@@ -119,13 +119,13 @@ impl CheckAttrVisitor<'_> {
119
119
}
120
120
sym:: naked => self . check_naked ( hir_id, attr, span, target) ,
121
121
sym:: rustc_legacy_const_generics => {
122
- self . check_rustc_legacy_const_generics ( & attr, span, target, item)
122
+ self . check_rustc_legacy_const_generics ( hir_id , & attr, span, target, item)
123
123
}
124
124
sym:: rustc_lint_query_instability => {
125
- self . check_rustc_lint_query_instability ( & attr, span, target)
125
+ self . check_rustc_lint_query_instability ( hir_id , & attr, span, target)
126
126
}
127
127
sym:: rustc_lint_diagnostics => {
128
- self . check_rustc_lint_diagnostics ( & attr, span, target)
128
+ self . check_rustc_lint_diagnostics ( hir_id , & attr, span, target)
129
129
}
130
130
sym:: rustc_lint_opt_ty => self . check_rustc_lint_opt_ty ( & attr, span, target) ,
131
131
sym:: rustc_lint_opt_deny_field_access => {
@@ -135,7 +135,9 @@ impl CheckAttrVisitor<'_> {
135
135
| sym:: rustc_dirty
136
136
| sym:: rustc_if_this_changed
137
137
| sym:: rustc_then_this_would_need => self . check_rustc_dirty_clean ( & attr) ,
138
- sym:: cmse_nonsecure_entry => self . check_cmse_nonsecure_entry ( attr, span, target) ,
138
+ sym:: cmse_nonsecure_entry => {
139
+ self . check_cmse_nonsecure_entry ( hir_id, attr, span, target)
140
+ }
139
141
sym:: collapse_debuginfo => self . check_collapse_debuginfo ( attr, span, target) ,
140
142
sym:: const_trait => self . check_const_trait ( attr, span, target) ,
141
143
sym:: must_not_suspend => self . check_must_not_suspend ( & attr, span, target) ,
@@ -386,21 +388,29 @@ impl CheckAttrVisitor<'_> {
386
388
self . tcx . sess . emit_err ( errors:: AttrShouldBeAppliedToFn {
387
389
attr_span : attr. span ,
388
390
defn_span : span,
391
+ on_crate : hir_id == CRATE_HIR_ID ,
389
392
} ) ;
390
393
false
391
394
}
392
395
}
393
396
}
394
397
395
398
/// Checks if `#[cmse_nonsecure_entry]` is applied to a function definition.
396
- fn check_cmse_nonsecure_entry ( & self , attr : & Attribute , span : Span , target : Target ) -> bool {
399
+ fn check_cmse_nonsecure_entry (
400
+ & self ,
401
+ hir_id : HirId ,
402
+ attr : & Attribute ,
403
+ span : Span ,
404
+ target : Target ,
405
+ ) -> bool {
397
406
match target {
398
407
Target :: Fn
399
408
| Target :: Method ( MethodKind :: Trait { body : true } | MethodKind :: Inherent ) => true ,
400
409
_ => {
401
410
self . tcx . sess . emit_err ( errors:: AttrShouldBeAppliedToFn {
402
411
attr_span : attr. span ,
403
412
defn_span : span,
413
+ on_crate : hir_id == CRATE_HIR_ID ,
404
414
} ) ;
405
415
false
406
416
}
@@ -465,9 +475,11 @@ impl CheckAttrVisitor<'_> {
465
475
true
466
476
}
467
477
_ => {
468
- self . tcx
469
- . sess
470
- . emit_err ( errors:: TrackedCallerWrongLocation { attr_span, defn_span : span } ) ;
478
+ self . tcx . sess . emit_err ( errors:: TrackedCallerWrongLocation {
479
+ attr_span,
480
+ defn_span : span,
481
+ on_crate : hir_id == CRATE_HIR_ID ,
482
+ } ) ;
471
483
false
472
484
}
473
485
}
@@ -576,6 +588,7 @@ impl CheckAttrVisitor<'_> {
576
588
self . tcx . sess . emit_err ( errors:: AttrShouldBeAppliedToFn {
577
589
attr_span : attr. span ,
578
590
defn_span : span,
591
+ on_crate : hir_id == CRATE_HIR_ID ,
579
592
} ) ;
580
593
false
581
594
}
@@ -1230,7 +1243,7 @@ impl CheckAttrVisitor<'_> {
1230
1243
UNUSED_ATTRIBUTES ,
1231
1244
hir_id,
1232
1245
attr. span ,
1233
- errors:: Cold { span } ,
1246
+ errors:: Cold { span, on_crate : hir_id == CRATE_HIR_ID } ,
1234
1247
) ;
1235
1248
}
1236
1249
}
@@ -1366,6 +1379,7 @@ impl CheckAttrVisitor<'_> {
1366
1379
/// Checks if `#[rustc_legacy_const_generics]` is applied to a function and has a valid argument.
1367
1380
fn check_rustc_legacy_const_generics (
1368
1381
& self ,
1382
+ hir_id : HirId ,
1369
1383
attr : & Attribute ,
1370
1384
span : Span ,
1371
1385
target : Target ,
@@ -1376,6 +1390,7 @@ impl CheckAttrVisitor<'_> {
1376
1390
self . tcx . sess . emit_err ( errors:: AttrShouldBeAppliedToFn {
1377
1391
attr_span : attr. span ,
1378
1392
defn_span : span,
1393
+ on_crate : hir_id == CRATE_HIR_ID ,
1379
1394
} ) ;
1380
1395
return false ;
1381
1396
}
@@ -1440,12 +1455,19 @@ impl CheckAttrVisitor<'_> {
1440
1455
1441
1456
/// Helper function for checking that the provided attribute is only applied to a function or
1442
1457
/// method.
1443
- fn check_applied_to_fn_or_method ( & self , attr : & Attribute , span : Span , target : Target ) -> bool {
1458
+ fn check_applied_to_fn_or_method (
1459
+ & self ,
1460
+ hir_id : HirId ,
1461
+ attr : & Attribute ,
1462
+ span : Span ,
1463
+ target : Target ,
1464
+ ) -> bool {
1444
1465
let is_function = matches ! ( target, Target :: Fn | Target :: Method ( ..) ) ;
1445
1466
if !is_function {
1446
1467
self . tcx . sess . emit_err ( errors:: AttrShouldBeAppliedToFn {
1447
1468
attr_span : attr. span ,
1448
1469
defn_span : span,
1470
+ on_crate : hir_id == CRATE_HIR_ID ,
1449
1471
} ) ;
1450
1472
false
1451
1473
} else {
@@ -1457,17 +1479,24 @@ impl CheckAttrVisitor<'_> {
1457
1479
/// or method.
1458
1480
fn check_rustc_lint_query_instability (
1459
1481
& self ,
1482
+ hir_id : HirId ,
1460
1483
attr : & Attribute ,
1461
1484
span : Span ,
1462
1485
target : Target ,
1463
1486
) -> bool {
1464
- self . check_applied_to_fn_or_method ( attr, span, target)
1487
+ self . check_applied_to_fn_or_method ( hir_id , attr, span, target)
1465
1488
}
1466
1489
1467
1490
/// Checks that the `#[rustc_lint_diagnostics]` attribute is only applied to a function or
1468
1491
/// method.
1469
- fn check_rustc_lint_diagnostics ( & self , attr : & Attribute , span : Span , target : Target ) -> bool {
1470
- self . check_applied_to_fn_or_method ( attr, span, target)
1492
+ fn check_rustc_lint_diagnostics (
1493
+ & self ,
1494
+ hir_id : HirId ,
1495
+ attr : & Attribute ,
1496
+ span : Span ,
1497
+ target : Target ,
1498
+ ) -> bool {
1499
+ self . check_applied_to_fn_or_method ( hir_id, attr, span, target)
1471
1500
}
1472
1501
1473
1502
/// Checks that the `#[rustc_lint_opt_ty]` attribute is only applied to a struct.
0 commit comments