2014-12-02 12:57:38 -05:00
|
|
|
// Recursion limit.
|
|
|
|
|
//
|
|
|
|
|
// There are various parts of the compiler that must impose arbitrary limits
|
|
|
|
|
// on how deeply they recurse to prevent stack overflow. Users can override
|
2015-01-11 12:28:46 -08:00
|
|
|
// this via an attribute on the crate like `#![recursion_limit="22"]`. This pass
|
2014-12-02 12:57:38 -05:00
|
|
|
// just peeks and looks for that attribute.
|
|
|
|
|
|
|
|
|
|
use session::Session;
|
|
|
|
|
use syntax::ast;
|
|
|
|
|
|
2018-04-01 08:15:59 +02:00
|
|
|
use rustc_data_structures::sync::Once;
|
2016-11-15 23:25:59 +02:00
|
|
|
|
|
|
|
|
pub fn update_limits(sess: &Session, krate: &ast::Crate) {
|
2019-01-02 02:21:05 +03:00
|
|
|
update_limit(krate, &sess.recursion_limit, "recursion_limit", 64);
|
|
|
|
|
update_limit(krate, &sess.type_length_limit, "type_length_limit", 1048576);
|
2016-11-15 23:25:59 +02:00
|
|
|
}
|
|
|
|
|
|
2019-01-02 02:21:05 +03:00
|
|
|
fn update_limit(krate: &ast::Crate, limit: &Once<usize>, name: &str, default: usize) {
|
2015-01-31 12:20:46 -05:00
|
|
|
for attr in &krate.attrs {
|
2016-11-15 23:25:59 +02:00
|
|
|
if !attr.check_name(name) {
|
2014-12-02 12:57:38 -05:00
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if let Some(s) = attr.value_str() {
|
2016-11-16 10:52:37 +00:00
|
|
|
if let Some(n) = s.as_str().parse().ok() {
|
2016-11-15 23:25:59 +02:00
|
|
|
limit.set(n);
|
2014-12-02 12:57:38 -05:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-04-01 08:15:59 +02:00
|
|
|
limit.set(default);
|
2014-12-02 12:57:38 -05:00
|
|
|
}
|