2016-02-01 18:53:03 +00:00
|
|
|
use rustc::lint::*;
|
2016-03-27 18:59:02 +00:00
|
|
|
use rustc::ty;
|
2016-04-07 15:46:48 +00:00
|
|
|
use rustc::hir::*;
|
2017-02-27 02:32:41 +00:00
|
|
|
use utils::{match_def_path, paths, span_note_and_lint, is_copy};
|
2016-02-01 18:53:03 +00:00
|
|
|
|
2016-08-06 07:55:04 +00:00
|
|
|
/// **What it does:** Checks for calls to `std::mem::drop` with a reference
|
|
|
|
/// instead of an owned value.
|
2016-02-01 18:53:03 +00:00
|
|
|
///
|
2016-08-06 07:55:04 +00:00
|
|
|
/// **Why is this bad?** Calling `drop` on a reference will only drop the
|
|
|
|
/// reference itself, which is a no-op. It will not call the `drop` method (from
|
|
|
|
/// the `Drop` trait implementation) on the underlying referenced value, which
|
|
|
|
/// is likely what was intended.
|
2016-02-01 18:53:03 +00:00
|
|
|
///
|
2016-08-06 07:55:04 +00:00
|
|
|
/// **Known problems:** None.
|
2016-02-01 18:53:03 +00:00
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust
|
|
|
|
/// let mut lock_guard = mutex.lock();
|
2016-02-05 23:41:54 +00:00
|
|
|
/// std::mem::drop(&lock_guard) // Should have been drop(lock_guard), mutex still locked
|
2016-02-01 18:53:03 +00:00
|
|
|
/// operation_that_requires_mutex_to_be_unlocked();
|
|
|
|
/// ```
|
2016-02-05 23:13:29 +00:00
|
|
|
declare_lint! {
|
2016-08-06 08:18:36 +00:00
|
|
|
pub DROP_REF,
|
|
|
|
Warn,
|
|
|
|
"calls to `std::mem::drop` with a reference instead of an owned value"
|
2016-02-05 23:13:29 +00:00
|
|
|
}
|
2016-02-01 18:53:03 +00:00
|
|
|
|
2016-12-30 03:43:22 +00:00
|
|
|
/// **What it does:** Checks for calls to `std::mem::forget` with a reference
|
|
|
|
/// instead of an owned value.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** Calling `forget` on a reference will only forget the
|
|
|
|
/// reference itself, which is a no-op. It will not forget the underlying referenced
|
|
|
|
/// value, which is likely what was intended.
|
|
|
|
///
|
|
|
|
/// **Known problems:** None.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust
|
|
|
|
/// let x = Box::new(1);
|
|
|
|
/// std::mem::forget(&x) // Should have been forget(x), x will still be dropped
|
|
|
|
/// ```
|
|
|
|
declare_lint! {
|
|
|
|
pub FORGET_REF,
|
|
|
|
Warn,
|
|
|
|
"calls to `std::mem::forget` with a reference instead of an owned value"
|
|
|
|
}
|
|
|
|
|
2017-02-27 02:32:41 +00:00
|
|
|
/// **What it does:** Checks for calls to `std::mem::drop` with a value
|
|
|
|
/// that derives the Copy trait
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** Calling `std::mem::drop` [does nothing for types that
|
|
|
|
/// implement Copy](https://doc.rust-lang.org/std/mem/fn.drop.html), since the
|
|
|
|
/// value will be copied and moved into the function on invocation.
|
|
|
|
///
|
|
|
|
/// **Known problems:** None.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust
|
|
|
|
/// let x:i32 = 42; // i32 implements Copy
|
|
|
|
/// std::mem::drop(x) // A copy of x is passed to the function, leaving the original unaffected
|
|
|
|
/// ```
|
|
|
|
declare_lint! {
|
|
|
|
pub DROP_COPY,
|
|
|
|
Warn,
|
|
|
|
"calls to `std::mem::drop` with a value that implements Copy"
|
|
|
|
}
|
|
|
|
|
|
|
|
/// **What it does:** Checks for calls to `std::mem::forget` with a value that
|
|
|
|
/// derives the Copy trait
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** Calling `std::mem::forget` [does nothing for types that
|
|
|
|
/// implement Copy](https://doc.rust-lang.org/std/mem/fn.drop.html) since the
|
|
|
|
/// value will be copied and moved into the function on invocation.
|
|
|
|
///
|
|
|
|
/// An alternative, but also valid, explanation is that Copy types do not implement
|
|
|
|
/// the Drop trait, which means they have no destructors. Without a destructor, there
|
|
|
|
/// is nothing for `std::mem::forget` to ignore.
|
|
|
|
///
|
|
|
|
/// **Known problems:** None.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust
|
|
|
|
/// let x:i32 = 42; // i32 implements Copy
|
|
|
|
/// std::mem::forget(x) // A copy of x is passed to the function, leaving the original unaffected
|
|
|
|
/// ```
|
|
|
|
declare_lint! {
|
|
|
|
pub FORGET_COPY,
|
|
|
|
Warn,
|
|
|
|
"calls to `std::mem::forget` with a value that implements Copy"
|
|
|
|
}
|
|
|
|
|
2017-02-27 04:07:53 +00:00
|
|
|
const DROP_REF_SUMMARY: &str = "calls to `std::mem::drop` with a reference instead of an owned value.
|
2017-02-27 02:32:41 +00:00
|
|
|
Dropping a reference does nothing.";
|
2017-02-27 04:07:53 +00:00
|
|
|
const FORGET_REF_SUMMARY: &str = "calls to `std::mem::forget` with a reference instead of an owned value.
|
2017-02-27 02:32:41 +00:00
|
|
|
Forgetting a reference does nothing.";
|
2017-02-27 04:07:53 +00:00
|
|
|
const DROP_COPY_SUMMARY: &str = "calls to `std::mem::drop` with a value that implements Copy.
|
2017-02-27 02:32:41 +00:00
|
|
|
Dropping a copy leaves the original intact.";
|
2017-02-27 04:07:53 +00:00
|
|
|
const FORGET_COPY_SUMMARY: &str = "calls to `std::mem::forget` with a value that implements Copy.
|
2017-02-27 02:32:41 +00:00
|
|
|
Forgetting a copy leaves the original intact.";
|
|
|
|
|
2016-02-01 18:53:03 +00:00
|
|
|
#[allow(missing_copy_implementations)]
|
2016-06-10 14:17:20 +00:00
|
|
|
pub struct Pass;
|
2016-02-01 18:53:03 +00:00
|
|
|
|
2016-06-10 14:17:20 +00:00
|
|
|
impl LintPass for Pass {
|
2016-02-01 18:53:03 +00:00
|
|
|
fn get_lints(&self) -> LintArray {
|
2016-12-30 03:43:22 +00:00
|
|
|
lint_array!(DROP_REF, FORGET_REF)
|
2016-02-01 18:53:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-07 12:13:40 +00:00
|
|
|
impl<'a, 'tcx> LateLintPass<'a, 'tcx> for Pass {
|
|
|
|
fn check_expr(&mut self, cx: &LateContext<'a, 'tcx>, expr: &'tcx Expr) {
|
2016-12-30 03:22:24 +00:00
|
|
|
if_let_chain!{[
|
|
|
|
let ExprCall(ref path, ref args) = expr.node,
|
|
|
|
let ExprPath(ref qpath) = path.node,
|
|
|
|
args.len() == 1,
|
|
|
|
], {
|
2017-01-13 16:04:56 +00:00
|
|
|
let def_id = cx.tables.qpath_def(qpath, path.id).def_id();
|
2016-12-30 03:43:22 +00:00
|
|
|
let lint;
|
|
|
|
let msg;
|
2016-12-30 03:22:24 +00:00
|
|
|
let arg = &args[0];
|
2017-01-13 16:04:56 +00:00
|
|
|
let arg_ty = cx.tables.expr_ty(arg);
|
2017-02-27 02:32:41 +00:00
|
|
|
|
2016-12-30 03:22:24 +00:00
|
|
|
if let ty::TyRef(..) = arg_ty.sty {
|
2017-02-27 02:32:41 +00:00
|
|
|
if match_def_path(cx.tcx, def_id, &paths::DROP) {
|
|
|
|
lint = DROP_REF;
|
|
|
|
msg = DROP_REF_SUMMARY.to_string();
|
|
|
|
} else if match_def_path(cx.tcx, def_id, &paths::MEM_FORGET) {
|
|
|
|
lint = FORGET_REF;
|
|
|
|
msg = FORGET_REF_SUMMARY.to_string();
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
span_note_and_lint(cx,
|
|
|
|
lint,
|
|
|
|
expr.span,
|
|
|
|
&msg,
|
|
|
|
arg.span,
|
|
|
|
&format!("argument has type {}", arg_ty.sty));
|
|
|
|
} else if is_copy(cx, arg_ty, cx.tcx.hir.get_parent(arg.id)) {
|
|
|
|
if match_def_path(cx.tcx, def_id, &paths::DROP) {
|
|
|
|
lint = DROP_COPY;
|
|
|
|
msg = DROP_COPY_SUMMARY.to_string();
|
|
|
|
} else if match_def_path(cx.tcx, def_id, &paths::MEM_FORGET) {
|
|
|
|
lint = FORGET_COPY;
|
|
|
|
msg = FORGET_COPY_SUMMARY.to_string();
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
2016-12-30 03:22:24 +00:00
|
|
|
span_note_and_lint(cx,
|
2016-12-30 03:43:22 +00:00
|
|
|
lint,
|
2016-12-30 03:22:24 +00:00
|
|
|
expr.span,
|
2017-02-27 02:32:41 +00:00
|
|
|
&msg,
|
2016-12-30 03:22:24 +00:00
|
|
|
arg.span,
|
|
|
|
&format!("argument has type {}", arg_ty.sty));
|
2016-02-01 18:53:03 +00:00
|
|
|
}
|
2016-12-30 03:22:24 +00:00
|
|
|
}}
|
2016-02-01 18:53:03 +00:00
|
|
|
}
|
|
|
|
}
|