rust-clippy/clippy_lints/src/transmuting_null.rs

90 lines
3.5 KiB
Rust
Raw Normal View History

use crate::consts::{constant_context, Constant};
use clippy_utils::diagnostics::span_lint;
2021-03-16 16:06:34 +00:00
use clippy_utils::{match_qpath, paths};
use if_chain::if_chain;
2020-04-27 17:56:11 +00:00
use rustc_ast::LitKind;
2020-01-06 16:39:50 +00:00
use rustc_hir::{Expr, ExprKind};
2020-01-12 06:08:41 +00:00
use rustc_lint::{LateContext, LateLintPass, LintContext};
use rustc_middle::lint::in_external_macro;
2020-01-11 11:37:08 +00:00
use rustc_session::{declare_lint_pass, declare_tool_lint};
declare_clippy_lint! {
/// **What it does:** Checks for transmute calls which would receive a null pointer.
///
/// **Why is this bad?** Transmuting a null pointer is undefined behavior.
///
/// **Known problems:** Not all cases can be detected at the moment of this writing.
/// For example, variables which hold a null pointer and are then fed to a `transmute`
/// call, aren't detectable yet.
///
/// **Example:**
/// ```rust
/// let null_ref: &u64 = unsafe { std::mem::transmute(0 as *const u64) };
/// ```
pub TRANSMUTING_NULL,
correctness,
"transmutes from a null pointer to a reference, which is undefined behavior"
}
2019-04-08 20:43:55 +00:00
declare_lint_pass!(TransmutingNull => [TRANSMUTING_NULL]);
2021-02-24 13:02:51 +00:00
const LINT_MSG: &str = "transmuting a known null pointer into a reference";
impl<'tcx> LateLintPass<'tcx> for TransmutingNull {
fn check_expr(&mut self, cx: &LateContext<'tcx>, expr: &'tcx Expr<'_>) {
if in_external_macro(cx.sess(), expr.span) {
return;
}
if_chain! {
2019-09-27 15:16:06 +00:00
if let ExprKind::Call(ref func, ref args) = expr.kind;
if let ExprKind::Path(ref path) = func.kind;
2019-05-17 21:53:54 +00:00
if match_qpath(path, &paths::STD_MEM_TRANSMUTE);
if args.len() == 1;
then {
// Catching transmute over constants that resolve to `null`.
2020-07-17 08:47:04 +00:00
let mut const_eval_context = constant_context(cx, cx.typeck_results());
if_chain! {
2019-09-27 15:16:06 +00:00
if let ExprKind::Path(ref _qpath) = args[0].kind;
let x = const_eval_context.expr(&args[0]);
2020-11-25 02:57:09 +00:00
if let Some(Constant::RawPtr(0)) = x;
then {
2019-09-29 16:40:38 +00:00
span_lint(cx, TRANSMUTING_NULL, expr.span, LINT_MSG)
}
}
// Catching:
// `std::mem::transmute(0 as *const i32)`
if_chain! {
2019-09-27 15:16:06 +00:00
if let ExprKind::Cast(ref inner_expr, ref _cast_ty) = args[0].kind;
if let ExprKind::Lit(ref lit) = inner_expr.kind;
if let LitKind::Int(0, _) = lit.node;
then {
2019-09-29 16:40:38 +00:00
span_lint(cx, TRANSMUTING_NULL, expr.span, LINT_MSG)
}
}
// Catching:
// `std::mem::transmute(std::ptr::null::<i32>())`
if_chain! {
2019-09-27 15:16:06 +00:00
if let ExprKind::Call(ref func1, ref args1) = args[0].kind;
if let ExprKind::Path(ref path1) = func1.kind;
2019-05-17 21:53:54 +00:00
if match_qpath(path1, &paths::STD_PTR_NULL);
2019-12-27 07:12:26 +00:00
if args1.is_empty();
then {
2019-09-29 16:40:38 +00:00
span_lint(cx, TRANSMUTING_NULL, expr.span, LINT_MSG)
}
}
// FIXME:
// Also catch transmutations of variables which are known nulls.
// To do this, MIR const propagation seems to be the better tool.
// Whenever MIR const prop routines are more developed, this will
// become available. As of this writing (25/03/19) it is not yet.
}
}
}
}