags::__private::core::fmt::Result {
                let inner = self.0;
                ::bitflags::__private::core::fmt::Binary::fmt(&inner, f)
            }
        }
        impl ::bitflags::__private::core::fmt::Octal for InternalBitFlags {
            fn fmt(&self, f: &mut ::bitflags::__private::core::fmt::Formatter)
                -> ::bitflags::__private::core::fmt::Result {
                let inner = self.0;
                ::bitflags::__private::core::fmt::Octal::fmt(&inner, f)
            }
        }
        impl ::bitflags::__private::core::fmt::LowerHex for InternalBitFlags {
            fn fmt(&self, f: &mut ::bitflags::__private::core::fmt::Formatter)
                -> ::bitflags::__private::core::fmt::Result {
                let inner = self.0;
                ::bitflags::__private::core::fmt::LowerHex::fmt(&inner, f)
            }
        }
        impl ::bitflags::__private::core::fmt::UpperHex for InternalBitFlags {
            fn fmt(&self, f: &mut ::bitflags::__private::core::fmt::Formatter)
                -> ::bitflags::__private::core::fmt::Result {
                let inner = self.0;
                ::bitflags::__private::core::fmt::UpperHex::fmt(&inner, f)
            }
        }
        impl ::bitflags::__private::core::ops::BitOr for InternalBitFlags {
            type Output = Self;
            /// The bitwise or (`|`) of the bits in two flags values.
            #[inline]
            fn bitor(self, other: InternalBitFlags) -> Self {
                self.union(other)
            }
        }
        impl ::bitflags::__private::core::ops::BitOrAssign for
            InternalBitFlags {
            /// The bitwise or (`|`) of the bits in two flags values.
            #[inline]
            fn bitor_assign(&mut self, other: Self) { self.insert(other); }
        }
        impl ::bitflags::__private::core::ops::BitXor for InternalBitFlags {
            type Output = Self;
            /// The bitwise exclusive-or (`^`) of the bits in two flags values.
            #[inline]
            fn bitxor(self, other: Self) -> Self {
                self.symmetric_difference(other)
            }
        }
        impl ::bitflags::__private::core::ops::BitXorAssign for
            InternalBitFlags {
            /// The bitwise exclusive-or (`^`) of the bits in two flags values.
            #[inline]
            fn bitxor_assign(&mut self, other: Self) { self.toggle(other); }
        }
        impl ::bitflags::__private::core::ops::BitAnd for InternalBitFlags {
            type Output = Self;
            /// The bitwise and (`&`) of the bits in two flags values.
            #[inline]
            fn bitand(self, other: Self) -> Self { self.intersection(other) }
        }
        impl ::bitflags::__private::core::ops::BitAndAssign for
            InternalBitFlags {
            /// The bitwise and (`&`) of the bits in two flags values.
            #[inline]
            fn bitand_assign(&mut self, other: Self) {
                *self =
                    Self::from_bits_retain(self.bits()).intersection(other);
            }
        }
        impl ::bitflags::__private::core::ops::Sub for InternalBitFlags {
            type Output = Self;
            /// The intersection of a source flags value with the complement of a target flags value (`&!`).
            ///
            /// This method is not equivalent to `self & !other` when `other` has unknown bits set.
            /// `difference` won't truncate `other`, but the `!` operator will.
            #[inline]
            fn sub(self, other: Self) -> Self { self.difference(other) }
        }
        impl ::bitflags::__private::core::ops::SubAssign for InternalBitFlags
            {
            /// The intersection of a source flags value with the complement of a target flags value (`&!`).
            ///
            /// This method is not equivalent to `self & !other` when `other` has unknown bits set.
            /// `difference` won't truncate `other`, but the `!` operator will.
            #[inline]
            fn sub_assign(&mut self, other: Self) { self.remove(other); }
        }
        impl ::bitflags::__private::core::ops::Not for InternalBitFlags {
            type Output = Self;
            /// The bitwise negation (`!`) of the bits in a flags value, truncating the result.
            #[inline]
            fn not(self) -> Self { self.complement() }
        }
        impl ::bitflags::__private::core::iter::Extend<InternalBitFlags> for
            InternalBitFlags {
            /// The bitwise or (`|`) of the bits in each flags value.
            fn extend<T: ::bitflags::__private::core::iter::IntoIterator<Item
                = Self>>(&mut self, iterator: T) {
                for item in iterator { self.insert(item) }
            }
        }
        impl ::bitflags::__private::core::iter::FromIterator<InternalBitFlags>
            for InternalBitFlags {
            /// The bitwise or (`|`) of the bits in each flags value.
            fn from_iter<T: ::bitflags::__private::core::iter::IntoIterator<Item
                = Self>>(iterator: T) -> Self {
                use ::bitflags::__private::core::iter::Extend;
                let mut result = Self::empty();
                result.extend(iterator);
                result
            }
        }
        impl InternalBitFlags {
            /// Yield a set of contained flags values.
            ///
            /// Each yielded flags value will correspond to a defined named flag. Any unknown bits
            /// will be yielded together as a final flags value.
            #[inline]
            pub const fn iter(&self) -> ::bitflags::iter::Iter<RootUseFlags> {
                ::bitflags::iter::Iter::__private_const_new(<RootUseFlags as
                        ::bitflags::Flags>::FLAGS,
                    RootUseFlags::from_bits_retain(self.bits()),
                    RootUseFlags::from_bits_retain(self.bits()))
            }
            /// Yield a set of contained named flags values.
            ///
            /// This method is like [`iter`](#method.iter), except only yields bits in contained named flags.
            /// Any unknown bits, or bits not corresponding to a contained flag will not be yielded.
            #[inline]
            pub const fn iter_names(&self)
                -> ::bitflags::iter::IterNames<RootUseFlags> {
                ::bitflags::iter::IterNames::__private_const_new(<RootUseFlags
                        as ::bitflags::Flags>::FLAGS,
                    RootUseFlags::from_bits_retain(self.bits()),
                    RootUseFlags::from_bits_retain(self.bits()))
            }
        }
        impl ::bitflags::__private::core::iter::IntoIterator for
            InternalBitFlags {
            type Item = RootUseFlags;
            type IntoIter = ::bitflags::iter::Iter<RootUseFlags>;
            fn into_iter(self) -> Self::IntoIter { self.iter() }
        }
        impl InternalBitFlags {
            /// Returns a mutable reference to the raw value of the flags currently stored.
            #[inline]
            pub fn bits_mut(&mut self) -> &mut u8 { &mut self.0 }
        }
        #[allow(dead_code, deprecated, unused_attributes)]
        impl RootUseFlags {
            /// Get a flags value with all bits unset.
            #[inline]
            pub const fn empty() -> Self { Self(InternalBitFlags::empty()) }
            /// Get a flags value with all known bits set.
            #[inline]
            pub const fn all() -> Self { Self(InternalBitFlags::all()) }
            /// Get the underlying bits value.
            ///
            /// The returned value is exactly the bits set in this flags value.
            #[inline]
            pub const fn bits(&self) -> u8 { self.0.bits() }
            /// Convert from a bits value.
            ///
            /// This method will return `None` if any unknown bits are set.
            #[inline]
            pub const fn from_bits(bits: u8)
                -> ::bitflags::__private::core::option::Option<Self> {
                match InternalBitFlags::from_bits(bits) {
                    ::bitflags::__private::core::option::Option::Some(bits) =>
                        ::bitflags::__private::core::option::Option::Some(Self(bits)),
                    ::bitflags::__private::core::option::Option::None =>
                        ::bitflags::__private::core::option::Option::None,
                }
            }
            /// Convert from a bits value, unsetting any unknown bits.
            #[inline]
            pub const fn from_bits_truncate(bits: u8) -> Self {
                Self(InternalBitFlags::from_bits_truncate(bits))
            }
            /// Convert from a bits value exactly.
            #[inline]
            pub const fn from_bits_retain(bits: u8) -> Self {
                Self(InternalBitFlags::from_bits_retain(bits))
            }
            /// Get a flags value with the bits of a flag with the given name set.
            ///
            /// This method will return `None` if `name` is empty or doesn't
            /// correspond to any named flag.
            #[inline]
            pub fn from_name(name: &str)
                -> ::bitflags::__private::core::option::Option<Self> {
                match InternalBitFlags::from_name(name) {
                    ::bitflags::__private::core::option::Option::Some(bits) =>
                        ::bitflags::__private::core::option::Option::Some(Self(bits)),
                    ::bitflags::__private::core::option::Option::None =>
                        ::bitflags::__private::core::option::Option::None,
                }
            }
            /// Whether all bits in this flags value are unset.
            #[inline]
            pub const fn is_empty(&self) -> bool { self.0.is_empty() }
            /// Whether all known bits in this flags value are set.
            #[inline]
            pub const fn is_all(&self) -> bool { self.0.is_all() }
            /// Whether any set bits in a source flags value are also set in a target flags value.
            #[inline]
            pub const fn intersects(&self, other: Self) -> bool {
                self.0.intersects(other.0)
            }
            /// Whether all set bits in a source flags value are also set in a target flags value.
            #[inline]
            pub const fn contains(&self, other: Self) -> bool {
                self.0.contains(other.0)
            }
            /// The bitwise or (`|`) of the bits in two flags values.
            #[inline]
            pub fn insert(&mut self, other: Self) { self.0.insert(other.0) }
            /// The intersection of a source flags value with the complement of a target flags
            /// value (`&!`).
            ///
            /// This method is not equivalent to `self & !other` when `other` has unknown bits set.
            /// `remove` won't truncate `other`, but the `!` operator will.
            #[inline]
            pub fn remove(&mut self, other: Self) { self.0.remove(other.0) }
            /// The bitwise exclusive-or (`^`) of the bits in two flags values.
            #[inline]
            pub fn toggle(&mut self, other: Self) { self.0.toggle(other.0) }
            /// Call `insert` when `value` is `true` or `remove` when `value` is `false`.
            #[inline]
            pub fn set(&mut self, other: Self, value: bool) {
                self.0.set(other.0, value)
            }
            /// The bitwise and (`&`) of the bits in two flags values.
            #[inline]
            #[must_use]
            pub const fn intersection(self, other: Self) -> Self {
                Self(self.0.intersection(other.0))
            }
            /// The bitwise or (`|`) of the bits in two flags values.
            #[inline]
            #[must_use]
            pub const fn union(self, other: Self) -> Self {
                Self(self.0.union(other.0))
            }
            /// The intersection of a source flags value with the complement of a target flags
            /// value (`&!`).
            ///
            /// This method is not equivalent to `self & !other` when `other` has unknown bits set.
            /// `difference` won't truncate `other`, but the `!` operator will.
            #[inline]
            #[must_use]
            pub const fn difference(self, other: Self) -> Self {
                Self(self.0.difference(other.0))
            }
            /// The bitwise exclusive-or (`^`) of the bits in two flags values.
            #[inline]
            #[must_use]
            pub const fn symmetric_difference(self, other: Self) -> Self {
                Self(self.0.symmetric_difference(other.0))
            }
            /// The bitwise negation (`!`) of the bits in a flags value, truncating the result.
            #[inline]
            #[must_use]
            pub const fn complement(self) -> Self {
                Self(self.0.complement())
            }
        }
        impl ::bitflags::__private::core::fmt::Binary for RootUseFlags {
            fn fmt(&self, f: &mut ::bitflags::__private::core::fmt::Formatter)
                -> ::bitflags::__private::core::fmt::Result {
                let inner = self.0;
                ::bitflags::__private::core::fmt::Binary::fmt(&inner, f)
            }
        }
        impl ::bitflags::__private::core::fmt::Octal for RootUseFlags {
            fn fmt(&self, f: &mut ::bitflags::__private::core::fmt::Formatter)
                -> ::bitflags::__private::core::fmt::Result {
                let inner = self.0;
                ::bitflags::__private::core::fmt::Octal::fmt(&inner, f)
            }
        }
        impl ::bitflags::__private::core::fmt::LowerHex for RootUseFlags {
            fn fmt(&self, f: &mut ::bitflags::__private::core::fmt::Formatter)
                -> ::bitflags::__private::core::fmt::Result {
                let inner = self.0;
                ::bitflags::__private::core::fmt::LowerHex::fmt(&inner, f)
            }
        }
        impl ::bitflags::__private::core::fmt::UpperHex for RootUseFlags {
            fn fmt(&self, f: &mut ::bitflags::__private::core::fmt::Formatter)
                -> ::bitflags::__private::core::fmt::Result {
                let inner = self.0;
                ::bitflags::__private::core::fmt::UpperHex::fmt(&inner, f)
            }
        }
        impl ::bitflags::__private::core::ops::BitOr for RootUseFlags {
            type Output = Self;
            /// The bitwise or (`|`) of the bits in two flags values.
            #[inline]
            fn bitor(self, other: RootUseFlags) -> Self { self.union(other) }
        }
        impl ::bitflags::__private::core::ops::BitOrAssign for RootUseFlags {
            /// The bitwise or (`|`) of the bits in two flags values.
            #[inline]
            fn bitor_assign(&mut self, other: Self) { self.insert(other); }
        }
        impl ::bitflags::__private::core::ops::BitXor for RootUseFlags {
            type Output = Self;
            /// The bitwise exclusive-or (`^`) of the bits in two flags values.
            #[inline]
            fn bitxor(self, other: Self) -> Self {
                self.symmetric_difference(other)
            }
        }
        impl ::bitflags::__private::core::ops::BitXorAssign for RootUseFlags {
            /// The bitwise exclusive-or (`^`) of the bits in two flags values.
            #[inline]
            fn bitxor_assign(&mut self, other: Self) { self.toggle(other); }
        }
        impl ::bitflags::__private::core::ops::BitAnd for RootUseFlags {
            type Output = Self;
            /// The bitwise and (`&`) of the bits in two flags values.
            #[inline]
            fn bitand(self, other: Self) -> Self { self.intersection(other) }
        }
        impl ::bitflags::__private::core::ops::BitAndAssign for RootUseFlags {
            /// The bitwise and (`&`) of the bits in two flags values.
            #[inline]
            fn bitand_assign(&mut self, other: Self) {
                *self =
                    Self::from_bits_retain(self.bits()).intersection(other);
            }
        }
        impl ::bitflags::__private::core::ops::Sub for RootUseFlags {
            type Output = Self;
            /// The intersection of a source flags value with the complement of a target flags value (`&!`).
            ///
            /// This method is not equivalent to `self & !other` when `other` has unknown bits set.
            /// `difference` won't truncate `other`, but the `!` operator will.
            #[inline]
            fn sub(self, other: Self) -> Self { self.difference(other) }
        }
        impl ::bitflags::__private::core::ops::SubAssign for RootUseFlags {
            /// The intersection of a source flags value with the complement of a target flags value (`&!`).
            ///
            /// This method is not equivalent to `self & !other` when `other` has unknown bits set.
            /// `difference` won't truncate `other`, but the `!` operator will.
            #[inline]
            fn sub_assign(&mut self, other: Self) { self.remove(other); }
        }
        impl ::bitflags::__private::core::ops::Not for RootUseFlags {
            type Output = Self;
            /// The bitwise negation (`!`) of the bits in a flags value, truncating the result.
            #[inline]
            fn not(self) -> Self { self.complement() }
        }
        impl ::bitflags::__private::core::iter::Extend<RootUseFlags> for
            RootUseFlags {
            /// The bitwise or (`|`) of the bits in each flags value.
            fn extend<T: ::bitflags::__private::core::iter::IntoIterator<Item
                = Self>>(&mut self, iterator: T) {
                for item in iterator { self.insert(item) }
            }
        }
        impl ::bitflags::__private::core::iter::FromIterator<RootUseFlags> for
            RootUseFlags {
            /// The bitwise or (`|`) of the bits in each flags value.
            fn from_iter<T: ::bitflags::__private::core::iter::IntoIterator<Item
                = Self>>(iterator: T) -> Self {
                use ::bitflags::__private::core::iter::Extend;
                let mut result = Self::empty();
                result.extend(iterator);
                result
            }
        }
        impl RootUseFlags {
            /// Yield a set of contained flags values.
            ///
            /// Each yielded flags value will correspond to a defined named flag. Any unknown bits
            /// will be yielded together as a final flags value.
            #[inline]
            pub const fn iter(&self) -> ::bitflags::iter::Iter<RootUseFlags> {
                ::bitflags::iter::Iter::__private_const_new(<RootUseFlags as
                        ::bitflags::Flags>::FLAGS,
                    RootUseFlags::from_bits_retain(self.bits()),
                    RootUseFlags::from_bits_retain(self.bits()))
            }
            /// Yield a set of contained named flags values.
            ///
            /// This method is like [`iter`](#method.iter), except only yields bits in contained named flags.
            /// Any unknown bits, or bits not corresponding to a contained flag will not be yielded.
            #[inline]
            pub const fn iter_names(&self)
                -> ::bitflags::iter::IterNames<RootUseFlags> {
                ::bitflags::iter::IterNames::__private_const_new(<RootUseFlags
                        as ::bitflags::Flags>::FLAGS,
                    RootUseFlags::from_bits_retain(self.bits()),
                    RootUseFlags::from_bits_retain(self.bits()))
            }
        }
        impl ::bitflags::__private::core::iter::IntoIterator for RootUseFlags
            {
            type Item = RootUseFlags;
            type IntoIter = ::bitflags::iter::Iter<RootUseFlags>;
            fn into_iter(self) -> Self::IntoIter { self.iter() }
        }
    };Clone, #[automatically_derived]
impl ::core::marker::Copy for RootUseFlags { }Copy, #[automatically_derived]
impl ::core::fmt::Debug for RootUseFlags {
    #[inline]
    fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
        ::core::fmt::Formatter::debug_tuple_field1_finish(f, "RootUseFlags",
            &&self.0)
    }
}Debug, #[automatically_derived]
impl ::core::cmp::PartialEq for RootUseFlags {
    #[inline]
    fn eq(&self, other: &RootUseFlags) -> bool { self.0 == other.0 }
}PartialEq, #[automatically_derived]
impl ::core::cmp::Eq for RootUseFlags {
    #[inline]
    #[doc(hidden)]
    #[coverage(off)]
    fn assert_fields_are_eq(&self) {
        let _:
                ::core::cmp::AssertParamIsEq<<RootUseFlags as
                ::bitflags::__private::PublicFlags>::Internal>;
    }
}Eq)]
301    struct RootUseFlags: u8 {
302        /// For use in (externally-linked) static variables.
303        const STATIC = 0b000001;
304        /// For use in functions in general.
305        const FUNC = 0b000010;
306        /// For variables in function returns (implicitly: not for static variables).
307        const FN_RETURN = 0b000100;
308        /// For variables in functions/variables which are defined in rust.
309        const DEFINED = 0b001000;
310        /// For times where we are only defining the type of something
311        /// (struct/enum/union definitions, FnPtrs).
312        const THEORETICAL = 0b010000;
313    }
314}
315
316/// Description of the relationship between current Ty and
317/// the type (or lack thereof) immediately containing it
318#[derive(#[automatically_derived]
impl ::core::marker::Copy for OuterTyKind { }Copy, #[automatically_derived]
impl ::core::clone::Clone for OuterTyKind {
    #[inline]
    fn clone(&self) -> OuterTyKind { *self }
}Clone, #[automatically_derived]
impl ::core::fmt::Debug for OuterTyKind {
    #[inline]
    fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
        ::core::fmt::Formatter::write_str(f,
            match self {
                OuterTyKind::None => "None",
                OuterTyKind::NoneThroughFnPtr => "NoneThroughFnPtr",
                OuterTyKind::Other => "Other",
            })
    }
}Debug, #[automatically_derived]
impl ::core::cmp::PartialEq for OuterTyKind {
    #[inline]
    fn eq(&self, other: &OuterTyKind) -> bool {
        let __self_discr = ::core::intrinsics::discriminant_value(self);
        let __arg1_discr = ::core::intrinsics::discriminant_value(other);
        __self_discr == __arg1_discr
    }
}PartialEq, #[automatically_derived]
impl ::core::cmp::Eq for OuterTyKind {
    #[inline]
    #[doc(hidden)]
    #[coverage(off)]
    fn assert_fields_are_eq(&self) {}
}Eq)]
319enum OuterTyKind {
320    None,
321    /// A variant that should not exist,
322    /// but is needed because we don't change the lint's behavior yet
323    NoneThroughFnPtr,
324    /// Placeholder for properties that will be used eventually
325    Other,
326}
327
328impl OuterTyKind {
329    /// Computes the relationship by providing the containing Ty itself
330    fn from_ty<'tcx>(ty: Ty<'tcx>) -> Self {
331        match ty.kind() {
332            ty::FnPtr(..) => Self::NoneThroughFnPtr,
333            ty::RawPtr(..)
334            | ty::Ref(..)
335            | ty::Adt(..)
336            | ty::Tuple(..)
337            | ty::Array(..)
338            | ty::Slice(_) => OuterTyKind::Other,
339            _ => ::rustc_middle::util::bug::bug_fmt(format_args!("Unexpected outer type {0:?}",
        ty))bug!("Unexpected outer type {ty:?}"),
340        }
341    }
342}
343
344#[derive(#[automatically_derived]
impl ::core::marker::Copy for VisitorState { }Copy, #[automatically_derived]
impl ::core::clone::Clone for VisitorState {
    #[inline]
    fn clone(&self) -> VisitorState {
        let _: ::core::clone::AssertParamIsClone<RootUseFlags>;
        let _: ::core::clone::AssertParamIsClone<OuterTyKind>;
        *self
    }
}Clone, #[automatically_derived]
impl ::core::fmt::Debug for VisitorState {
    #[inline]
    fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
        ::core::fmt::Formatter::debug_struct_field2_finish(f, "VisitorState",
            "root_use_flags", &self.root_use_flags, "outer_ty_kind",
            &&self.outer_ty_kind)
    }
}Debug, #[automatically_derived]
impl ::core::cmp::PartialEq for VisitorState {
    #[inline]
    fn eq(&self, other: &VisitorState) -> bool {
        self.root_use_flags == other.root_use_flags &&
            self.outer_ty_kind == other.outer_ty_kind
    }
}PartialEq, #[automatically_derived]
impl ::core::cmp::Eq for VisitorState {
    #[inline]
    #[doc(hidden)]
    #[coverage(off)]
    fn assert_fields_are_eq(&self) {
        let _: ::core::cmp::AssertParamIsEq<RootUseFlags>;
        let _: ::core::cmp::AssertParamIsEq<OuterTyKind>;
    }
}Eq)]
345struct VisitorState {
346    /// Flags describing both the overall context in which the current Ty is,
347    /// linked to how the Visitor's original Ty was used.
348    root_use_flags: RootUseFlags,
349    /// Flags describing both the immediate context in which the current Ty is,
350    /// linked to how it relates to its parent Ty (or lack thereof).
351    outer_ty_kind: OuterTyKind,
352}
353
354impl RootUseFlags {
355    // The values that can be set.
356    const STATIC_TY: Self = Self::STATIC;
357    const ARGUMENT_TY_IN_DEFINITION: Self =
358        Self::from_bits(Self::FUNC.bits() | Self::DEFINED.bits()).unwrap();
359    const RETURN_TY_IN_DEFINITION: Self =
360        Self::from_bits(Self::FUNC.bits() | Self::FN_RETURN.bits() | Self::DEFINED.bits()).unwrap();
361    const ARGUMENT_TY_IN_DECLARATION: Self = Self::FUNC;
362    const RETURN_TY_IN_DECLARATION: Self =
363        Self::from_bits(Self::FUNC.bits() | Self::FN_RETURN.bits()).unwrap();
364    const ARGUMENT_TY_IN_FNPTR: Self =
365        Self::from_bits(Self::FUNC.bits() | Self::THEORETICAL.bits()).unwrap();
366    const RETURN_TY_IN_FNPTR: Self =
367        Self::from_bits(Self::FUNC.bits() | Self::THEORETICAL.bits() | Self::FN_RETURN.bits())
368            .unwrap();
369}
370
371impl VisitorState {
372    /// From an existing state, compute the state of any subtype of the current type.
373    /// (General case. For the case where the current type is a function pointer, see `next_in_fnptr`.)
374    fn next(&self, current_ty: Ty<'_>) -> Self {
375        if !!#[allow(non_exhaustive_omitted_patterns)] match current_ty.kind() {
                ty::FnPtr(..) => true,
                _ => false,
            } {
    ::core::panicking::panic("assertion failed: !matches!(current_ty.kind(), ty::FnPtr(..))")
};assert!(!matches!(current_ty.kind(), ty::FnPtr(..)));
376        VisitorState {
377            root_use_flags: self.root_use_flags,
378            outer_ty_kind: OuterTyKind::from_ty(current_ty),
379        }
380    }
381
382    /// From an existing state, compute the state of any subtype of the current type.
383    /// (Case where the current type is a function pointer,
384    /// meaning we need to specify if the subtype is an argument or the return.)
385    fn next_in_fnptr(&self, current_ty: Ty<'_>, fn_pos: FnPos) -> Self {
386        if !#[allow(non_exhaustive_omitted_patterns)] match current_ty.kind() {
            ty::FnPtr(..) => true,
            _ => false,
        } {
    ::core::panicking::panic("assertion failed: matches!(current_ty.kind(), ty::FnPtr(..))")
};assert!(matches!(current_ty.kind(), ty::FnPtr(..)));
387        VisitorState {
388            root_use_flags: match fn_pos {
389                FnPos::Ret => RootUseFlags::RETURN_TY_IN_FNPTR,
390                FnPos::Arg => RootUseFlags::ARGUMENT_TY_IN_FNPTR,
391            },
392            outer_ty_kind: OuterTyKind::from_ty(current_ty),
393        }
394    }
395
396    /// Get the proper visitor state for a given function's arguments or return type.
397    fn fn_entry_point(fn_mode: CItemKind, fn_pos: FnPos) -> Self {
398        let p_flags = match (fn_mode, fn_pos) {
399            (CItemKind::Definition, FnPos::Ret) => RootUseFlags::RETURN_TY_IN_DEFINITION,
400            (CItemKind::Declaration, FnPos::Ret) => RootUseFlags::RETURN_TY_IN_DECLARATION,
401            (CItemKind::Definition, FnPos::Arg) => RootUseFlags::ARGUMENT_TY_IN_DEFINITION,
402            (CItemKind::Declaration, FnPos::Arg) => RootUseFlags::ARGUMENT_TY_IN_DECLARATION,
403        };
404        VisitorState { root_use_flags: p_flags, outer_ty_kind: OuterTyKind::None }
405    }
406
407    /// Get the proper visitor state for a static variable's type
408    fn static_entry_point() -> Self {
409        VisitorState { root_use_flags: RootUseFlags::STATIC_TY, outer_ty_kind: OuterTyKind::None }
410    }
411
412    /// Whether the type is used in a function.
413    fn is_in_function(&self) -> bool {
414        let ret = self.root_use_flags.contains(RootUseFlags::FUNC);
415        if ret {
416            if true {
    if !!self.root_use_flags.contains(RootUseFlags::STATIC) {
        ::core::panicking::panic("assertion failed: !self.root_use_flags.contains(RootUseFlags::STATIC)")
    };
};debug_assert!(!self.root_use_flags.contains(RootUseFlags::STATIC));
417        }
418        ret
419    }
420
421    /// Whether the type is used (directly or not) in a function, in return position.
422    fn is_in_function_return(&self) -> bool {
423        let ret = self.root_use_flags.contains(RootUseFlags::FN_RETURN);
424        if ret {
425            if true {
    if !self.is_in_function() {
        ::core::panicking::panic("assertion failed: self.is_in_function()")
    };
};debug_assert!(self.is_in_function());
426        }
427        ret
428    }
429
430    /// Whether the type is used (directly or not) in a defined function.
431    /// In other words, whether or not we allow non-FFI-safe types behind a C pointer,
432    /// to be treated as an opaque type on the other side of the FFI boundary.
433    fn is_in_defined_function(&self) -> bool {
434        self.root_use_flags.contains(RootUseFlags::DEFINED) && self.is_in_function()
435    }
436
437    /// Whether the type is used (directly or not) in a function pointer type.
438    /// Here, we also allow non-FFI-safe types behind a C pointer,
439    /// to be treated as an opaque type on the other side of the FFI boundary.
440    fn is_in_fnptr(&self) -> bool {
441        self.root_use_flags.contains(RootUseFlags::THEORETICAL) && self.is_in_function()
442    }
443
444    /// Whether we can expect type parameters and co in a given type.
445    fn can_expect_ty_params(&self) -> bool {
446        // rust-defined functions, as well as FnPtrs
447        self.root_use_flags.contains(RootUseFlags::THEORETICAL) || self.is_in_defined_function()
448    }
449}
450
451/// Visitor used to recursively traverse MIR types and evaluate FFI-safety.
452/// It uses ``check_*`` methods as entrypoints to be called elsewhere,
453/// and ``visit_*`` methods to recurse.
454struct ImproperCTypesVisitor<'a, 'tcx> {
455    cx: &'a LateContext<'tcx>,
456    /// To prevent problems with recursive types,
457    /// add a types-in-check cache.
458    cache: FxHashSet<Ty<'tcx>>,
459    /// The original type being checked, before we recursed
460    /// to any other types it contains.
461    base_ty: Ty<'tcx>,
462    base_fn_mode: CItemKind,
463}
464
465impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
466    fn new(
467        cx: &'a LateContext<'tcx>,
468        base_ty: Unnormalized<'tcx, Ty<'tcx>>,
469        base_fn_mode: CItemKind,
470    ) -> Self {
471        ImproperCTypesVisitor {
472            cx,
473            base_ty: maybe_normalize_erasing_regions(cx, base_ty),
474            base_fn_mode,
475            cache: FxHashSet::default(),
476        }
477    }
478
479    /// Checks if the given indirection (box,ref,pointer) is "ffi-safe".
480    fn visit_indirection(
481        &mut self,
482        state: VisitorState,
483        ty: Ty<'tcx>,
484        inner_ty: Ty<'tcx>,
485        indirection_kind: IndirectionKind,
486    ) -> FfiResult<'tcx> {
487        use FfiResult::*;
488        let tcx = self.cx.tcx;
489
490        match indirection_kind {
491            IndirectionKind::Box => {
492                // FIXME(ctypes): this logic is broken, but it still fits the current tests:
493                // - for some reason `Box<_>`es in `extern "ABI" {}` blocks
494                //   (including within FnPtr:s)
495                //   are not treated as pointers but as FFI-unsafe structs
496                // - otherwise, treat the box itself correctly, and follow pointee safety logic
497                //   as described in the other `indirection_type` match branch.
498                if state.is_in_defined_function()
499                    || (state.is_in_fnptr() && #[allow(non_exhaustive_omitted_patterns)] match self.base_fn_mode {
    CItemKind::Definition => true,
    _ => false,
}matches!(self.base_fn_mode, CItemKind::Definition))
500                {
501                    if inner_ty.is_sized(tcx, self.cx.typing_env()) {
502                        return FfiSafe;
503                    } else {
504                        return FfiUnsafe {
505                            ty,
506                            reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("box cannot be represented as a single pointer"))msg!("box cannot be represented as a single pointer"),
507                            help: None,
508                        };
509                    }
510                } else {
511                    // (mid-retcon-commit-chain comment:)
512                    // this is the original fallback behavior, which is wrong
513                    if let ty::Adt(def, args) = ty.kind() {
514                        self.visit_struct_or_union(state, ty, *def, args)
515                    } else if truecfg!(debug_assertions) {
516                        ::rustc_middle::util::bug::bug_fmt(format_args!("ImproperCTypes: this retcon commit was badly written"))bug!("ImproperCTypes: this retcon commit was badly written")
517                    } else {
518                        FfiSafe
519                    }
520                }
521            }
522            IndirectionKind::Ref | IndirectionKind::RawPtr => {
523                // Weird behaviour for pointee safety. the big question here is
524                // "if you have a FFI-unsafe pointee behind a FFI-safe pointer type, is it ok?"
525                // The answer until now is:
526                // "It's OK for rust-defined functions and callbacks, we'll assume those are
527                // meant to be opaque types on the other side of the FFI boundary".
528                //
529                // Reasoning:
530                // For extern function declarations, the actual definition of the function is
531                // written somewhere else, meaning the declaration is free to express this
532                // opaqueness with an extern type (opaque caller-side) or a std::ffi::c_void
533                // (opaque callee-side). For extern function definitions, however, in the case
534                // where the type is opaque caller-side, it is not opaque callee-side,
535                // and having the full type information is necessary to compile the function.
536                //
537                // It might be better to rething this, or even ignore pointee safety for a first
538                // batch of behaviour changes. See the discussion that ends with
539                // https://github.com/rust-lang/rust/pull/134697#issuecomment-2692610258
540                if (state.is_in_defined_function() || state.is_in_fnptr())
541                    && inner_ty.is_sized(self.cx.tcx, self.cx.typing_env())
542                {
543                    FfiSafe
544                } else {
545                    self.visit_type(state.next(ty), inner_ty)
546                }
547            }
548        }
549    }
550
551    /// Checks if the given `VariantDef`'s field types are "ffi-safe".
552    fn visit_variant_fields(
553        &mut self,
554        state: VisitorState,
555        ty: Ty<'tcx>,
556        def: AdtDef<'tcx>,
557        variant: &ty::VariantDef,
558        args: GenericArgsRef<'tcx>,
559    ) -> FfiResult<'tcx> {
560        use FfiResult::*;
561
562        let transparent_with_all_zst_fields = if def.repr().transparent() {
563            if let Some(field) = super::transparent_newtype_field(self.cx.tcx, variant) {
564                // Transparent newtypes have at most one non-ZST field which needs to be checked..
565                let field_ty = maybe_normalize_erasing_regions(
566                    self.cx,
567                    Unnormalized::new_wip(field.ty(self.cx.tcx, args)),
568                );
569                match self.visit_type(state.next(ty), field_ty) {
570                    FfiUnsafe { ty, .. } if ty.is_unit() => (),
571                    r => return r,
572                }
573
574                false
575            } else {
576                // ..or have only ZST fields, which is FFI-unsafe (unless those fields are all
577                // `PhantomData`).
578                true
579            }
580        } else {
581            false
582        };
583
584        // We can't completely trust `repr(C)` markings, so make sure the fields are actually safe.
585        let mut all_phantom = !variant.fields.is_empty();
586        for field in &variant.fields {
587            let field_ty = maybe_normalize_erasing_regions(
588                self.cx,
589                Unnormalized::new_wip(field.ty(self.cx.tcx, args)),
590            );
591            all_phantom &= match self.visit_type(state.next(ty), field_ty) {
592                FfiSafe => false,
593                // `()` fields are FFI-safe!
594                FfiUnsafe { ty, .. } if ty.is_unit() => false,
595                FfiPhantom(..) => true,
596                r @ FfiUnsafe { .. } => return r,
597            }
598        }
599
600        if all_phantom {
601            FfiPhantom(ty)
602        } else if transparent_with_all_zst_fields {
603            FfiUnsafe {
604                ty,
605                reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("this struct contains only zero-sized fields"))msg!("this struct contains only zero-sized fields"),
606                help: None,
607            }
608        } else {
609            FfiSafe
610        }
611    }
612
613    fn visit_struct_or_union(
614        &mut self,
615        state: VisitorState,
616        ty: Ty<'tcx>,
617        def: AdtDef<'tcx>,
618        args: GenericArgsRef<'tcx>,
619    ) -> FfiResult<'tcx> {
620        if true {
    if !#[allow(non_exhaustive_omitted_patterns)] match def.adt_kind() {
                AdtKind::Struct | AdtKind::Union => true,
                _ => false,
            } {
        ::core::panicking::panic("assertion failed: matches!(def.adt_kind(), AdtKind::Struct | AdtKind::Union)")
    };
};debug_assert!(matches!(def.adt_kind(), AdtKind::Struct | AdtKind::Union));
621        use FfiResult::*;
622
623        if !def.repr().c() && !def.repr().transparent() {
624            return FfiUnsafe {
625                ty,
626                reason: if def.is_struct() {
627                    rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("this struct has unspecified layout"))msg!("this struct has unspecified layout")
628                } else {
629                    rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("this union has unspecified layout"))msg!("this union has unspecified layout")
630                },
631                help: if def.is_struct() {
632                    Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider adding a `#[repr(C)]` or `#[repr(transparent)]` attribute to this struct"))msg!(
633                        "consider adding a `#[repr(C)]` or `#[repr(transparent)]` attribute to this struct"
634                    ))
635                } else {
636                    // FIXME(#60405): confirm that this makes sense for unions once #60405 / RFC2645 stabilises
637                    Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider adding a `#[repr(C)]` or `#[repr(transparent)]` attribute to this union"))msg!(
638                        "consider adding a `#[repr(C)]` or `#[repr(transparent)]` attribute to this union"
639                    ))
640                },
641            };
642        }
643
644        if def.non_enum_variant().field_list_has_applicable_non_exhaustive() {
645            return FfiUnsafe {
646                ty,
647                reason: if def.is_struct() {
648                    rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("this struct is non-exhaustive"))msg!("this struct is non-exhaustive")
649                } else {
650                    rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("this union is non-exhaustive"))msg!("this union is non-exhaustive")
651                },
652                help: None,
653            };
654        }
655
656        if def.non_enum_variant().fields.is_empty() {
657            FfiUnsafe {
658                ty,
659                reason: if def.is_struct() {
660                    rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("this struct has no fields"))msg!("this struct has no fields")
661                } else {
662                    rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("this union has no fields"))msg!("this union has no fields")
663                },
664                help: if def.is_struct() {
665                    Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider adding a member to this struct"))msg!("consider adding a member to this struct"))
666                } else {
667                    Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider adding a member to this union"))msg!("consider adding a member to this union"))
668                },
669            }
670        } else {
671            self.visit_variant_fields(state, ty, def, def.non_enum_variant(), args)
672        }
673    }
674
675    fn visit_enum(
676        &mut self,
677        state: VisitorState,
678        ty: Ty<'tcx>,
679        def: AdtDef<'tcx>,
680        args: GenericArgsRef<'tcx>,
681    ) -> FfiResult<'tcx> {
682        if true {
    if !#[allow(non_exhaustive_omitted_patterns)] match def.adt_kind() {
                AdtKind::Enum => true,
                _ => false,
            } {
        ::core::panicking::panic("assertion failed: matches!(def.adt_kind(), AdtKind::Enum)")
    };
};debug_assert!(matches!(def.adt_kind(), AdtKind::Enum));
683        use FfiResult::*;
684
685        if def.variants().is_empty() {
686            // Empty enums are okay... although sort of useless.
687            return FfiSafe;
688        }
689        // Check for a repr() attribute to specify the size of the
690        // discriminant.
691        if !def.repr().c() && !def.repr().transparent() && def.repr().int.is_none() {
692            // Special-case types like `Option<extern fn()>` and `Result<extern fn(), ()>`
693            if let Some(inner_ty) = repr_nullable_ptr(self.cx.tcx, self.cx.typing_env(), ty) {
694                return self.visit_type(state.next(ty), inner_ty);
695            }
696
697            return FfiUnsafe {
698                ty,
699                reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("enum has no representation hint"))msg!("enum has no representation hint"),
700                help: Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider adding a `#[repr(C)]`, `#[repr(transparent)]`, or integer `#[repr(...)]` attribute to this enum"))msg!(
701                    "consider adding a `#[repr(C)]`, `#[repr(transparent)]`, or integer `#[repr(...)]` attribute to this enum"
702                )),
703            };
704        }
705
706        let non_exhaustive = def.variant_list_has_applicable_non_exhaustive();
707        // Check the contained variants.
708        let ret = def.variants().iter().try_for_each(|variant| {
709            check_non_exhaustive_variant(non_exhaustive, variant)
710                .map_break(|reason| FfiUnsafe { ty, reason, help: None })?;
711
712            match self.visit_variant_fields(state, ty, def, variant, args) {
713                FfiSafe => ControlFlow::Continue(()),
714                r => ControlFlow::Break(r),
715            }
716        });
717        if let ControlFlow::Break(result) = ret {
718            return result;
719        }
720
721        FfiSafe
722    }
723
724    /// Checks if the given type is "ffi-safe" (has a stable, well-defined
725    /// representation which can be exported to C code).
726    fn visit_type(&mut self, state: VisitorState, ty: Ty<'tcx>) -> FfiResult<'tcx> {
727        use FfiResult::*;
728
729        let tcx = self.cx.tcx;
730
731        // Protect against infinite recursion, for example
732        // `struct S(*mut S);`.
733        // FIXME: A recursion limit is necessary as well, for irregular
734        // recursive types.
735        if !self.cache.insert(ty) {
736            return FfiSafe;
737        }
738
739        match *ty.kind() {
740            ty::Adt(def, args) => {
741                if let Some(inner_ty) = ty.boxed_ty() {
742                    return self.visit_indirection(state, ty, inner_ty, IndirectionKind::Box);
743                }
744                if def.is_phantom_data() {
745                    return FfiPhantom(ty);
746                }
747                match def.adt_kind() {
748                    AdtKind::Struct | AdtKind::Union => {
749                        if let Some(sym::cstring_type | sym::cstr_type) =
750                            tcx.get_diagnostic_name(def.did())
751                            && !self.base_ty.is_mutable_ptr()
752                        {
753                            return FfiUnsafe {
754                                ty,
755                                reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("`CStr`/`CString` do not have a guaranteed layout"))msg!("`CStr`/`CString` do not have a guaranteed layout"),
756                                help: Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider passing a `*const std::ffi::c_char` instead, and use `CStr::as_ptr()`"))msg!(
757                                    "consider passing a `*const std::ffi::c_char` instead, and use `CStr::as_ptr()`"
758                                )),
759                            };
760                        }
761                        self.visit_struct_or_union(state, ty, def, args)
762                    }
763                    AdtKind::Enum => self.visit_enum(state, ty, def, args),
764                }
765            }
766
767            // Pattern types are just extra invariants on the type that you need to uphold,
768            // but only the base type is relevant for being representable in FFI.
769            // (note: this lint was written when pattern types could only be integers constrained to ranges)
770            // (also note: the lack of ".next(ty)" on the state is on purpose)
771            ty::Pat(pat_ty, _) => self.visit_type(state, pat_ty),
772
773            // types which likely have a stable representation, if the target architecture defines those
774            // note: before rust 1.77, 128-bit ints were not FFI-safe on x86_64
775            ty::Int(..) | ty::Uint(..) | ty::Float(..) => FfiResult::FfiSafe,
776
777            ty::Bool => FfiResult::FfiSafe,
778
779            ty::Char => FfiResult::FfiUnsafe {
780                ty,
781                reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("the `char` type has no C equivalent"))msg!("the `char` type has no C equivalent"),
782                help: Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider using `u32` or `libc::wchar_t` instead"))msg!("consider using `u32` or `libc::wchar_t` instead")),
783            },
784
785            ty::Slice(_) => FfiUnsafe {
786                ty,
787                reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("slices have no C equivalent"))msg!("slices have no C equivalent"),
788                help: Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider using a raw pointer instead"))msg!("consider using a raw pointer instead")),
789            },
790
791            ty::Dynamic(..) => {
792                FfiUnsafe { ty, reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("trait objects have no C equivalent"))msg!("trait objects have no C equivalent"), help: None }
793            }
794
795            ty::Str => FfiUnsafe {
796                ty,
797                reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("string slices have no C equivalent"))msg!("string slices have no C equivalent"),
798                help: Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider using `*const u8` and a length instead"))msg!("consider using `*const u8` and a length instead")),
799            },
800
801            ty::Tuple(tuple) => {
802                if tuple.is_empty()
803                    && state.is_in_function_return()
804                    && #[allow(non_exhaustive_omitted_patterns)] match state.outer_ty_kind {
    OuterTyKind::None | OuterTyKind::NoneThroughFnPtr => true,
    _ => false,
}matches!(
805                        state.outer_ty_kind,
806                        OuterTyKind::None | OuterTyKind::NoneThroughFnPtr
807                    )
808                {
809                    // C functions can return void
810                    FfiSafe
811                } else {
812                    FfiUnsafe {
813                        ty,
814                        reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("tuples have unspecified layout"))msg!("tuples have unspecified layout"),
815                        help: Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider using a struct instead"))msg!("consider using a struct instead")),
816                    }
817                }
818            }
819
820            ty::RawPtr(ty, _)
821                if match ty.kind() {
822                    ty::Tuple(tuple) => tuple.is_empty(),
823                    _ => false,
824                } =>
825            {
826                FfiSafe
827            }
828
829            ty::RawPtr(inner_ty, _) => {
830                return self.visit_indirection(state, ty, inner_ty, IndirectionKind::RawPtr);
831            }
832            ty::Ref(_, inner_ty, _) => {
833                return self.visit_indirection(state, ty, inner_ty, IndirectionKind::Ref);
834            }
835
836            ty::Array(inner_ty, _) => {
837                if state.is_in_function()
838                    // FIXME(ctypes): VVV-this-VVV shouldn't make a difference between ::None and ::NoneThroughFnPtr
839                    && #[allow(non_exhaustive_omitted_patterns)] match state.outer_ty_kind {
    OuterTyKind::None => true,
    _ => false,
}matches!(state.outer_ty_kind, OuterTyKind::None)
840                {
841                    // C doesn't really support passing arrays by value - the only way to pass an array by value
842                    // is through a struct.
843                    FfiResult::FfiUnsafe {
844                        ty,
845                        reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("passing raw arrays by value is not FFI-safe"))msg!("passing raw arrays by value is not FFI-safe"),
846                        help: Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider passing a pointer to the array"))msg!("consider passing a pointer to the array")),
847                    }
848                } else {
849                    // let's allow phantoms to go through,
850                    // since an array of 1-ZSTs is also a 1-ZST
851                    self.visit_type(state.next(ty), inner_ty)
852                }
853            }
854
855            ty::FnPtr(sig_tys, hdr) => {
856                let sig = sig_tys.with(hdr);
857                if sig.abi().is_rustic_abi() {
858                    return FfiUnsafe {
859                        ty,
860                        reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("this function pointer has Rust-specific calling convention"))msg!("this function pointer has Rust-specific calling convention"),
861                        help: Some(rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("consider using an `extern fn(...) -> ...` function pointer instead"))msg!(
862                            "consider using an `extern fn(...) -> ...` function pointer instead"
863                        )),
864                    };
865                }
866
867                let sig = tcx.instantiate_bound_regions_with_erased(sig);
868                for arg in sig.inputs() {
869                    match self.visit_type(state.next_in_fnptr(ty, FnPos::Arg), *arg) {
870                        FfiSafe => {}
871                        r => return r,
872                    }
873                }
874
875                let ret_ty = sig.output();
876                self.visit_type(state.next_in_fnptr(ty, FnPos::Ret), ret_ty)
877            }
878
879            ty::Foreign(..) => FfiSafe,
880
881            ty::Never => FfiSafe,
882
883            // While opaque types are checked for earlier, if a projection in a struct field
884            // normalizes to an opaque type, then it will reach this branch.
885            ty::Alias(ty::AliasTy { kind: ty::Opaque { .. }, .. }) => {
886                FfiUnsafe { ty, reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("opaque types have no C equivalent"))msg!("opaque types have no C equivalent"), help: None }
887            }
888
889            // `extern "C" fn` functions can have type parameters, which may or may not be FFI-safe,
890            //  so they are currently ignored for the purposes of this lint.
891            ty::Param(..)
892            | ty::Alias(ty::AliasTy {
893                kind: ty::Projection { .. } | ty::Inherent { .. }, ..
894            }) if state.can_expect_ty_params() => FfiSafe,
895
896            ty::UnsafeBinder(_) => FfiUnsafe {
897                ty,
898                reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("unsafe binders are incompatible with foreign function interfaces"))msg!("unsafe binders are incompatible with foreign function interfaces"),
899                help: None,
900            },
901
902            ty::Param(..)
903            | ty::Alias(ty::AliasTy {
904                kind: ty::Projection { .. } | ty::Inherent { .. } | ty::Free { .. },
905                ..
906            })
907            | ty::Infer(..)
908            | ty::Bound(..)
909            | ty::Error(_)
910            | ty::Closure(..)
911            | ty::CoroutineClosure(..)
912            | ty::Coroutine(..)
913            | ty::CoroutineWitness(..)
914            | ty::Placeholder(..)
915            | ty::FnDef(..) => ::rustc_middle::util::bug::bug_fmt(format_args!("unexpected type in foreign function: {0:?}",
        ty))bug!("unexpected type in foreign function: {:?}", ty),
916        }
917    }
918
919    fn visit_for_opaque_ty(&mut self, ty: Ty<'tcx>) -> PartialFfiResult<'tcx> {
920        struct ProhibitOpaqueTypes;
921        impl<'tcx> ty::TypeVisitor<TyCtxt<'tcx>> for ProhibitOpaqueTypes {
922            type Result = ControlFlow<Ty<'tcx>>;
923
924            fn visit_ty(&mut self, ty: Ty<'tcx>) -> Self::Result {
925                if !ty.has_opaque_types() {
926                    return ControlFlow::Continue(());
927                }
928
929                if let ty::Alias(ty::AliasTy { kind: ty::Opaque { .. }, .. }) = ty.kind() {
930                    ControlFlow::Break(ty)
931                } else {
932                    ty.super_visit_with(self)
933                }
934            }
935        }
936
937        ty.visit_with(&mut ProhibitOpaqueTypes).break_value().map(|ty| FfiResult::FfiUnsafe {
938            ty,
939            reason: rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("opaque types have no C equivalent"))msg!("opaque types have no C equivalent"),
940            help: None,
941        })
942    }
943
944    fn check_type(
945        &mut self,
946        state: VisitorState,
947        ty: Unnormalized<'tcx, Ty<'tcx>>,
948    ) -> FfiResult<'tcx> {
949        let ty = maybe_normalize_erasing_regions(self.cx, ty);
950        if let Some(res) = self.visit_for_opaque_ty(ty) {
951            return res;
952        }
953
954        self.visit_type(state, ty)
955    }
956}
957
958impl<'tcx> ImproperCTypesLint {
959    /// Find any fn-ptr types with external ABIs in `ty`, and FFI-checks them.
960    /// For example, `Option<extern "C" fn()>` FFI-checks `extern "C" fn()`.
961    fn check_type_for_external_abi_fnptr(
962        &mut self,
963        cx: &LateContext<'tcx>,
964        state: VisitorState,
965        hir_ty: &hir::Ty<'tcx>,
966        ty: Ty<'tcx>,
967        fn_mode: CItemKind,
968    ) {
969        struct FnPtrFinder<'tcx> {
970            spans: Vec<Span>,
971            tys: Vec<Ty<'tcx>>,
972        }
973
974        impl<'tcx> hir::intravisit::Visitor<'_> for FnPtrFinder<'tcx> {
975            fn visit_ty(&mut self, ty: &'_ hir::Ty<'_, AmbigArg>) {
976                {
    use ::tracing::__macro_support::Callsite as _;
    static __CALLSITE: ::tracing::callsite::DefaultCallsite =
        {
            static META: ::tracing::Metadata<'static> =
                {
                    ::tracing_core::metadata::Metadata::new("event compiler/rustc_lint/src/types/improper_ctypes.rs:976",
                        "rustc_lint::types::improper_ctypes",
                        ::tracing::Level::DEBUG,
                        ::tracing_core::__macro_support::Option::Some("compiler/rustc_lint/src/types/improper_ctypes.rs"),
                        ::tracing_core::__macro_support::Option::Some(976u32),
                        ::tracing_core::__macro_support::Option::Some("rustc_lint::types::improper_ctypes"),
                        ::tracing_core::field::FieldSet::new(&["ty"],
                            ::tracing_core::callsite::Identifier(&__CALLSITE)),
                        ::tracing::metadata::Kind::EVENT)
                };
            ::tracing::callsite::DefaultCallsite::new(&META)
        };
    let enabled =
        ::tracing::Level::DEBUG <= ::tracing::level_filters::STATIC_MAX_LEVEL
                &&
                ::tracing::Level::DEBUG <=
                    ::tracing::level_filters::LevelFilter::current() &&
            {
                let interest = __CALLSITE.interest();
                !interest.is_never() &&
                    ::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
                        interest)
            };
    if enabled {
        (|value_set: ::tracing::field::ValueSet|
                    {
                        let meta = __CALLSITE.metadata();
                        ::tracing::Event::dispatch(meta, &value_set);
                        ;
                    })({
                #[allow(unused_imports)]
                use ::tracing::field::{debug, display, Value};
                let mut iter = __CALLSITE.metadata().fields().iter();
                __CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
                                    ::tracing::__macro_support::Option::Some(&debug(&ty) as
                                            &dyn Value))])
            });
    } else { ; }
};debug!(?ty);
977                if let hir::TyKind::FnPtr(hir::FnPtrTy { abi, .. }) = ty.kind
978                    && !abi.is_rustic_abi()
979                {
980                    self.spans.push(ty.span);
981                }
982
983                hir::intravisit::walk_ty(self, ty);
984            }
985        }
986
987        impl<'tcx> ty::TypeVisitor<TyCtxt<'tcx>> for FnPtrFinder<'tcx> {
988            type Result = ();
989
990            fn visit_ty(&mut self, ty: Ty<'tcx>) -> Self::Result {
991                if let ty::FnPtr(_, hdr) = ty.kind()
992                    && !hdr.abi().is_rustic_abi()
993                {
994                    self.tys.push(ty);
995                }
996
997                ty.super_visit_with(self)
998            }
999        }
1000
1001        let mut visitor = FnPtrFinder { spans: Vec::new(), tys: Vec::new() };
1002        ty.visit_with(&mut visitor);
1003        visitor.visit_ty_unambig(hir_ty);
1004
1005        let all_types = iter::zip(visitor.tys.drain(..), visitor.spans.drain(..));
1006        for (fn_ptr_ty, span) in all_types {
1007            let fn_ptr_ty = Unnormalized::new_wip(fn_ptr_ty);
1008            let mut visitor = ImproperCTypesVisitor::new(cx, fn_ptr_ty, fn_mode);
1009            // FIXME(ctypes): make a check_for_fnptr
1010            let ffi_res = visitor.check_type(state, fn_ptr_ty);
1011
1012            self.process_ffi_result(cx, span, ffi_res, fn_mode);
1013        }
1014    }
1015
1016    /// Regardless of a function's need to be "ffi-safe", look for fn-ptr argument/return types
1017    /// that need to be checked for ffi-safety.
1018    fn check_fn_for_external_abi_fnptr(
1019        &mut self,
1020        cx: &LateContext<'tcx>,
1021        fn_mode: CItemKind,
1022        def_id: LocalDefId,
1023        decl: &'tcx hir::FnDecl<'_>,
1024    ) {
1025        let sig = cx.tcx.fn_sig(def_id).instantiate_identity().skip_norm_wip();
1026        let sig = cx.tcx.instantiate_bound_regions_with_erased(sig);
1027
1028        for (input_ty, input_hir) in iter::zip(sig.inputs(), decl.inputs) {
1029            let state = VisitorState::fn_entry_point(fn_mode, FnPos::Arg);
1030            self.check_type_for_external_abi_fnptr(cx, state, input_hir, *input_ty, fn_mode);
1031        }
1032
1033        if let hir::FnRetTy::Return(ret_hir) = decl.output {
1034            let state = VisitorState::fn_entry_point(fn_mode, FnPos::Ret);
1035            self.check_type_for_external_abi_fnptr(cx, state, ret_hir, sig.output(), fn_mode);
1036        }
1037    }
1038
1039    /// For a local definition of a #[repr(C)] struct/enum/union, check that it is indeed FFI-safe.
1040    fn check_reprc_adt(
1041        &mut self,
1042        cx: &LateContext<'tcx>,
1043        item: &'tcx hir::Item<'tcx>,
1044        adt_def: AdtDef<'tcx>,
1045    ) {
1046        if true {
    if !(adt_def.repr().c() && !adt_def.repr().packed() &&
                adt_def.repr().align.is_none()) {
        ::core::panicking::panic("assertion failed: adt_def.repr().c() && !adt_def.repr().packed() &&\n    adt_def.repr().align.is_none()")
    };
};debug_assert!(
1047            adt_def.repr().c() && !adt_def.repr().packed() && adt_def.repr().align.is_none()
1048        );
1049
1050        // FIXME(ctypes): this following call is awkward.
1051        // is there a way to perform its logic in MIR space rather than HIR space?
1052        // (so that its logic can be absorbed into visitor.visit_struct_or_union)
1053        check_struct_for_power_alignment(cx, item, adt_def);
1054    }
1055
1056    fn check_foreign_static(&mut self, cx: &LateContext<'tcx>, id: hir::OwnerId, span: Span) {
1057        let ty = cx.tcx.type_of(id).instantiate_identity();
1058        let mut visitor = ImproperCTypesVisitor::new(cx, ty, CItemKind::Declaration);
1059        let ffi_res = visitor.check_type(VisitorState::static_entry_point(), ty);
1060        self.process_ffi_result(cx, span, ffi_res, CItemKind::Declaration);
1061    }
1062
1063    /// Check if a function's argument types and result type are "ffi-safe".
1064    fn check_foreign_fn(
1065        &mut self,
1066        cx: &LateContext<'tcx>,
1067        fn_mode: CItemKind,
1068        def_id: LocalDefId,
1069        decl: &'tcx hir::FnDecl<'_>,
1070    ) {
1071        let sig = cx.tcx.fn_sig(def_id).instantiate_identity().skip_norm_wip();
1072        let sig = cx.tcx.instantiate_bound_regions_with_erased(sig);
1073
1074        for (input_ty, input_hir) in iter::zip(sig.inputs(), decl.inputs) {
1075            let input_ty = Unnormalized::new_wip(*input_ty);
1076            let state = VisitorState::fn_entry_point(fn_mode, FnPos::Arg);
1077            let mut visitor = ImproperCTypesVisitor::new(cx, input_ty, fn_mode);
1078            let ffi_res = visitor.check_type(state, input_ty);
1079            self.process_ffi_result(cx, input_hir.span, ffi_res, fn_mode);
1080        }
1081
1082        if let hir::FnRetTy::Return(ret_hir) = decl.output {
1083            let output_ty = Unnormalized::new_wip(sig.output());
1084            let state = VisitorState::fn_entry_point(fn_mode, FnPos::Ret);
1085            let mut visitor = ImproperCTypesVisitor::new(cx, output_ty, fn_mode);
1086            let ffi_res = visitor.check_type(state, output_ty);
1087            self.process_ffi_result(cx, ret_hir.span, ffi_res, fn_mode);
1088        }
1089    }
1090
1091    fn process_ffi_result(
1092        &self,
1093        cx: &LateContext<'tcx>,
1094        sp: Span,
1095        res: FfiResult<'tcx>,
1096        fn_mode: CItemKind,
1097    ) {
1098        match res {
1099            FfiResult::FfiSafe => {}
1100            FfiResult::FfiPhantom(ty) => {
1101                self.emit_ffi_unsafe_type_lint(
1102                    cx,
1103                    ty,
1104                    sp,
1105                    rustc_errors::DiagMessage::Inline(std::borrow::Cow::Borrowed("composed only of `PhantomData`"))msg!("composed only of `PhantomData`"),
1106                    None,
1107                    fn_mode,
1108                );
1109            }
1110            FfiResult::FfiUnsafe { ty, reason, help } => {
1111                self.emit_ffi_unsafe_type_lint(cx, ty, sp, reason, help, fn_mode);
1112            }
1113        }
1114    }
1115
1116    fn emit_ffi_unsafe_type_lint(
1117        &self,
1118        cx: &LateContext<'tcx>,
1119        ty: Ty<'tcx>,
1120        sp: Span,
1121        note: DiagMessage,
1122        help: Option<DiagMessage>,
1123        fn_mode: CItemKind,
1124    ) {
1125        let lint = match fn_mode {
1126            CItemKind::Declaration => IMPROPER_CTYPES,
1127            CItemKind::Definition => IMPROPER_CTYPES_DEFINITIONS,
1128        };
1129        let desc = match fn_mode {
1130            CItemKind::Declaration => "block",
1131            CItemKind::Definition => "fn",
1132        };
1133        let span_note = if let ty::Adt(def, _) = ty.kind()
1134            && let Some(sp) = cx.tcx.hir_span_if_local(def.did())
1135        {
1136            Some(sp)
1137        } else {
1138            None
1139        };
1140        cx.emit_span_lint(lint, sp, ImproperCTypes { ty, desc, label: sp, help, note, span_note });
1141    }
1142}
1143
1144/// `ImproperCTypesDefinitions` checks items outside of foreign items (e.g. stuff that isn't in
1145/// `extern "C" { }` blocks):
1146///
1147/// - `extern "<abi>" fn` definitions are checked in the same way as the
1148///   `ImproperCtypesDeclarations` visitor checks functions if `<abi>` is external (e.g. "C").
1149/// - All other items which contain types (e.g. other functions, struct definitions, etc) are
1150///   checked for extern fn-ptrs with external ABIs.
1151impl<'tcx> LateLintPass<'tcx> for ImproperCTypesLint {
1152    fn check_foreign_item(&mut self, cx: &LateContext<'tcx>, it: &hir::ForeignItem<'tcx>) {
1153        let abi = cx.tcx.hir_get_foreign_abi(it.hir_id());
1154
1155        match it.kind {
1156            hir::ForeignItemKind::Fn(sig, _, _) => {
1157                // fnptrs are a special case, they always need to be treated as
1158                // "the element rendered unsafe" because their unsafety doesn't affect
1159                // their surroundings, and their type is often declared inline
1160                if !abi.is_rustic_abi() {
1161                    self.check_foreign_fn(cx, CItemKind::Declaration, it.owner_id.def_id, sig.decl);
1162                } else {
1163                    self.check_fn_for_external_abi_fnptr(
1164                        cx,
1165                        CItemKind::Declaration,
1166                        it.owner_id.def_id,
1167                        sig.decl,
1168                    );
1169                }
1170            }
1171            hir::ForeignItemKind::Static(ty, _, _) if !abi.is_rustic_abi() => {
1172                self.check_foreign_static(cx, it.owner_id, ty.span);
1173            }
1174            hir::ForeignItemKind::Static(..) | hir::ForeignItemKind::Type => (),
1175        }
1176    }
1177
1178    fn check_item(&mut self, cx: &LateContext<'tcx>, item: &'tcx hir::Item<'tcx>) {
1179        match item.kind {
1180            hir::ItemKind::Static(_, _, ty, _)
1181            | hir::ItemKind::Const(_, _, ty, _)
1182            | hir::ItemKind::TyAlias(_, _, ty) => {
1183                self.check_type_for_external_abi_fnptr(
1184                    cx,
1185                    VisitorState::static_entry_point(),
1186                    ty,
1187                    cx.tcx.type_of(item.owner_id).instantiate_identity().skip_norm_wip(),
1188                    CItemKind::Definition,
1189                );
1190            }
1191            // See `check_fn` for declarations, `check_foreign_items` for definitions in extern blocks
1192            hir::ItemKind::Fn { .. } => {}
1193            hir::ItemKind::Struct(..) | hir::ItemKind::Union(..) | hir::ItemKind::Enum(..) => {
1194                // looking for extern FnPtr:s is delegated to `check_field_def`.
1195                let adt_def: AdtDef<'tcx> = cx.tcx.adt_def(item.owner_id.to_def_id());
1196
1197                if adt_def.repr().c() && !adt_def.repr().packed() && adt_def.repr().align.is_none()
1198                {
1199                    self.check_reprc_adt(cx, item, adt_def);
1200                }
1201            }
1202
1203            // Doesn't define something that can contain a external type to be checked.
1204            hir::ItemKind::Impl(..)
1205            | hir::ItemKind::TraitAlias(..)
1206            | hir::ItemKind::Trait { .. }
1207            | hir::ItemKind::GlobalAsm { .. }
1208            | hir::ItemKind::ForeignMod { .. }
1209            | hir::ItemKind::Mod(..)
1210            | hir::ItemKind::Macro(..)
1211            | hir::ItemKind::Use(..)
1212            | hir::ItemKind::ExternCrate(..) => {}
1213        }
1214    }
1215
1216    fn check_field_def(&mut self, cx: &LateContext<'tcx>, field: &'tcx hir::FieldDef<'tcx>) {
1217        self.check_type_for_external_abi_fnptr(
1218            cx,
1219            VisitorState::static_entry_point(),
1220            field.ty,
1221            cx.tcx.type_of(field.def_id).instantiate_identity().skip_norm_wip(),
1222            CItemKind::Definition,
1223        );
1224    }
1225
1226    fn check_fn(
1227        &mut self,
1228        cx: &LateContext<'tcx>,
1229        kind: hir::intravisit::FnKind<'tcx>,
1230        decl: &'tcx hir::FnDecl<'_>,
1231        _: &'tcx hir::Body<'_>,
1232        _: Span,
1233        id: LocalDefId,
1234    ) {
1235        use hir::intravisit::FnKind;
1236
1237        let abi = match kind {
1238            FnKind::ItemFn(_, _, header, ..) => header.abi,
1239            FnKind::Method(_, sig, ..) => sig.header.abi,
1240            _ => return,
1241        };
1242
1243        // fnptrs are a special case, they always need to be treated as
1244        // "the element rendered unsafe" because their unsafety doesn't affect
1245        // their surroundings, and their type is often declared inline
1246        if !abi.is_rustic_abi() {
1247            self.check_foreign_fn(cx, CItemKind::Definition, id, decl);
1248        } else {
1249            self.check_fn_for_external_abi_fnptr(cx, CItemKind::Definition, id, decl);
1250        }
1251    }
1252}