1 //! This module implements some validity checks for attributes.
2 //! In particular it verifies that `#[inline]` and `#[repr]` attributes are
3 //! attached to items that actually support them and if there are
4 //! conflicts between multiple such attributes attached to the same
8 self, AttrApplication, DebugVisualizerUnreadable, InvalidAttrAtCrateLevel, ObjectLifetimeErr,
9 OnlyHasEffectOn, ProcMacroDiffArguments, ProcMacroInvalidAbi, ProcMacroMissingArguments,
10 ProcMacroTypeError, ProcMacroUnsafe, TransparentIncompatible, UnrecognizedReprHint,
12 use rustc_ast::{ast, AttrStyle, Attribute, LitKind, MetaItemKind, MetaItemLit, NestedMetaItem};
13 use rustc_data_structures::fx::FxHashMap;
14 use rustc_errors::{fluent, Applicability, IntoDiagnosticArg, MultiSpan};
15 use rustc_expand::base::resolve_path;
16 use rustc_feature::{AttributeDuplicates, AttributeType, BuiltinAttribute, BUILTIN_ATTRIBUTE_MAP};
18 use rustc_hir::def_id::LocalDefId;
19 use rustc_hir::intravisit::{self, Visitor};
21 self, FnSig, ForeignItem, HirId, Item, ItemKind, TraitItem, CRATE_HIR_ID, CRATE_OWNER_ID,
23 use rustc_hir::{MethodKind, Target, Unsafety};
24 use rustc_middle::hir::nested_filter;
25 use rustc_middle::middle::resolve_lifetime::ObjectLifetimeDefault;
26 use rustc_middle::ty::fast_reject::{DeepRejectCtxt, TreatParams};
27 use rustc_middle::ty::query::Providers;
28 use rustc_middle::ty::{ParamEnv, TyCtxt};
29 use rustc_session::lint::builtin::{
30 CONFLICTING_REPR_HINTS, INVALID_DOC_ATTRIBUTES, UNUSED_ATTRIBUTES,
32 use rustc_session::parse::feature_err;
33 use rustc_span::symbol::{kw, sym, Symbol};
34 use rustc_span::{Span, DUMMY_SP};
35 use rustc_target::spec::abi::Abi;
37 use std::collections::hash_map::Entry;
39 pub(crate) fn target_from_impl_item<'tcx>(
41 impl_item: &hir::ImplItem<'_>,
43 match impl_item.kind {
44 hir::ImplItemKind::Const(..) => Target::AssocConst,
45 hir::ImplItemKind::Fn(..) => {
46 let parent_def_id = tcx.hir().get_parent_item(impl_item.hir_id()).def_id;
47 let containing_item = tcx.hir().expect_item(parent_def_id);
48 let containing_impl_is_for_trait = match &containing_item.kind {
49 hir::ItemKind::Impl(impl_) => impl_.of_trait.is_some(),
50 _ => bug!("parent of an ImplItem must be an Impl"),
52 if containing_impl_is_for_trait {
53 Target::Method(MethodKind::Trait { body: true })
55 Target::Method(MethodKind::Inherent)
58 hir::ImplItemKind::Type(..) => Target::AssocTy,
62 #[derive(Clone, Copy)]
64 Item(&'tcx Item<'tcx>),
68 #[derive(Copy, Clone)]
69 pub(crate) enum ProcMacroKind {
75 impl IntoDiagnosticArg for ProcMacroKind {
76 fn into_diagnostic_arg(self) -> rustc_errors::DiagnosticArgValue<'static> {
78 ProcMacroKind::Attribute => "attribute proc macro",
79 ProcMacroKind::Derive => "derive proc macro",
80 ProcMacroKind::FunctionLike => "function-like proc macro",
82 .into_diagnostic_arg()
86 struct CheckAttrVisitor<'tcx> {
89 // Whether or not this visitor should abort after finding errors
93 impl CheckAttrVisitor<'_> {
94 /// Checks any attribute.
100 item: Option<ItemLike<'_>>,
102 let mut doc_aliases = FxHashMap::default();
103 let mut is_valid = true;
104 let mut specified_inline = None;
105 let mut seen = FxHashMap::default();
106 let attrs = self.tcx.hir().attrs(hir_id);
108 let attr_is_valid = match attr.name_or_empty() {
109 sym::do_not_recommend => self.check_do_not_recommend(attr.span, target),
110 sym::inline => self.check_inline(hir_id, attr, span, target),
111 sym::no_coverage => self.check_no_coverage(hir_id, attr, span, target),
112 sym::non_exhaustive => self.check_non_exhaustive(hir_id, attr, span, target),
113 sym::marker => self.check_marker(hir_id, attr, span, target),
114 sym::rustc_must_implement_one_of => {
115 self.check_rustc_must_implement_one_of(attr, span, target)
117 sym::target_feature => self.check_target_feature(hir_id, attr, span, target),
118 sym::thread_local => self.check_thread_local(attr, span, target),
119 sym::track_caller => {
120 self.check_track_caller(hir_id, attr.span, attrs, span, target)
122 sym::doc => self.check_doc_attrs(
126 &mut specified_inline,
129 sym::no_link => self.check_no_link(hir_id, &attr, span, target),
130 sym::export_name => self.check_export_name(hir_id, &attr, span, target),
131 sym::rustc_layout_scalar_valid_range_start
132 | sym::rustc_layout_scalar_valid_range_end => {
133 self.check_rustc_layout_scalar_valid_range(&attr, span, target)
135 sym::allow_internal_unstable => {
136 self.check_allow_internal_unstable(hir_id, &attr, span, target, &attrs)
138 sym::debugger_visualizer => self.check_debugger_visualizer(&attr, target),
139 sym::rustc_allow_const_fn_unstable => {
140 self.check_rustc_allow_const_fn_unstable(hir_id, &attr, span, target)
142 sym::rustc_std_internal_symbol => {
143 self.check_rustc_std_internal_symbol(&attr, span, target)
145 sym::naked => self.check_naked(hir_id, attr, span, target),
146 sym::rustc_legacy_const_generics => {
147 self.check_rustc_legacy_const_generics(hir_id, &attr, span, target, item)
149 sym::rustc_lint_query_instability => {
150 self.check_rustc_lint_query_instability(hir_id, &attr, span, target)
152 sym::rustc_lint_diagnostics => {
153 self.check_rustc_lint_diagnostics(hir_id, &attr, span, target)
155 sym::rustc_lint_opt_ty => self.check_rustc_lint_opt_ty(&attr, span, target),
156 sym::rustc_lint_opt_deny_field_access => {
157 self.check_rustc_lint_opt_deny_field_access(&attr, span, target)
161 | sym::rustc_if_this_changed
162 | sym::rustc_then_this_would_need => self.check_rustc_dirty_clean(&attr),
163 sym::cmse_nonsecure_entry => {
164 self.check_cmse_nonsecure_entry(hir_id, attr, span, target)
166 sym::collapse_debuginfo => self.check_collapse_debuginfo(attr, span, target),
167 sym::const_trait => self.check_const_trait(attr, span, target),
168 sym::must_not_suspend => self.check_must_not_suspend(&attr, span, target),
169 sym::must_use => self.check_must_use(hir_id, &attr, target),
170 sym::rustc_pass_by_value => self.check_pass_by_value(&attr, span, target),
171 sym::rustc_allow_incoherent_impl => {
172 self.check_allow_incoherent_impl(&attr, span, target)
174 sym::rustc_has_incoherent_inherent_impls => {
175 self.check_has_incoherent_inherent_impls(&attr, span, target)
177 sym::rustc_const_unstable
178 | sym::rustc_const_stable
181 | sym::rustc_allowed_through_unstable_modules
182 | sym::rustc_promotable => self.check_stability_promotable(&attr, span, target),
183 sym::link_ordinal => self.check_link_ordinal(&attr, span, target),
186 is_valid &= attr_is_valid;
189 match attr.name_or_empty() {
190 sym::cold => self.check_cold(hir_id, attr, span, target),
191 sym::link => self.check_link(hir_id, attr, span, target),
192 sym::link_name => self.check_link_name(hir_id, attr, span, target),
193 sym::link_section => self.check_link_section(hir_id, attr, span, target),
194 sym::no_mangle => self.check_no_mangle(hir_id, attr, span, target),
195 sym::deprecated => self.check_deprecated(hir_id, attr, span, target),
196 sym::macro_use | sym::macro_escape => self.check_macro_use(hir_id, attr, target),
197 sym::path => self.check_generic_attr(hir_id, attr, target, Target::Mod),
198 sym::plugin_registrar => self.check_plugin_registrar(hir_id, attr, target),
199 sym::macro_export => self.check_macro_export(hir_id, attr, target),
200 sym::ignore | sym::should_panic => {
201 self.check_generic_attr(hir_id, attr, target, Target::Fn)
203 sym::automatically_derived => {
204 self.check_generic_attr(hir_id, attr, target, Target::Impl)
206 sym::no_implicit_prelude => {
207 self.check_generic_attr(hir_id, attr, target, Target::Mod)
209 sym::rustc_object_lifetime_default => self.check_object_lifetime_default(hir_id),
211 self.check_proc_macro(hir_id, target, ProcMacroKind::FunctionLike)
213 sym::proc_macro_attribute => {
214 self.check_proc_macro(hir_id, target, ProcMacroKind::Attribute);
216 sym::proc_macro_derive => {
217 self.check_generic_attr(hir_id, attr, target, Target::Fn);
218 self.check_proc_macro(hir_id, target, ProcMacroKind::Derive)
223 let builtin = attr.ident().and_then(|ident| BUILTIN_ATTRIBUTE_MAP.get(&ident.name));
225 if hir_id != CRATE_HIR_ID {
226 if let Some(BuiltinAttribute { type_: AttributeType::CrateLevel, .. }) =
227 attr.ident().and_then(|ident| BUILTIN_ATTRIBUTE_MAP.get(&ident.name))
230 ast::AttrStyle::Outer => self.tcx.emit_spanned_lint(
234 errors::OuterCrateLevelAttr,
236 ast::AttrStyle::Inner => self.tcx.emit_spanned_lint(
240 errors::InnerCrateLevelAttr,
246 if let Some(BuiltinAttribute { duplicates, .. }) = builtin {
247 check_duplicates(self.tcx, attr, hir_id, *duplicates, &mut seen);
250 self.check_unused_attribute(hir_id, attr)
257 self.check_repr(attrs, span, target, item, hir_id);
258 self.check_used(attrs, target);
261 fn inline_attr_str_error_with_macro_def(&self, hir_id: HirId, attr: &Attribute, sym: &str) {
262 self.tcx.emit_spanned_lint(
266 errors::IgnoredAttrWithMacro { sym },
270 fn inline_attr_str_error_without_macro_def(&self, hir_id: HirId, attr: &Attribute, sym: &str) {
271 self.tcx.emit_spanned_lint(
275 errors::IgnoredAttr { sym },
279 /// Checks if `#[do_not_recommend]` is applied on a trait impl.
280 fn check_do_not_recommend(&self, attr_span: Span, target: Target) -> bool {
281 if let Target::Impl = target {
284 self.tcx.sess.emit_err(errors::IncorrectDoNotRecommendLocation { span: attr_span });
289 /// Checks if an `#[inline]` is applied to a function or a closure. Returns `true` if valid.
290 fn check_inline(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) -> bool {
294 | Target::Method(MethodKind::Trait { body: true } | MethodKind::Inherent) => true,
295 Target::Method(MethodKind::Trait { body: false }) | Target::ForeignFn => {
296 self.tcx.emit_spanned_lint(
300 errors::IgnoredInlineAttrFnProto,
304 // FIXME(#65833): We permit associated consts to have an `#[inline]` attribute with
305 // just a lint, because we previously erroneously allowed it and some crates used it
306 // accidentally, to be compatible with crates depending on them, we can't throw an
308 Target::AssocConst => {
309 self.tcx.emit_spanned_lint(
313 errors::IgnoredInlineAttrConstants,
317 // FIXME(#80564): Same for fields, arms, and macro defs
318 Target::Field | Target::Arm | Target::MacroDef => {
319 self.inline_attr_str_error_with_macro_def(hir_id, attr, "inline");
323 self.tcx.sess.emit_err(errors::InlineNotFnOrClosure {
324 attr_span: attr.span,
332 /// Checks if a `#[no_coverage]` is applied directly to a function
333 fn check_no_coverage(
341 // no_coverage on function is fine
344 | Target::Method(MethodKind::Trait { body: true } | MethodKind::Inherent) => true,
346 // function prototypes can't be covered
347 Target::Method(MethodKind::Trait { body: false }) | Target::ForeignFn => {
348 self.tcx.emit_spanned_lint(
352 errors::IgnoredNoCoverageFnProto,
357 Target::Mod | Target::ForeignMod | Target::Impl | Target::Trait => {
358 self.tcx.emit_spanned_lint(
362 errors::IgnoredNoCoveragePropagate,
367 Target::Expression | Target::Statement | Target::Arm => {
368 self.tcx.emit_spanned_lint(
372 errors::IgnoredNoCoverageFnDefn,
378 self.tcx.sess.emit_err(errors::IgnoredNoCoverageNotCoverable {
379 attr_span: attr.span,
387 fn check_generic_attr(
392 allowed_target: Target,
394 if target != allowed_target {
395 self.tcx.emit_spanned_lint(
400 attr_name: attr.name_or_empty(),
401 target_name: allowed_target.name().replace(' ', "_"),
407 /// Checks if `#[naked]` is applied to a function definition.
408 fn check_naked(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) -> bool {
411 | Target::Method(MethodKind::Trait { body: true } | MethodKind::Inherent) => true,
412 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
413 // `#[allow_internal_unstable]` attribute with just a lint, because we previously
414 // erroneously allowed it and some crates used it accidentally, to be compatible
415 // with crates depending on them, we can't throw an error here.
416 Target::Field | Target::Arm | Target::MacroDef => {
417 self.inline_attr_str_error_with_macro_def(hir_id, attr, "naked");
421 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToFn {
422 attr_span: attr.span,
424 on_crate: hir_id == CRATE_HIR_ID,
431 /// Checks if `#[cmse_nonsecure_entry]` is applied to a function definition.
432 fn check_cmse_nonsecure_entry(
441 | Target::Method(MethodKind::Trait { body: true } | MethodKind::Inherent) => true,
443 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToFn {
444 attr_span: attr.span,
446 on_crate: hir_id == CRATE_HIR_ID,
453 /// Debugging aid for `object_lifetime_default` query.
454 fn check_object_lifetime_default(&self, hir_id: HirId) {
456 if let Some(owner_id) = hir_id.as_owner()
457 && let Some(generics) = tcx.hir().get_generics(owner_id.def_id)
459 for p in generics.params {
460 let hir::GenericParamKind::Type { .. } = p.kind else { continue };
461 let default = tcx.object_lifetime_default(p.def_id);
462 let repr = match default {
463 ObjectLifetimeDefault::Empty => "BaseDefault".to_owned(),
464 ObjectLifetimeDefault::Static => "'static".to_owned(),
465 ObjectLifetimeDefault::Param(def_id) => tcx.item_name(def_id).to_string(),
466 ObjectLifetimeDefault::Ambiguous => "Ambiguous".to_owned(),
468 tcx.sess.emit_err(ObjectLifetimeErr { span: p.span, repr });
473 /// Checks if `#[collapse_debuginfo]` is applied to a macro.
474 fn check_collapse_debuginfo(&self, attr: &Attribute, span: Span, target: Target) -> bool {
476 Target::MacroDef => true,
480 .emit_err(errors::CollapseDebuginfo { attr_span: attr.span, defn_span: span });
486 /// Checks if a `#[track_caller]` is applied to a non-naked function. Returns `true` if valid.
487 fn check_track_caller(
496 _ if attrs.iter().any(|attr| attr.has_name(sym::naked)) => {
497 self.tcx.sess.emit_err(errors::NakedTrackedCaller { attr_span });
500 Target::Fn | Target::Method(..) | Target::ForeignFn | Target::Closure => true,
501 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
502 // `#[track_caller]` attribute with just a lint, because we previously
503 // erroneously allowed it and some crates used it accidentally, to be compatible
504 // with crates depending on them, we can't throw an error here.
505 Target::Field | Target::Arm | Target::MacroDef => {
507 self.inline_attr_str_error_with_macro_def(hir_id, attr, "track_caller");
512 self.tcx.sess.emit_err(errors::TrackedCallerWrongLocation {
515 on_crate: hir_id == CRATE_HIR_ID,
522 /// Checks if the `#[non_exhaustive]` attribute on an `item` is valid. Returns `true` if valid.
523 fn check_non_exhaustive(
531 Target::Struct | Target::Enum | Target::Variant => true,
532 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
533 // `#[non_exhaustive]` attribute with just a lint, because we previously
534 // erroneously allowed it and some crates used it accidentally, to be compatible
535 // with crates depending on them, we can't throw an error here.
536 Target::Field | Target::Arm | Target::MacroDef => {
537 self.inline_attr_str_error_with_macro_def(hir_id, attr, "non_exhaustive");
541 self.tcx.sess.emit_err(errors::NonExhaustiveWrongLocation {
542 attr_span: attr.span,
550 /// Checks if the `#[marker]` attribute on an `item` is valid. Returns `true` if valid.
551 fn check_marker(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) -> bool {
553 Target::Trait => true,
554 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
555 // `#[marker]` attribute with just a lint, because we previously
556 // erroneously allowed it and some crates used it accidentally, to be compatible
557 // with crates depending on them, we can't throw an error here.
558 Target::Field | Target::Arm | Target::MacroDef => {
559 self.inline_attr_str_error_with_macro_def(hir_id, attr, "marker");
563 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToTrait {
564 attr_span: attr.span,
572 /// Checks if the `#[rustc_must_implement_one_of]` attribute on a `target` is valid. Returns `true` if valid.
573 fn check_rustc_must_implement_one_of(
580 Target::Trait => true,
582 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToTrait {
583 attr_span: attr.span,
591 /// Checks if the `#[target_feature]` attribute on `item` is valid. Returns `true` if valid.
592 fn check_target_feature(
601 | Target::Method(MethodKind::Trait { body: true } | MethodKind::Inherent) => true,
602 // FIXME: #[target_feature] was previously erroneously allowed on statements and some
603 // crates used this, so only emit a warning.
604 Target::Statement => {
605 self.tcx.emit_spanned_lint(
609 errors::TargetFeatureOnStatement,
613 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
614 // `#[target_feature]` attribute with just a lint, because we previously
615 // erroneously allowed it and some crates used it accidentally, to be compatible
616 // with crates depending on them, we can't throw an error here.
617 Target::Field | Target::Arm | Target::MacroDef => {
618 self.inline_attr_str_error_with_macro_def(hir_id, attr, "target_feature");
622 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToFn {
623 attr_span: attr.span,
625 on_crate: hir_id == CRATE_HIR_ID,
632 /// Checks if the `#[thread_local]` attribute on `item` is valid. Returns `true` if valid.
633 fn check_thread_local(&self, attr: &Attribute, span: Span, target: Target) -> bool {
635 Target::ForeignStatic | Target::Static => true,
637 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToStatic {
638 attr_span: attr.span,
646 fn doc_attr_str_error(&self, meta: &NestedMetaItem, attr_name: &str) {
647 self.tcx.sess.emit_err(errors::DocExpectStr { attr_span: meta.span(), attr_name });
650 fn check_doc_alias_value(
652 meta: &NestedMetaItem,
657 aliases: &mut FxHashMap<String, Span>,
660 let span = meta.name_value_literal_span().unwrap_or_else(|| meta.span());
662 &format!("`#[doc(alias{})]`", if is_list { "(\"...\")" } else { " = \"...\"" });
663 if doc_alias == kw::Empty {
664 tcx.sess.emit_err(errors::DocAliasEmpty { span, attr_str });
668 let doc_alias_str = doc_alias.as_str();
669 if let Some(c) = doc_alias_str
671 .find(|&c| c == '"' || c == '\'' || (c.is_whitespace() && c != ' '))
673 tcx.sess.emit_err(errors::DocAliasBadChar { span, attr_str, char_: c });
676 if doc_alias_str.starts_with(' ') || doc_alias_str.ends_with(' ') {
677 tcx.sess.emit_err(errors::DocAliasStartEnd { span, attr_str });
681 let span = meta.span();
682 if let Some(location) = match target {
684 let parent_def_id = self.tcx.hir().get_parent_item(hir_id).def_id;
685 let containing_item = self.tcx.hir().expect_item(parent_def_id);
686 if Target::from_item(containing_item) == Target::Impl {
687 Some("type alias in implementation block")
692 Target::AssocConst => {
693 let parent_def_id = self.tcx.hir().get_parent_item(hir_id).def_id;
694 let containing_item = self.tcx.hir().expect_item(parent_def_id);
695 // We can't link to trait impl's consts.
696 let err = "associated constant in trait implementation block";
697 match containing_item.kind {
698 ItemKind::Impl(hir::Impl { of_trait: Some(_), .. }) => Some(err),
702 // we check the validity of params elsewhere
703 Target::Param => return false,
709 | Target::Impl => Some(target.name()),
719 | Target::ImplTraitPlaceholder
729 | Target::ForeignStatic
731 | Target::GenericParam(..)
734 | Target::ExprField => None,
736 tcx.sess.emit_err(errors::DocAliasBadLocation { span, attr_str, location });
739 let item_name = self.tcx.hir().name(hir_id);
740 if item_name == doc_alias {
741 tcx.sess.emit_err(errors::DocAliasNotAnAlias { span, attr_str });
744 if let Err(entry) = aliases.try_insert(doc_alias_str.to_owned(), span) {
745 self.tcx.emit_spanned_lint(
749 errors::DocAliasDuplicated { first_defn: *entry.entry.get() },
757 meta: &NestedMetaItem,
760 aliases: &mut FxHashMap<String, Span>,
762 if let Some(values) = meta.meta_item_list() {
766 Some(l) => match l.kind {
767 LitKind::Str(s, _) => {
768 if !self.check_doc_alias_value(v, s, hir_id, target, true, aliases) {
775 .emit_err(errors::DocAliasNotStringLiteral { span: v.span() });
780 self.tcx.sess.emit_err(errors::DocAliasNotStringLiteral { span: v.span() });
786 } else if let Some(doc_alias) = meta.value_str() {
787 self.check_doc_alias_value(meta, doc_alias, hir_id, target, false, aliases)
789 self.tcx.sess.emit_err(errors::DocAliasMalformed { span: meta.span() });
794 fn check_doc_keyword(&self, meta: &NestedMetaItem, hir_id: HirId) -> bool {
795 let doc_keyword = meta.value_str().unwrap_or(kw::Empty);
796 if doc_keyword == kw::Empty {
797 self.doc_attr_str_error(meta, "keyword");
800 match self.tcx.hir().find(hir_id).and_then(|node| match node {
801 hir::Node::Item(item) => Some(&item.kind),
804 Some(ItemKind::Mod(ref module)) => {
805 if !module.item_ids.is_empty() {
806 self.tcx.sess.emit_err(errors::DocKeywordEmptyMod { span: meta.span() });
811 self.tcx.sess.emit_err(errors::DocKeywordNotMod { span: meta.span() });
815 if !rustc_lexer::is_ident(doc_keyword.as_str()) {
816 self.tcx.sess.emit_err(errors::DocKeywordInvalidIdent {
817 span: meta.name_value_literal_span().unwrap_or_else(|| meta.span()),
825 fn check_doc_fake_variadic(&self, meta: &NestedMetaItem, hir_id: HirId) -> bool {
826 match self.tcx.hir().find(hir_id).and_then(|node| match node {
827 hir::Node::Item(item) => Some(&item.kind),
830 Some(ItemKind::Impl(ref i)) => {
831 let is_valid = matches!(&i.self_ty.kind, hir::TyKind::Tup([_]))
832 || if let hir::TyKind::BareFn(bare_fn_ty) = &i.self_ty.kind {
833 bare_fn_ty.decl.inputs.len() == 1
838 self.tcx.sess.emit_err(errors::DocFakeVariadicNotValid { span: meta.span() });
843 self.tcx.sess.emit_err(errors::DocKeywordOnlyImpl { span: meta.span() });
850 /// Checks `#[doc(inline)]`/`#[doc(no_inline)]` attributes. Returns `true` if valid.
852 /// A doc inlining attribute is invalid if it is applied to a non-`use` item, or
853 /// if there are conflicting attributes for one item.
855 /// `specified_inline` is used to keep track of whether we have
856 /// already seen an inlining attribute for this item.
857 /// If so, `specified_inline` holds the value and the span of
858 /// the first `inline`/`no_inline` attribute.
862 meta: &NestedMetaItem,
865 specified_inline: &mut Option<(bool, Span)>,
868 Target::Use | Target::ExternCrate => {
869 let do_inline = meta.name_or_empty() == sym::inline;
870 if let Some((prev_inline, prev_span)) = *specified_inline {
871 if do_inline != prev_inline {
872 let mut spans = MultiSpan::from_spans(vec![prev_span, meta.span()]);
873 spans.push_span_label(prev_span, fluent::passes_doc_inline_conflict_first);
874 spans.push_span_label(
876 fluent::passes_doc_inline_conflict_second,
878 self.tcx.sess.emit_err(errors::DocKeywordConflict { spans });
883 *specified_inline = Some((do_inline, meta.span()));
888 self.tcx.emit_spanned_lint(
889 INVALID_DOC_ATTRIBUTES,
892 errors::DocInlineOnlyUse {
893 attr_span: meta.span(),
894 item_span: (attr.style == AttrStyle::Outer)
895 .then(|| self.tcx.hir().span(hir_id)),
903 /// Checks that an attribute is *not* used at the crate level. Returns `true` if valid.
904 fn check_attr_not_crate_level(
906 meta: &NestedMetaItem,
910 if CRATE_HIR_ID == hir_id {
911 self.tcx.sess.emit_err(errors::DocAttrNotCrateLevel { span: meta.span(), attr_name });
917 /// Checks that an attribute is used at the crate level. Returns `true` if valid.
918 fn check_attr_crate_level(
921 meta: &NestedMetaItem,
924 if hir_id != CRATE_HIR_ID {
925 self.tcx.struct_span_lint_hir(
926 INVALID_DOC_ATTRIBUTES,
929 fluent::passes_attr_crate_level,
931 if attr.style == AttrStyle::Outer
932 && self.tcx.hir().get_parent_item(hir_id) == CRATE_OWNER_ID
934 if let Ok(mut src) = self.tcx.sess.source_map().span_to_snippet(attr.span) {
936 err.span_suggestion_verbose(
940 Applicability::MaybeIncorrect,
943 err.span_help(attr.span, fluent::help);
946 err.note(fluent::note);
955 /// Checks that `doc(test(...))` attribute contains only valid attributes. Returns `true` if
957 fn check_test_attr(&self, meta: &NestedMetaItem, hir_id: HirId) -> bool {
958 let mut is_valid = true;
959 if let Some(metas) = meta.meta_item_list() {
960 for i_meta in metas {
961 match i_meta.name_or_empty() {
962 sym::attr | sym::no_crate_inject => {}
964 self.tcx.emit_spanned_lint(
965 INVALID_DOC_ATTRIBUTES,
968 errors::DocTestUnknown {
969 path: rustc_ast_pretty::pprust::path_to_string(
970 &i_meta.meta_item().unwrap().path,
979 self.tcx.emit_spanned_lint(
980 INVALID_DOC_ATTRIBUTES,
983 errors::DocTestTakesList,
990 /// Check that the `#![doc(cfg_hide(...))]` attribute only contains a list of attributes.
991 /// Returns `true` if valid.
992 fn check_doc_cfg_hide(&self, meta: &NestedMetaItem, hir_id: HirId) -> bool {
993 if meta.meta_item_list().is_some() {
996 self.tcx.emit_spanned_lint(
997 INVALID_DOC_ATTRIBUTES,
1000 errors::DocCfgHideTakesList,
1006 /// Runs various checks on `#[doc]` attributes. Returns `true` if valid.
1008 /// `specified_inline` should be initialized to `None` and kept for the scope
1009 /// of one item. Read the documentation of [`check_doc_inline`] for more information.
1011 /// [`check_doc_inline`]: Self::check_doc_inline
1017 specified_inline: &mut Option<(bool, Span)>,
1018 aliases: &mut FxHashMap<String, Span>,
1020 let mut is_valid = true;
1022 if let Some(mi) = attr.meta() && let Some(list) = mi.meta_item_list() {
1024 if let Some(i_meta) = meta.meta_item() {
1025 match i_meta.name_or_empty() {
1027 if !self.check_attr_not_crate_level(meta, hir_id, "alias")
1028 || !self.check_doc_alias(meta, hir_id, target, aliases) =>
1034 if !self.check_attr_not_crate_level(meta, hir_id, "keyword")
1035 || !self.check_doc_keyword(meta, hir_id) =>
1041 if !self.check_attr_not_crate_level(meta, hir_id, "fake_variadic")
1042 || !self.check_doc_fake_variadic(meta, hir_id) =>
1047 sym::html_favicon_url
1048 | sym::html_logo_url
1049 | sym::html_playground_url
1050 | sym::issue_tracker_base_url
1051 | sym::html_root_url
1052 | sym::html_no_source
1054 if !self.check_attr_crate_level(attr, meta, hir_id) =>
1060 if !self.check_attr_crate_level(attr, meta, hir_id)
1061 || !self.check_doc_cfg_hide(meta, hir_id) =>
1066 sym::inline | sym::no_inline
1067 if !self.check_doc_inline(
1078 // no_default_passes: deprecated
1079 // passes: deprecated
1080 // plugins: removed, but rustdoc warns about it itself
1085 | sym::html_favicon_url
1086 | sym::html_logo_url
1087 | sym::html_no_source
1088 | sym::html_playground_url
1089 | sym::html_root_url
1091 | sym::issue_tracker_base_url
1094 | sym::no_default_passes
1096 | sym::notable_trait
1099 | sym::fake_variadic => {}
1102 if !self.check_test_attr(meta, hir_id) {
1108 if !self.tcx.features().rustdoc_internals {
1109 self.tcx.emit_spanned_lint(
1110 INVALID_DOC_ATTRIBUTES,
1113 errors::DocPrimitive,
1119 let path = rustc_ast_pretty::pprust::path_to_string(&i_meta.path);
1120 if i_meta.has_name(sym::spotlight) {
1121 self.tcx.emit_spanned_lint(
1122 INVALID_DOC_ATTRIBUTES,
1125 errors::DocTestUnknownSpotlight {
1130 } else if i_meta.has_name(sym::include) &&
1131 let Some(value) = i_meta.value_str() {
1132 let applicability = if list.len() == 1 {
1133 Applicability::MachineApplicable
1135 Applicability::MaybeIncorrect
1137 // If there are multiple attributes, the suggestion would suggest
1138 // deleting all of them, which is incorrect.
1139 self.tcx.emit_spanned_lint(
1140 INVALID_DOC_ATTRIBUTES,
1143 errors::DocTestUnknownInclude {
1145 value: value.to_string(),
1146 inner: match attr.style { AttrStyle::Inner=> "!" , AttrStyle::Outer => "" },
1147 sugg: (attr.meta().unwrap().span, applicability),
1151 self.tcx.emit_spanned_lint(
1152 INVALID_DOC_ATTRIBUTES,
1155 errors::DocTestUnknownAny { path }
1162 self.tcx.emit_spanned_lint(
1163 INVALID_DOC_ATTRIBUTES,
1176 /// Warns against some misuses of `#[pass_by_value]`
1177 fn check_pass_by_value(&self, attr: &Attribute, span: Span, target: Target) -> bool {
1179 Target::Struct | Target::Enum | Target::TyAlias => true,
1181 self.tcx.sess.emit_err(errors::PassByValue { attr_span: attr.span, span });
1187 fn check_allow_incoherent_impl(&self, attr: &Attribute, span: Span, target: Target) -> bool {
1189 Target::Method(MethodKind::Inherent) => true,
1191 self.tcx.sess.emit_err(errors::AllowIncoherentImpl { attr_span: attr.span, span });
1197 fn check_has_incoherent_inherent_impls(
1204 Target::Trait | Target::Struct | Target::Enum | Target::Union | Target::ForeignTy => {
1210 .emit_err(errors::HasIncoherentInherentImpl { attr_span: attr.span, span });
1216 /// Warns against some misuses of `#[must_use]`
1217 fn check_must_use(&self, hir_id: HirId, attr: &Attribute, target: Target) -> bool {
1226 // `impl Trait` in return position can trip
1227 // `unused_must_use` if `Trait` is marked as
1231 let article = match target {
1236 | Target::Expression
1238 | Target::AssocConst
1239 | Target::AssocTy => "an",
1243 self.tcx.emit_spanned_lint(
1247 errors::MustUseNoEffect { article, target },
1251 // For now, its always valid
1255 /// Checks if `#[must_not_suspend]` is applied to a function. Returns `true` if valid.
1256 fn check_must_not_suspend(&self, attr: &Attribute, span: Span, target: Target) -> bool {
1258 Target::Struct | Target::Enum | Target::Union | Target::Trait => true,
1260 self.tcx.sess.emit_err(errors::MustNotSuspend { attr_span: attr.span, span });
1266 /// Checks if `#[cold]` is applied to a non-function. Returns `true` if valid.
1267 fn check_cold(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) {
1269 Target::Fn | Target::Method(..) | Target::ForeignFn | Target::Closure => {}
1270 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1271 // `#[cold]` attribute with just a lint, because we previously
1272 // erroneously allowed it and some crates used it accidentally, to be compatible
1273 // with crates depending on them, we can't throw an error here.
1274 Target::Field | Target::Arm | Target::MacroDef => {
1275 self.inline_attr_str_error_with_macro_def(hir_id, attr, "cold");
1278 // FIXME: #[cold] was previously allowed on non-functions and some crates used
1279 // this, so only emit a warning.
1280 self.tcx.emit_spanned_lint(
1284 errors::Cold { span, on_crate: hir_id == CRATE_HIR_ID },
1290 /// Checks if `#[link]` is applied to an item other than a foreign module.
1291 fn check_link(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) {
1292 if target == Target::ForeignMod
1293 && let hir::Node::Item(item) = self.tcx.hir().get(hir_id)
1294 && let Item { kind: ItemKind::ForeignMod { abi, .. }, .. } = item
1295 && !matches!(abi, Abi::Rust | Abi::RustIntrinsic | Abi::PlatformIntrinsic)
1300 self.tcx.emit_spanned_lint(
1304 errors::Link { span: (target != Target::ForeignMod).then_some(span) },
1308 /// Checks if `#[link_name]` is applied to an item other than a foreign function or static.
1309 fn check_link_name(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) {
1311 Target::ForeignFn | Target::ForeignStatic => {}
1312 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1313 // `#[link_name]` attribute with just a lint, because we previously
1314 // erroneously allowed it and some crates used it accidentally, to be compatible
1315 // with crates depending on them, we can't throw an error here.
1316 Target::Field | Target::Arm | Target::MacroDef => {
1317 self.inline_attr_str_error_with_macro_def(hir_id, attr, "link_name");
1320 // FIXME: #[cold] was previously allowed on non-functions/statics and some crates
1321 // used this, so only emit a warning.
1322 let attr_span = matches!(target, Target::ForeignMod).then_some(attr.span);
1323 if let Some(s) = attr.value_str() {
1324 self.tcx.emit_spanned_lint(
1328 errors::LinkName { span, attr_span, value: s.as_str() },
1331 self.tcx.emit_spanned_lint(
1335 errors::LinkName { span, attr_span, value: "..." },
1342 /// Checks if `#[no_link]` is applied to an `extern crate`. Returns `true` if valid.
1343 fn check_no_link(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) -> bool {
1345 Target::ExternCrate => true,
1346 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1347 // `#[no_link]` attribute with just a lint, because we previously
1348 // erroneously allowed it and some crates used it accidentally, to be compatible
1349 // with crates depending on them, we can't throw an error here.
1350 Target::Field | Target::Arm | Target::MacroDef => {
1351 self.inline_attr_str_error_with_macro_def(hir_id, attr, "no_link");
1355 self.tcx.sess.emit_err(errors::NoLink { attr_span: attr.span, span });
1361 fn is_impl_item(&self, hir_id: HirId) -> bool {
1362 matches!(self.tcx.hir().get(hir_id), hir::Node::ImplItem(..))
1365 /// Checks if `#[export_name]` is applied to a function or static. Returns `true` if valid.
1366 fn check_export_name(
1374 Target::Static | Target::Fn => true,
1375 Target::Method(..) if self.is_impl_item(hir_id) => true,
1376 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1377 // `#[export_name]` attribute with just a lint, because we previously
1378 // erroneously allowed it and some crates used it accidentally, to be compatible
1379 // with crates depending on them, we can't throw an error here.
1380 Target::Field | Target::Arm | Target::MacroDef => {
1381 self.inline_attr_str_error_with_macro_def(hir_id, attr, "export_name");
1385 self.tcx.sess.emit_err(errors::ExportName { attr_span: attr.span, span });
1391 fn check_rustc_layout_scalar_valid_range(
1397 if target != Target::Struct {
1398 self.tcx.sess.emit_err(errors::RustcLayoutScalarValidRangeNotStruct {
1399 attr_span: attr.span,
1405 let Some(list) = attr.meta_item_list() else {
1409 if matches!(&list[..], &[NestedMetaItem::Lit(MetaItemLit { kind: LitKind::Int(..), .. })]) {
1412 self.tcx.sess.emit_err(errors::RustcLayoutScalarValidRangeArg { attr_span: attr.span });
1417 /// Checks if `#[rustc_legacy_const_generics]` is applied to a function and has a valid argument.
1418 fn check_rustc_legacy_const_generics(
1424 item: Option<ItemLike<'_>>,
1426 let is_function = matches!(target, Target::Fn);
1428 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToFn {
1429 attr_span: attr.span,
1431 on_crate: hir_id == CRATE_HIR_ID,
1436 let Some(list) = attr.meta_item_list() else {
1437 // The attribute form is validated on AST.
1441 let Some(ItemLike::Item(Item {
1442 kind: ItemKind::Fn(FnSig { decl, .. }, generics, _),
1445 bug!("should be a function item");
1448 for param in generics.params {
1450 hir::GenericParamKind::Const { .. } => {}
1452 self.tcx.sess.emit_err(errors::RustcLegacyConstGenericsOnly {
1453 attr_span: attr.span,
1454 param_span: param.span,
1461 if list.len() != generics.params.len() {
1462 self.tcx.sess.emit_err(errors::RustcLegacyConstGenericsIndex {
1463 attr_span: attr.span,
1464 generics_span: generics.span,
1469 let arg_count = decl.inputs.len() as u128 + generics.params.len() as u128;
1470 let mut invalid_args = vec![];
1472 if let Some(LitKind::Int(val, _)) = meta.lit().map(|lit| &lit.kind) {
1473 if *val >= arg_count {
1474 let span = meta.span();
1475 self.tcx.sess.emit_err(errors::RustcLegacyConstGenericsIndexExceed {
1477 arg_count: arg_count as usize,
1482 invalid_args.push(meta.span());
1486 if !invalid_args.is_empty() {
1487 self.tcx.sess.emit_err(errors::RustcLegacyConstGenericsIndexNegative { invalid_args });
1494 /// Helper function for checking that the provided attribute is only applied to a function or
1496 fn check_applied_to_fn_or_method(
1503 let is_function = matches!(target, Target::Fn | Target::Method(..));
1505 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToFn {
1506 attr_span: attr.span,
1508 on_crate: hir_id == CRATE_HIR_ID,
1516 /// Checks that the `#[rustc_lint_query_instability]` attribute is only applied to a function
1518 fn check_rustc_lint_query_instability(
1525 self.check_applied_to_fn_or_method(hir_id, attr, span, target)
1528 /// Checks that the `#[rustc_lint_diagnostics]` attribute is only applied to a function or
1530 fn check_rustc_lint_diagnostics(
1537 self.check_applied_to_fn_or_method(hir_id, attr, span, target)
1540 /// Checks that the `#[rustc_lint_opt_ty]` attribute is only applied to a struct.
1541 fn check_rustc_lint_opt_ty(&self, attr: &Attribute, span: Span, target: Target) -> bool {
1543 Target::Struct => true,
1545 self.tcx.sess.emit_err(errors::RustcLintOptTy { attr_span: attr.span, span });
1551 /// Checks that the `#[rustc_lint_opt_deny_field_access]` attribute is only applied to a field.
1552 fn check_rustc_lint_opt_deny_field_access(
1559 Target::Field => true,
1563 .emit_err(errors::RustcLintOptDenyFieldAccess { attr_span: attr.span, span });
1569 /// Checks that the dep-graph debugging attributes are only present when the query-dep-graph
1570 /// option is passed to the compiler.
1571 fn check_rustc_dirty_clean(&self, attr: &Attribute) -> bool {
1572 if self.tcx.sess.opts.unstable_opts.query_dep_graph {
1575 self.tcx.sess.emit_err(errors::RustcDirtyClean { span: attr.span });
1580 /// Checks if `#[link_section]` is applied to a function or static.
1581 fn check_link_section(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) {
1583 Target::Static | Target::Fn | Target::Method(..) => {}
1584 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1585 // `#[link_section]` attribute with just a lint, because we previously
1586 // erroneously allowed it and some crates used it accidentally, to be compatible
1587 // with crates depending on them, we can't throw an error here.
1588 Target::Field | Target::Arm | Target::MacroDef => {
1589 self.inline_attr_str_error_with_macro_def(hir_id, attr, "link_section");
1592 // FIXME: #[link_section] was previously allowed on non-functions/statics and some
1593 // crates used this, so only emit a warning.
1594 self.tcx.emit_spanned_lint(
1598 errors::LinkSection { span },
1604 /// Checks if `#[no_mangle]` is applied to a function or static.
1605 fn check_no_mangle(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) {
1607 Target::Static | Target::Fn => {}
1608 Target::Method(..) if self.is_impl_item(hir_id) => {}
1609 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1610 // `#[no_mangle]` attribute with just a lint, because we previously
1611 // erroneously allowed it and some crates used it accidentally, to be compatible
1612 // with crates depending on them, we can't throw an error here.
1613 Target::Field | Target::Arm | Target::MacroDef => {
1614 self.inline_attr_str_error_with_macro_def(hir_id, attr, "no_mangle");
1616 // FIXME: #[no_mangle] was previously allowed on non-functions/statics, this should be an error
1617 // The error should specify that the item that is wrong is specifically a *foreign* fn/static
1618 // otherwise the error seems odd
1619 Target::ForeignFn | Target::ForeignStatic => {
1620 let foreign_item_kind = match target {
1621 Target::ForeignFn => "function",
1622 Target::ForeignStatic => "static",
1623 _ => unreachable!(),
1625 self.tcx.emit_spanned_lint(
1629 errors::NoMangleForeign { span, attr_span: attr.span, foreign_item_kind },
1633 // FIXME: #[no_mangle] was previously allowed on non-functions/statics and some
1634 // crates used this, so only emit a warning.
1635 self.tcx.emit_spanned_lint(
1639 errors::NoMangle { span },
1645 /// Checks if the `#[repr]` attributes on `item` are valid.
1648 attrs: &[Attribute],
1651 item: Option<ItemLike<'_>>,
1654 // Extract the names of all repr hints, e.g., [foo, bar, align] for:
1657 // #[repr(bar, align(8))]
1659 let hints: Vec<_> = attrs
1661 .filter(|attr| attr.has_name(sym::repr))
1662 .filter_map(|attr| attr.meta_item_list())
1666 let mut int_reprs = 0;
1667 let mut is_c = false;
1668 let mut is_simd = false;
1669 let mut is_transparent = false;
1671 for hint in &hints {
1672 if !hint.is_meta_item() {
1673 self.tcx.sess.emit_err(errors::ReprIdent { span: hint.span() });
1677 match hint.name_or_empty() {
1681 Target::Struct | Target::Union | Target::Enum => continue,
1683 self.tcx.sess.emit_err(AttrApplication::StructEnumUnion {
1684 hint_span: hint.span(),
1691 if let (Target::Fn, false) = (target, self.tcx.features().fn_align) {
1693 &self.tcx.sess.parse_sess,
1696 "`repr(align)` attributes on functions are unstable",
1702 Target::Struct | Target::Union | Target::Enum | Target::Fn => continue,
1704 self.tcx.sess.emit_err(AttrApplication::StructEnumFunctionUnion {
1705 hint_span: hint.span(),
1712 if target != Target::Struct && target != Target::Union {
1713 self.tcx.sess.emit_err(AttrApplication::StructUnion {
1714 hint_span: hint.span(),
1723 if target != Target::Struct {
1726 .emit_err(AttrApplication::Struct { hint_span: hint.span(), span });
1731 sym::transparent => {
1732 is_transparent = true;
1734 Target::Struct | Target::Union | Target::Enum => continue,
1736 self.tcx.sess.emit_err(AttrApplication::StructEnumUnion {
1737 hint_span: hint.span(),
1756 if target != Target::Enum {
1759 .emit_err(AttrApplication::Enum { hint_span: hint.span(), span });
1765 self.tcx.sess.emit_err(UnrecognizedReprHint { span: hint.span() });
1771 // Just point at all repr hints if there are any incompatibilities.
1772 // This is not ideal, but tracking precisely which ones are at fault is a huge hassle.
1773 let hint_spans = hints.iter().map(|hint| hint.span());
1775 // Error on repr(transparent, <anything else>).
1776 if is_transparent && hints.len() > 1 {
1777 let hint_spans: Vec<_> = hint_spans.clone().collect();
1780 .emit_err(TransparentIncompatible { hint_spans, target: target.to_string() });
1782 // Warn on repr(u8, u16), repr(C, simd), and c-like-enum-repr(C, u8)
1784 || (is_simd && is_c)
1787 && item.map_or(false, |item| {
1788 if let ItemLike::Item(item) = item {
1789 return is_c_like_enum(item);
1794 self.tcx.emit_spanned_lint(
1795 CONFLICTING_REPR_HINTS,
1797 hint_spans.collect::<Vec<Span>>(),
1798 errors::ReprConflicting,
1803 fn check_used(&self, attrs: &[Attribute], target: Target) {
1804 let mut used_linker_span = None;
1805 let mut used_compiler_span = None;
1806 for attr in attrs.iter().filter(|attr| attr.has_name(sym::used)) {
1807 if target != Target::Static {
1808 self.tcx.sess.emit_err(errors::UsedStatic { span: attr.span });
1810 let inner = attr.meta_item_list();
1811 match inner.as_deref() {
1812 Some([item]) if item.has_name(sym::linker) => {
1813 if used_linker_span.is_none() {
1814 used_linker_span = Some(attr.span);
1817 Some([item]) if item.has_name(sym::compiler) => {
1818 if used_compiler_span.is_none() {
1819 used_compiler_span = Some(attr.span);
1823 // This error case is handled in rustc_hir_analysis::collect.
1826 // Default case (compiler) when arg isn't defined.
1827 if used_compiler_span.is_none() {
1828 used_compiler_span = Some(attr.span);
1833 if let (Some(linker_span), Some(compiler_span)) = (used_linker_span, used_compiler_span) {
1836 .emit_err(errors::UsedCompilerLinker { spans: vec![linker_span, compiler_span] });
1840 /// Outputs an error for `#[allow_internal_unstable]` which can only be applied to macros.
1841 /// (Allows proc_macro functions)
1842 fn check_allow_internal_unstable(
1848 attrs: &[Attribute],
1850 debug!("Checking target: {:?}", target);
1854 if self.tcx.sess.is_proc_macro_attr(attr) {
1855 debug!("Is proc macro attr");
1859 debug!("Is not proc macro attr");
1862 Target::MacroDef => true,
1863 // FIXME(#80564): We permit struct fields and match arms to have an
1864 // `#[allow_internal_unstable]` attribute with just a lint, because we previously
1865 // erroneously allowed it and some crates used it accidentally, to be compatible
1866 // with crates depending on them, we can't throw an error here.
1867 Target::Field | Target::Arm => {
1868 self.inline_attr_str_error_without_macro_def(
1871 "allow_internal_unstable",
1878 .emit_err(errors::AllowInternalUnstable { attr_span: attr.span, span });
1884 /// Checks if the items on the `#[debugger_visualizer]` attribute are valid.
1885 fn check_debugger_visualizer(&self, attr: &Attribute, target: Target) -> bool {
1889 self.tcx.sess.emit_err(errors::DebugVisualizerPlacement { span: attr.span });
1894 let Some(hints) = attr.meta_item_list() else {
1895 self.tcx.sess.emit_err(errors::DebugVisualizerInvalid { span: attr.span });
1899 let hint = match hints.len() {
1902 self.tcx.sess.emit_err(errors::DebugVisualizerInvalid { span: attr.span });
1907 let Some(meta_item) = hint.meta_item() else {
1908 self.tcx.sess.emit_err(errors::DebugVisualizerInvalid { span: attr.span });
1912 let visualizer_path = match (meta_item.name_or_empty(), meta_item.value_str()) {
1913 (sym::natvis_file, Some(value)) => value,
1914 (sym::gdb_script_file, Some(value)) => value,
1916 self.tcx.sess.emit_err(errors::DebugVisualizerInvalid { span: meta_item.span });
1922 match resolve_path(&self.tcx.sess.parse_sess, visualizer_path.as_str(), attr.span) {
1930 match std::fs::File::open(&file) {
1933 self.tcx.sess.emit_err(DebugVisualizerUnreadable {
1934 span: meta_item.span,
1943 /// Outputs an error for `#[allow_internal_unstable]` which can only be applied to macros.
1944 /// (Allows proc_macro functions)
1945 fn check_rustc_allow_const_fn_unstable(
1953 Target::Fn | Target::Method(_)
1954 if self.tcx.is_const_fn_raw(hir_id.expect_owner().to_def_id()) =>
1958 // FIXME(#80564): We permit struct fields and match arms to have an
1959 // `#[allow_internal_unstable]` attribute with just a lint, because we previously
1960 // erroneously allowed it and some crates used it accidentally, to be compatible
1961 // with crates depending on them, we can't throw an error here.
1962 Target::Field | Target::Arm | Target::MacroDef => {
1963 self.inline_attr_str_error_with_macro_def(hir_id, attr, "allow_internal_unstable");
1969 .emit_err(errors::RustcAllowConstFnUnstable { attr_span: attr.span, span });
1975 fn check_rustc_std_internal_symbol(
1982 Target::Fn | Target::Static => true,
1986 .emit_err(errors::RustcStdInternalSymbol { attr_span: attr.span, span });
1992 /// `#[const_trait]` only applies to traits.
1993 fn check_const_trait(&self, attr: &Attribute, _span: Span, target: Target) -> bool {
1995 Target::Trait => true,
1997 self.tcx.sess.emit_err(errors::ConstTrait { attr_span: attr.span });
2003 fn check_stability_promotable(&self, attr: &Attribute, _span: Span, target: Target) -> bool {
2005 Target::Expression => {
2006 self.tcx.sess.emit_err(errors::StabilityPromotable { attr_span: attr.span });
2013 fn check_link_ordinal(&self, attr: &Attribute, _span: Span, target: Target) -> bool {
2015 Target::ForeignFn | Target::ForeignStatic => true,
2017 self.tcx.sess.emit_err(errors::LinkOrdinal { attr_span: attr.span });
2023 fn check_deprecated(&self, hir_id: HirId, attr: &Attribute, _span: Span, target: Target) {
2025 Target::Closure | Target::Expression | Target::Statement | Target::Arm => {
2026 self.tcx.emit_spanned_lint(
2037 fn check_macro_use(&self, hir_id: HirId, attr: &Attribute, target: Target) {
2038 let name = attr.name_or_empty();
2040 Target::ExternCrate | Target::Mod => {}
2042 self.tcx.emit_spanned_lint(
2046 errors::MacroUse { name },
2052 fn check_macro_export(&self, hir_id: HirId, attr: &Attribute, target: Target) {
2053 if target != Target::MacroDef {
2054 self.tcx.emit_spanned_lint(UNUSED_ATTRIBUTES, hir_id, attr.span, errors::MacroExport);
2058 fn check_plugin_registrar(&self, hir_id: HirId, attr: &Attribute, target: Target) {
2059 if target != Target::Fn {
2060 self.tcx.emit_spanned_lint(
2064 errors::PluginRegistrar,
2069 fn check_unused_attribute(&self, hir_id: HirId, attr: &Attribute) {
2070 // Warn on useless empty attributes.
2071 let note = if matches!(
2072 attr.name_or_empty(),
2081 | sym::target_feature
2082 ) && attr.meta_item_list().map_or(false, |list| list.is_empty())
2084 errors::UnusedNote::EmptyList { name: attr.name_or_empty() }
2086 attr.name_or_empty(),
2087 sym::allow | sym::warn | sym::deny | sym::forbid | sym::expect
2088 ) && let Some(meta) = attr.meta_item_list()
2090 && let Some(item) = meta[0].meta_item()
2091 && let MetaItemKind::NameValue(_) = &item.kind
2092 && item.path == sym::reason
2094 errors::UnusedNote::NoLints { name: attr.name_or_empty() }
2095 } else if attr.name_or_empty() == sym::default_method_body_is_const {
2096 errors::UnusedNote::DefaultMethodBodyConst
2101 self.tcx.emit_spanned_lint(
2105 errors::Unused { attr_span: attr.span, note },
2109 /// A best effort attempt to create an error for a mismatching proc macro signature.
2111 /// If this best effort goes wrong, it will just emit a worse error later (see #102923)
2112 fn check_proc_macro(&self, hir_id: HirId, target: Target, kind: ProcMacroKind) {
2113 let expected_input_count = match kind {
2114 ProcMacroKind::Attribute => 2,
2115 ProcMacroKind::Derive | ProcMacroKind::FunctionLike => 1,
2118 let expected_signature = match kind {
2119 ProcMacroKind::Attribute => "fn(TokenStream, TokenStream) -> TokenStream",
2120 ProcMacroKind::Derive | ProcMacroKind::FunctionLike => "fn(TokenStream) -> TokenStream",
2124 if target == Target::Fn {
2125 let Some(tokenstream) = tcx.get_diagnostic_item(sym::TokenStream) else {return};
2126 let tokenstream = tcx.type_of(tokenstream);
2128 let id = hir_id.expect_owner();
2129 let hir_sig = tcx.hir().fn_sig_by_hir_id(hir_id).unwrap();
2132 tcx.liberate_late_bound_regions(id.to_def_id(), tcx.fn_sig(id).subst_identity());
2133 let sig = tcx.normalize_erasing_regions(ParamEnv::empty(), sig);
2135 // We don't currently require that the function signature is equal to
2136 // `fn(TokenStream) -> TokenStream`, but instead monomorphizes to
2137 // `fn(TokenStream) -> TokenStream` after some substitution of generic arguments.
2139 // Properly checking this means pulling in additional `rustc` crates, so we don't.
2140 let drcx = DeepRejectCtxt { treat_obligation_params: TreatParams::AsInfer };
2142 if sig.abi != Abi::Rust {
2143 tcx.sess.emit_err(ProcMacroInvalidAbi { span: hir_sig.span, abi: sig.abi.name() });
2144 self.abort.set(true);
2147 if sig.unsafety == Unsafety::Unsafe {
2148 tcx.sess.emit_err(ProcMacroUnsafe { span: hir_sig.span });
2149 self.abort.set(true);
2152 let output = sig.output();
2154 // Typecheck the output
2155 if !drcx.types_may_unify(output, tokenstream) {
2156 tcx.sess.emit_err(ProcMacroTypeError {
2157 span: hir_sig.decl.output.span(),
2162 self.abort.set(true);
2165 if sig.inputs().len() < expected_input_count {
2166 tcx.sess.emit_err(ProcMacroMissingArguments {
2167 expected_input_count,
2172 self.abort.set(true);
2175 // Check that the inputs are correct, if there are enough.
2176 if sig.inputs().len() >= expected_input_count {
2178 sig.inputs().iter().zip(hir_sig.decl.inputs).take(expected_input_count)
2180 if !drcx.types_may_unify(*arg, tokenstream) {
2181 tcx.sess.emit_err(ProcMacroTypeError {
2187 self.abort.set(true);
2192 // Check that there are not too many arguments
2193 let body_id = tcx.hir().body_owned_by(id.def_id);
2194 let excess = tcx.hir().body(body_id).params.get(expected_input_count..);
2195 if let Some(excess @ [begin @ end] | excess @ [begin, .., end]) = excess {
2196 tcx.sess.emit_err(ProcMacroDiffArguments {
2197 span: begin.span.to(end.span),
2198 count: excess.len(),
2202 self.abort.set(true);
2208 impl<'tcx> Visitor<'tcx> for CheckAttrVisitor<'tcx> {
2209 type NestedFilter = nested_filter::OnlyBodies;
2211 fn nested_visit_map(&mut self) -> Self::Map {
2215 fn visit_item(&mut self, item: &'tcx Item<'tcx>) {
2216 // Historically we've run more checks on non-exported than exported macros,
2217 // so this lets us continue to run them while maintaining backwards compatibility.
2218 // In the long run, the checks should be harmonized.
2219 if let ItemKind::Macro(ref macro_def, _) = item.kind {
2220 let def_id = item.owner_id.to_def_id();
2221 if macro_def.macro_rules && !self.tcx.has_attr(def_id, sym::macro_export) {
2222 check_non_exported_macro_for_invalid_attrs(self.tcx, item);
2226 let target = Target::from_item(item);
2227 self.check_attributes(item.hir_id(), item.span, target, Some(ItemLike::Item(item)));
2228 intravisit::walk_item(self, item)
2231 fn visit_generic_param(&mut self, generic_param: &'tcx hir::GenericParam<'tcx>) {
2232 let target = Target::from_generic_param(generic_param);
2233 self.check_attributes(generic_param.hir_id, generic_param.span, target, None);
2234 intravisit::walk_generic_param(self, generic_param)
2237 fn visit_trait_item(&mut self, trait_item: &'tcx TraitItem<'tcx>) {
2238 let target = Target::from_trait_item(trait_item);
2239 self.check_attributes(trait_item.hir_id(), trait_item.span, target, None);
2240 intravisit::walk_trait_item(self, trait_item)
2243 fn visit_field_def(&mut self, struct_field: &'tcx hir::FieldDef<'tcx>) {
2244 self.check_attributes(struct_field.hir_id, struct_field.span, Target::Field, None);
2245 intravisit::walk_field_def(self, struct_field);
2248 fn visit_arm(&mut self, arm: &'tcx hir::Arm<'tcx>) {
2249 self.check_attributes(arm.hir_id, arm.span, Target::Arm, None);
2250 intravisit::walk_arm(self, arm);
2253 fn visit_foreign_item(&mut self, f_item: &'tcx ForeignItem<'tcx>) {
2254 let target = Target::from_foreign_item(f_item);
2255 self.check_attributes(f_item.hir_id(), f_item.span, target, Some(ItemLike::ForeignItem));
2256 intravisit::walk_foreign_item(self, f_item)
2259 fn visit_impl_item(&mut self, impl_item: &'tcx hir::ImplItem<'tcx>) {
2260 let target = target_from_impl_item(self.tcx, impl_item);
2261 self.check_attributes(impl_item.hir_id(), impl_item.span, target, None);
2262 intravisit::walk_impl_item(self, impl_item)
2265 fn visit_stmt(&mut self, stmt: &'tcx hir::Stmt<'tcx>) {
2266 // When checking statements ignore expressions, they will be checked later.
2267 if let hir::StmtKind::Local(ref l) = stmt.kind {
2268 self.check_attributes(l.hir_id, stmt.span, Target::Statement, None);
2270 intravisit::walk_stmt(self, stmt)
2273 fn visit_expr(&mut self, expr: &'tcx hir::Expr<'tcx>) {
2274 let target = match expr.kind {
2275 hir::ExprKind::Closure { .. } => Target::Closure,
2276 _ => Target::Expression,
2279 self.check_attributes(expr.hir_id, expr.span, target, None);
2280 intravisit::walk_expr(self, expr)
2283 fn visit_expr_field(&mut self, field: &'tcx hir::ExprField<'tcx>) {
2284 self.check_attributes(field.hir_id, field.span, Target::ExprField, None);
2285 intravisit::walk_expr_field(self, field)
2288 fn visit_variant(&mut self, variant: &'tcx hir::Variant<'tcx>) {
2289 self.check_attributes(variant.hir_id, variant.span, Target::Variant, None);
2290 intravisit::walk_variant(self, variant)
2293 fn visit_param(&mut self, param: &'tcx hir::Param<'tcx>) {
2294 self.check_attributes(param.hir_id, param.span, Target::Param, None);
2296 intravisit::walk_param(self, param);
2299 fn visit_pat_field(&mut self, field: &'tcx hir::PatField<'tcx>) {
2300 self.check_attributes(field.hir_id, field.span, Target::PatField, None);
2301 intravisit::walk_pat_field(self, field);
2305 fn is_c_like_enum(item: &Item<'_>) -> bool {
2306 if let ItemKind::Enum(ref def, _) = item.kind {
2307 for variant in def.variants {
2308 match variant.data {
2309 hir::VariantData::Unit(..) => { /* continue */ }
2319 // FIXME: Fix "Cannot determine resolution" error and remove built-in macros
2321 fn check_invalid_crate_level_attr(tcx: TyCtxt<'_>, attrs: &[Attribute]) {
2322 // Check for builtin attributes at the crate level
2323 // which were unsuccessfully resolved due to cannot determine
2324 // resolution for the attribute macro error.
2325 const ATTRS_TO_CHECK: &[Symbol] = &[
2329 sym::automatically_derived,
2336 sym::global_allocator,
2341 // This function should only be called with crate attributes
2342 // which are inner attributes always but lets check to make sure
2343 if attr.style == AttrStyle::Inner {
2344 for attr_to_check in ATTRS_TO_CHECK {
2345 if attr.has_name(*attr_to_check) {
2346 tcx.sess.emit_err(InvalidAttrAtCrateLevel {
2348 snippet: tcx.sess.source_map().span_to_snippet(attr.span).ok(),
2349 name: *attr_to_check,
2357 fn check_non_exported_macro_for_invalid_attrs(tcx: TyCtxt<'_>, item: &Item<'_>) {
2358 let attrs = tcx.hir().attrs(item.hir_id());
2361 if attr.has_name(sym::inline) {
2362 tcx.sess.emit_err(errors::NonExportedMacroInvalidAttrs { attr_span: attr.span });
2367 fn check_mod_attrs(tcx: TyCtxt<'_>, module_def_id: LocalDefId) {
2368 let check_attr_visitor = &mut CheckAttrVisitor { tcx, abort: Cell::new(false) };
2369 tcx.hir().visit_item_likes_in_module(module_def_id, check_attr_visitor);
2370 if module_def_id.is_top_level_module() {
2371 check_attr_visitor.check_attributes(CRATE_HIR_ID, DUMMY_SP, Target::Mod, None);
2372 check_invalid_crate_level_attr(tcx, tcx.hir().krate_attrs());
2374 if check_attr_visitor.abort.get() {
2375 tcx.sess.abort_if_errors()
2379 pub(crate) fn provide(providers: &mut Providers) {
2380 *providers = Providers { check_mod_attrs, ..*providers };
2383 fn check_duplicates(
2387 duplicates: AttributeDuplicates,
2388 seen: &mut FxHashMap<Symbol, Span>,
2390 use AttributeDuplicates::*;
2391 if matches!(duplicates, WarnFollowingWordOnly) && !attr.is_word() {
2396 WarnFollowing | FutureWarnFollowing | WarnFollowingWordOnly | FutureWarnPreceding => {
2397 match seen.entry(attr.name_or_empty()) {
2398 Entry::Occupied(mut entry) => {
2399 let (this, other) = if matches!(duplicates, FutureWarnPreceding) {
2400 let to_remove = entry.insert(attr.span);
2401 (to_remove, attr.span)
2403 (attr.span, *entry.get())
2405 tcx.emit_spanned_lint(
2409 errors::UnusedDuplicate {
2414 FutureWarnFollowing | FutureWarnPreceding
2420 Entry::Vacant(entry) => {
2421 entry.insert(attr.span);
2425 ErrorFollowing | ErrorPreceding => match seen.entry(attr.name_or_empty()) {
2426 Entry::Occupied(mut entry) => {
2427 let (this, other) = if matches!(duplicates, ErrorPreceding) {
2428 let to_remove = entry.insert(attr.span);
2429 (to_remove, attr.span)
2431 (attr.span, *entry.get())
2433 tcx.sess.emit_err(errors::UnusedMultiple {
2436 name: attr.name_or_empty(),
2439 Entry::Vacant(entry) => {
2440 entry.insert(attr.span);