diff --git a/src/librustc/middle/lint.rs b/src/librustc/middle/lint.rs index 062a7418287e3..1e78c57fe04ab 100644 --- a/src/librustc/middle/lint.rs +++ b/src/librustc/middle/lint.rs @@ -89,6 +89,7 @@ pub enum Lint { TypeOverflow, UnusedUnsafe, UnsafeBlock, + InternalMutability, AttributeUsage, UnknownFeatures, UnknownCrateType, @@ -281,6 +282,13 @@ static lint_table: &'static [(&'static str, LintSpec)] = &[ default: allow }), + ("internal_mutability", + LintSpec { + lint: InternalMutability, + desc: "detect the use of types with internal (non-inherited) mutability", + default: allow + }), + ("attribute_usage", LintSpec { lint: AttributeUsage, @@ -1387,6 +1395,25 @@ fn check_unsafe_block(cx: &Context, e: &ast::Expr) { } } +fn check_internal_mutability(cx: &Context, e: &ast::Expr) { + let (name, args) = match e.node { + ast::ExprMethodCall(_, _, ref args) => ("method", args), + ast::ExprCall(_, ref args) => ("function", args), + _ => return + }; + + for arg in args.iter() { + let arg_ty = ty::expr_ty(cx.tcx, *arg); + let reaches_unsafe = ty::type_interior_reaches_unsafe(cx.tcx, arg_ty); + + if reaches_unsafe { + cx.span_lint(InternalMutability, arg.span, + format_strbuf!("internally mutable type used in {} call", + name).as_slice()) + } + } +} + fn check_unused_mut_pat(cx: &Context, pats: &[@ast::Pat]) { // collect all mutable pattern and group their NodeIDs by their Identifier to // avoid false warnings in match arms with multiple patterns @@ -1742,6 +1769,7 @@ impl<'a> Visitor<()> for Context<'a> { check_unnecessary_parens_expr(self, e); check_unused_unsafe(self, e); check_unsafe_block(self, e); + check_internal_mutability(self, e); check_unnecessary_allocation(self, e); check_heap_expr(self, e); diff --git a/src/librustc/middle/ty.rs b/src/librustc/middle/ty.rs index 2ae925caab563..eeae9f7c10d0f 100644 --- a/src/librustc/middle/ty.rs +++ b/src/librustc/middle/ty.rs @@ -1811,13 +1811,14 @@ def_type_content_sets!( OwnsAffine = 0b0000_0000__0000_1000__0000, OwnsAll = 0b0000_0000__1111_1111__0000, - // Things that are reachable by the value in any way (fourth nibble): + // Things that are reachable by the value in any way (fourth nibble (and more)): ReachesNonsendAnnot = 0b0000_0001__0000_0000__0000, ReachesBorrowed = 0b0000_0010__0000_0000__0000, // ReachesManaged /* see [1] below */ = 0b0000_0100__0000_0000__0000, ReachesMutable = 0b0000_1000__0000_0000__0000, ReachesNoShare = 0b0001_0000__0000_0000__0000, - ReachesAll = 0b0001_1111__0000_0000__0000, + ReachesUnsafe = 0b0010_0000__0000_0000__0000, + ReachesAll = 0b0011_1111__0000_0000__0000, // Things that cause values to *move* rather than *copy* Moves = 0b0000_0000__0000_1011__0000, @@ -1911,6 +1912,10 @@ impl TypeContents { self.intersects(TC::InteriorUnsafe) } + pub fn reaches_unsafe(&self) -> bool { + self.intersects(TC::ReachesUnsafe) + } + pub fn interior_unsized(&self) -> bool { self.intersects(TC::InteriorUnsized) } @@ -2002,6 +2007,9 @@ pub fn type_is_sendable(cx: &ctxt, t: ty::t) -> bool { pub fn type_interior_is_unsafe(cx: &ctxt, t: ty::t) -> bool { type_contents(cx, t).interior_unsafe() } +pub fn type_interior_reaches_unsafe(cx: &ctxt, t: ty::t) -> bool { + type_contents(cx, t).reaches_unsafe() +} pub fn type_contents(cx: &ctxt, ty: t) -> TypeContents { let ty_id = type_id(ty); @@ -2186,7 +2194,7 @@ pub fn type_contents(cx: &ctxt, ty: t) -> TypeContents { } else if Some(did) == cx.lang_items.unsafe_type() { // FIXME(#13231): This shouldn't be needed after // opt-in built-in bounds are implemented. - (tc | TC::InteriorUnsafe) - TC::Nonsharable + (tc | TC::ReachesUnsafe | TC::InteriorUnsafe) - TC::Nonsharable } else { tc } diff --git a/src/test/compile-fail/lint-internal-mutability.rs b/src/test/compile-fail/lint-internal-mutability.rs new file mode 100644 index 0000000000000..69df2b076e2af --- /dev/null +++ b/src/test/compile-fail/lint-internal-mutability.rs @@ -0,0 +1,65 @@ +// Copyright 2013-2014 The Rust Project Developers. See the COPYRIGHT +// file at the top-level directory of this distribution and at +// http://rust-lang.org/COPYRIGHT. +// +// Licensed under the Apache License, Version 2.0 or the MIT license +// , at your +// option. This file may not be copied, modified, or distributed +// except according to those terms. + +#![deny(internal_mutability)] + +use std::cell::{Cell,RefCell}; +use std::ty::Unsafe; +use std::rc::Rc; + +struct Foo { + x: Unsafe +} +impl Foo { + fn amp_call(&self) {} + fn amp_mut_call(&mut self) {} + fn call(self) {} +} + +struct Bar; + +impl Bar { + fn call(&self, _: Cell, _: &RefCell, _: &Rc) {} + fn call2(&self, _: &Cell, _: RefCell, _: &uint) {} +} + +fn call(_: Cell, _: &RefCell, _: &Rc) {} +fn call2(_: &Cell, _: RefCell, _: &uint) {} + + +fn main() { + let a = Cell::new(1); + let b1 = RefCell::new(2u); + let b2 = b1.clone(); //~ ERROR internally mutable type used in method call + let c = Rc::new(3); + + call(a, //~ ERROR internally mutable type used in function call + &b1, //~ ERROR internally mutable type used in function call + &c); //~ ERROR internally mutable type used in function call + + call2(&a, //~ ERROR internally mutable type used in function call + b1, //~ ERROR internally mutable type used in function call + &*c); + + let mut foo = Foo { x: Unsafe::new(4) }; + + foo.amp_call();//~ ERROR internally mutable type used in method call + foo.amp_mut_call();//~ ERROR internally mutable type used in method call + foo.call();//~ ERROR internally mutable type used in method call + + Bar.call(a, //~ ERROR internally mutable type used in method call + &b2, //~ ERROR internally mutable type used in method call + &c); //~ ERROR internally mutable type used in method call + + Bar.call2(&a, //~ ERROR internally mutable type used in method call + b2, //~ ERROR internally mutable type used in method call + &*c); + +}