2013-05-23 21:12:16 -05:00
|
|
|
// Copyright 2012-2013 The Rust Project Developers. See the COPYRIGHT
|
|
|
|
// file at the top-level directory of this distribution and at
|
|
|
|
// http://rust-lang.org/COPYRIGHT.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
|
|
|
|
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
|
|
|
|
// option. This file may not be copied, modified, or distributed
|
|
|
|
// except according to those terms.
|
|
|
|
|
|
|
|
//! Enforces the Rust effect system. Currently there is just one effect,
|
|
|
|
/// `unsafe`.
|
|
|
|
|
|
|
|
use middle::ty;
|
2014-04-09 10:18:40 -05:00
|
|
|
use middle::typeck::MethodCall;
|
2013-05-23 21:12:16 -05:00
|
|
|
use util::ppaux;
|
|
|
|
|
|
|
|
use syntax::ast;
|
2013-08-31 11:13:04 -05:00
|
|
|
use syntax::codemap::Span;
|
2013-08-12 21:15:54 -05:00
|
|
|
use syntax::visit;
|
2013-10-07 16:25:30 -05:00
|
|
|
use syntax::visit::Visitor;
|
2013-05-23 21:12:16 -05:00
|
|
|
|
|
|
|
#[deriving(Eq)]
|
|
|
|
enum UnsafeContext {
|
|
|
|
SafeContext,
|
|
|
|
UnsafeFn,
|
2013-07-27 03:25:59 -05:00
|
|
|
UnsafeBlock(ast::NodeId),
|
2013-05-23 21:12:16 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn type_is_unsafe_function(ty: ty::t) -> bool {
|
|
|
|
match ty::get(ty).sty {
|
2014-04-06 20:04:40 -05:00
|
|
|
ty::ty_bare_fn(ref f) => f.fn_style == ast::UnsafeFn,
|
|
|
|
ty::ty_closure(ref f) => f.fn_style == ast::UnsafeFn,
|
2013-05-23 21:12:16 -05:00
|
|
|
_ => false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-03-05 21:07:47 -06:00
|
|
|
struct EffectCheckVisitor<'a> {
|
|
|
|
tcx: &'a ty::ctxt,
|
2013-10-07 16:25:30 -05:00
|
|
|
|
|
|
|
/// Whether we're in an unsafe context.
|
|
|
|
unsafe_context: UnsafeContext,
|
2013-08-12 21:15:54 -05:00
|
|
|
}
|
2013-05-23 21:12:16 -05:00
|
|
|
|
2014-03-05 21:07:47 -06:00
|
|
|
impl<'a> EffectCheckVisitor<'a> {
|
2013-08-31 11:13:04 -05:00
|
|
|
fn require_unsafe(&mut self, span: Span, description: &str) {
|
2013-10-07 16:25:30 -05:00
|
|
|
match self.unsafe_context {
|
2013-05-23 21:12:16 -05:00
|
|
|
SafeContext => {
|
|
|
|
// Report an error.
|
2013-08-12 21:15:54 -05:00
|
|
|
self.tcx.sess.span_err(span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("{} requires unsafe function or block",
|
2013-05-23 21:12:16 -05:00
|
|
|
description))
|
|
|
|
}
|
|
|
|
UnsafeBlock(block_id) => {
|
|
|
|
// OK, but record this.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("effect: recording unsafe block as used: {:?}", block_id);
|
2014-03-20 21:49:20 -05:00
|
|
|
self.tcx.used_unsafe.borrow_mut().insert(block_id);
|
2013-05-23 21:12:16 -05:00
|
|
|
}
|
|
|
|
UnsafeFn => {}
|
|
|
|
}
|
2013-08-12 21:15:54 -05:00
|
|
|
}
|
2013-10-07 16:25:30 -05:00
|
|
|
|
|
|
|
fn check_str_index(&mut self, e: @ast::Expr) {
|
|
|
|
let base_type = match e.node {
|
2014-02-26 08:06:45 -06:00
|
|
|
ast::ExprIndex(base, _) => ty::node_id_to_type(self.tcx, base.id),
|
2013-10-07 16:25:30 -05:00
|
|
|
_ => return
|
|
|
|
};
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("effect: checking index with base type {}",
|
2013-10-07 16:25:30 -05:00
|
|
|
ppaux::ty_to_str(self.tcx, base_type));
|
|
|
|
match ty::get(base_type).sty {
|
2014-04-26 17:19:15 -05:00
|
|
|
ty::ty_uniq(ty) | ty::ty_rptr(_, ty::mt{ty, ..}) => match ty::get(ty).sty {
|
2014-04-28 20:10:23 -05:00
|
|
|
ty::ty_str => {
|
2014-04-26 17:19:15 -05:00
|
|
|
self.tcx.sess.span_err(e.span,
|
|
|
|
"modification of string types is not allowed");
|
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
},
|
2014-04-28 20:10:23 -05:00
|
|
|
ty::ty_str => {
|
2013-10-07 16:25:30 -05:00
|
|
|
self.tcx.sess.span_err(e.span,
|
|
|
|
"modification of string types is not allowed");
|
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
}
|
|
|
|
}
|
2013-08-12 21:15:54 -05:00
|
|
|
}
|
|
|
|
|
2014-03-05 21:07:47 -06:00
|
|
|
impl<'a> Visitor<()> for EffectCheckVisitor<'a> {
|
2014-01-09 07:05:33 -06:00
|
|
|
fn visit_fn(&mut self, fn_kind: &visit::FnKind, fn_decl: &ast::FnDecl,
|
2014-05-14 01:20:25 -05:00
|
|
|
block: &ast::Block, span: Span, _: ast::NodeId, _:()) {
|
2013-10-07 16:25:30 -05:00
|
|
|
|
|
|
|
let (is_item_fn, is_unsafe_fn) = match *fn_kind {
|
2014-04-06 20:04:40 -05:00
|
|
|
visit::FkItemFn(_, _, fn_style, _) =>
|
|
|
|
(true, fn_style == ast::UnsafeFn),
|
2014-01-09 07:05:33 -06:00
|
|
|
visit::FkMethod(_, _, method) =>
|
2014-04-06 20:04:40 -05:00
|
|
|
(true, method.fn_style == ast::UnsafeFn),
|
2013-10-07 16:25:30 -05:00
|
|
|
_ => (false, false),
|
|
|
|
};
|
|
|
|
|
|
|
|
let old_unsafe_context = self.unsafe_context;
|
|
|
|
if is_unsafe_fn {
|
|
|
|
self.unsafe_context = UnsafeFn
|
|
|
|
} else if is_item_fn {
|
|
|
|
self.unsafe_context = SafeContext
|
|
|
|
}
|
2013-05-23 21:12:16 -05:00
|
|
|
|
2014-05-14 01:20:25 -05:00
|
|
|
visit::walk_fn(self, fn_kind, fn_decl, block, span, ());
|
2013-08-12 21:15:54 -05:00
|
|
|
|
2013-10-07 16:25:30 -05:00
|
|
|
self.unsafe_context = old_unsafe_context
|
2013-08-12 21:15:54 -05:00
|
|
|
}
|
2013-05-23 21:12:16 -05:00
|
|
|
|
2014-01-06 06:00:46 -06:00
|
|
|
fn visit_block(&mut self, block: &ast::Block, _:()) {
|
2013-10-07 16:25:30 -05:00
|
|
|
let old_unsafe_context = self.unsafe_context;
|
2014-02-20 06:22:45 -06:00
|
|
|
match block.rules {
|
|
|
|
ast::DefaultBlock => {}
|
|
|
|
ast::UnsafeBlock(source) => {
|
|
|
|
// By default only the outermost `unsafe` block is
|
|
|
|
// "used" and so nested unsafe blocks are pointless
|
|
|
|
// (the inner ones are unnecessary and we actually
|
|
|
|
// warn about them). As such, there are two cases when
|
|
|
|
// we need to create a new context, when we're
|
|
|
|
// - outside `unsafe` and found a `unsafe` block
|
|
|
|
// (normal case)
|
|
|
|
// - inside `unsafe` but found an `unsafe` block
|
|
|
|
// created internally to the compiler
|
|
|
|
//
|
|
|
|
// The second case is necessary to ensure that the
|
|
|
|
// compiler `unsafe` blocks don't accidentally "use"
|
|
|
|
// external blocks (e.g. `unsafe { println("") }`,
|
|
|
|
// expands to `unsafe { ... unsafe { ... } }` where
|
|
|
|
// the inner one is compiler generated).
|
|
|
|
if self.unsafe_context == SafeContext || source == ast::CompilerGenerated {
|
|
|
|
self.unsafe_context = UnsafeBlock(block.id)
|
|
|
|
}
|
|
|
|
}
|
2013-10-07 16:25:30 -05:00
|
|
|
}
|
2013-05-23 21:12:16 -05:00
|
|
|
|
2013-10-07 16:25:30 -05:00
|
|
|
visit::walk_block(self, block, ());
|
2013-05-23 21:12:16 -05:00
|
|
|
|
2013-10-07 16:25:30 -05:00
|
|
|
self.unsafe_context = old_unsafe_context
|
2013-08-12 21:15:54 -05:00
|
|
|
}
|
|
|
|
|
2014-01-06 06:00:46 -06:00
|
|
|
fn visit_expr(&mut self, expr: &ast::Expr, _:()) {
|
2013-10-07 16:25:30 -05:00
|
|
|
match expr.node {
|
2014-02-26 08:06:45 -06:00
|
|
|
ast::ExprMethodCall(_, _, _) => {
|
2014-03-06 11:24:11 -06:00
|
|
|
let method_call = MethodCall::expr(expr.id);
|
2014-04-09 10:18:40 -05:00
|
|
|
let base_type = self.tcx.method_map.borrow().get(&method_call).ty;
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("effect: method call case, base type is {}",
|
2013-10-07 16:25:30 -05:00
|
|
|
ppaux::ty_to_str(self.tcx, base_type));
|
|
|
|
if type_is_unsafe_function(base_type) {
|
|
|
|
self.require_unsafe(expr.span,
|
|
|
|
"invocation of unsafe method")
|
2013-05-23 21:12:16 -05:00
|
|
|
}
|
2013-10-07 16:25:30 -05:00
|
|
|
}
|
2014-02-14 02:28:32 -06:00
|
|
|
ast::ExprCall(base, _) => {
|
2013-10-07 16:25:30 -05:00
|
|
|
let base_type = ty::node_id_to_type(self.tcx, base.id);
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("effect: call case, base type is {}",
|
2013-10-07 16:25:30 -05:00
|
|
|
ppaux::ty_to_str(self.tcx, base_type));
|
|
|
|
if type_is_unsafe_function(base_type) {
|
|
|
|
self.require_unsafe(expr.span, "call to unsafe function")
|
2013-05-23 21:12:16 -05:00
|
|
|
}
|
2013-10-07 16:25:30 -05:00
|
|
|
}
|
2014-02-26 08:06:45 -06:00
|
|
|
ast::ExprUnary(ast::UnDeref, base) => {
|
2013-10-07 16:25:30 -05:00
|
|
|
let base_type = ty::node_id_to_type(self.tcx, base.id);
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("effect: unary case, base type is {}",
|
2013-10-07 16:25:30 -05:00
|
|
|
ppaux::ty_to_str(self.tcx, base_type));
|
|
|
|
match ty::get(base_type).sty {
|
|
|
|
ty::ty_ptr(_) => {
|
|
|
|
self.require_unsafe(expr.span,
|
|
|
|
"dereference of unsafe pointer")
|
2013-05-23 21:12:16 -05:00
|
|
|
}
|
2013-10-07 16:25:30 -05:00
|
|
|
_ => {}
|
2013-05-23 21:12:16 -05:00
|
|
|
}
|
2013-10-07 16:25:30 -05:00
|
|
|
}
|
2014-02-26 08:06:45 -06:00
|
|
|
ast::ExprAssign(base, _) | ast::ExprAssignOp(_, base, _) => {
|
2013-10-07 16:25:30 -05:00
|
|
|
self.check_str_index(base);
|
|
|
|
}
|
|
|
|
ast::ExprAddrOf(ast::MutMutable, base) => {
|
|
|
|
self.check_str_index(base);
|
|
|
|
}
|
2013-11-28 14:22:53 -06:00
|
|
|
ast::ExprInlineAsm(..) => {
|
2013-10-07 16:25:30 -05:00
|
|
|
self.require_unsafe(expr.span, "use of inline assembly")
|
|
|
|
}
|
2013-11-28 14:22:53 -06:00
|
|
|
ast::ExprPath(..) => {
|
2013-10-07 16:25:30 -05:00
|
|
|
match ty::resolve_expr(self.tcx, expr) {
|
|
|
|
ast::DefStatic(_, true) => {
|
|
|
|
self.require_unsafe(expr.span, "use of mutable static")
|
2013-06-21 20:46:34 -05:00
|
|
|
}
|
2013-10-07 16:25:30 -05:00
|
|
|
_ => {}
|
2013-06-21 20:46:34 -05:00
|
|
|
}
|
2013-05-23 21:12:16 -05:00
|
|
|
}
|
2013-10-07 16:25:30 -05:00
|
|
|
_ => {}
|
|
|
|
}
|
2013-05-23 21:12:16 -05:00
|
|
|
|
2013-10-07 16:25:30 -05:00
|
|
|
visit::walk_expr(self, expr, ());
|
2013-08-12 21:15:54 -05:00
|
|
|
}
|
|
|
|
}
|
2013-05-23 21:12:16 -05:00
|
|
|
|
2014-04-09 10:18:40 -05:00
|
|
|
pub fn check_crate(tcx: &ty::ctxt, krate: &ast::Crate) {
|
2013-08-12 21:15:54 -05:00
|
|
|
let mut visitor = EffectCheckVisitor {
|
|
|
|
tcx: tcx,
|
2013-10-07 16:25:30 -05:00
|
|
|
unsafe_context: SafeContext,
|
2013-08-12 21:15:54 -05:00
|
|
|
};
|
2013-05-23 21:12:16 -05:00
|
|
|
|
2014-02-05 15:15:24 -06:00
|
|
|
visit::walk_crate(&mut visitor, krate, ());
|
2013-05-23 21:12:16 -05:00
|
|
|
}
|