@@ -985,6 +985,14 @@ struct ImproperCTypesVisitor<'a, 'tcx> {
985
985
mode : CItemKind ,
986
986
}
987
987
988
+ /// Accumulator for recursive ffi type checking
989
+ struct CTypesVisitorState < ' tcx > {
990
+ cache : FxHashSet < Ty < ' tcx > > ,
991
+ /// The original type being checked, before we recursed
992
+ /// to any other types it contains.
993
+ base_ty : Ty < ' tcx > ,
994
+ }
995
+
988
996
enum FfiResult < ' tcx > {
989
997
FfiSafe ,
990
998
FfiPhantom ( Ty < ' tcx > ) ,
@@ -1213,7 +1221,7 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1213
1221
/// Checks if the given field's type is "ffi-safe".
1214
1222
fn check_field_type_for_ffi (
1215
1223
& self ,
1216
- cache : & mut FxHashSet < Ty < ' tcx > > ,
1224
+ acc : & mut CTypesVisitorState < ' tcx > ,
1217
1225
field : & ty:: FieldDef ,
1218
1226
args : GenericArgsRef < ' tcx > ,
1219
1227
) -> FfiResult < ' tcx > {
@@ -1223,13 +1231,13 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1223
1231
. tcx
1224
1232
. try_normalize_erasing_regions ( self . cx . param_env , field_ty)
1225
1233
. unwrap_or ( field_ty) ;
1226
- self . check_type_for_ffi ( cache , field_ty)
1234
+ self . check_type_for_ffi ( acc , field_ty)
1227
1235
}
1228
1236
1229
1237
/// Checks if the given `VariantDef`'s field types are "ffi-safe".
1230
1238
fn check_variant_for_ffi (
1231
1239
& self ,
1232
- cache : & mut FxHashSet < Ty < ' tcx > > ,
1240
+ acc : & mut CTypesVisitorState < ' tcx > ,
1233
1241
ty : Ty < ' tcx > ,
1234
1242
def : ty:: AdtDef < ' tcx > ,
1235
1243
variant : & ty:: VariantDef ,
@@ -1239,7 +1247,7 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1239
1247
let transparent_with_all_zst_fields = if def. repr ( ) . transparent ( ) {
1240
1248
if let Some ( field) = transparent_newtype_field ( self . cx . tcx , variant) {
1241
1249
// Transparent newtypes have at most one non-ZST field which needs to be checked..
1242
- match self . check_field_type_for_ffi ( cache , field, args) {
1250
+ match self . check_field_type_for_ffi ( acc , field, args) {
1243
1251
FfiUnsafe { ty, .. } if ty. is_unit ( ) => ( ) ,
1244
1252
r => return r,
1245
1253
}
@@ -1257,7 +1265,7 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1257
1265
// We can't completely trust `repr(C)` markings, so make sure the fields are actually safe.
1258
1266
let mut all_phantom = !variant. fields . is_empty ( ) ;
1259
1267
for field in & variant. fields {
1260
- all_phantom &= match self . check_field_type_for_ffi ( cache , field, args) {
1268
+ all_phantom &= match self . check_field_type_for_ffi ( acc , field, args) {
1261
1269
FfiSafe => false ,
1262
1270
// `()` fields are FFI-safe!
1263
1271
FfiUnsafe { ty, .. } if ty. is_unit ( ) => false ,
@@ -1277,7 +1285,11 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1277
1285
1278
1286
/// Checks if the given type is "ffi-safe" (has a stable, well-defined
1279
1287
/// representation which can be exported to C code).
1280
- fn check_type_for_ffi ( & self , cache : & mut FxHashSet < Ty < ' tcx > > , ty : Ty < ' tcx > ) -> FfiResult < ' tcx > {
1288
+ fn check_type_for_ffi (
1289
+ & self ,
1290
+ acc : & mut CTypesVisitorState < ' tcx > ,
1291
+ ty : Ty < ' tcx > ,
1292
+ ) -> FfiResult < ' tcx > {
1281
1293
use FfiResult :: * ;
1282
1294
1283
1295
let tcx = self . cx . tcx ;
@@ -1286,7 +1298,7 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1286
1298
// `struct S(*mut S);`.
1287
1299
// FIXME: A recursion limit is necessary as well, for irregular
1288
1300
// recursive types.
1289
- if !cache. insert ( ty) {
1301
+ if !acc . cache . insert ( ty) {
1290
1302
return FfiSafe ;
1291
1303
}
1292
1304
@@ -1308,6 +1320,17 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1308
1320
}
1309
1321
match def. adt_kind ( ) {
1310
1322
AdtKind :: Struct | AdtKind :: Union => {
1323
+ if let Some ( sym:: cstring_type | sym:: cstr_type) =
1324
+ tcx. get_diagnostic_name ( def. did ( ) )
1325
+ && !acc. base_ty . is_mutable_ptr ( )
1326
+ {
1327
+ return FfiUnsafe {
1328
+ ty,
1329
+ reason : fluent:: lint_improper_ctypes_cstr_reason,
1330
+ help : Some ( fluent:: lint_improper_ctypes_cstr_help) ,
1331
+ } ;
1332
+ }
1333
+
1311
1334
if !def. repr ( ) . c ( ) && !def. repr ( ) . transparent ( ) {
1312
1335
return FfiUnsafe {
1313
1336
ty,
@@ -1354,7 +1377,7 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1354
1377
} ;
1355
1378
}
1356
1379
1357
- self . check_variant_for_ffi ( cache , ty, def, def. non_enum_variant ( ) , args)
1380
+ self . check_variant_for_ffi ( acc , ty, def, def. non_enum_variant ( ) , args)
1358
1381
}
1359
1382
AdtKind :: Enum => {
1360
1383
if def. variants ( ) . is_empty ( ) {
@@ -1378,7 +1401,7 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1378
1401
if let Some ( ty) =
1379
1402
repr_nullable_ptr ( self . cx . tcx , self . cx . param_env , ty, self . mode )
1380
1403
{
1381
- return self . check_type_for_ffi ( cache , ty) ;
1404
+ return self . check_type_for_ffi ( acc , ty) ;
1382
1405
}
1383
1406
1384
1407
return FfiUnsafe {
@@ -1399,7 +1422,7 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1399
1422
} ;
1400
1423
}
1401
1424
1402
- match self . check_variant_for_ffi ( cache , ty, def, variant, args) {
1425
+ match self . check_variant_for_ffi ( acc , ty, def, variant, args) {
1403
1426
FfiSafe => ( ) ,
1404
1427
r => return r,
1405
1428
}
@@ -1469,9 +1492,9 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1469
1492
FfiSafe
1470
1493
}
1471
1494
1472
- ty:: RawPtr ( ty, _) | ty:: Ref ( _, ty, _) => self . check_type_for_ffi ( cache , ty) ,
1495
+ ty:: RawPtr ( ty, _) | ty:: Ref ( _, ty, _) => self . check_type_for_ffi ( acc , ty) ,
1473
1496
1474
- ty:: Array ( inner_ty, _) => self . check_type_for_ffi ( cache , inner_ty) ,
1497
+ ty:: Array ( inner_ty, _) => self . check_type_for_ffi ( acc , inner_ty) ,
1475
1498
1476
1499
ty:: FnPtr ( sig_tys, hdr) => {
1477
1500
let sig = sig_tys. with ( hdr) ;
@@ -1485,7 +1508,7 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1485
1508
1486
1509
let sig = tcx. instantiate_bound_regions_with_erased ( sig) ;
1487
1510
for arg in sig. inputs ( ) {
1488
- match self . check_type_for_ffi ( cache , * arg) {
1511
+ match self . check_type_for_ffi ( acc , * arg) {
1489
1512
FfiSafe => { }
1490
1513
r => return r,
1491
1514
}
@@ -1496,7 +1519,7 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1496
1519
return FfiSafe ;
1497
1520
}
1498
1521
1499
- self . check_type_for_ffi ( cache , ret_ty)
1522
+ self . check_type_for_ffi ( acc , ret_ty)
1500
1523
}
1501
1524
1502
1525
ty:: Foreign ( ..) => FfiSafe ,
@@ -1619,7 +1642,8 @@ impl<'a, 'tcx> ImproperCTypesVisitor<'a, 'tcx> {
1619
1642
return ;
1620
1643
}
1621
1644
1622
- match self . check_type_for_ffi ( & mut FxHashSet :: default ( ) , ty) {
1645
+ let mut acc = CTypesVisitorState { cache : FxHashSet :: default ( ) , base_ty : ty } ;
1646
+ match self . check_type_for_ffi ( & mut acc, ty) {
1623
1647
FfiResult :: FfiSafe => { }
1624
1648
FfiResult :: FfiPhantom ( ty) => {
1625
1649
self . emit_ffi_unsafe_type_lint (
0 commit comments