1 // Copyright 2012-2013 The Rust Project Developers. See the COPYRIGHT
2 // file at the top-level directory of this distribution and at
3 // http://rust-lang.org/COPYRIGHT.
5 // Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
6 // http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
7 // <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
8 // option. This file may not be copied, modified, or distributed
9 // except according to those terms.
11 //! Enforces the Rust effect system. Currently there is just one effect,
13 use self::RootUnsafeContext::*;
15 use ty::{self, Ty, TyCtxt};
21 use hir::{self, PatKind};
23 use hir::intravisit::{self, FnKind, Visitor, NestedVisitorMap};
25 #[derive(Copy, Clone)]
26 struct UnsafeContext {
27 push_unsafe_count: usize,
28 root: RootUnsafeContext,
32 fn new(root: RootUnsafeContext) -> UnsafeContext {
33 UnsafeContext { root: root, push_unsafe_count: 0 }
37 #[derive(Copy, Clone, PartialEq)]
38 enum RootUnsafeContext {
41 UnsafeBlock(ast::NodeId),
44 fn type_is_unsafe_function(ty: Ty) -> bool {
47 ty::TyFnPtr(f) => f.unsafety() == hir::Unsafety::Unsafe,
52 struct EffectCheckVisitor<'a, 'tcx: 'a> {
53 tcx: TyCtxt<'a, 'tcx, 'tcx>,
54 tables: &'a ty::TypeckTables<'tcx>,
56 /// Whether we're in an unsafe context.
57 unsafe_context: UnsafeContext,
60 impl<'a, 'tcx> EffectCheckVisitor<'a, 'tcx> {
61 fn require_unsafe_ext(&mut self, node_id: ast::NodeId, span: Span,
62 description: &str, is_lint: bool) {
63 if self.unsafe_context.push_unsafe_count > 0 { return; }
64 match self.unsafe_context.root {
67 self.tcx.sess.add_lint(lint::builtin::SAFE_EXTERN_STATICS,
70 format!("{} requires unsafe function or \
71 block (error E0133)", description));
75 self.tcx.sess, span, E0133,
76 "{} requires unsafe function or block", description)
77 .span_label(span, &description)
81 UnsafeBlock(block_id) => {
82 // OK, but record this.
83 debug!("effect: recording unsafe block as used: {}", block_id);
84 self.tcx.used_unsafe.borrow_mut().insert(block_id);
90 fn require_unsafe(&mut self, span: Span, description: &str) {
91 self.require_unsafe_ext(ast::DUMMY_NODE_ID, span, description, false)
95 impl<'a, 'tcx> Visitor<'tcx> for EffectCheckVisitor<'a, 'tcx> {
96 fn nested_visit_map<'this>(&'this mut self) -> NestedVisitorMap<'this, 'tcx> {
97 NestedVisitorMap::None
100 fn visit_nested_body(&mut self, body: hir::BodyId) {
101 let old_tables = self.tables;
102 self.tables = self.tcx.body_tables(body);
103 let body = self.tcx.hir.body(body);
104 self.visit_body(body);
105 self.tables = old_tables;
108 fn visit_fn(&mut self, fn_kind: FnKind<'tcx>, fn_decl: &'tcx hir::FnDecl,
109 body_id: hir::BodyId, span: Span, id: ast::NodeId) {
111 let (is_item_fn, is_unsafe_fn) = match fn_kind {
112 FnKind::ItemFn(_, _, unsafety, ..) =>
113 (true, unsafety == hir::Unsafety::Unsafe),
114 FnKind::Method(_, sig, ..) =>
115 (true, sig.unsafety == hir::Unsafety::Unsafe),
119 let old_unsafe_context = self.unsafe_context;
121 self.unsafe_context = UnsafeContext::new(UnsafeFn)
122 } else if is_item_fn {
123 self.unsafe_context = UnsafeContext::new(SafeContext)
126 intravisit::walk_fn(self, fn_kind, fn_decl, body_id, span, id);
128 self.unsafe_context = old_unsafe_context
131 fn visit_block(&mut self, block: &'tcx hir::Block) {
132 let old_unsafe_context = self.unsafe_context;
134 hir::UnsafeBlock(source) => {
135 // By default only the outermost `unsafe` block is
136 // "used" and so nested unsafe blocks are pointless
137 // (the inner ones are unnecessary and we actually
138 // warn about them). As such, there are two cases when
139 // we need to create a new context, when we're
140 // - outside `unsafe` and found a `unsafe` block
142 // - inside `unsafe`, found an `unsafe` block
143 // created internally to the compiler
145 // The second case is necessary to ensure that the
146 // compiler `unsafe` blocks don't accidentally "use"
147 // external blocks (e.g. `unsafe { println("") }`,
148 // expands to `unsafe { ... unsafe { ... } }` where
149 // the inner one is compiler generated).
150 if self.unsafe_context.root == SafeContext || source == hir::CompilerGenerated {
151 self.unsafe_context.root = UnsafeBlock(block.id)
154 hir::PushUnsafeBlock(..) => {
155 self.unsafe_context.push_unsafe_count =
156 self.unsafe_context.push_unsafe_count.checked_add(1).unwrap();
158 hir::PopUnsafeBlock(..) => {
159 self.unsafe_context.push_unsafe_count =
160 self.unsafe_context.push_unsafe_count.checked_sub(1).unwrap();
162 hir::DefaultBlock => {}
165 intravisit::walk_block(self, block);
167 self.unsafe_context = old_unsafe_context
170 fn visit_expr(&mut self, expr: &'tcx hir::Expr) {
172 hir::ExprMethodCall(..) => {
173 let method_call = MethodCall::expr(expr.id);
174 let base_type = self.tables.method_map[&method_call].ty;
175 debug!("effect: method call case, base type is {:?}",
177 if type_is_unsafe_function(base_type) {
178 self.require_unsafe(expr.span,
179 "invocation of unsafe method")
182 hir::ExprCall(ref base, _) => {
183 let base_type = self.tables.expr_ty_adjusted(base);
184 debug!("effect: call case, base type is {:?}",
186 if type_is_unsafe_function(base_type) {
187 self.require_unsafe(expr.span, "call to unsafe function")
190 hir::ExprUnary(hir::UnDeref, ref base) => {
191 let base_type = self.tables.expr_ty_adjusted(base);
192 debug!("effect: unary case, base type is {:?}",
194 if let ty::TyRawPtr(_) = base_type.sty {
195 self.require_unsafe(expr.span, "dereference of raw pointer")
198 hir::ExprInlineAsm(..) => {
199 self.require_unsafe(expr.span, "use of inline assembly");
201 hir::ExprPath(hir::QPath::Resolved(_, ref path)) => {
202 if let Def::Static(def_id, mutbl) = path.def {
204 self.require_unsafe(expr.span, "use of mutable static");
205 } else if match self.tcx.hir.get_if_local(def_id) {
206 Some(hir::map::NodeForeignItem(..)) => true,
208 None => self.tcx.sess.cstore.is_foreign_item(def_id),
210 self.require_unsafe_ext(expr.id, expr.span, "use of extern static", true);
214 hir::ExprField(ref base_expr, field) => {
215 if let ty::TyAdt(adt, ..) = self.tables.expr_ty_adjusted(base_expr).sty {
217 self.require_unsafe(field.span, "access to union field");
224 intravisit::walk_expr(self, expr);
227 fn visit_pat(&mut self, pat: &'tcx hir::Pat) {
228 if let PatKind::Struct(_, ref fields, _) = pat.node {
229 if let ty::TyAdt(adt, ..) = self.tables.pat_ty(pat).sty {
231 for field in fields {
232 self.require_unsafe(field.span, "matching on union field");
238 intravisit::walk_pat(self, pat);
242 pub fn check_crate<'a, 'tcx>(tcx: TyCtxt<'a, 'tcx, 'tcx>) {
243 let mut visitor = EffectCheckVisitor {
245 tables: &ty::TypeckTables::empty(),
246 unsafe_context: UnsafeContext::new(SafeContext),
249 tcx.hir.krate().visit_all_item_likes(&mut visitor.as_deep_visitor());