1 //! This module implements some validity checks for attributes.
2 //! In particular it verifies that `#[inline]` and `#[repr]` attributes are
3 //! attached to items that actually support them and if there are
4 //! conflicts between multiple such attributes attached to the same
8 use rustc_ast::{ast, AttrStyle, Attribute, Lit, LitKind, MetaItemKind, NestedMetaItem};
9 use rustc_data_structures::fx::FxHashMap;
10 use rustc_errors::{fluent, struct_span_err, Applicability, MultiSpan};
11 use rustc_expand::base::resolve_path;
12 use rustc_feature::{AttributeDuplicates, AttributeType, BuiltinAttribute, BUILTIN_ATTRIBUTE_MAP};
14 use rustc_hir::def_id::{LocalDefId, CRATE_DEF_ID};
15 use rustc_hir::intravisit::{self, Visitor};
16 use rustc_hir::{self, FnSig, ForeignItem, HirId, Item, ItemKind, TraitItem, CRATE_HIR_ID};
17 use rustc_hir::{MethodKind, Target};
18 use rustc_middle::hir::nested_filter;
19 use rustc_middle::middle::resolve_lifetime::ObjectLifetimeDefault;
20 use rustc_middle::ty::query::Providers;
21 use rustc_middle::ty::TyCtxt;
22 use rustc_session::lint::builtin::{
23 CONFLICTING_REPR_HINTS, INVALID_DOC_ATTRIBUTES, UNUSED_ATTRIBUTES,
25 use rustc_session::parse::feature_err;
26 use rustc_span::symbol::{kw, sym, Symbol};
27 use rustc_span::{Span, DUMMY_SP};
28 use rustc_target::spec::abi::Abi;
29 use std::collections::hash_map::Entry;
31 pub(crate) fn target_from_impl_item<'tcx>(
33 impl_item: &hir::ImplItem<'_>,
35 match impl_item.kind {
36 hir::ImplItemKind::Const(..) => Target::AssocConst,
37 hir::ImplItemKind::Fn(..) => {
38 let parent_hir_id = tcx.hir().get_parent_item(impl_item.hir_id());
39 let containing_item = tcx.hir().expect_item(parent_hir_id);
40 let containing_impl_is_for_trait = match &containing_item.kind {
41 hir::ItemKind::Impl(impl_) => impl_.of_trait.is_some(),
42 _ => bug!("parent of an ImplItem must be an Impl"),
44 if containing_impl_is_for_trait {
45 Target::Method(MethodKind::Trait { body: true })
47 Target::Method(MethodKind::Inherent)
50 hir::ImplItemKind::TyAlias(..) => Target::AssocTy,
54 #[derive(Clone, Copy)]
56 Item(&'tcx Item<'tcx>),
60 struct CheckAttrVisitor<'tcx> {
64 impl CheckAttrVisitor<'_> {
65 /// Checks any attribute.
71 item: Option<ItemLike<'_>>,
73 let mut doc_aliases = FxHashMap::default();
74 let mut is_valid = true;
75 let mut specified_inline = None;
76 let mut seen = FxHashMap::default();
77 let attrs = self.tcx.hir().attrs(hir_id);
79 let attr_is_valid = match attr.name_or_empty() {
80 sym::inline => self.check_inline(hir_id, attr, span, target),
81 sym::no_coverage => self.check_no_coverage(hir_id, attr, span, target),
82 sym::non_exhaustive => self.check_non_exhaustive(hir_id, attr, span, target),
83 sym::marker => self.check_marker(hir_id, attr, span, target),
84 sym::rustc_must_implement_one_of => {
85 self.check_rustc_must_implement_one_of(attr, span, target)
87 sym::target_feature => self.check_target_feature(hir_id, attr, span, target),
88 sym::thread_local => self.check_thread_local(attr, span, target),
89 sym::track_caller => {
90 self.check_track_caller(hir_id, attr.span, attrs, span, target)
92 sym::doc => self.check_doc_attrs(
96 &mut specified_inline,
99 sym::no_link => self.check_no_link(hir_id, &attr, span, target),
100 sym::export_name => self.check_export_name(hir_id, &attr, span, target),
101 sym::rustc_layout_scalar_valid_range_start
102 | sym::rustc_layout_scalar_valid_range_end => {
103 self.check_rustc_layout_scalar_valid_range(&attr, span, target)
105 sym::allow_internal_unstable => {
106 self.check_allow_internal_unstable(hir_id, &attr, span, target, &attrs)
108 sym::debugger_visualizer => self.check_debugger_visualizer(&attr, target),
109 sym::rustc_allow_const_fn_unstable => {
110 self.check_rustc_allow_const_fn_unstable(hir_id, &attr, span, target)
112 sym::rustc_std_internal_symbol => {
113 self.check_rustc_std_internal_symbol(&attr, span, target)
115 sym::naked => self.check_naked(hir_id, attr, span, target),
116 sym::rustc_legacy_const_generics => {
117 self.check_rustc_legacy_const_generics(&attr, span, target, item)
119 sym::rustc_lint_query_instability => {
120 self.check_rustc_lint_query_instability(&attr, span, target)
122 sym::rustc_lint_diagnostics => {
123 self.check_rustc_lint_diagnostics(&attr, span, target)
125 sym::rustc_lint_opt_ty => self.check_rustc_lint_opt_ty(&attr, span, target),
126 sym::rustc_lint_opt_deny_field_access => {
127 self.check_rustc_lint_opt_deny_field_access(&attr, span, target)
131 | sym::rustc_if_this_changed
132 | sym::rustc_then_this_would_need => self.check_rustc_dirty_clean(&attr),
133 sym::cmse_nonsecure_entry => self.check_cmse_nonsecure_entry(attr, span, target),
134 sym::const_trait => self.check_const_trait(attr, span, target),
135 sym::must_not_suspend => self.check_must_not_suspend(&attr, span, target),
136 sym::must_use => self.check_must_use(hir_id, &attr, span, target),
137 sym::rustc_pass_by_value => self.check_pass_by_value(&attr, span, target),
138 sym::rustc_allow_incoherent_impl => {
139 self.check_allow_incoherent_impl(&attr, span, target)
141 sym::rustc_has_incoherent_inherent_impls => {
142 self.check_has_incoherent_inherent_impls(&attr, span, target)
144 sym::rustc_const_unstable
145 | sym::rustc_const_stable
148 | sym::rustc_allowed_through_unstable_modules
149 | sym::rustc_promotable => self.check_stability_promotable(&attr, span, target),
150 sym::link_ordinal => self.check_link_ordinal(&attr, span, target),
153 is_valid &= attr_is_valid;
156 match attr.name_or_empty() {
157 sym::cold => self.check_cold(hir_id, attr, span, target),
158 sym::link => self.check_link(hir_id, attr, span, target),
159 sym::link_name => self.check_link_name(hir_id, attr, span, target),
160 sym::link_section => self.check_link_section(hir_id, attr, span, target),
161 sym::no_mangle => self.check_no_mangle(hir_id, attr, span, target),
162 sym::deprecated => self.check_deprecated(hir_id, attr, span, target),
163 sym::macro_use | sym::macro_escape => self.check_macro_use(hir_id, attr, target),
164 sym::path => self.check_generic_attr(hir_id, attr, target, &[Target::Mod]),
165 sym::plugin_registrar => self.check_plugin_registrar(hir_id, attr, target),
166 sym::macro_export => self.check_macro_export(hir_id, attr, target),
167 sym::ignore | sym::should_panic | sym::proc_macro_derive => {
168 self.check_generic_attr(hir_id, attr, target, &[Target::Fn])
170 sym::automatically_derived => {
171 self.check_generic_attr(hir_id, attr, target, &[Target::Impl])
173 sym::no_implicit_prelude => {
174 self.check_generic_attr(hir_id, attr, target, &[Target::Mod])
176 sym::rustc_object_lifetime_default => self.check_object_lifetime_default(hir_id),
180 let builtin = attr.ident().and_then(|ident| BUILTIN_ATTRIBUTE_MAP.get(&ident.name));
182 if hir_id != CRATE_HIR_ID {
183 if let Some(BuiltinAttribute { type_: AttributeType::CrateLevel, .. }) =
184 attr.ident().and_then(|ident| BUILTIN_ATTRIBUTE_MAP.get(&ident.name))
187 ast::AttrStyle::Outer => self.tcx.emit_spanned_lint(
191 errors::OuterCrateLevelAttr,
193 ast::AttrStyle::Inner => self.tcx.emit_spanned_lint(
197 errors::InnerCrateLevelAttr,
203 if let Some(BuiltinAttribute { duplicates, .. }) = builtin {
204 check_duplicates(self.tcx, attr, hir_id, *duplicates, &mut seen);
207 self.check_unused_attribute(hir_id, attr)
214 // FIXME(@lcnr): this doesn't belong here.
221 | Target::ForeignStatic
223 self.tcx.ensure().codegen_fn_attrs(self.tcx.hir().local_def_id(hir_id));
226 self.check_repr(attrs, span, target, item, hir_id);
227 self.check_used(attrs, target);
230 fn inline_attr_str_error_with_macro_def(&self, hir_id: HirId, attr: &Attribute, sym: &str) {
231 self.tcx.emit_spanned_lint(
235 errors::IgnoredAttrWithMacro { sym },
239 fn inline_attr_str_error_without_macro_def(&self, hir_id: HirId, attr: &Attribute, sym: &str) {
240 self.tcx.emit_spanned_lint(
244 errors::IgnoredAttr { sym },
248 /// Checks if an `#[inline]` is applied to a function or a closure. Returns `true` if valid.
249 fn check_inline(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) -> bool {
253 | Target::Method(MethodKind::Trait { body: true } | MethodKind::Inherent) => true,
254 Target::Method(MethodKind::Trait { body: false }) | Target::ForeignFn => {
255 self.tcx.emit_spanned_lint(
259 errors::IgnoredInlineAttrFnProto,
263 // FIXME(#65833): We permit associated consts to have an `#[inline]` attribute with
264 // just a lint, because we previously erroneously allowed it and some crates used it
265 // accidentally, to to be compatible with crates depending on them, we can't throw an
267 Target::AssocConst => {
268 self.tcx.emit_spanned_lint(
272 errors::IgnoredInlineAttrConstants,
276 // FIXME(#80564): Same for fields, arms, and macro defs
277 Target::Field | Target::Arm | Target::MacroDef => {
278 self.inline_attr_str_error_with_macro_def(hir_id, attr, "inline");
282 self.tcx.sess.emit_err(errors::InlineNotFnOrClosure {
283 attr_span: attr.span,
291 /// Checks if a `#[no_coverage]` is applied directly to a function
292 fn check_no_coverage(
300 // no_coverage on function is fine
303 | Target::Method(MethodKind::Trait { body: true } | MethodKind::Inherent) => true,
305 // function prototypes can't be covered
306 Target::Method(MethodKind::Trait { body: false }) | Target::ForeignFn => {
307 self.tcx.emit_spanned_lint(
311 errors::IgnoredNoCoverageFnProto,
316 Target::Mod | Target::ForeignMod | Target::Impl | Target::Trait => {
317 self.tcx.emit_spanned_lint(
321 errors::IgnoredNoCoveragePropagate,
326 Target::Expression | Target::Statement | Target::Arm => {
327 self.tcx.emit_spanned_lint(
331 errors::IgnoredNoCoverageFnDefn,
337 self.tcx.sess.emit_err(errors::IgnoredNoCoverageNotCoverable {
338 attr_span: attr.span,
346 fn check_generic_attr(
351 allowed_targets: &[Target],
353 if !allowed_targets.iter().any(|t| t == &target) {
354 let name = attr.name_or_empty();
355 let mut i = allowed_targets.iter();
357 let b = i.next().map_or_else(String::new, |t| t.to_string() + "s");
358 let supported_names = i.enumerate().fold(b, |mut b, (i, allowed_target)| {
359 if allowed_targets.len() > 2 && i == allowed_targets.len() - 2 {
360 b.push_str(", and ");
361 } else if allowed_targets.len() == 2 && i == allowed_targets.len() - 2 {
367 b.push_str(&(allowed_target.to_string() + "s"));
370 self.tcx.struct_span_lint_hir(UNUSED_ATTRIBUTES, hir_id, attr.span, |lint| {
371 lint.build(&format!("`#[{name}]` only has an effect on {}", supported_names))
377 /// Checks if `#[naked]` is applied to a function definition.
378 fn check_naked(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) -> bool {
381 | Target::Method(MethodKind::Trait { body: true } | MethodKind::Inherent) => true,
382 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
383 // `#[allow_internal_unstable]` attribute with just a lint, because we previously
384 // erroneously allowed it and some crates used it accidentally, to to be compatible
385 // with crates depending on them, we can't throw an error here.
386 Target::Field | Target::Arm | Target::MacroDef => {
387 self.inline_attr_str_error_with_macro_def(hir_id, attr, "naked");
391 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToFn {
392 attr_span: attr.span,
400 /// Checks if `#[cmse_nonsecure_entry]` is applied to a function definition.
401 fn check_cmse_nonsecure_entry(&self, attr: &Attribute, span: Span, target: Target) -> bool {
404 | Target::Method(MethodKind::Trait { body: true } | MethodKind::Inherent) => true,
406 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToFn {
407 attr_span: attr.span,
415 /// Debugging aid for `object_lifetime_default` query.
416 fn check_object_lifetime_default(&self, hir_id: HirId) {
418 if let Some(generics) = tcx.hir().get_generics(tcx.hir().local_def_id(hir_id)) {
419 for p in generics.params {
420 let hir::GenericParamKind::Type { .. } = p.kind else { continue };
421 let param_id = tcx.hir().local_def_id(p.hir_id);
422 let default = tcx.object_lifetime_default(param_id);
423 let repr = match default {
424 ObjectLifetimeDefault::Empty => "BaseDefault".to_owned(),
425 ObjectLifetimeDefault::Static => "'static".to_owned(),
426 ObjectLifetimeDefault::Param(def_id) => tcx.item_name(def_id).to_string(),
427 ObjectLifetimeDefault::Ambiguous => "Ambiguous".to_owned(),
429 tcx.sess.span_err(p.span, &repr);
434 /// Checks if a `#[track_caller]` is applied to a non-naked function. Returns `true` if valid.
435 fn check_track_caller(
444 _ if attrs.iter().any(|attr| attr.has_name(sym::naked)) => {
445 self.tcx.sess.emit_err(errors::NakedTrackedCaller { attr_span });
448 Target::Fn | Target::Method(..) | Target::ForeignFn | Target::Closure => true,
449 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
450 // `#[track_caller]` attribute with just a lint, because we previously
451 // erroneously allowed it and some crates used it accidentally, to to be compatible
452 // with crates depending on them, we can't throw an error here.
453 Target::Field | Target::Arm | Target::MacroDef => {
455 self.inline_attr_str_error_with_macro_def(hir_id, attr, "track_caller");
462 .emit_err(errors::TrackedCallerWrongLocation { attr_span, defn_span: span });
468 /// Checks if the `#[non_exhaustive]` attribute on an `item` is valid. Returns `true` if valid.
469 fn check_non_exhaustive(
477 Target::Struct | Target::Enum | Target::Variant => true,
478 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
479 // `#[non_exhaustive]` attribute with just a lint, because we previously
480 // erroneously allowed it and some crates used it accidentally, to to be compatible
481 // with crates depending on them, we can't throw an error here.
482 Target::Field | Target::Arm | Target::MacroDef => {
483 self.inline_attr_str_error_with_macro_def(hir_id, attr, "non_exhaustive");
487 self.tcx.sess.emit_err(errors::NonExhaustiveWrongLocation {
488 attr_span: attr.span,
496 /// Checks if the `#[marker]` attribute on an `item` is valid. Returns `true` if valid.
497 fn check_marker(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) -> bool {
499 Target::Trait => true,
500 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
501 // `#[marker]` attribute with just a lint, because we previously
502 // erroneously allowed it and some crates used it accidentally, to to be compatible
503 // with crates depending on them, we can't throw an error here.
504 Target::Field | Target::Arm | Target::MacroDef => {
505 self.inline_attr_str_error_with_macro_def(hir_id, attr, "marker");
509 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToTrait {
510 attr_span: attr.span,
518 /// Checks if the `#[rustc_must_implement_one_of]` attribute on a `target` is valid. Returns `true` if valid.
519 fn check_rustc_must_implement_one_of(
526 Target::Trait => true,
528 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToTrait {
529 attr_span: attr.span,
537 /// Checks if the `#[target_feature]` attribute on `item` is valid. Returns `true` if valid.
538 fn check_target_feature(
547 | Target::Method(MethodKind::Trait { body: true } | MethodKind::Inherent) => true,
548 // FIXME: #[target_feature] was previously erroneously allowed on statements and some
549 // crates used this, so only emit a warning.
550 Target::Statement => {
551 self.tcx.emit_spanned_lint(
555 errors::TargetFeatureOnStatement,
559 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
560 // `#[target_feature]` attribute with just a lint, because we previously
561 // erroneously allowed it and some crates used it accidentally, to to be compatible
562 // with crates depending on them, we can't throw an error here.
563 Target::Field | Target::Arm | Target::MacroDef => {
564 self.inline_attr_str_error_with_macro_def(hir_id, attr, "target_feature");
568 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToFn {
569 attr_span: attr.span,
577 /// Checks if the `#[thread_local]` attribute on `item` is valid. Returns `true` if valid.
578 fn check_thread_local(&self, attr: &Attribute, span: Span, target: Target) -> bool {
580 Target::ForeignStatic | Target::Static => true,
582 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToStatic {
583 attr_span: attr.span,
591 fn doc_attr_str_error(&self, meta: &NestedMetaItem, attr_name: &str) {
592 self.tcx.sess.emit_err(errors::DocExpectStr { attr_span: meta.span(), attr_name });
595 fn check_doc_alias_value(
597 meta: &NestedMetaItem,
602 aliases: &mut FxHashMap<String, Span>,
605 let span = meta.name_value_literal_span().unwrap_or_else(|| meta.span());
607 &format!("`#[doc(alias{})]`", if is_list { "(\"...\")" } else { " = \"...\"" });
608 if doc_alias == kw::Empty {
609 tcx.sess.emit_err(errors::DocAliasEmpty { span, attr_str });
613 let doc_alias_str = doc_alias.as_str();
614 if let Some(c) = doc_alias_str
616 .find(|&c| c == '"' || c == '\'' || (c.is_whitespace() && c != ' '))
618 tcx.sess.emit_err(errors::DocAliasBadChar { span, attr_str, char_: c });
621 if doc_alias_str.starts_with(' ') || doc_alias_str.ends_with(' ') {
622 tcx.sess.emit_err(errors::DocAliasStartEnd { span, attr_str });
626 let span = meta.span();
627 if let Some(location) = match target {
629 let parent_hir_id = self.tcx.hir().get_parent_item(hir_id);
630 let containing_item = self.tcx.hir().expect_item(parent_hir_id);
631 if Target::from_item(containing_item) == Target::Impl {
632 Some("type alias in implementation block")
637 Target::AssocConst => {
638 let parent_hir_id = self.tcx.hir().get_parent_item(hir_id);
639 let containing_item = self.tcx.hir().expect_item(parent_hir_id);
640 // We can't link to trait impl's consts.
641 let err = "associated constant in trait implementation block";
642 match containing_item.kind {
643 ItemKind::Impl(hir::Impl { of_trait: Some(_), .. }) => Some(err),
647 // we check the validity of params elsewhere
648 Target::Param => return false,
654 | Target::Impl => Some(target.name()),
664 | Target::ImplTraitPlaceholder
674 | Target::ForeignStatic
676 | Target::GenericParam(..)
679 | Target::ExprField => None,
681 tcx.sess.emit_err(errors::DocAliasBadLocation { span, attr_str, location });
684 let item_name = self.tcx.hir().name(hir_id);
685 if item_name == doc_alias {
686 tcx.sess.emit_err(errors::DocAliasNotAnAlias { span, attr_str });
689 if let Err(entry) = aliases.try_insert(doc_alias_str.to_owned(), span) {
690 self.tcx.emit_spanned_lint(
694 errors::DocAliasDuplicated { first_defn: *entry.entry.get() },
702 meta: &NestedMetaItem,
705 aliases: &mut FxHashMap<String, Span>,
707 if let Some(values) = meta.meta_item_list() {
711 Some(l) => match l.kind {
712 LitKind::Str(s, _) => {
713 if !self.check_doc_alias_value(v, s, hir_id, target, true, aliases) {
720 .emit_err(errors::DocAliasNotStringLiteral { span: v.span() });
725 self.tcx.sess.emit_err(errors::DocAliasNotStringLiteral { span: v.span() });
731 } else if let Some(doc_alias) = meta.value_str() {
732 self.check_doc_alias_value(meta, doc_alias, hir_id, target, false, aliases)
734 self.tcx.sess.emit_err(errors::DocAliasMalformed { span: meta.span() });
739 fn check_doc_keyword(&self, meta: &NestedMetaItem, hir_id: HirId) -> bool {
740 let doc_keyword = meta.value_str().unwrap_or(kw::Empty);
741 if doc_keyword == kw::Empty {
742 self.doc_attr_str_error(meta, "keyword");
745 match self.tcx.hir().find(hir_id).and_then(|node| match node {
746 hir::Node::Item(item) => Some(&item.kind),
749 Some(ItemKind::Mod(ref module)) => {
750 if !module.item_ids.is_empty() {
751 self.tcx.sess.emit_err(errors::DocKeywordEmptyMod { span: meta.span() });
756 self.tcx.sess.emit_err(errors::DocKeywordNotMod { span: meta.span() });
760 if !rustc_lexer::is_ident(doc_keyword.as_str()) {
761 self.tcx.sess.emit_err(errors::DocKeywordInvalidIdent {
762 span: meta.name_value_literal_span().unwrap_or_else(|| meta.span()),
770 fn check_doc_fake_variadic(&self, meta: &NestedMetaItem, hir_id: HirId) -> bool {
771 match self.tcx.hir().find(hir_id).and_then(|node| match node {
772 hir::Node::Item(item) => Some(&item.kind),
775 Some(ItemKind::Impl(ref i)) => {
776 let is_valid = matches!(&i.self_ty.kind, hir::TyKind::Tup([_]))
777 || if let hir::TyKind::BareFn(bare_fn_ty) = &i.self_ty.kind {
778 bare_fn_ty.decl.inputs.len() == 1
783 self.tcx.sess.emit_err(errors::DocFakeVariadicNotValid { span: meta.span() });
788 self.tcx.sess.emit_err(errors::DocKeywordOnlyImpl { span: meta.span() });
795 /// Checks `#[doc(inline)]`/`#[doc(no_inline)]` attributes. Returns `true` if valid.
797 /// A doc inlining attribute is invalid if it is applied to a non-`use` item, or
798 /// if there are conflicting attributes for one item.
800 /// `specified_inline` is used to keep track of whether we have
801 /// already seen an inlining attribute for this item.
802 /// If so, `specified_inline` holds the value and the span of
803 /// the first `inline`/`no_inline` attribute.
807 meta: &NestedMetaItem,
810 specified_inline: &mut Option<(bool, Span)>,
812 if target == Target::Use || target == Target::ExternCrate {
813 let do_inline = meta.name_or_empty() == sym::inline;
814 if let Some((prev_inline, prev_span)) = *specified_inline {
815 if do_inline != prev_inline {
816 let mut spans = MultiSpan::from_spans(vec![prev_span, meta.span()]);
817 spans.push_span_label(prev_span, fluent::passes::doc_inline_conflict_first);
818 spans.push_span_label(meta.span(), fluent::passes::doc_inline_conflict_second);
819 self.tcx.sess.emit_err(errors::DocKeywordConflict { spans });
824 *specified_inline = Some((do_inline, meta.span()));
828 self.tcx.emit_spanned_lint(
829 INVALID_DOC_ATTRIBUTES,
832 errors::DocInlineOnlyUse {
833 attr_span: meta.span(),
834 item_span: (attr.style == AttrStyle::Outer)
835 .then(|| self.tcx.hir().span(hir_id)),
842 /// Checks that an attribute is *not* used at the crate level. Returns `true` if valid.
843 fn check_attr_not_crate_level(
845 meta: &NestedMetaItem,
849 if CRATE_HIR_ID == hir_id {
850 self.tcx.sess.emit_err(errors::DocAttrNotCrateLevel { span: meta.span(), attr_name });
856 /// Checks that an attribute is used at the crate level. Returns `true` if valid.
857 fn check_attr_crate_level(
860 meta: &NestedMetaItem,
863 if hir_id != CRATE_HIR_ID {
864 self.tcx.struct_span_lint_hir(INVALID_DOC_ATTRIBUTES, hir_id, meta.span(), |lint| {
865 let mut err = lint.build(fluent::passes::attr_crate_level);
866 if attr.style == AttrStyle::Outer
867 && self.tcx.hir().get_parent_item(hir_id) == CRATE_DEF_ID
869 if let Ok(mut src) = self.tcx.sess.source_map().span_to_snippet(attr.span) {
871 err.span_suggestion_verbose(
873 fluent::passes::suggestion,
875 Applicability::MaybeIncorrect,
878 err.span_help(attr.span, fluent::passes::help);
881 err.note(fluent::passes::note).emit();
888 /// Checks that `doc(test(...))` attribute contains only valid attributes. Returns `true` if
890 fn check_test_attr(&self, meta: &NestedMetaItem, hir_id: HirId) -> bool {
891 let mut is_valid = true;
892 if let Some(metas) = meta.meta_item_list() {
893 for i_meta in metas {
894 match i_meta.name_or_empty() {
895 sym::attr | sym::no_crate_inject => {}
897 self.tcx.emit_spanned_lint(
898 INVALID_DOC_ATTRIBUTES,
901 errors::DocTestUnknown {
902 path: rustc_ast_pretty::pprust::path_to_string(
903 &i_meta.meta_item().unwrap().path,
912 self.tcx.emit_spanned_lint(
913 INVALID_DOC_ATTRIBUTES,
916 errors::DocTestTakesList,
923 /// Runs various checks on `#[doc]` attributes. Returns `true` if valid.
925 /// `specified_inline` should be initialized to `None` and kept for the scope
926 /// of one item. Read the documentation of [`check_doc_inline`] for more information.
928 /// [`check_doc_inline`]: Self::check_doc_inline
934 specified_inline: &mut Option<(bool, Span)>,
935 aliases: &mut FxHashMap<String, Span>,
937 let mut is_valid = true;
939 if let Some(mi) = attr.meta() && let Some(list) = mi.meta_item_list() {
941 if let Some(i_meta) = meta.meta_item() {
942 match i_meta.name_or_empty() {
944 if !self.check_attr_not_crate_level(meta, hir_id, "alias")
945 || !self.check_doc_alias(meta, hir_id, target, aliases) =>
951 if !self.check_attr_not_crate_level(meta, hir_id, "keyword")
952 || !self.check_doc_keyword(meta, hir_id) =>
958 if !self.check_attr_not_crate_level(meta, hir_id, "fake_variadic")
959 || !self.check_doc_fake_variadic(meta, hir_id) =>
964 sym::html_favicon_url
966 | sym::html_playground_url
967 | sym::issue_tracker_base_url
969 | sym::html_no_source
971 if !self.check_attr_crate_level(attr, meta, hir_id) =>
976 sym::inline | sym::no_inline
977 if !self.check_doc_inline(
988 // no_default_passes: deprecated
989 // passes: deprecated
990 // plugins: removed, but rustdoc warns about it itself
995 | sym::html_favicon_url
997 | sym::html_no_source
998 | sym::html_playground_url
1001 | sym::issue_tracker_base_url
1004 | sym::no_default_passes
1006 | sym::notable_trait
1009 | sym::fake_variadic => {}
1012 if !self.check_test_attr(meta, hir_id) {
1018 if !self.tcx.features().rustdoc_internals {
1019 self.tcx.emit_spanned_lint(
1020 INVALID_DOC_ATTRIBUTES,
1023 errors::DocPrimitive,
1029 let path = rustc_ast_pretty::pprust::path_to_string(&i_meta.path);
1030 if i_meta.has_name(sym::spotlight) {
1031 self.tcx.emit_spanned_lint(
1032 INVALID_DOC_ATTRIBUTES,
1035 errors::DocTestUnknownSpotlight {
1040 } else if i_meta.has_name(sym::include) &&
1041 let Some(value) = i_meta.value_str() {
1042 let applicability = if list.len() == 1 {
1043 Applicability::MachineApplicable
1045 Applicability::MaybeIncorrect
1047 // If there are multiple attributes, the suggestion would suggest
1048 // deleting all of them, which is incorrect.
1049 self.tcx.emit_spanned_lint(
1050 INVALID_DOC_ATTRIBUTES,
1053 errors::DocTestUnknownInclude {
1055 value: value.to_string(),
1056 inner: (attr.style == AttrStyle::Inner)
1059 sugg: (attr.meta().unwrap().span, applicability),
1063 self.tcx.emit_spanned_lint(
1064 INVALID_DOC_ATTRIBUTES,
1067 errors::DocTestUnknownAny { path }
1074 self.tcx.emit_spanned_lint(
1075 INVALID_DOC_ATTRIBUTES,
1088 /// Warns against some misuses of `#[pass_by_value]`
1089 fn check_pass_by_value(&self, attr: &Attribute, span: Span, target: Target) -> bool {
1091 Target::Struct | Target::Enum | Target::TyAlias => true,
1093 self.tcx.sess.emit_err(errors::PassByValue { attr_span: attr.span, span });
1099 fn check_allow_incoherent_impl(&self, attr: &Attribute, span: Span, target: Target) -> bool {
1101 Target::Method(MethodKind::Inherent) => true,
1103 self.tcx.sess.emit_err(errors::AllowIncoherentImpl { attr_span: attr.span, span });
1109 fn check_has_incoherent_inherent_impls(
1116 Target::Trait | Target::Struct | Target::Enum | Target::Union | Target::ForeignTy => {
1122 .emit_err(errors::HasIncoherentInherentImpl { attr_span: attr.span, span });
1128 /// Warns against some misuses of `#[must_use]`
1129 fn check_must_use(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) -> bool {
1130 let node = self.tcx.hir().get(hir_id);
1131 if let Some(kind) = node.fn_kind() && let rustc_hir::IsAsync::Async = kind.asyncness() {
1132 self.tcx.emit_spanned_lint(
1136 errors::MustUseAsync { span }
1148 // `impl Trait` in return position can trip
1149 // `unused_must_use` if `Trait` is marked as
1153 let article = match target {
1158 | Target::Expression
1160 | Target::AssocConst
1161 | Target::AssocTy => "an",
1165 self.tcx.emit_spanned_lint(
1169 errors::MustUseNoEffect { article, target },
1173 // For now, its always valid
1177 /// Checks if `#[must_not_suspend]` is applied to a function. Returns `true` if valid.
1178 fn check_must_not_suspend(&self, attr: &Attribute, span: Span, target: Target) -> bool {
1180 Target::Struct | Target::Enum | Target::Union | Target::Trait => true,
1182 self.tcx.sess.emit_err(errors::MustNotSuspend { attr_span: attr.span, span });
1188 /// Checks if `#[cold]` is applied to a non-function. Returns `true` if valid.
1189 fn check_cold(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) {
1191 Target::Fn | Target::Method(..) | Target::ForeignFn | Target::Closure => {}
1192 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1193 // `#[cold]` attribute with just a lint, because we previously
1194 // erroneously allowed it and some crates used it accidentally, to to be compatible
1195 // with crates depending on them, we can't throw an error here.
1196 Target::Field | Target::Arm | Target::MacroDef => {
1197 self.inline_attr_str_error_with_macro_def(hir_id, attr, "cold");
1200 // FIXME: #[cold] was previously allowed on non-functions and some crates used
1201 // this, so only emit a warning.
1202 self.tcx.emit_spanned_lint(
1206 errors::Cold { span },
1212 /// Checks if `#[link]` is applied to an item other than a foreign module.
1213 fn check_link(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) {
1214 if target == Target::ForeignMod
1215 && let hir::Node::Item(item) = self.tcx.hir().get(hir_id)
1216 && let Item { kind: ItemKind::ForeignMod { abi, .. }, .. } = item
1217 && !matches!(abi, Abi::Rust | Abi::RustIntrinsic | Abi::PlatformIntrinsic)
1222 self.tcx.emit_spanned_lint(
1226 errors::Link { span: (target != Target::ForeignMod).then_some(span) },
1230 /// Checks if `#[link_name]` is applied to an item other than a foreign function or static.
1231 fn check_link_name(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) {
1233 Target::ForeignFn | Target::ForeignStatic => {}
1234 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1235 // `#[link_name]` attribute with just a lint, because we previously
1236 // erroneously allowed it and some crates used it accidentally, to to be compatible
1237 // with crates depending on them, we can't throw an error here.
1238 Target::Field | Target::Arm | Target::MacroDef => {
1239 self.inline_attr_str_error_with_macro_def(hir_id, attr, "link_name");
1242 // FIXME: #[cold] was previously allowed on non-functions/statics and some crates
1243 // used this, so only emit a warning.
1244 let attr_span = matches!(target, Target::ForeignMod).then_some(attr.span);
1245 if let Some(s) = attr.value_str() {
1246 self.tcx.emit_spanned_lint(
1250 errors::LinkName { span, attr_span, value: s.as_str() },
1253 self.tcx.emit_spanned_lint(
1257 errors::LinkName { span, attr_span, value: "..." },
1264 /// Checks if `#[no_link]` is applied to an `extern crate`. Returns `true` if valid.
1265 fn check_no_link(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) -> bool {
1267 Target::ExternCrate => true,
1268 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1269 // `#[no_link]` attribute with just a lint, because we previously
1270 // erroneously allowed it and some crates used it accidentally, to to be compatible
1271 // with crates depending on them, we can't throw an error here.
1272 Target::Field | Target::Arm | Target::MacroDef => {
1273 self.inline_attr_str_error_with_macro_def(hir_id, attr, "no_link");
1277 self.tcx.sess.emit_err(errors::NoLink { attr_span: attr.span, span });
1283 fn is_impl_item(&self, hir_id: HirId) -> bool {
1284 matches!(self.tcx.hir().get(hir_id), hir::Node::ImplItem(..))
1287 /// Checks if `#[export_name]` is applied to a function or static. Returns `true` if valid.
1288 fn check_export_name(
1296 Target::Static | Target::Fn => true,
1297 Target::Method(..) if self.is_impl_item(hir_id) => true,
1298 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1299 // `#[export_name]` attribute with just a lint, because we previously
1300 // erroneously allowed it and some crates used it accidentally, to to be compatible
1301 // with crates depending on them, we can't throw an error here.
1302 Target::Field | Target::Arm | Target::MacroDef => {
1303 self.inline_attr_str_error_with_macro_def(hir_id, attr, "export_name");
1307 self.tcx.sess.emit_err(errors::ExportName { attr_span: attr.span, span });
1313 fn check_rustc_layout_scalar_valid_range(
1319 if target != Target::Struct {
1320 self.tcx.sess.emit_err(errors::RustcLayoutScalarValidRangeNotStruct {
1321 attr_span: attr.span,
1327 let Some(list) = attr.meta_item_list() else {
1331 if matches!(&list[..], &[NestedMetaItem::Literal(Lit { kind: LitKind::Int(..), .. })]) {
1334 self.tcx.sess.emit_err(errors::RustcLayoutScalarValidRangeArg { attr_span: attr.span });
1339 /// Checks if `#[rustc_legacy_const_generics]` is applied to a function and has a valid argument.
1340 fn check_rustc_legacy_const_generics(
1345 item: Option<ItemLike<'_>>,
1347 let is_function = matches!(target, Target::Fn);
1349 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToFn {
1350 attr_span: attr.span,
1356 let Some(list) = attr.meta_item_list() else {
1357 // The attribute form is validated on AST.
1361 let Some(ItemLike::Item(Item {
1362 kind: ItemKind::Fn(FnSig { decl, .. }, generics, _),
1365 bug!("should be a function item");
1368 for param in generics.params {
1370 hir::GenericParamKind::Const { .. } => {}
1372 self.tcx.sess.emit_err(errors::RustcLegacyConstGenericsOnly {
1373 attr_span: attr.span,
1374 param_span: param.span,
1381 if list.len() != generics.params.len() {
1382 self.tcx.sess.emit_err(errors::RustcLegacyConstGenericsIndex {
1383 attr_span: attr.span,
1384 generics_span: generics.span,
1389 let arg_count = decl.inputs.len() as u128 + generics.params.len() as u128;
1390 let mut invalid_args = vec![];
1392 if let Some(LitKind::Int(val, _)) = meta.literal().map(|lit| &lit.kind) {
1393 if *val >= arg_count {
1394 let span = meta.span();
1395 self.tcx.sess.emit_err(errors::RustcLegacyConstGenericsIndexExceed {
1397 arg_count: arg_count as usize,
1402 invalid_args.push(meta.span());
1406 if !invalid_args.is_empty() {
1407 self.tcx.sess.emit_err(errors::RustcLegacyConstGenericsIndexNegative { invalid_args });
1414 /// Helper function for checking that the provided attribute is only applied to a function or
1416 fn check_applied_to_fn_or_method(&self, attr: &Attribute, span: Span, target: Target) -> bool {
1417 let is_function = matches!(target, Target::Fn | Target::Method(..));
1419 self.tcx.sess.emit_err(errors::AttrShouldBeAppliedToFn {
1420 attr_span: attr.span,
1429 /// Checks that the `#[rustc_lint_query_instability]` attribute is only applied to a function
1431 fn check_rustc_lint_query_instability(
1437 self.check_applied_to_fn_or_method(attr, span, target)
1440 /// Checks that the `#[rustc_lint_diagnostics]` attribute is only applied to a function or
1442 fn check_rustc_lint_diagnostics(&self, attr: &Attribute, span: Span, target: Target) -> bool {
1443 self.check_applied_to_fn_or_method(attr, span, target)
1446 /// Checks that the `#[rustc_lint_opt_ty]` attribute is only applied to a struct.
1447 fn check_rustc_lint_opt_ty(&self, attr: &Attribute, span: Span, target: Target) -> bool {
1449 Target::Struct => true,
1451 self.tcx.sess.emit_err(errors::RustcLintOptTy { attr_span: attr.span, span });
1457 /// Checks that the `#[rustc_lint_opt_deny_field_access]` attribute is only applied to a field.
1458 fn check_rustc_lint_opt_deny_field_access(
1465 Target::Field => true,
1469 .emit_err(errors::RustcLintOptDenyFieldAccess { attr_span: attr.span, span });
1475 /// Checks that the dep-graph debugging attributes are only present when the query-dep-graph
1476 /// option is passed to the compiler.
1477 fn check_rustc_dirty_clean(&self, attr: &Attribute) -> bool {
1478 if self.tcx.sess.opts.unstable_opts.query_dep_graph {
1481 self.tcx.sess.emit_err(errors::RustcDirtyClean { span: attr.span });
1486 /// Checks if `#[link_section]` is applied to a function or static.
1487 fn check_link_section(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) {
1489 Target::Static | Target::Fn | Target::Method(..) => {}
1490 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1491 // `#[link_section]` attribute with just a lint, because we previously
1492 // erroneously allowed it and some crates used it accidentally, to to be compatible
1493 // with crates depending on them, we can't throw an error here.
1494 Target::Field | Target::Arm | Target::MacroDef => {
1495 self.inline_attr_str_error_with_macro_def(hir_id, attr, "link_section");
1498 // FIXME: #[link_section] was previously allowed on non-functions/statics and some
1499 // crates used this, so only emit a warning.
1500 self.tcx.emit_spanned_lint(
1504 errors::LinkSection { span },
1510 /// Checks if `#[no_mangle]` is applied to a function or static.
1511 fn check_no_mangle(&self, hir_id: HirId, attr: &Attribute, span: Span, target: Target) {
1513 Target::Static | Target::Fn => {}
1514 Target::Method(..) if self.is_impl_item(hir_id) => {}
1515 // FIXME(#80564): We permit struct fields, match arms and macro defs to have an
1516 // `#[no_mangle]` attribute with just a lint, because we previously
1517 // erroneously allowed it and some crates used it accidentally, to to be compatible
1518 // with crates depending on them, we can't throw an error here.
1519 Target::Field | Target::Arm | Target::MacroDef => {
1520 self.inline_attr_str_error_with_macro_def(hir_id, attr, "no_mangle");
1522 // FIXME: #[no_mangle] was previously allowed on non-functions/statics, this should be an error
1523 // The error should specify that the item that is wrong is specifically a *foreign* fn/static
1524 // otherwise the error seems odd
1525 Target::ForeignFn | Target::ForeignStatic => {
1526 let foreign_item_kind = match target {
1527 Target::ForeignFn => "function",
1528 Target::ForeignStatic => "static",
1529 _ => unreachable!(),
1531 self.tcx.emit_spanned_lint(
1535 errors::NoMangleForeign { span, attr_span: attr.span, foreign_item_kind },
1539 // FIXME: #[no_mangle] was previously allowed on non-functions/statics and some
1540 // crates used this, so only emit a warning.
1541 self.tcx.emit_spanned_lint(
1545 errors::NoMangle { span },
1551 /// Checks if the `#[repr]` attributes on `item` are valid.
1554 attrs: &[Attribute],
1557 item: Option<ItemLike<'_>>,
1560 // Extract the names of all repr hints, e.g., [foo, bar, align] for:
1563 // #[repr(bar, align(8))]
1565 let hints: Vec<_> = attrs
1567 .filter(|attr| attr.has_name(sym::repr))
1568 .filter_map(|attr| attr.meta_item_list())
1572 let mut int_reprs = 0;
1573 let mut is_c = false;
1574 let mut is_simd = false;
1575 let mut is_transparent = false;
1577 for hint in &hints {
1578 if !hint.is_meta_item() {
1579 self.tcx.sess.emit_err(errors::ReprIdent { span: hint.span() });
1583 let (article, allowed_targets) = match hint.name_or_empty() {
1587 Target::Struct | Target::Union | Target::Enum => continue,
1588 _ => ("a", "struct, enum, or union"),
1592 if let (Target::Fn, false) = (target, self.tcx.features().fn_align) {
1594 &self.tcx.sess.parse_sess,
1597 "`repr(align)` attributes on functions are unstable",
1603 Target::Struct | Target::Union | Target::Enum | Target::Fn => continue,
1604 _ => ("a", "struct, enum, function, or union"),
1608 if target != Target::Struct && target != Target::Union {
1609 ("a", "struct or union")
1616 if target != Target::Struct {
1622 sym::transparent => {
1623 is_transparent = true;
1625 Target::Struct | Target::Union | Target::Enum => continue,
1626 _ => ("a", "struct, enum, or union"),
1642 if target != Target::Enum {
1653 "unrecognized representation hint"
1655 .help("valid reprs are `C`, `align`, `packed`, `transparent`, `simd`, `i8`, `u8`, `i16`, `u16`, `i32`, `u32`, `i64`, `u64`, `i128`, `u128`, `isize`, `usize`")
1667 &format!("attribute should be applied to {article} {allowed_targets}")
1669 .span_label(span, &format!("not {article} {allowed_targets}"))
1673 // Just point at all repr hints if there are any incompatibilities.
1674 // This is not ideal, but tracking precisely which ones are at fault is a huge hassle.
1675 let hint_spans = hints.iter().map(|hint| hint.span());
1677 // Error on repr(transparent, <anything else>).
1678 if is_transparent && hints.len() > 1 {
1679 let hint_spans: Vec<_> = hint_spans.clone().collect();
1684 "transparent {} cannot have other repr hints",
1689 // Warn on repr(u8, u16), repr(C, simd), and c-like-enum-repr(C, u8)
1691 || (is_simd && is_c)
1694 && item.map_or(false, |item| {
1695 if let ItemLike::Item(item) = item {
1696 return is_c_like_enum(item);
1701 self.tcx.emit_spanned_lint(
1702 CONFLICTING_REPR_HINTS,
1704 hint_spans.collect::<Vec<Span>>(),
1705 errors::ReprConflicting,
1710 fn check_used(&self, attrs: &[Attribute], target: Target) {
1711 let mut used_linker_span = None;
1712 let mut used_compiler_span = None;
1713 for attr in attrs.iter().filter(|attr| attr.has_name(sym::used)) {
1714 if target != Target::Static {
1715 self.tcx.sess.emit_err(errors::UsedStatic { span: attr.span });
1717 let inner = attr.meta_item_list();
1718 match inner.as_deref() {
1719 Some([item]) if item.has_name(sym::linker) => {
1720 if used_linker_span.is_none() {
1721 used_linker_span = Some(attr.span);
1724 Some([item]) if item.has_name(sym::compiler) => {
1725 if used_compiler_span.is_none() {
1726 used_compiler_span = Some(attr.span);
1730 // This error case is handled in rustc_typeck::collect.
1733 // Default case (compiler) when arg isn't defined.
1734 if used_compiler_span.is_none() {
1735 used_compiler_span = Some(attr.span);
1740 if let (Some(linker_span), Some(compiler_span)) = (used_linker_span, used_compiler_span) {
1743 .emit_err(errors::UsedCompilerLinker { spans: vec![linker_span, compiler_span] });
1747 /// Outputs an error for `#[allow_internal_unstable]` which can only be applied to macros.
1748 /// (Allows proc_macro functions)
1749 fn check_allow_internal_unstable(
1755 attrs: &[Attribute],
1757 debug!("Checking target: {:?}", target);
1761 if self.tcx.sess.is_proc_macro_attr(attr) {
1762 debug!("Is proc macro attr");
1766 debug!("Is not proc macro attr");
1769 Target::MacroDef => true,
1770 // FIXME(#80564): We permit struct fields and match arms to have an
1771 // `#[allow_internal_unstable]` attribute with just a lint, because we previously
1772 // erroneously allowed it and some crates used it accidentally, to to be compatible
1773 // with crates depending on them, we can't throw an error here.
1774 Target::Field | Target::Arm => {
1775 self.inline_attr_str_error_without_macro_def(
1778 "allow_internal_unstable",
1785 .emit_err(errors::AllowInternalUnstable { attr_span: attr.span, span });
1791 /// Checks if the items on the `#[debugger_visualizer]` attribute are valid.
1792 fn check_debugger_visualizer(&self, attr: &Attribute, target: Target) -> bool {
1796 self.tcx.sess.emit_err(errors::DebugVisualizerPlacement { span: attr.span });
1801 let Some(hints) = attr.meta_item_list() else {
1802 self.tcx.sess.emit_err(errors::DebugVisualizerInvalid { span: attr.span });
1806 let hint = match hints.len() {
1809 self.tcx.sess.emit_err(errors::DebugVisualizerInvalid { span: attr.span });
1814 let Some(meta_item) = hint.meta_item() else {
1815 self.tcx.sess.emit_err(errors::DebugVisualizerInvalid { span: attr.span });
1819 let visualizer_path = match (meta_item.name_or_empty(), meta_item.value_str()) {
1820 (sym::natvis_file, Some(value)) => value,
1821 (sym::gdb_script_file, Some(value)) => value,
1823 self.tcx.sess.emit_err(errors::DebugVisualizerInvalid { span: meta_item.span });
1829 match resolve_path(&self.tcx.sess.parse_sess, visualizer_path.as_str(), attr.span) {
1837 match std::fs::File::open(&file) {
1844 &format!("couldn't read {}: {}", file.display(), err),
1852 /// Outputs an error for `#[allow_internal_unstable]` which can only be applied to macros.
1853 /// (Allows proc_macro functions)
1854 fn check_rustc_allow_const_fn_unstable(
1862 Target::Fn | Target::Method(_)
1863 if self.tcx.is_const_fn_raw(self.tcx.hir().local_def_id(hir_id).to_def_id()) =>
1867 // FIXME(#80564): We permit struct fields and match arms to have an
1868 // `#[allow_internal_unstable]` attribute with just a lint, because we previously
1869 // erroneously allowed it and some crates used it accidentally, to to be compatible
1870 // with crates depending on them, we can't throw an error here.
1871 Target::Field | Target::Arm | Target::MacroDef => {
1872 self.inline_attr_str_error_with_macro_def(hir_id, attr, "allow_internal_unstable");
1878 .emit_err(errors::RustcAllowConstFnUnstable { attr_span: attr.span, span });
1884 fn check_rustc_std_internal_symbol(
1891 Target::Fn | Target::Static => true,
1895 .emit_err(errors::RustcStdInternalSymbol { attr_span: attr.span, span });
1901 /// `#[const_trait]` only applies to traits.
1902 fn check_const_trait(&self, attr: &Attribute, _span: Span, target: Target) -> bool {
1904 Target::Trait => true,
1906 self.tcx.sess.emit_err(errors::ConstTrait { attr_span: attr.span });
1912 fn check_stability_promotable(&self, attr: &Attribute, _span: Span, target: Target) -> bool {
1914 Target::Expression => {
1915 self.tcx.sess.emit_err(errors::StabilityPromotable { attr_span: attr.span });
1922 fn check_link_ordinal(&self, attr: &Attribute, _span: Span, target: Target) -> bool {
1924 Target::ForeignFn | Target::ForeignStatic => true,
1926 self.tcx.sess.emit_err(errors::LinkOrdinal { attr_span: attr.span });
1932 fn check_deprecated(&self, hir_id: HirId, attr: &Attribute, _span: Span, target: Target) {
1934 Target::Closure | Target::Expression | Target::Statement | Target::Arm => {
1935 self.tcx.emit_spanned_lint(
1946 fn check_macro_use(&self, hir_id: HirId, attr: &Attribute, target: Target) {
1947 let name = attr.name_or_empty();
1949 Target::ExternCrate | Target::Mod => {}
1951 self.tcx.emit_spanned_lint(
1955 errors::MacroUse { name },
1961 fn check_macro_export(&self, hir_id: HirId, attr: &Attribute, target: Target) {
1962 if target != Target::MacroDef {
1963 self.tcx.emit_spanned_lint(UNUSED_ATTRIBUTES, hir_id, attr.span, errors::MacroExport);
1967 fn check_plugin_registrar(&self, hir_id: HirId, attr: &Attribute, target: Target) {
1968 if target != Target::Fn {
1969 self.tcx.emit_spanned_lint(
1973 errors::PluginRegistrar,
1978 fn check_unused_attribute(&self, hir_id: HirId, attr: &Attribute) {
1979 // Warn on useless empty attributes.
1980 let note = if matches!(
1981 attr.name_or_empty(),
1990 | sym::target_feature
1991 ) && attr.meta_item_list().map_or(false, |list| list.is_empty())
1993 errors::UnusedNote::EmptyList { name: attr.name_or_empty() }
1995 attr.name_or_empty(),
1996 sym::allow | sym::warn | sym::deny | sym::forbid | sym::expect
1997 ) && let Some(meta) = attr.meta_item_list()
1999 && let Some(item) = meta[0].meta_item()
2000 && let MetaItemKind::NameValue(_) = &item.kind
2001 && item.path == sym::reason
2003 errors::UnusedNote::NoLints { name: attr.name_or_empty() }
2004 } else if attr.name_or_empty() == sym::default_method_body_is_const {
2005 errors::UnusedNote::DefaultMethodBodyConst
2010 self.tcx.emit_spanned_lint(
2014 errors::Unused { attr_span: attr.span, note },
2019 impl<'tcx> Visitor<'tcx> for CheckAttrVisitor<'tcx> {
2020 type NestedFilter = nested_filter::OnlyBodies;
2022 fn nested_visit_map(&mut self) -> Self::Map {
2026 fn visit_item(&mut self, item: &'tcx Item<'tcx>) {
2027 // Historically we've run more checks on non-exported than exported macros,
2028 // so this lets us continue to run them while maintaining backwards compatibility.
2029 // In the long run, the checks should be harmonized.
2030 if let ItemKind::Macro(ref macro_def, _) = item.kind {
2031 let def_id = item.def_id.to_def_id();
2032 if macro_def.macro_rules && !self.tcx.has_attr(def_id, sym::macro_export) {
2033 check_non_exported_macro_for_invalid_attrs(self.tcx, item);
2037 let target = Target::from_item(item);
2038 self.check_attributes(item.hir_id(), item.span, target, Some(ItemLike::Item(item)));
2039 intravisit::walk_item(self, item)
2042 fn visit_generic_param(&mut self, generic_param: &'tcx hir::GenericParam<'tcx>) {
2043 let target = Target::from_generic_param(generic_param);
2044 self.check_attributes(generic_param.hir_id, generic_param.span, target, None);
2045 intravisit::walk_generic_param(self, generic_param)
2048 fn visit_trait_item(&mut self, trait_item: &'tcx TraitItem<'tcx>) {
2049 let target = Target::from_trait_item(trait_item);
2050 self.check_attributes(trait_item.hir_id(), trait_item.span, target, None);
2051 intravisit::walk_trait_item(self, trait_item)
2054 fn visit_field_def(&mut self, struct_field: &'tcx hir::FieldDef<'tcx>) {
2055 self.check_attributes(struct_field.hir_id, struct_field.span, Target::Field, None);
2056 intravisit::walk_field_def(self, struct_field);
2059 fn visit_arm(&mut self, arm: &'tcx hir::Arm<'tcx>) {
2060 self.check_attributes(arm.hir_id, arm.span, Target::Arm, None);
2061 intravisit::walk_arm(self, arm);
2064 fn visit_foreign_item(&mut self, f_item: &'tcx ForeignItem<'tcx>) {
2065 let target = Target::from_foreign_item(f_item);
2066 self.check_attributes(f_item.hir_id(), f_item.span, target, Some(ItemLike::ForeignItem));
2067 intravisit::walk_foreign_item(self, f_item)
2070 fn visit_impl_item(&mut self, impl_item: &'tcx hir::ImplItem<'tcx>) {
2071 let target = target_from_impl_item(self.tcx, impl_item);
2072 self.check_attributes(impl_item.hir_id(), impl_item.span, target, None);
2073 intravisit::walk_impl_item(self, impl_item)
2076 fn visit_stmt(&mut self, stmt: &'tcx hir::Stmt<'tcx>) {
2077 // When checking statements ignore expressions, they will be checked later.
2078 if let hir::StmtKind::Local(ref l) = stmt.kind {
2079 self.check_attributes(l.hir_id, stmt.span, Target::Statement, None);
2081 intravisit::walk_stmt(self, stmt)
2084 fn visit_expr(&mut self, expr: &'tcx hir::Expr<'tcx>) {
2085 let target = match expr.kind {
2086 hir::ExprKind::Closure { .. } => Target::Closure,
2087 _ => Target::Expression,
2090 self.check_attributes(expr.hir_id, expr.span, target, None);
2091 intravisit::walk_expr(self, expr)
2094 fn visit_expr_field(&mut self, field: &'tcx hir::ExprField<'tcx>) {
2095 self.check_attributes(field.hir_id, field.span, Target::ExprField, None);
2096 intravisit::walk_expr_field(self, field)
2099 fn visit_variant(&mut self, variant: &'tcx hir::Variant<'tcx>) {
2100 self.check_attributes(variant.id, variant.span, Target::Variant, None);
2101 intravisit::walk_variant(self, variant)
2104 fn visit_param(&mut self, param: &'tcx hir::Param<'tcx>) {
2105 self.check_attributes(param.hir_id, param.span, Target::Param, None);
2107 intravisit::walk_param(self, param);
2110 fn visit_pat_field(&mut self, field: &'tcx hir::PatField<'tcx>) {
2111 self.check_attributes(field.hir_id, field.span, Target::PatField, None);
2112 intravisit::walk_pat_field(self, field);
2116 fn is_c_like_enum(item: &Item<'_>) -> bool {
2117 if let ItemKind::Enum(ref def, _) = item.kind {
2118 for variant in def.variants {
2119 match variant.data {
2120 hir::VariantData::Unit(..) => { /* continue */ }
2130 // FIXME: Fix "Cannot determine resolution" error and remove built-in macros
2132 fn check_invalid_crate_level_attr(tcx: TyCtxt<'_>, attrs: &[Attribute]) {
2133 // Check for builtin attributes at the crate level
2134 // which were unsuccessfully resolved due to cannot determine
2135 // resolution for the attribute macro error.
2136 const ATTRS_TO_CHECK: &[Symbol] = &[
2140 sym::automatically_derived,
2147 sym::global_allocator,
2152 // This function should only be called with crate attributes
2153 // which are inner attributes always but lets check to make sure
2154 if attr.style == AttrStyle::Inner {
2155 for attr_to_check in ATTRS_TO_CHECK {
2156 if attr.has_name(*attr_to_check) {
2157 let mut err = tcx.sess.struct_span_err(
2160 "`{}` attribute cannot be used at crate level",
2161 attr_to_check.to_ident_string()
2164 // Only emit an error with a suggestion if we can create a
2165 // string out of the attribute span
2166 if let Ok(src) = tcx.sess.source_map().span_to_snippet(attr.span) {
2167 let replacement = src.replace("#!", "#");
2168 err.span_suggestion_verbose(
2170 "perhaps you meant to use an outer attribute",
2172 rustc_errors::Applicability::MachineApplicable,
2182 fn check_non_exported_macro_for_invalid_attrs(tcx: TyCtxt<'_>, item: &Item<'_>) {
2183 let attrs = tcx.hir().attrs(item.hir_id());
2186 if attr.has_name(sym::inline) {
2187 tcx.sess.emit_err(errors::NonExportedMacroInvalidAttrs { attr_span: attr.span });
2192 fn check_mod_attrs(tcx: TyCtxt<'_>, module_def_id: LocalDefId) {
2193 let check_attr_visitor = &mut CheckAttrVisitor { tcx };
2194 tcx.hir().visit_item_likes_in_module(module_def_id, check_attr_visitor);
2195 if module_def_id.is_top_level_module() {
2196 check_attr_visitor.check_attributes(CRATE_HIR_ID, DUMMY_SP, Target::Mod, None);
2197 check_invalid_crate_level_attr(tcx, tcx.hir().krate_attrs());
2201 pub(crate) fn provide(providers: &mut Providers) {
2202 *providers = Providers { check_mod_attrs, ..*providers };
2205 fn check_duplicates(
2209 duplicates: AttributeDuplicates,
2210 seen: &mut FxHashMap<Symbol, Span>,
2212 use AttributeDuplicates::*;
2213 if matches!(duplicates, WarnFollowingWordOnly) && !attr.is_word() {
2218 WarnFollowing | FutureWarnFollowing | WarnFollowingWordOnly | FutureWarnPreceding => {
2219 match seen.entry(attr.name_or_empty()) {
2220 Entry::Occupied(mut entry) => {
2221 let (this, other) = if matches!(duplicates, FutureWarnPreceding) {
2222 let to_remove = entry.insert(attr.span);
2223 (to_remove, attr.span)
2225 (attr.span, *entry.get())
2227 tcx.emit_spanned_lint(
2231 errors::UnusedDuplicate {
2236 FutureWarnFollowing | FutureWarnPreceding
2242 Entry::Vacant(entry) => {
2243 entry.insert(attr.span);
2247 ErrorFollowing | ErrorPreceding => match seen.entry(attr.name_or_empty()) {
2248 Entry::Occupied(mut entry) => {
2249 let (this, other) = if matches!(duplicates, ErrorPreceding) {
2250 let to_remove = entry.insert(attr.span);
2251 (to_remove, attr.span)
2253 (attr.span, *entry.get())
2255 tcx.sess.emit_err(errors::UnusedMultiple {
2258 name: attr.name_or_empty(),
2261 Entry::Vacant(entry) => {
2262 entry.insert(attr.span);