rust/clippy_lints/src/misc.rs

603 lines
20 KiB
Rust
Raw Normal View History

2016-02-24 17:38:57 +01:00
use reexport::*;
use rustc::hir::*;
use rustc::hir::intravisit::FnKind;
use rustc::lint::*;
use rustc::middle::const_val::ConstVal;
use rustc::ty;
2017-07-31 12:37:38 +02:00
use rustc::ty::subst::Substs;
2017-01-13 17:04:56 +01:00
use rustc_const_eval::ConstContext;
use rustc_const_math::ConstFloat;
2017-09-05 11:33:04 +02:00
use syntax::codemap::{ExpnFormat, Span};
use utils::{get_item_name, get_parent_expr, implements_trait, in_constant, in_macro, is_integer_literal,
iter_input_pats, last_path_segment, match_qpath, match_trait_method, paths, snippet, span_lint,
span_lint_and_then, walk_ptrs_ty};
2016-06-29 21:25:23 +02:00
use utils::sugg::Sugg;
2017-09-05 11:33:04 +02:00
use syntax::ast::{FloatTy, LitKind, CRATE_NODE_ID};
2017-08-09 09:30:56 +02:00
/// **What it does:** Checks for function arguments and let bindings denoted as
/// `ref`.
///
/// **Why is this bad?** The `ref` declaration makes the function take an owned
/// value, but turns the argument into a reference (which means that the value
/// is destroyed when exiting the function). This adds not much value: either
/// take a reference type, or take an owned value and create references in the
/// body.
///
/// For let bindings, `let x = &foo;` is preferred over `let ref x = foo`. The
/// type of `x` is more obvious with the former.
///
/// **Known problems:** If the argument is dereferenced within the function,
/// removing the `ref` will lead to errors. This can be fixed by removing the
/// dereferences, e.g. changing `*x` to `x` within the function.
///
2016-07-16 00:25:44 +02:00
/// **Example:**
/// ```rust
/// fn foo(ref x: u8) -> bool { .. }
/// ```
declare_lint! {
pub TOPLEVEL_REF_ARG,
Warn,
"an entire binding declared as `ref`, in a function argument or a `let` statement"
}
/// **What it does:** Checks for comparisons to NaN.
///
/// **Why is this bad?** NaN does not compare meaningfully to anything not
/// even itself so those comparisons are simply wrong.
///
/// **Known problems:** None.
///
/// **Example:**
/// ```rust
/// x == NAN
/// ```
declare_lint! {
pub CMP_NAN,
Deny,
"comparisons to NAN, which will always return false, probably not intended"
}
/// **What it does:** Checks for (in-)equality comparisons on floating-point
/// values (apart from zero), except in functions called `*eq*` (which probably
/// implement equality for a type involving floats).
///
/// **Why is this bad?** Floating point calculations are usually imprecise, so
/// asking if two values are *exactly* equal is asking for trouble. For a good
/// guide on what to do, see [the floating point
/// guide](http://www.floating-point-gui.de/errors/comparison).
///
/// **Known problems:** None.
///
/// **Example:**
/// ```rust
/// y == 1.23f64
/// y != x // where both are floats
/// ```
declare_lint! {
pub FLOAT_CMP,
Warn,
"using `==` or `!=` on float values instead of comparing difference with an epsilon"
}
/// **What it does:** Checks for conversions to owned values just for the sake
/// of a comparison.
///
/// **Why is this bad?** The comparison can operate on a reference, so creating
/// an owned value effectively throws it away directly afterwards, which is
/// needlessly consuming code and heap space.
///
/// **Known problems:** None.
///
/// **Example:**
/// ```rust
/// x.to_owned() == y
/// ```
declare_lint! {
pub CMP_OWNED,
Warn,
"creating owned instances for comparing with others, e.g. `x == \"foo\".to_string()`"
}
/// **What it does:** Checks for getting the remainder of a division by one.
///
/// **Why is this bad?** The result can only ever be zero. No one will write
/// such code deliberately, unless trying to win an Underhanded Rust
/// Contest. Even for that contest, it's probably a bad idea. Use something more
/// underhanded.
///
/// **Known problems:** None.
///
/// **Example:**
/// ```rust
/// x % 1
/// ```
declare_lint! {
pub MODULO_ONE,
Warn,
"taking a number modulo 1, which always returns 0"
}
/// **What it does:** Checks for patterns in the form `name @ _`.
///
2017-08-09 09:30:56 +02:00
/// **Why is this bad?** It's almost always more readable to just use direct
/// bindings.
///
/// **Known problems:** None.
///
/// **Example:**
/// ```rust
/// match v {
/// Some(x) => (),
/// y @ _ => (), // easier written as `y`,
/// }
/// ```
declare_lint! {
pub REDUNDANT_PATTERN,
Warn,
"using `name @ _` in a pattern"
}
2017-08-09 09:30:56 +02:00
/// **What it does:** Checks for the use of bindings with a single leading
/// underscore.
///
/// **Why is this bad?** A single leading underscore is usually used to indicate
/// that a binding will not be used. Using such a binding breaks this
/// expectation.
///
/// **Known problems:** The lint does not work properly with desugaring and
/// macro, it has been allowed in the mean time.
///
/// **Example:**
/// ```rust
/// let _x = 0;
2017-08-09 09:30:56 +02:00
/// let y = _x + 1; // Here we are using `_x`, even though it has a leading
/// underscore.
/// // We should rename `_x` to `x`
/// ```
declare_lint! {
pub USED_UNDERSCORE_BINDING,
Allow,
"using a binding which is prefixed with an underscore"
}
2017-08-09 09:30:56 +02:00
/// **What it does:** Checks for the use of short circuit boolean conditions as
/// a
/// statement.
///
2017-08-09 09:30:56 +02:00
/// **Why is this bad?** Using a short circuit boolean condition as a statement
/// may
/// hide the fact that the second part is executed or not depending on the
/// outcome of
/// the first part.
///
/// **Known problems:** None.
///
/// **Example:**
/// ```rust
/// f() && g(); // We should write `if f() { g(); }`.
/// ```
declare_lint! {
pub SHORT_CIRCUIT_STATEMENT,
Warn,
"using a short circuit boolean condition as a statement"
}
/// **What it does:** Catch casts from `0` to some pointer type
///
/// **Why is this bad?** This generally means `null` and is better expressed as
/// {`std`, `core`}`::ptr::`{`null`, `null_mut`}.
///
/// **Known problems:** None.
///
/// **Example:**
///
/// ```rust
/// 0 as *const u32
/// ```
declare_lint! {
pub ZERO_PTR,
Warn,
"using 0 as *{const, mut} T"
}
#[derive(Copy, Clone)]
pub struct Pass;
impl LintPass for Pass {
fn get_lints(&self) -> LintArray {
2017-08-09 09:30:56 +02:00
lint_array!(
TOPLEVEL_REF_ARG,
CMP_NAN,
FLOAT_CMP,
CMP_OWNED,
MODULO_ONE,
REDUNDANT_PATTERN,
USED_UNDERSCORE_BINDING,
SHORT_CIRCUIT_STATEMENT,
ZERO_PTR
)
}
}
impl<'a, 'tcx> LateLintPass<'a, 'tcx> for Pass {
fn check_fn(
&mut self,
cx: &LateContext<'a, 'tcx>,
k: FnKind<'tcx>,
decl: &'tcx FnDecl,
body: &'tcx Body,
_: Span,
2017-08-09 09:30:56 +02:00
_: NodeId,
) {
2016-03-23 16:11:24 +01:00
if let FnKind::Closure(_) = k {
// Does not apply to closures
2016-01-04 05:26:12 +01:00
return;
}
for arg in iter_input_pats(decl, body) {
match arg.pat.node {
2017-08-01 10:19:49 +02:00
PatKind::Binding(BindingAnnotation::Ref, _, _, _) |
PatKind::Binding(BindingAnnotation::RefMut, _, _, _) => {
2017-08-09 09:30:56 +02:00
span_lint(
cx,
TOPLEVEL_REF_ARG,
arg.pat.span,
"`ref` directly on a function argument is ignored. Consider using a reference type \
2017-09-05 11:33:04 +02:00
instead.",
2017-08-09 09:30:56 +02:00
);
},
2017-08-01 10:19:49 +02:00
_ => {},
}
}
}
fn check_stmt(&mut self, cx: &LateContext<'a, 'tcx>, s: &'tcx Stmt) {
2016-06-06 02:09:19 +02:00
if_let_chain! {[
let StmtDecl(ref d, _) = s.node,
let DeclLocal(ref l) = d.node,
let PatKind::Binding(an, _, i, None) = l.pat.node,
let Some(ref init) = l.init
2016-06-06 02:09:19 +02:00
], {
if an == BindingAnnotation::Ref || an == BindingAnnotation::RefMut {
let init = Sugg::hir(cx, init, "..");
let (mutopt,initref) = if an == BindingAnnotation::RefMut {
("mut ", init.mut_addr())
} else {
("", init.addr())
};
let tyopt = if let Some(ref ty) = l.ty {
format!(": &{mutopt}{ty}", mutopt=mutopt, ty=snippet(cx, ty.span, "_"))
} else {
"".to_owned()
};
span_lint_and_then(cx,
TOPLEVEL_REF_ARG,
l.pat.span,
"`ref` on an entire `let` pattern is discouraged, take a reference with `&` instead",
|db| {
db.span_suggestion(s.span,
"try",
format!("let {name}{tyopt} = {initref};",
name=snippet(cx, i.span, "_"),
tyopt=tyopt,
initref=initref));
}
);
}
}};
if_let_chain! {[
let StmtSemi(ref expr, _) = s.node,
let Expr_::ExprBinary(ref binop, ref a, ref b) = expr.node,
binop.node == BiAnd || binop.node == BiOr,
let Some(sugg) = Sugg::hir_opt(cx, a),
], {
span_lint_and_then(cx,
SHORT_CIRCUIT_STATEMENT,
s.span,
"boolean short circuit operator in statement may be clearer using an explicit test",
|db| {
let sugg = if binop.node == BiOr { !sugg } else { sugg };
db.span_suggestion(s.span, "replace it with",
format!("if {} {{ {}; }}", sugg, &snippet(cx, b.span, "..")));
});
}};
}
fn check_expr(&mut self, cx: &LateContext<'a, 'tcx>, expr: &'tcx Expr) {
match expr.node {
ExprCast(ref e, ref ty) => {
check_cast(cx, expr.span, e, ty);
return;
},
ExprBinary(ref cmp, ref left, ref right) => {
let op = cmp.node;
if op.is_comparison() {
if let ExprPath(QPath::Resolved(_, ref path)) = left.node {
check_nan(cx, path, expr);
}
if let ExprPath(QPath::Resolved(_, ref path)) = right.node {
check_nan(cx, path, expr);
}
2017-05-11 18:59:36 +02:00
check_to_owned(cx, left, right);
check_to_owned(cx, right, left);
2016-01-04 05:26:12 +01:00
}
if (op == BiEq || op == BiNe) && (is_float(cx, left) || is_float(cx, right)) {
if is_allowed(cx, left) || is_allowed(cx, right) {
2015-09-06 21:03:09 +02:00
return;
}
if let Some(name) = get_item_name(cx, expr) {
let name = name.as_str();
if name == "eq" || name == "ne" || name == "is_nan" || name.starts_with("eq_") ||
2017-08-09 09:30:56 +02:00
name.ends_with("_eq")
{
return;
}
}
span_lint_and_then(cx, FLOAT_CMP, expr.span, "strict comparison of f32 or f64", |db| {
let lhs = Sugg::hir(cx, left, "..");
let rhs = Sugg::hir(cx, right, "..");
2017-08-09 09:30:56 +02:00
db.span_suggestion(
expr.span,
"consider comparing them within some error",
format!("({}).abs() < error", lhs - rhs),
);
db.span_note(expr.span, "std::f32::EPSILON and std::f64::EPSILON are available.");
});
} else if op == BiRem && is_integer_literal(right, 1) {
span_lint(cx, MODULO_ONE, expr.span, "any number modulo 1 will be 0");
2015-09-02 10:30:11 +02:00
}
},
2017-03-13 11:32:58 +01:00
_ => {},
}
if in_attributes_expansion(expr) {
// Don't lint things expanded by #[derive(...)], etc
return;
}
let binding = match expr.node {
ExprPath(ref qpath) => {
2016-12-02 17:38:31 +01:00
let binding = last_path_segment(qpath).name.as_str();
if binding.starts_with('_') &&
!binding.starts_with("__") &&
2017-03-09 10:58:31 +01:00
binding != "_result" && // FIXME: #944
2016-12-02 17:38:31 +01:00
is_used(cx, expr) &&
// don't lint if the declaration is in a macro
2017-08-15 11:10:49 +02:00
non_macro_local(cx, &cx.tables.qpath_def(qpath, expr.hir_id))
2017-08-09 09:30:56 +02:00
{
2016-12-02 17:38:31 +01:00
Some(binding)
} else {
None
}
2016-12-20 18:21:30 +01:00
},
ExprField(_, spanned) => {
let name = spanned.node.as_str();
if name.starts_with('_') && !name.starts_with("__") {
Some(name)
} else {
None
}
2016-12-20 18:21:30 +01:00
},
_ => None,
};
if let Some(binding) = binding {
2017-08-09 09:30:56 +02:00
span_lint(
cx,
USED_UNDERSCORE_BINDING,
expr.span,
&format!(
"used binding `{}` which is prefixed with an underscore. A leading \
2017-09-05 11:33:04 +02:00
underscore signals that a binding will not be used.",
2017-08-09 09:30:56 +02:00
binding
),
);
}
}
2016-06-29 21:25:23 +02:00
fn check_pat(&mut self, cx: &LateContext<'a, 'tcx>, pat: &'tcx Pat) {
if let PatKind::Binding(_, _, ref ident, Some(ref right)) = pat.node {
if right.node == PatKind::Wild {
2017-08-09 09:30:56 +02:00
span_lint(
cx,
REDUNDANT_PATTERN,
pat.span,
&format!("the `{} @ _` pattern can be written as just `{}`", ident.node, ident.node),
);
}
}
}
}
fn check_nan(cx: &LateContext, path: &Path, expr: &Expr) {
if !in_constant(cx, expr.id) {
path.segments.last().map(|seg| if seg.name == "NAN" {
2017-08-09 09:30:56 +02:00
span_lint(
cx,
CMP_NAN,
expr.span,
"doomed comparison with NAN, use `std::{f32,f64}::is_nan()` instead",
);
});
}
}
fn is_allowed(cx: &LateContext, expr: &Expr) -> bool {
2017-07-31 12:37:38 +02:00
let parent_item = cx.tcx.hir.get_parent(expr.id);
let parent_def_id = cx.tcx.hir.local_def_id(parent_item);
let substs = Substs::identity_for_item(cx.tcx, parent_def_id);
let res = ConstContext::new(cx.tcx, cx.param_env.and(substs), cx.tables).eval(expr);
if let Ok(ConstVal::Float(val)) = res {
use std::cmp::Ordering;
2017-08-06 07:06:21 +02:00
match val.ty {
FloatTy::F32 => {
let zero = ConstFloat {
ty: FloatTy::F32,
2017-08-13 23:58:17 +02:00
bits: u128::from(0.0_f32.to_bits()),
2017-08-06 07:06:21 +02:00
};
2017-08-06 07:06:21 +02:00
let infinity = ConstFloat {
ty: FloatTy::F32,
2017-08-13 23:58:17 +02:00
bits: u128::from(::std::f32::INFINITY.to_bits()),
2017-08-06 07:06:21 +02:00
};
2017-08-06 07:06:21 +02:00
let neg_infinity = ConstFloat {
ty: FloatTy::F32,
2017-08-13 23:58:17 +02:00
bits: u128::from(::std::f32::NEG_INFINITY.to_bits()),
2017-08-06 07:06:21 +02:00
};
val.try_cmp(zero) == Ok(Ordering::Equal) || val.try_cmp(infinity) == Ok(Ordering::Equal) ||
2017-08-09 09:30:56 +02:00
val.try_cmp(neg_infinity) == Ok(Ordering::Equal)
},
2017-08-06 07:06:21 +02:00
FloatTy::F64 => {
let zero = ConstFloat {
ty: FloatTy::F64,
2017-08-13 23:58:17 +02:00
bits: u128::from(0.0_f64.to_bits()),
2017-08-06 07:06:21 +02:00
};
2017-08-06 07:06:21 +02:00
let infinity = ConstFloat {
ty: FloatTy::F64,
2017-08-13 23:58:17 +02:00
bits: u128::from(::std::f64::INFINITY.to_bits()),
2017-08-06 07:06:21 +02:00
};
2017-08-06 07:06:21 +02:00
let neg_infinity = ConstFloat {
ty: FloatTy::F64,
2017-08-13 23:58:17 +02:00
bits: u128::from(::std::f64::NEG_INFINITY.to_bits()),
2017-08-06 07:06:21 +02:00
};
val.try_cmp(zero) == Ok(Ordering::Equal) || val.try_cmp(infinity) == Ok(Ordering::Equal) ||
2017-08-09 09:30:56 +02:00
val.try_cmp(neg_infinity) == Ok(Ordering::Equal)
2017-03-05 10:27:20 +01:00
},
}
2016-01-04 05:26:12 +01:00
} else {
false
}
}
fn is_float(cx: &LateContext, expr: &Expr) -> bool {
2017-01-13 17:04:56 +01:00
matches!(walk_ptrs_ty(cx.tables.expr_ty(expr)).sty, ty::TyFloat(_))
}
2015-05-06 12:59:08 +02:00
2017-05-11 18:59:36 +02:00
fn check_to_owned(cx: &LateContext, expr: &Expr, other: &Expr) {
2016-01-18 15:35:50 +01:00
let (arg_ty, snip) = match expr.node {
2017-05-11 18:59:36 +02:00
ExprMethodCall(.., ref args) if args.len() == 1 => {
if match_trait_method(cx, expr, &paths::TO_STRING) || match_trait_method(cx, expr, &paths::TO_OWNED) {
(cx.tables.expr_ty_adjusted(&args[0]), snippet(cx, args[0].span, ".."))
2016-01-04 05:26:12 +01:00
} else {
return;
}
2016-12-20 18:21:30 +01:00
},
2017-09-05 11:33:04 +02:00
ExprCall(ref path, ref v) if v.len() == 1 => if let ExprPath(ref path) = path.node {
if match_qpath(path, &["String", "from_str"]) || match_qpath(path, &["String", "from"]) {
(cx.tables.expr_ty_adjusted(&v[0]), snippet(cx, v[0].span, ".."))
} else {
2016-01-04 05:26:12 +01:00
return;
}
2017-09-05 11:33:04 +02:00
} else {
return;
2016-12-20 18:21:30 +01:00
},
2016-01-04 05:26:12 +01:00
_ => return,
};
2016-01-18 15:35:50 +01:00
2017-05-11 18:59:36 +02:00
let other_ty = cx.tables.expr_ty_adjusted(other);
let partial_eq_trait_id = match cx.tcx.lang_items().eq_trait() {
2016-01-18 15:35:50 +01:00
Some(id) => id,
None => return,
};
2017-05-11 18:59:36 +02:00
// *arg impls PartialEq<other>
if !arg_ty
.builtin_deref(true, ty::LvaluePreference::NoPreference)
.map_or(false, |tam| implements_trait(cx, tam.ty, partial_eq_trait_id, &[other_ty]))
2017-05-11 18:59:36 +02:00
// arg impls PartialEq<*other>
&& !other_ty
.builtin_deref(true, ty::LvaluePreference::NoPreference)
.map_or(false, |tam| implements_trait(cx, arg_ty, partial_eq_trait_id, &[tam.ty]))
2017-05-11 18:59:36 +02:00
// arg impls PartialEq<other>
2017-08-09 09:30:56 +02:00
&& !implements_trait(cx, arg_ty, partial_eq_trait_id, &[other_ty])
{
2016-01-18 15:35:50 +01:00
return;
}
2017-08-09 09:30:56 +02:00
span_lint_and_then(
cx,
CMP_OWNED,
expr.span,
"this creates an owned instance just for comparison",
|db| {
// this is as good as our recursion check can get, we can't prove that the
// current function is
// called by
// PartialEq::eq, but we can at least ensure that this code is not part of it
let parent_fn = cx.tcx.hir.get_parent(expr.id);
let parent_impl = cx.tcx.hir.get_parent(parent_fn);
if parent_impl != CRATE_NODE_ID {
if let map::NodeItem(item) = cx.tcx.hir.get(parent_impl) {
if let ItemImpl(.., Some(ref trait_ref), _, _) = item.node {
if trait_ref.path.def.def_id() == partial_eq_trait_id {
// we are implementing PartialEq, don't suggest not doing `to_owned`, otherwise
// we go into
// recursion
db.span_label(expr.span, "try calling implementing the comparison without allocating");
return;
}
2017-05-11 18:59:36 +02:00
}
}
}
2017-08-09 09:30:56 +02:00
db.span_suggestion(expr.span, "try", snip.to_string());
},
);
}
2015-08-11 18:55:07 +02:00
2017-08-09 09:30:56 +02:00
/// Heuristic to see if an expression is used. Should be compatible with
/// `unused_variables`'s idea
/// of what it means for an expression to be "used".
fn is_used(cx: &LateContext, expr: &Expr) -> bool {
2016-08-01 16:59:14 +02:00
if let Some(parent) = get_parent_expr(cx, expr) {
match parent.node {
2017-09-05 11:33:04 +02:00
ExprAssign(_, ref rhs) | ExprAssignOp(_, _, ref rhs) => **rhs == *expr,
2016-04-26 17:05:39 +02:00
_ => is_used(cx, parent),
}
2016-01-04 05:26:12 +01:00
} else {
true
}
}
2017-08-09 09:30:56 +02:00
/// Test whether an expression is in a macro expansion (e.g. something
/// generated by
/// `#[derive(...)`] or the like).
fn in_attributes_expansion(expr: &Expr) -> bool {
2017-09-05 11:33:04 +02:00
expr.span
.ctxt()
.outer()
.expn_info()
.map_or(false, |info| matches!(info.callee.format, ExpnFormat::MacroAttribute(_)))
}
2016-06-15 16:27:56 +02:00
/// Test whether `def` is a variable defined outside a macro.
fn non_macro_local(cx: &LateContext, def: &def::Def) -> bool {
match *def {
2017-09-05 11:33:04 +02:00
def::Def::Local(def_id) | def::Def::Upvar(def_id, _, _) => {
let id = cx.tcx
.hir
.as_local_node_id(def_id)
.expect("local variables should be found in the same crate");
2017-06-11 05:15:53 +02:00
!in_macro(cx.tcx.hir.span(id))
2016-12-20 18:21:30 +01:00
},
2016-06-15 16:27:56 +02:00
_ => false,
}
}
fn check_cast(cx: &LateContext, span: Span, e: &Expr, ty: &Ty) {
if_let_chain! {[
let TyPtr(MutTy { mutbl, .. }) = ty.node,
let ExprLit(ref lit) = e.node,
let LitKind::Int(value, ..) = lit.node,
value == 0,
!in_constant(cx, e.id)
], {
let msg = match mutbl {
Mutability::MutMutable => "`0 as *mut _` detected. Consider using `ptr::null_mut()`",
Mutability::MutImmutable => "`0 as *const _` detected. Consider using `ptr::null()`",
};
span_lint(cx, ZERO_PTR, span, msg);
}}
}