Merge from rustc
This commit is contained in:
commit
a10633afe6
176 changed files with 1438 additions and 795 deletions
|
@ -1,5 +1,5 @@
|
|||
use rustc_middle::mir::coverage::{
|
||||
CodeRegion, ConditionInfo, CounterId, CovTerm, DecisionInfo, ExpressionId, MappingKind,
|
||||
ConditionInfo, CounterId, CovTerm, DecisionInfo, ExpressionId, MappingKind, SourceRegion,
|
||||
};
|
||||
|
||||
/// Must match the layout of `LLVMRustCounterKind`.
|
||||
|
@ -236,9 +236,10 @@ impl CounterMappingRegion {
|
|||
pub(crate) fn from_mapping(
|
||||
mapping_kind: &MappingKind,
|
||||
local_file_id: u32,
|
||||
code_region: &CodeRegion,
|
||||
source_region: &SourceRegion,
|
||||
) -> Self {
|
||||
let &CodeRegion { file_name: _, start_line, start_col, end_line, end_col } = code_region;
|
||||
let &SourceRegion { file_name: _, start_line, start_col, end_line, end_col } =
|
||||
source_region;
|
||||
match *mapping_kind {
|
||||
MappingKind::Code(term) => Self::code_region(
|
||||
Counter::from_term(term),
|
||||
|
|
|
@ -2,8 +2,8 @@ use rustc_data_structures::captures::Captures;
|
|||
use rustc_data_structures::fx::FxIndexSet;
|
||||
use rustc_index::bit_set::BitSet;
|
||||
use rustc_middle::mir::coverage::{
|
||||
CodeRegion, CounterId, CovTerm, Expression, ExpressionId, FunctionCoverageInfo, Mapping,
|
||||
MappingKind, Op,
|
||||
CounterId, CovTerm, Expression, ExpressionId, FunctionCoverageInfo, Mapping, MappingKind, Op,
|
||||
SourceRegion,
|
||||
};
|
||||
use rustc_middle::ty::Instance;
|
||||
use rustc_span::Symbol;
|
||||
|
@ -201,7 +201,7 @@ impl<'tcx> FunctionCoverage<'tcx> {
|
|||
|
||||
/// Returns an iterator over all filenames used by this function's mappings.
|
||||
pub(crate) fn all_file_names(&self) -> impl Iterator<Item = Symbol> + Captures<'_> {
|
||||
self.function_coverage_info.mappings.iter().map(|mapping| mapping.code_region.file_name)
|
||||
self.function_coverage_info.mappings.iter().map(|mapping| mapping.source_region.file_name)
|
||||
}
|
||||
|
||||
/// Convert this function's coverage expression data into a form that can be
|
||||
|
@ -230,12 +230,12 @@ impl<'tcx> FunctionCoverage<'tcx> {
|
|||
/// that will be used by `mapgen` when preparing for FFI.
|
||||
pub(crate) fn counter_regions(
|
||||
&self,
|
||||
) -> impl Iterator<Item = (MappingKind, &CodeRegion)> + ExactSizeIterator {
|
||||
) -> impl Iterator<Item = (MappingKind, &SourceRegion)> + ExactSizeIterator {
|
||||
self.function_coverage_info.mappings.iter().map(move |mapping| {
|
||||
let Mapping { kind, code_region } = mapping;
|
||||
let Mapping { kind, source_region } = mapping;
|
||||
let kind =
|
||||
kind.map_terms(|term| if self.is_zero_term(term) { CovTerm::Zero } else { term });
|
||||
(kind, code_region)
|
||||
(kind, source_region)
|
||||
})
|
||||
}
|
||||
|
||||
|
|
|
@ -1,5 +1,6 @@
|
|||
use rustc_ast::{ast, attr, MetaItemKind, NestedMetaItem};
|
||||
use rustc_attr::{list_contains_name, InlineAttr, InstructionSetAttr, OptimizeAttr};
|
||||
use rustc_data_structures::fx::FxHashSet;
|
||||
use rustc_errors::codes::*;
|
||||
use rustc_errors::{struct_span_code_err, DiagMessage, SubdiagMessage};
|
||||
use rustc_hir as hir;
|
||||
|
@ -8,7 +9,7 @@ use rustc_hir::def_id::{DefId, LocalDefId, LOCAL_CRATE};
|
|||
use rustc_hir::weak_lang_items::WEAK_LANG_ITEMS;
|
||||
use rustc_hir::{lang_items, LangItem};
|
||||
use rustc_middle::middle::codegen_fn_attrs::{
|
||||
CodegenFnAttrFlags, CodegenFnAttrs, PatchableFunctionEntry,
|
||||
CodegenFnAttrFlags, CodegenFnAttrs, PatchableFunctionEntry, TargetFeature,
|
||||
};
|
||||
use rustc_middle::mir::mono::Linkage;
|
||||
use rustc_middle::query::Providers;
|
||||
|
@ -17,6 +18,7 @@ use rustc_session::lint;
|
|||
use rustc_session::parse::feature_err;
|
||||
use rustc_span::symbol::Ident;
|
||||
use rustc_span::{sym, Span};
|
||||
use rustc_target::abi::VariantIdx;
|
||||
use rustc_target::spec::{abi, SanitizerSet};
|
||||
|
||||
use crate::errors;
|
||||
|
@ -78,6 +80,13 @@ fn codegen_fn_attrs(tcx: TyCtxt<'_>, did: LocalDefId) -> CodegenFnAttrs {
|
|||
let mut link_ordinal_span = None;
|
||||
let mut no_sanitize_span = None;
|
||||
|
||||
let fn_sig_outer = || {
|
||||
use DefKind::*;
|
||||
|
||||
let def_kind = tcx.def_kind(did);
|
||||
if let Fn | AssocFn | Variant | Ctor(..) = def_kind { Some(tcx.fn_sig(did)) } else { None }
|
||||
};
|
||||
|
||||
for attr in attrs.iter() {
|
||||
// In some cases, attribute are only valid on functions, but it's the `check_attr`
|
||||
// pass that check that they aren't used anywhere else, rather this module.
|
||||
|
@ -85,16 +94,12 @@ fn codegen_fn_attrs(tcx: TyCtxt<'_>, did: LocalDefId) -> CodegenFnAttrs {
|
|||
// functions (such as calling `fn_sig`, which ICEs if given a non-function). We also
|
||||
// report a delayed bug, just in case `check_attr` isn't doing its job.
|
||||
let fn_sig = || {
|
||||
use DefKind::*;
|
||||
|
||||
let def_kind = tcx.def_kind(did);
|
||||
if let Fn | AssocFn | Variant | Ctor(..) = def_kind {
|
||||
Some(tcx.fn_sig(did))
|
||||
} else {
|
||||
let sig = fn_sig_outer();
|
||||
if sig.is_none() {
|
||||
tcx.dcx()
|
||||
.span_delayed_bug(attr.span, "this attribute can only be applied to functions");
|
||||
None
|
||||
}
|
||||
sig
|
||||
};
|
||||
|
||||
let Some(Ident { name, .. }) = attr.ident() else {
|
||||
|
@ -613,7 +618,93 @@ fn codegen_fn_attrs(tcx: TyCtxt<'_>, did: LocalDefId) -> CodegenFnAttrs {
|
|||
}
|
||||
}
|
||||
|
||||
// If a function uses #[target_feature] it can't be inlined into general
|
||||
if let Some(sig) = fn_sig_outer() {
|
||||
// Collect target features from types reachable from arguments.
|
||||
// We define a type as "reachable" if:
|
||||
// - it is a function argument
|
||||
// - it is a field of a reachable struct
|
||||
// - there is a reachable reference to it
|
||||
// FIXME(struct_target_features): we may want to cache the result of this computation.
|
||||
let mut visited_types = FxHashSet::default();
|
||||
let mut reachable_types: Vec<_> = sig.skip_binder().inputs().skip_binder().to_owned();
|
||||
let mut additional_tf = vec![];
|
||||
|
||||
while let Some(ty) = reachable_types.pop() {
|
||||
if visited_types.contains(&ty) {
|
||||
continue;
|
||||
}
|
||||
visited_types.insert(ty);
|
||||
match ty.kind() {
|
||||
ty::Alias(..) => {
|
||||
if let Ok(t) =
|
||||
tcx.try_normalize_erasing_regions(tcx.param_env(did.to_def_id()), ty)
|
||||
{
|
||||
reachable_types.push(t)
|
||||
}
|
||||
}
|
||||
|
||||
ty::Ref(_, inner, _) => reachable_types.push(*inner),
|
||||
ty::Tuple(tys) => reachable_types.extend(tys.iter()),
|
||||
ty::Adt(adt_def, args) => {
|
||||
additional_tf.extend_from_slice(tcx.struct_target_features(adt_def.did()));
|
||||
// This only recurses into structs as i.e. an Option<TargetFeature> is an ADT
|
||||
// that doesn't actually always contain a TargetFeature.
|
||||
if adt_def.is_struct() {
|
||||
reachable_types.extend(
|
||||
adt_def
|
||||
.variant(VariantIdx::from_usize(0))
|
||||
.fields
|
||||
.iter()
|
||||
.map(|field| field.ty(tcx, args)),
|
||||
);
|
||||
}
|
||||
}
|
||||
ty::Bool
|
||||
| ty::Char
|
||||
| ty::Int(..)
|
||||
| ty::Uint(..)
|
||||
| ty::Float(..)
|
||||
| ty::Foreign(..)
|
||||
| ty::Str
|
||||
| ty::Array(..)
|
||||
| ty::Pat(..)
|
||||
| ty::Slice(..)
|
||||
| ty::RawPtr(..)
|
||||
| ty::FnDef(..)
|
||||
| ty::FnPtr(..)
|
||||
| ty::Dynamic(..)
|
||||
| ty::Closure(..)
|
||||
| ty::CoroutineClosure(..)
|
||||
| ty::Coroutine(..)
|
||||
| ty::CoroutineWitness(..)
|
||||
| ty::Never
|
||||
| ty::Param(..)
|
||||
| ty::Bound(..)
|
||||
| ty::Placeholder(..)
|
||||
| ty::Infer(..)
|
||||
| ty::Error(..) => (),
|
||||
}
|
||||
}
|
||||
|
||||
// FIXME(struct_target_features): is this really necessary?
|
||||
if !additional_tf.is_empty() && sig.skip_binder().abi() != abi::Abi::Rust {
|
||||
tcx.dcx().span_err(
|
||||
tcx.hir().span(tcx.local_def_id_to_hir_id(did)),
|
||||
"cannot use a struct with target features in a function with non-Rust ABI",
|
||||
);
|
||||
}
|
||||
if !additional_tf.is_empty() && codegen_fn_attrs.inline == InlineAttr::Always {
|
||||
tcx.dcx().span_err(
|
||||
tcx.hir().span(tcx.local_def_id_to_hir_id(did)),
|
||||
"cannot use a struct with target features in a #[inline(always)] function",
|
||||
);
|
||||
}
|
||||
codegen_fn_attrs
|
||||
.target_features
|
||||
.extend(additional_tf.iter().map(|tf| TargetFeature { implied: true, ..*tf }));
|
||||
}
|
||||
|
||||
// If a function uses non-default target_features it can't be inlined into general
|
||||
// purpose functions as they wouldn't have the right target features
|
||||
// enabled. For that reason we also forbid #[inline(always)] as it can't be
|
||||
// respected.
|
||||
|
@ -758,6 +849,20 @@ fn check_link_name_xor_ordinal(
|
|||
}
|
||||
}
|
||||
|
||||
pub fn provide(providers: &mut Providers) {
|
||||
*providers = Providers { codegen_fn_attrs, should_inherit_track_caller, ..*providers };
|
||||
fn struct_target_features(tcx: TyCtxt<'_>, def_id: LocalDefId) -> &[TargetFeature] {
|
||||
let mut features = vec![];
|
||||
let supported_features = tcx.supported_target_features(LOCAL_CRATE);
|
||||
for attr in tcx.get_attrs(def_id, sym::target_feature) {
|
||||
from_target_feature(tcx, attr, supported_features, &mut features);
|
||||
}
|
||||
tcx.arena.alloc_slice(&features)
|
||||
}
|
||||
|
||||
pub fn provide(providers: &mut Providers) {
|
||||
*providers = Providers {
|
||||
codegen_fn_attrs,
|
||||
should_inherit_track_caller,
|
||||
struct_target_features,
|
||||
..*providers
|
||||
};
|
||||
}
|
||||
|
|
|
@ -402,9 +402,6 @@ const_eval_unallowed_mutable_refs =
|
|||
const_eval_unallowed_op_in_const_context =
|
||||
{$msg}
|
||||
|
||||
const_eval_unavailable_target_features_for_fn =
|
||||
calling a function that requires unavailable target features: {$unavailable_feats}
|
||||
|
||||
const_eval_uninhabited_enum_variant_read =
|
||||
read discriminant of an uninhabited enum variant
|
||||
const_eval_uninhabited_enum_variant_written =
|
||||
|
|
|
@ -311,34 +311,6 @@ impl<'tcx, M: Machine<'tcx>> InterpCx<'tcx, M> {
|
|||
Ok(())
|
||||
}
|
||||
|
||||
fn check_fn_target_features(&self, instance: ty::Instance<'tcx>) -> InterpResult<'tcx, ()> {
|
||||
// Calling functions with `#[target_feature]` is not unsafe on WASM, see #84988
|
||||
let attrs = self.tcx.codegen_fn_attrs(instance.def_id());
|
||||
if !self.tcx.sess.target.is_like_wasm
|
||||
&& attrs
|
||||
.target_features
|
||||
.iter()
|
||||
.any(|feature| !self.tcx.sess.target_features.contains(&feature.name))
|
||||
{
|
||||
throw_ub_custom!(
|
||||
fluent::const_eval_unavailable_target_features_for_fn,
|
||||
unavailable_feats = attrs
|
||||
.target_features
|
||||
.iter()
|
||||
.filter(|&feature| !feature.implied
|
||||
&& !self.tcx.sess.target_features.contains(&feature.name))
|
||||
.fold(String::new(), |mut s, feature| {
|
||||
if !s.is_empty() {
|
||||
s.push_str(", ");
|
||||
}
|
||||
s.push_str(feature.name.as_str());
|
||||
s
|
||||
}),
|
||||
);
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// The main entry point for creating a new stack frame: performs ABI checks and initializes
|
||||
/// arguments.
|
||||
#[instrument(skip(self), level = "trace")]
|
||||
|
@ -360,20 +332,18 @@ impl<'tcx, M: Machine<'tcx>> InterpCx<'tcx, M> {
|
|||
throw_unsup_format!("calling a c-variadic function is not supported");
|
||||
}
|
||||
|
||||
if M::enforce_abi(self) {
|
||||
if caller_fn_abi.conv != callee_fn_abi.conv {
|
||||
throw_ub_custom!(
|
||||
fluent::const_eval_incompatible_calling_conventions,
|
||||
callee_conv = format!("{:?}", callee_fn_abi.conv),
|
||||
caller_conv = format!("{:?}", caller_fn_abi.conv),
|
||||
)
|
||||
}
|
||||
if caller_fn_abi.conv != callee_fn_abi.conv {
|
||||
throw_ub_custom!(
|
||||
fluent::const_eval_incompatible_calling_conventions,
|
||||
callee_conv = format!("{:?}", callee_fn_abi.conv),
|
||||
caller_conv = format!("{:?}", caller_fn_abi.conv),
|
||||
)
|
||||
}
|
||||
|
||||
// Check that all target features required by the callee (i.e., from
|
||||
// the attribute `#[target_feature(enable = ...)]`) are enabled at
|
||||
// compile time.
|
||||
self.check_fn_target_features(instance)?;
|
||||
M::check_fn_target_features(self, instance)?;
|
||||
|
||||
if !callee_fn_abi.can_unwind {
|
||||
// The callee cannot unwind, so force the `Unreachable` unwind handling.
|
||||
|
|
|
@ -684,19 +684,19 @@ impl<'tcx, M: Machine<'tcx>> InterpCx<'tcx, M> {
|
|||
assert!(layout.is_sized());
|
||||
|
||||
let get_bytes = |this: &InterpCx<'tcx, M>,
|
||||
op: &OpTy<'tcx, <M as Machine<'tcx>>::Provenance>,
|
||||
size|
|
||||
op: &OpTy<'tcx, <M as Machine<'tcx>>::Provenance>|
|
||||
-> InterpResult<'tcx, &[u8]> {
|
||||
let ptr = this.read_pointer(op)?;
|
||||
let Some(alloc_ref) = self.get_ptr_alloc(ptr, size)? else {
|
||||
this.check_ptr_align(ptr, layout.align.abi)?;
|
||||
let Some(alloc_ref) = self.get_ptr_alloc(ptr, layout.size)? else {
|
||||
// zero-sized access
|
||||
return Ok(&[]);
|
||||
};
|
||||
alloc_ref.get_bytes_strip_provenance()
|
||||
};
|
||||
|
||||
let lhs_bytes = get_bytes(self, lhs, layout.size)?;
|
||||
let rhs_bytes = get_bytes(self, rhs, layout.size)?;
|
||||
let lhs_bytes = get_bytes(self, lhs)?;
|
||||
let rhs_bytes = get_bytes(self, rhs)?;
|
||||
Ok(Scalar::from_bool(lhs_bytes == rhs_bytes))
|
||||
}
|
||||
}
|
||||
|
|
|
@ -173,11 +173,6 @@ pub trait Machine<'tcx>: Sized {
|
|||
false
|
||||
}
|
||||
|
||||
/// Whether function calls should be [ABI](CallAbi)-checked.
|
||||
fn enforce_abi(_ecx: &InterpCx<'tcx, Self>) -> bool {
|
||||
true
|
||||
}
|
||||
|
||||
/// Whether Assert(OverflowNeg) and Assert(Overflow) MIR terminators should actually
|
||||
/// check for overflow.
|
||||
fn ignore_optional_overflow_checks(_ecx: &InterpCx<'tcx, Self>) -> bool;
|
||||
|
@ -238,6 +233,13 @@ pub trait Machine<'tcx>: Sized {
|
|||
unwind: mir::UnwindAction,
|
||||
) -> InterpResult<'tcx, Option<ty::Instance<'tcx>>>;
|
||||
|
||||
/// Check whether the given function may be executed on the current machine, in terms of the
|
||||
/// target features is requires.
|
||||
fn check_fn_target_features(
|
||||
_ecx: &InterpCx<'tcx, Self>,
|
||||
_instance: ty::Instance<'tcx>,
|
||||
) -> InterpResult<'tcx>;
|
||||
|
||||
/// Called to evaluate `Assert` MIR terminators that trigger a panic.
|
||||
fn assert_panic(
|
||||
ecx: &mut InterpCx<'tcx, Self>,
|
||||
|
@ -280,6 +282,9 @@ pub trait Machine<'tcx>: Sized {
|
|||
Ok(())
|
||||
}
|
||||
|
||||
/// Determines the result of a `NullaryOp::UbChecks` invocation.
|
||||
fn ub_checks(_ecx: &InterpCx<'tcx, Self>) -> InterpResult<'tcx, bool>;
|
||||
|
||||
/// Called when the interpreter encounters a `StatementKind::ConstEvalCounter` instruction.
|
||||
/// You can use this to detect long or endlessly running programs.
|
||||
#[inline]
|
||||
|
@ -614,6 +619,16 @@ pub macro compile_time_machine(<$tcx: lifetime>) {
|
|||
unreachable!("unwinding cannot happen during compile-time evaluation")
|
||||
}
|
||||
|
||||
#[inline(always)]
|
||||
fn check_fn_target_features(
|
||||
_ecx: &InterpCx<$tcx, Self>,
|
||||
_instance: ty::Instance<$tcx>,
|
||||
) -> InterpResult<$tcx> {
|
||||
// For now we don't do any checking here. We can't use `tcx.sess` because that can differ
|
||||
// between crates, and we need to ensure that const-eval always behaves the same.
|
||||
Ok(())
|
||||
}
|
||||
|
||||
#[inline(always)]
|
||||
fn call_extra_fn(
|
||||
_ecx: &mut InterpCx<$tcx, Self>,
|
||||
|
@ -627,6 +642,13 @@ pub macro compile_time_machine(<$tcx: lifetime>) {
|
|||
match fn_val {}
|
||||
}
|
||||
|
||||
#[inline(always)]
|
||||
fn ub_checks(_ecx: &InterpCx<$tcx, Self>) -> InterpResult<$tcx, bool> {
|
||||
// We can't look at `tcx.sess` here as that can differ across crates, which can lead to
|
||||
// unsound differences in evaluating the same constant at different instantiation sites.
|
||||
Ok(true)
|
||||
}
|
||||
|
||||
#[inline(always)]
|
||||
fn adjust_global_allocation<'b>(
|
||||
_ecx: &InterpCx<$tcx, Self>,
|
||||
|
|
|
@ -512,7 +512,7 @@ impl<'tcx, M: Machine<'tcx>> InterpCx<'tcx, M> {
|
|||
self.tcx.offset_of_subfield(self.param_env, layout, fields.iter()).bytes();
|
||||
ImmTy::from_uint(val, usize_layout())
|
||||
}
|
||||
UbChecks => ImmTy::from_bool(self.tcx.sess.ub_checks(), *self.tcx),
|
||||
UbChecks => ImmTy::from_bool(M::ub_checks(self)?, *self.tcx),
|
||||
})
|
||||
}
|
||||
}
|
||||
|
|
|
@ -393,13 +393,17 @@ fn run_compiler(
|
|||
|
||||
let linker = compiler.enter(|queries| {
|
||||
let early_exit = || early_exit().map(|_| None);
|
||||
|
||||
// Parse the crate root source code (doesn't parse submodules yet)
|
||||
// Everything else is parsed during macro expansion.
|
||||
queries.parse()?;
|
||||
|
||||
if let Some(ppm) = &sess.opts.pretty {
|
||||
if ppm.needs_ast_map() {
|
||||
// If pretty printing is requested: Figure out the representation, print it and exit
|
||||
if let Some(pp_mode) = sess.opts.pretty {
|
||||
if pp_mode.needs_ast_map() {
|
||||
queries.global_ctxt()?.enter(|tcx| {
|
||||
tcx.ensure().early_lint_checks(());
|
||||
pretty::print(sess, *ppm, pretty::PrintExtra::NeedsAstMap { tcx });
|
||||
pretty::print(sess, pp_mode, pretty::PrintExtra::NeedsAstMap { tcx });
|
||||
Ok(())
|
||||
})?;
|
||||
|
||||
|
@ -410,7 +414,7 @@ fn run_compiler(
|
|||
let krate = queries.parse()?;
|
||||
pretty::print(
|
||||
sess,
|
||||
*ppm,
|
||||
pp_mode,
|
||||
pretty::PrintExtra::AfterParsing { krate: &*krate.borrow() },
|
||||
);
|
||||
}
|
||||
|
@ -465,12 +469,8 @@ fn run_compiler(
|
|||
linker.link(sess, codegen_backend)?
|
||||
}
|
||||
|
||||
if sess.opts.unstable_opts.print_fuel.is_some() {
|
||||
eprintln!(
|
||||
"Fuel used by {}: {}",
|
||||
sess.opts.unstable_opts.print_fuel.as_ref().unwrap(),
|
||||
sess.print_fuel.load(Ordering::SeqCst)
|
||||
);
|
||||
if let Some(fuel) = sess.opts.unstable_opts.print_fuel.as_deref() {
|
||||
eprintln!("Fuel used by {}: {}", fuel, sess.print_fuel.load(Ordering::SeqCst));
|
||||
}
|
||||
|
||||
Ok(())
|
||||
|
@ -487,36 +487,43 @@ fn make_output(matches: &getopts::Matches) -> (Option<PathBuf>, Option<OutFileNa
|
|||
(odir, ofile)
|
||||
}
|
||||
|
||||
// Extract input (string or file and optional path) from matches.
|
||||
/// Extract input (string or file and optional path) from matches.
|
||||
/// This handles reading from stdin if `-` is provided.
|
||||
fn make_input(
|
||||
early_dcx: &EarlyDiagCtxt,
|
||||
free_matches: &[String],
|
||||
) -> Result<Option<Input>, ErrorGuaranteed> {
|
||||
let [ifile] = free_matches else { return Ok(None) };
|
||||
if ifile == "-" {
|
||||
let mut src = String::new();
|
||||
if io::stdin().read_to_string(&mut src).is_err() {
|
||||
// Immediately stop compilation if there was an issue reading
|
||||
// the input (for example if the input stream is not UTF-8).
|
||||
let reported =
|
||||
early_dcx.early_err("couldn't read from stdin, as it did not contain valid UTF-8");
|
||||
return Err(reported);
|
||||
}
|
||||
if let Ok(path) = env::var("UNSTABLE_RUSTDOC_TEST_PATH") {
|
||||
let [input_file] = free_matches else { return Ok(None) };
|
||||
|
||||
if input_file != "-" {
|
||||
// Normal `Input::File`
|
||||
return Ok(Some(Input::File(PathBuf::from(input_file))));
|
||||
}
|
||||
|
||||
// read from stdin as `Input::Str`
|
||||
let mut input = String::new();
|
||||
if io::stdin().read_to_string(&mut input).is_err() {
|
||||
// Immediately stop compilation if there was an issue reading
|
||||
// the input (for example if the input stream is not UTF-8).
|
||||
let reported =
|
||||
early_dcx.early_err("couldn't read from stdin, as it did not contain valid UTF-8");
|
||||
return Err(reported);
|
||||
}
|
||||
|
||||
let name = match env::var("UNSTABLE_RUSTDOC_TEST_PATH") {
|
||||
Ok(path) => {
|
||||
let line = env::var("UNSTABLE_RUSTDOC_TEST_LINE").expect(
|
||||
"when UNSTABLE_RUSTDOC_TEST_PATH is set \
|
||||
UNSTABLE_RUSTDOC_TEST_LINE also needs to be set",
|
||||
);
|
||||
let line = isize::from_str_radix(&line, 10)
|
||||
.expect("UNSTABLE_RUSTDOC_TEST_LINE needs to be an number");
|
||||
let file_name = FileName::doc_test_source_code(PathBuf::from(path), line);
|
||||
Ok(Some(Input::Str { name: file_name, input: src }))
|
||||
} else {
|
||||
Ok(Some(Input::Str { name: FileName::anon_source_code(&src), input: src }))
|
||||
FileName::doc_test_source_code(PathBuf::from(path), line)
|
||||
}
|
||||
} else {
|
||||
Ok(Some(Input::File(PathBuf::from(ifile))))
|
||||
}
|
||||
Err(_) => FileName::anon_source_code(&input),
|
||||
};
|
||||
|
||||
Ok(Some(Input::Str { name, input }))
|
||||
}
|
||||
|
||||
/// Whether to stop or continue compilation.
|
||||
|
|
|
@ -594,6 +594,8 @@ declare_features! (
|
|||
(unstable, strict_provenance, "1.61.0", Some(95228)),
|
||||
/// Allows string patterns to dereference values to match them.
|
||||
(unstable, string_deref_patterns, "1.67.0", Some(87121)),
|
||||
/// Allows structs to carry target_feature information.
|
||||
(incomplete, struct_target_features, "CURRENT_RUSTC_VERSION", Some(129107)),
|
||||
/// Allows the use of `#[target_feature]` on safe functions.
|
||||
(unstable, target_feature_11, "1.45.0", Some(69098)),
|
||||
/// Allows using `#[thread_local]` on `static` items.
|
||||
|
|
|
@ -326,6 +326,41 @@ impl DefKind {
|
|||
| DefKind::ExternCrate => false,
|
||||
}
|
||||
}
|
||||
|
||||
/// Whether `query struct_target_features` should be used with this definition.
|
||||
pub fn has_struct_target_features(self) -> bool {
|
||||
match self {
|
||||
DefKind::Struct | DefKind::Union | DefKind::Enum => true,
|
||||
DefKind::Fn
|
||||
| DefKind::AssocFn
|
||||
| DefKind::Ctor(..)
|
||||
| DefKind::Closure
|
||||
| DefKind::Static { .. }
|
||||
| DefKind::Mod
|
||||
| DefKind::Variant
|
||||
| DefKind::Trait
|
||||
| DefKind::TyAlias
|
||||
| DefKind::ForeignTy
|
||||
| DefKind::TraitAlias
|
||||
| DefKind::AssocTy
|
||||
| DefKind::Const
|
||||
| DefKind::AssocConst
|
||||
| DefKind::Macro(..)
|
||||
| DefKind::Use
|
||||
| DefKind::ForeignMod
|
||||
| DefKind::OpaqueTy
|
||||
| DefKind::Impl { .. }
|
||||
| DefKind::Field
|
||||
| DefKind::TyParam
|
||||
| DefKind::ConstParam
|
||||
| DefKind::LifetimeParam
|
||||
| DefKind::AnonConst
|
||||
| DefKind::InlineConst
|
||||
| DefKind::SyntheticCoroutineBody
|
||||
| DefKind::GlobalAsm
|
||||
| DefKind::ExternCrate => false,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// The resolution of a path or export.
|
||||
|
|
|
@ -34,7 +34,7 @@ use rustc_infer::traits::ObligationCause;
|
|||
use rustc_middle::hir::nested_filter;
|
||||
use rustc_middle::query::Providers;
|
||||
use rustc_middle::ty::util::{Discr, IntTypeExt};
|
||||
use rustc_middle::ty::{self, AdtKind, Const, IsSuggestable, Ty, TyCtxt, Upcast};
|
||||
use rustc_middle::ty::{self, AdtKind, Const, IsSuggestable, Ty, TyCtxt};
|
||||
use rustc_middle::{bug, span_bug};
|
||||
use rustc_span::symbol::{kw, sym, Ident, Symbol};
|
||||
use rustc_span::{Span, DUMMY_SP};
|
||||
|
@ -70,7 +70,6 @@ pub fn provide(providers: &mut Providers) {
|
|||
impl_super_outlives: item_bounds::impl_super_outlives,
|
||||
generics_of: generics_of::generics_of,
|
||||
predicates_of: predicates_of::predicates_of,
|
||||
predicates_defined_on,
|
||||
explicit_predicates_of: predicates_of::explicit_predicates_of,
|
||||
explicit_super_predicates_of: predicates_of::explicit_super_predicates_of,
|
||||
explicit_implied_predicates_of: predicates_of::explicit_implied_predicates_of,
|
||||
|
@ -1775,34 +1774,6 @@ fn early_bound_lifetimes_from_generics<'a, 'tcx: 'a>(
|
|||
})
|
||||
}
|
||||
|
||||
/// Returns a list of type predicates for the definition with ID `def_id`, including inferred
|
||||
/// lifetime constraints. This includes all predicates returned by `explicit_predicates_of`, plus
|
||||
/// inferred constraints concerning which regions outlive other regions.
|
||||
#[instrument(level = "debug", skip(tcx))]
|
||||
fn predicates_defined_on(tcx: TyCtxt<'_>, def_id: DefId) -> ty::GenericPredicates<'_> {
|
||||
let mut result = tcx.explicit_predicates_of(def_id);
|
||||
debug!("predicates_defined_on: explicit_predicates_of({:?}) = {:?}", def_id, result);
|
||||
let inferred_outlives = tcx.inferred_outlives_of(def_id);
|
||||
if !inferred_outlives.is_empty() {
|
||||
debug!(
|
||||
"predicates_defined_on: inferred_outlives_of({:?}) = {:?}",
|
||||
def_id, inferred_outlives,
|
||||
);
|
||||
let inferred_outlives_iter =
|
||||
inferred_outlives.iter().map(|(clause, span)| ((*clause).upcast(tcx), *span));
|
||||
if result.predicates.is_empty() {
|
||||
result.predicates = tcx.arena.alloc_from_iter(inferred_outlives_iter);
|
||||
} else {
|
||||
result.predicates = tcx.arena.alloc_from_iter(
|
||||
result.predicates.into_iter().copied().chain(inferred_outlives_iter),
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
debug!("predicates_defined_on({:?}) = {:?}", def_id, result);
|
||||
result
|
||||
}
|
||||
|
||||
fn compute_sig_of_foreign_fn_decl<'tcx>(
|
||||
tcx: TyCtxt<'tcx>,
|
||||
def_id: LocalDefId,
|
||||
|
|
|
@ -18,10 +18,26 @@ use crate::delegation::inherit_predicates_for_delegation_item;
|
|||
use crate::hir_ty_lowering::{HirTyLowerer, OnlySelfBounds, PredicateFilter, RegionInferReason};
|
||||
|
||||
/// Returns a list of all type predicates (explicit and implicit) for the definition with
|
||||
/// ID `def_id`. This includes all predicates returned by `predicates_defined_on`, plus
|
||||
/// `Self: Trait` predicates for traits.
|
||||
/// ID `def_id`. This includes all predicates returned by `explicit_predicates_of`, plus
|
||||
/// inferred constraints concerning which regions outlive other regions.
|
||||
#[instrument(level = "debug", skip(tcx))]
|
||||
pub(super) fn predicates_of(tcx: TyCtxt<'_>, def_id: DefId) -> ty::GenericPredicates<'_> {
|
||||
let mut result = tcx.predicates_defined_on(def_id);
|
||||
let mut result = tcx.explicit_predicates_of(def_id);
|
||||
debug!("predicates_of: explicit_predicates_of({:?}) = {:?}", def_id, result);
|
||||
|
||||
let inferred_outlives = tcx.inferred_outlives_of(def_id);
|
||||
if !inferred_outlives.is_empty() {
|
||||
debug!("predicates_of: inferred_outlives_of({:?}) = {:?}", def_id, inferred_outlives,);
|
||||
let inferred_outlives_iter =
|
||||
inferred_outlives.iter().map(|(clause, span)| ((*clause).upcast(tcx), *span));
|
||||
if result.predicates.is_empty() {
|
||||
result.predicates = tcx.arena.alloc_from_iter(inferred_outlives_iter);
|
||||
} else {
|
||||
result.predicates = tcx.arena.alloc_from_iter(
|
||||
result.predicates.into_iter().copied().chain(inferred_outlives_iter),
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
if tcx.is_trait(def_id) {
|
||||
// For traits, add `Self: Trait` predicate. This is
|
||||
|
@ -51,7 +67,8 @@ pub(super) fn predicates_of(tcx: TyCtxt<'_>, def_id: DefId) -> ty::GenericPredic
|
|||
.chain(std::iter::once((ty::TraitRef::identity(tcx, def_id).upcast(tcx), span))),
|
||||
);
|
||||
}
|
||||
debug!("predicates_of(def_id={:?}) = {:?}", def_id, result);
|
||||
|
||||
debug!("predicates_of({:?}) = {:?}", def_id, result);
|
||||
result
|
||||
}
|
||||
|
||||
|
|
|
@ -850,6 +850,8 @@ impl<'f, 'tcx> Coerce<'f, 'tcx> {
|
|||
}
|
||||
|
||||
// Safe `#[target_feature]` functions are not assignable to safe fn pointers (RFC 2396).
|
||||
// FIXME(struct_target_features): should this be true also for functions that inherit
|
||||
// target features from structs?
|
||||
|
||||
if b_hdr.safety == hir::Safety::Safe
|
||||
&& !self.tcx.codegen_fn_attrs(def_id).target_features.is_empty()
|
||||
|
|
|
@ -224,6 +224,7 @@ provide! { tcx, def_id, other, cdata,
|
|||
variances_of => { table }
|
||||
fn_sig => { table }
|
||||
codegen_fn_attrs => { table }
|
||||
struct_target_features => { table }
|
||||
impl_trait_header => { table }
|
||||
const_param_default => { table }
|
||||
object_lifetime_default => { table }
|
||||
|
|
|
@ -1392,6 +1392,9 @@ impl<'a, 'tcx> EncodeContext<'a, 'tcx> {
|
|||
if def_kind.has_codegen_attrs() {
|
||||
record!(self.tables.codegen_fn_attrs[def_id] <- self.tcx.codegen_fn_attrs(def_id));
|
||||
}
|
||||
if def_kind.has_struct_target_features() {
|
||||
record_array!(self.tables.struct_target_features[def_id] <- self.tcx.struct_target_features(def_id));
|
||||
}
|
||||
if should_encode_visibility(def_kind) {
|
||||
let vis =
|
||||
self.tcx.local_visibility(local_id).map_id(|def_id| def_id.local_def_index);
|
||||
|
|
|
@ -19,7 +19,7 @@ use rustc_macros::{
|
|||
Decodable, Encodable, MetadataDecodable, MetadataEncodable, TyDecodable, TyEncodable,
|
||||
};
|
||||
use rustc_middle::metadata::ModChild;
|
||||
use rustc_middle::middle::codegen_fn_attrs::CodegenFnAttrs;
|
||||
use rustc_middle::middle::codegen_fn_attrs::{CodegenFnAttrs, TargetFeature};
|
||||
use rustc_middle::middle::debugger_visualizer::DebuggerVisualizerFile;
|
||||
use rustc_middle::middle::exported_symbols::{ExportedSymbol, SymbolExportInfo};
|
||||
use rustc_middle::middle::lib_features::FeatureStability;
|
||||
|
@ -427,6 +427,7 @@ define_tables! {
|
|||
variances_of: Table<DefIndex, LazyArray<ty::Variance>>,
|
||||
fn_sig: Table<DefIndex, LazyValue<ty::EarlyBinder<'static, ty::PolyFnSig<'static>>>>,
|
||||
codegen_fn_attrs: Table<DefIndex, LazyValue<CodegenFnAttrs>>,
|
||||
struct_target_features: Table<DefIndex, LazyArray<TargetFeature>>,
|
||||
impl_trait_header: Table<DefIndex, LazyValue<ty::ImplTraitHeader<'static>>>,
|
||||
const_param_default: Table<DefIndex, LazyValue<ty::EarlyBinder<'static, rustc_middle::ty::Const<'static>>>>,
|
||||
object_lifetime_default: Table<DefIndex, LazyValue<ObjectLifetimeDefault>>,
|
||||
|
|
|
@ -35,7 +35,6 @@ macro_rules! arena_types {
|
|||
)>,
|
||||
[] crate_for_resolver: rustc_data_structures::steal::Steal<(rustc_ast::Crate, rustc_ast::AttrVec)>,
|
||||
[] resolutions: rustc_middle::ty::ResolverGlobalCtxt,
|
||||
[decode] code_region: rustc_middle::mir::coverage::CodeRegion,
|
||||
[] const_allocs: rustc_middle::mir::interpret::Allocation,
|
||||
[] region_scope_tree: rustc_middle::middle::region::ScopeTree,
|
||||
// Required for the incremental on-disk cache
|
||||
|
|
|
@ -26,8 +26,8 @@ pub struct CodegenFnAttrs {
|
|||
/// be set when `link_name` is set. This is for foreign items with the
|
||||
/// "raw-dylib" kind.
|
||||
pub link_ordinal: Option<u16>,
|
||||
/// The `#[target_feature(enable = "...")]` attribute and the enabled
|
||||
/// features (only enabled features are supported right now).
|
||||
/// All the target features that are enabled for this function. Some features might be enabled
|
||||
/// implicitly.
|
||||
pub target_features: Vec<TargetFeature>,
|
||||
/// The `#[linkage = "..."]` attribute on Rust-defined items and the value we found.
|
||||
pub linkage: Option<Linkage>,
|
||||
|
@ -55,8 +55,8 @@ pub struct CodegenFnAttrs {
|
|||
pub struct TargetFeature {
|
||||
/// The name of the target feature (e.g. "avx")
|
||||
pub name: Symbol,
|
||||
/// The feature is implied by another feature, rather than explicitly added by the
|
||||
/// `#[target_feature]` attribute
|
||||
/// The feature is implied by another feature or by an argument, rather than explicitly
|
||||
/// added by the `#[target_feature]` attribute
|
||||
pub implied: bool,
|
||||
}
|
||||
|
||||
|
|
|
@ -163,7 +163,7 @@ impl Debug for CoverageKind {
|
|||
|
||||
#[derive(Clone, TyEncodable, TyDecodable, Hash, HashStable, PartialEq, Eq, PartialOrd, Ord)]
|
||||
#[derive(TypeFoldable, TypeVisitable)]
|
||||
pub struct CodeRegion {
|
||||
pub struct SourceRegion {
|
||||
pub file_name: Symbol,
|
||||
pub start_line: u32,
|
||||
pub start_col: u32,
|
||||
|
@ -171,7 +171,7 @@ pub struct CodeRegion {
|
|||
pub end_col: u32,
|
||||
}
|
||||
|
||||
impl Debug for CodeRegion {
|
||||
impl Debug for SourceRegion {
|
||||
fn fmt(&self, fmt: &mut Formatter<'_>) -> fmt::Result {
|
||||
write!(
|
||||
fmt,
|
||||
|
@ -242,7 +242,7 @@ impl MappingKind {
|
|||
#[derive(TyEncodable, TyDecodable, Hash, HashStable, TypeFoldable, TypeVisitable)]
|
||||
pub struct Mapping {
|
||||
pub kind: MappingKind,
|
||||
pub code_region: CodeRegion,
|
||||
pub source_region: SourceRegion,
|
||||
}
|
||||
|
||||
/// Stores per-function coverage information attached to a `mir::Body`,
|
||||
|
|
|
@ -547,8 +547,8 @@ fn write_function_coverage_info(
|
|||
for (id, expression) in expressions.iter_enumerated() {
|
||||
writeln!(w, "{INDENT}coverage {id:?} => {expression:?};")?;
|
||||
}
|
||||
for coverage::Mapping { kind, code_region } in mappings {
|
||||
writeln!(w, "{INDENT}coverage {kind:?} => {code_region:?};")?;
|
||||
for coverage::Mapping { kind, source_region } in mappings {
|
||||
writeln!(w, "{INDENT}coverage {kind:?} => {source_region:?};")?;
|
||||
}
|
||||
writeln!(w)?;
|
||||
|
||||
|
|
|
@ -47,7 +47,7 @@ use {rustc_ast as ast, rustc_attr as attr, rustc_hir as hir};
|
|||
use crate::infer::canonical::{self, Canonical};
|
||||
use crate::lint::LintExpectation;
|
||||
use crate::metadata::ModChild;
|
||||
use crate::middle::codegen_fn_attrs::CodegenFnAttrs;
|
||||
use crate::middle::codegen_fn_attrs::{CodegenFnAttrs, TargetFeature};
|
||||
use crate::middle::debugger_visualizer::DebuggerVisualizerFile;
|
||||
use crate::middle::exported_symbols::{ExportedSymbol, SymbolExportInfo};
|
||||
use crate::middle::lib_features::LibFeatures;
|
||||
|
@ -312,17 +312,6 @@ rustc_queries! {
|
|||
/// predicates (where-clauses) that must be proven true in order
|
||||
/// to reference it. This is almost always the "predicates query"
|
||||
/// that you want.
|
||||
///
|
||||
/// `predicates_of` builds on `predicates_defined_on` -- in fact,
|
||||
/// it is almost always the same as that query, except for the
|
||||
/// case of traits. For traits, `predicates_of` contains
|
||||
/// an additional `Self: Trait<...>` predicate that users don't
|
||||
/// actually write. This reflects the fact that to invoke the
|
||||
/// trait (e.g., via `Default::default`) you must supply types
|
||||
/// that actually implement the trait. (However, this extra
|
||||
/// predicate gets in the way of some checks, which are intended
|
||||
/// to operate over only the actual where-clauses written by the
|
||||
/// user.)
|
||||
query predicates_of(key: DefId) -> ty::GenericPredicates<'tcx> {
|
||||
desc { |tcx| "computing predicates of `{}`", tcx.def_path_str(key) }
|
||||
cache_on_disk_if { key.is_local() }
|
||||
|
@ -619,14 +608,6 @@ rustc_queries! {
|
|||
desc { "getting wasm import module map" }
|
||||
}
|
||||
|
||||
/// Maps from the `DefId` of an item (trait/struct/enum/fn) to the
|
||||
/// predicates (where-clauses) directly defined on it. This is
|
||||
/// equal to the `explicit_predicates_of` predicates plus the
|
||||
/// `inferred_outlives_of` predicates.
|
||||
query predicates_defined_on(key: DefId) -> ty::GenericPredicates<'tcx> {
|
||||
desc { |tcx| "computing predicates of `{}`", tcx.def_path_str(key) }
|
||||
}
|
||||
|
||||
/// Returns everything that looks like a predicate written explicitly
|
||||
/// by the user on a trait item.
|
||||
///
|
||||
|
@ -1264,6 +1245,11 @@ rustc_queries! {
|
|||
feedable
|
||||
}
|
||||
|
||||
query struct_target_features(def_id: DefId) -> &'tcx [TargetFeature] {
|
||||
separate_provide_extern
|
||||
desc { |tcx| "computing target features for struct `{}`", tcx.def_path_str(def_id) }
|
||||
}
|
||||
|
||||
query asm_target_features(def_id: DefId) -> &'tcx FxIndexSet<Symbol> {
|
||||
desc { |tcx| "computing target features for inline asm of `{}`", tcx.def_path_str(def_id) }
|
||||
}
|
||||
|
|
|
@ -462,7 +462,6 @@ impl_decodable_via_ref! {
|
|||
&'tcx traits::ImplSource<'tcx, ()>,
|
||||
&'tcx mir::Body<'tcx>,
|
||||
&'tcx mir::BorrowCheckResult<'tcx>,
|
||||
&'tcx mir::coverage::CodeRegion,
|
||||
&'tcx ty::List<ty::BoundVariableKind>,
|
||||
&'tcx ty::ListWithCachedTypeInfo<ty::Clause<'tcx>>,
|
||||
&'tcx ty::List<FieldIdx>,
|
||||
|
|
|
@ -59,6 +59,7 @@ trivially_parameterized_over_tcx! {
|
|||
std::string::String,
|
||||
crate::metadata::ModChild,
|
||||
crate::middle::codegen_fn_attrs::CodegenFnAttrs,
|
||||
crate::middle::codegen_fn_attrs::TargetFeature,
|
||||
crate::middle::debugger_visualizer::DebuggerVisualizerFile,
|
||||
crate::middle::exported_symbols::SymbolExportInfo,
|
||||
crate::middle::lib_features::FeatureStability,
|
||||
|
|
|
@ -125,6 +125,17 @@ mir_build_initializing_type_with_requires_unsafe_unsafe_op_in_unsafe_fn_allowed
|
|||
.note = initializing a layout restricted type's field with a value outside the valid range is undefined behavior
|
||||
.label = initializing type with `rustc_layout_scalar_valid_range` attr
|
||||
|
||||
mir_build_initializing_type_with_target_feature_requires_unsafe =
|
||||
initializing type with `target_feature` attr is unsafe and requires unsafe block
|
||||
.note = this struct can only be constructed if the corresponding `target_feature`s are available
|
||||
.label = initializing type with `target_feature` attr
|
||||
|
||||
mir_build_initializing_type_with_target_feature_requires_unsafe_unsafe_op_in_unsafe_fn_allowed =
|
||||
initializing type with `target_feature` attr is unsafe and requires unsafe function or block
|
||||
.note = this struct can only be constructed if the corresponding `target_feature`s are available
|
||||
.label = initializing type with `target_feature` attr
|
||||
|
||||
|
||||
mir_build_inline_assembly_requires_unsafe =
|
||||
use of inline assembly is unsafe and requires unsafe block
|
||||
.note = inline assembly is entirely unchecked and can cause undefined behavior
|
||||
|
@ -387,6 +398,11 @@ mir_build_unsafe_op_in_unsafe_fn_initializing_type_with_requires_unsafe =
|
|||
.note = initializing a layout restricted type's field with a value outside the valid range is undefined behavior
|
||||
.label = initializing type with `rustc_layout_scalar_valid_range` attr
|
||||
|
||||
mir_build_unsafe_op_in_unsafe_fn_initializing_type_with_target_feature_requires_unsafe =
|
||||
initializing type with `target_feature` attr is unsafe and requires unsafe block
|
||||
.note = this struct can only be constructed if the corresponding `target_feature`s are available
|
||||
.label = initializing type with `target_feature` attr
|
||||
|
||||
mir_build_unsafe_op_in_unsafe_fn_inline_assembly_requires_unsafe =
|
||||
use of inline assembly is unsafe and requires unsafe block
|
||||
.note = inline assembly is entirely unchecked and can cause undefined behavior
|
||||
|
|
|
@ -461,14 +461,18 @@ impl<'a, 'tcx> Visitor<'a, 'tcx> for UnsafetyVisitor<'a, 'tcx> {
|
|||
};
|
||||
self.requires_unsafe(expr.span, CallToUnsafeFunction(func_id));
|
||||
} else if let &ty::FnDef(func_did, _) = self.thir[fun].ty.kind() {
|
||||
// If the called function has target features the calling function hasn't,
|
||||
// If the called function has explicit target features the calling function hasn't,
|
||||
// the call requires `unsafe`. Don't check this on wasm
|
||||
// targets, though. For more information on wasm see the
|
||||
// is_like_wasm check in hir_analysis/src/collect.rs
|
||||
// Implicit target features are OK because they are either a consequence of some
|
||||
// explicit target feature (which is checked to be present in the caller) or
|
||||
// come from a witness argument.
|
||||
let callee_features = &self.tcx.codegen_fn_attrs(func_did).target_features;
|
||||
if !self.tcx.sess.target.options.is_like_wasm
|
||||
&& !callee_features.iter().all(|feature| {
|
||||
self.body_target_features.iter().any(|f| f.name == feature.name)
|
||||
feature.implied
|
||||
|| self.body_target_features.iter().any(|f| f.name == feature.name)
|
||||
})
|
||||
{
|
||||
let missing: Vec<_> = callee_features
|
||||
|
@ -542,10 +546,16 @@ impl<'a, 'tcx> Visitor<'a, 'tcx> for UnsafetyVisitor<'a, 'tcx> {
|
|||
user_ty: _,
|
||||
fields: _,
|
||||
base: _,
|
||||
}) => match self.tcx.layout_scalar_valid_range(adt_def.did()) {
|
||||
(Bound::Unbounded, Bound::Unbounded) => {}
|
||||
_ => self.requires_unsafe(expr.span, InitializingTypeWith),
|
||||
},
|
||||
}) => {
|
||||
match self.tcx.layout_scalar_valid_range(adt_def.did()) {
|
||||
(Bound::Unbounded, Bound::Unbounded) => {}
|
||||
_ => self.requires_unsafe(expr.span, InitializingTypeWith),
|
||||
}
|
||||
if !self.tcx.struct_target_features(adt_def.did()).is_empty() {
|
||||
self.requires_unsafe(expr.span, ConstructingTargetFeaturesType)
|
||||
}
|
||||
}
|
||||
|
||||
ExprKind::Closure(box ClosureExpr {
|
||||
closure_id,
|
||||
args: _,
|
||||
|
@ -647,6 +657,7 @@ enum UnsafeOpKind {
|
|||
CallToUnsafeFunction(Option<DefId>),
|
||||
UseOfInlineAssembly,
|
||||
InitializingTypeWith,
|
||||
ConstructingTargetFeaturesType,
|
||||
UseOfMutableStatic,
|
||||
UseOfExternStatic,
|
||||
DerefOfRawPointer,
|
||||
|
@ -728,6 +739,15 @@ impl UnsafeOpKind {
|
|||
unsafe_not_inherited_note,
|
||||
},
|
||||
),
|
||||
ConstructingTargetFeaturesType => tcx.emit_node_span_lint(
|
||||
UNSAFE_OP_IN_UNSAFE_FN,
|
||||
hir_id,
|
||||
span,
|
||||
UnsafeOpInUnsafeFnInitializingTypeWithTargetFeatureRequiresUnsafe {
|
||||
span,
|
||||
unsafe_not_inherited_note,
|
||||
},
|
||||
),
|
||||
UseOfMutableStatic => tcx.emit_node_span_lint(
|
||||
UNSAFE_OP_IN_UNSAFE_FN,
|
||||
hir_id,
|
||||
|
@ -885,6 +905,20 @@ impl UnsafeOpKind {
|
|||
unsafe_not_inherited_note,
|
||||
});
|
||||
}
|
||||
ConstructingTargetFeaturesType if unsafe_op_in_unsafe_fn_allowed => {
|
||||
dcx.emit_err(
|
||||
InitializingTypeWithTargetFeatureRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
||||
span,
|
||||
unsafe_not_inherited_note,
|
||||
},
|
||||
);
|
||||
}
|
||||
ConstructingTargetFeaturesType => {
|
||||
dcx.emit_err(InitializingTypeWithTargetFeatureRequiresUnsafe {
|
||||
span,
|
||||
unsafe_not_inherited_note,
|
||||
});
|
||||
}
|
||||
UseOfMutableStatic if unsafe_op_in_unsafe_fn_allowed => {
|
||||
dcx.emit_err(UseOfMutableStaticRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
||||
span,
|
||||
|
|
|
@ -86,6 +86,16 @@ pub(crate) struct UnsafeOpInUnsafeFnInitializingTypeWithRequiresUnsafe {
|
|||
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
||||
}
|
||||
|
||||
#[derive(LintDiagnostic)]
|
||||
#[diag(mir_build_unsafe_op_in_unsafe_fn_initializing_type_with_target_feature_requires_unsafe, code = E0133)]
|
||||
#[note]
|
||||
pub(crate) struct UnsafeOpInUnsafeFnInitializingTypeWithTargetFeatureRequiresUnsafe {
|
||||
#[label]
|
||||
pub(crate) span: Span,
|
||||
#[subdiagnostic]
|
||||
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
||||
}
|
||||
|
||||
#[derive(LintDiagnostic)]
|
||||
#[diag(mir_build_unsafe_op_in_unsafe_fn_mutable_static_requires_unsafe, code = E0133)]
|
||||
#[note]
|
||||
|
@ -250,6 +260,17 @@ pub(crate) struct InitializingTypeWithRequiresUnsafe {
|
|||
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
||||
}
|
||||
|
||||
#[derive(Diagnostic)]
|
||||
#[diag(mir_build_initializing_type_with_target_feature_requires_unsafe, code = E0133)]
|
||||
#[note]
|
||||
pub(crate) struct InitializingTypeWithTargetFeatureRequiresUnsafe {
|
||||
#[primary_span]
|
||||
#[label]
|
||||
pub(crate) span: Span,
|
||||
#[subdiagnostic]
|
||||
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
||||
}
|
||||
|
||||
#[derive(Diagnostic)]
|
||||
#[diag(
|
||||
mir_build_initializing_type_with_requires_unsafe_unsafe_op_in_unsafe_fn_allowed,
|
||||
|
@ -264,6 +285,20 @@ pub(crate) struct InitializingTypeWithRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|||
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
||||
}
|
||||
|
||||
#[derive(Diagnostic)]
|
||||
#[diag(
|
||||
mir_build_initializing_type_with_target_feature_requires_unsafe_unsafe_op_in_unsafe_fn_allowed,
|
||||
code = E0133
|
||||
)]
|
||||
#[note]
|
||||
pub(crate) struct InitializingTypeWithTargetFeatureRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
||||
#[primary_span]
|
||||
#[label]
|
||||
pub(crate) span: Span,
|
||||
#[subdiagnostic]
|
||||
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
||||
}
|
||||
|
||||
#[derive(Diagnostic)]
|
||||
#[diag(mir_build_mutable_static_requires_unsafe, code = E0133)]
|
||||
#[note]
|
||||
|
|
|
@ -13,7 +13,7 @@ use rustc_hir::intravisit::{walk_expr, Visitor};
|
|||
use rustc_middle::hir::map::Map;
|
||||
use rustc_middle::hir::nested_filter;
|
||||
use rustc_middle::mir::coverage::{
|
||||
CodeRegion, CoverageKind, DecisionInfo, FunctionCoverageInfo, Mapping, MappingKind,
|
||||
CoverageKind, DecisionInfo, FunctionCoverageInfo, Mapping, MappingKind, SourceRegion,
|
||||
};
|
||||
use rustc_middle::mir::{
|
||||
self, BasicBlock, BasicBlockData, SourceInfo, Statement, StatementKind, Terminator,
|
||||
|
@ -159,7 +159,7 @@ fn create_mappings<'tcx>(
|
|||
.expect("all BCBs with spans were given counters")
|
||||
.as_term()
|
||||
};
|
||||
let region_for_span = |span: Span| make_code_region(source_map, file_name, span, body_span);
|
||||
let region_for_span = |span: Span| make_source_region(source_map, file_name, span, body_span);
|
||||
|
||||
// Fully destructure the mappings struct to make sure we don't miss any kinds.
|
||||
let ExtractedMappings {
|
||||
|
@ -175,9 +175,9 @@ fn create_mappings<'tcx>(
|
|||
mappings.extend(code_mappings.iter().filter_map(
|
||||
// Ordinary code mappings are the simplest kind.
|
||||
|&mappings::CodeMapping { span, bcb }| {
|
||||
let code_region = region_for_span(span)?;
|
||||
let source_region = region_for_span(span)?;
|
||||
let kind = MappingKind::Code(term_for_bcb(bcb));
|
||||
Some(Mapping { kind, code_region })
|
||||
Some(Mapping { kind, source_region })
|
||||
},
|
||||
));
|
||||
|
||||
|
@ -186,29 +186,29 @@ fn create_mappings<'tcx>(
|
|||
let true_term = term_for_bcb(true_bcb);
|
||||
let false_term = term_for_bcb(false_bcb);
|
||||
let kind = MappingKind::Branch { true_term, false_term };
|
||||
let code_region = region_for_span(span)?;
|
||||
Some(Mapping { kind, code_region })
|
||||
let source_region = region_for_span(span)?;
|
||||
Some(Mapping { kind, source_region })
|
||||
},
|
||||
));
|
||||
|
||||
mappings.extend(mcdc_branches.iter().filter_map(
|
||||
|&mappings::MCDCBranch { span, true_bcb, false_bcb, condition_info, decision_depth: _ }| {
|
||||
let code_region = region_for_span(span)?;
|
||||
let source_region = region_for_span(span)?;
|
||||
let true_term = term_for_bcb(true_bcb);
|
||||
let false_term = term_for_bcb(false_bcb);
|
||||
let kind = match condition_info {
|
||||
Some(mcdc_params) => MappingKind::MCDCBranch { true_term, false_term, mcdc_params },
|
||||
None => MappingKind::Branch { true_term, false_term },
|
||||
};
|
||||
Some(Mapping { kind, code_region })
|
||||
Some(Mapping { kind, source_region })
|
||||
},
|
||||
));
|
||||
|
||||
mappings.extend(mcdc_decisions.iter().filter_map(
|
||||
|&mappings::MCDCDecision { span, bitmap_idx, num_conditions, .. }| {
|
||||
let code_region = region_for_span(span)?;
|
||||
let source_region = region_for_span(span)?;
|
||||
let kind = MappingKind::MCDCDecision(DecisionInfo { bitmap_idx, num_conditions });
|
||||
Some(Mapping { kind, code_region })
|
||||
Some(Mapping { kind, source_region })
|
||||
},
|
||||
));
|
||||
|
||||
|
@ -362,19 +362,13 @@ fn inject_statement(mir_body: &mut mir::Body<'_>, counter_kind: CoverageKind, bb
|
|||
/// but it's hard to rule out entirely (especially in the presence of complex macros
|
||||
/// or other expansions), and if it does happen then skipping a span or function is
|
||||
/// better than an ICE or `llvm-cov` failure that the user might have no way to avoid.
|
||||
fn make_code_region(
|
||||
#[instrument(level = "debug", skip(source_map))]
|
||||
fn make_source_region(
|
||||
source_map: &SourceMap,
|
||||
file_name: Symbol,
|
||||
span: Span,
|
||||
body_span: Span,
|
||||
) -> Option<CodeRegion> {
|
||||
debug!(
|
||||
"Called make_code_region(file_name={}, span={}, body_span={})",
|
||||
file_name,
|
||||
source_map.span_to_diagnostic_string(span),
|
||||
source_map.span_to_diagnostic_string(body_span)
|
||||
);
|
||||
|
||||
) -> Option<SourceRegion> {
|
||||
let lo = span.lo();
|
||||
let hi = span.hi();
|
||||
|
||||
|
@ -424,7 +418,7 @@ fn make_code_region(
|
|||
start_line = source_map.doctest_offset_line(&file.name, start_line);
|
||||
end_line = source_map.doctest_offset_line(&file.name, end_line);
|
||||
|
||||
check_code_region(CodeRegion {
|
||||
check_source_region(SourceRegion {
|
||||
file_name,
|
||||
start_line: start_line as u32,
|
||||
start_col: start_col as u32,
|
||||
|
@ -433,12 +427,12 @@ fn make_code_region(
|
|||
})
|
||||
}
|
||||
|
||||
/// If `llvm-cov` sees a code region that is improperly ordered (end < start),
|
||||
/// If `llvm-cov` sees a source region that is improperly ordered (end < start),
|
||||
/// it will immediately exit with a fatal error. To prevent that from happening,
|
||||
/// discard regions that are improperly ordered, or might be interpreted in a
|
||||
/// way that makes them improperly ordered.
|
||||
fn check_code_region(code_region: CodeRegion) -> Option<CodeRegion> {
|
||||
let CodeRegion { file_name: _, start_line, start_col, end_line, end_col } = code_region;
|
||||
fn check_source_region(source_region: SourceRegion) -> Option<SourceRegion> {
|
||||
let SourceRegion { file_name: _, start_line, start_col, end_line, end_col } = source_region;
|
||||
|
||||
// Line/column coordinates are supposed to be 1-based. If we ever emit
|
||||
// coordinates of 0, `llvm-cov` might misinterpret them.
|
||||
|
@ -451,17 +445,17 @@ fn check_code_region(code_region: CodeRegion) -> Option<CodeRegion> {
|
|||
let is_ordered = (start_line, start_col) <= (end_line, end_col);
|
||||
|
||||
if all_nonzero && end_col_has_high_bit_unset && is_ordered {
|
||||
Some(code_region)
|
||||
Some(source_region)
|
||||
} else {
|
||||
debug!(
|
||||
?code_region,
|
||||
?source_region,
|
||||
?all_nonzero,
|
||||
?end_col_has_high_bit_unset,
|
||||
?is_ordered,
|
||||
"Skipping code region that would be misinterpreted or rejected by LLVM"
|
||||
"Skipping source region that would be misinterpreted or rejected by LLVM"
|
||||
);
|
||||
// If this happens in a debug build, ICE to make it easier to notice.
|
||||
debug_assert!(false, "Improper code region: {code_region:?}");
|
||||
debug_assert!(false, "Improper source region: {source_region:?}");
|
||||
None
|
||||
}
|
||||
}
|
||||
|
|
|
@ -862,7 +862,7 @@ where
|
|||
_ecx: &mut EvalCtxt<'_, D>,
|
||||
goal: Goal<I, Self>,
|
||||
) -> Result<Candidate<I>, NoSolution> {
|
||||
panic!("`BikeshedIntrinsicFrom` does not have an associated type: {:?}", goal)
|
||||
panic!("`TransmuteFrom` does not have an associated type: {:?}", goal)
|
||||
}
|
||||
|
||||
fn consider_builtin_effects_intersection_candidate(
|
||||
|
|
|
@ -51,7 +51,9 @@ impl<'a> Parser<'a> {
|
|||
}
|
||||
|
||||
/// Parses the contents of a module (inner attributes followed by module items).
|
||||
/// We exit once we hit `term`
|
||||
/// We exit once we hit `term` which can be either
|
||||
/// - EOF (for files)
|
||||
/// - `}` for mod items
|
||||
pub fn parse_mod(
|
||||
&mut self,
|
||||
term: &TokenKind,
|
||||
|
|
|
@ -672,6 +672,10 @@ passes_should_be_applied_to_fn =
|
|||
*[false] not a function definition
|
||||
}
|
||||
|
||||
passes_should_be_applied_to_fn_or_unit_struct =
|
||||
attribute should be applied to a function definition or unit struct
|
||||
.label = not a function definition or a unit struct
|
||||
|
||||
passes_should_be_applied_to_static =
|
||||
attribute should be applied to a static
|
||||
.label = not a static
|
||||
|
|
|
@ -517,6 +517,7 @@ impl<'tcx> CheckAttrVisitor<'tcx> {
|
|||
sym::no_mangle,
|
||||
sym::naked,
|
||||
sym::instruction_set,
|
||||
sym::repr,
|
||||
// code generation
|
||||
sym::cold,
|
||||
sym::target_feature,
|
||||
|
@ -746,12 +747,35 @@ impl<'tcx> CheckAttrVisitor<'tcx> {
|
|||
Target::Field | Target::Arm | Target::MacroDef => {
|
||||
self.inline_attr_str_error_with_macro_def(hir_id, attr, "target_feature");
|
||||
}
|
||||
Target::Struct if self.tcx.features().struct_target_features => {
|
||||
let ty = self.tcx.hir_node(hir_id).expect_item();
|
||||
match ty.kind {
|
||||
ItemKind::Struct(data, _) => {
|
||||
if data.fields().len() != 0 {
|
||||
self.dcx().emit_err(errors::AttrShouldBeAppliedToFnOrUnitStruct {
|
||||
attr_span: attr.span,
|
||||
defn_span: span,
|
||||
});
|
||||
}
|
||||
}
|
||||
_ => {
|
||||
panic!("Target::Struct for a non-struct");
|
||||
}
|
||||
}
|
||||
}
|
||||
_ => {
|
||||
self.dcx().emit_err(errors::AttrShouldBeAppliedToFn {
|
||||
attr_span: attr.span,
|
||||
defn_span: span,
|
||||
on_crate: hir_id == CRATE_HIR_ID,
|
||||
});
|
||||
if self.tcx.features().struct_target_features {
|
||||
self.dcx().emit_err(errors::AttrShouldBeAppliedToFnOrUnitStruct {
|
||||
attr_span: attr.span,
|
||||
defn_span: span,
|
||||
});
|
||||
} else {
|
||||
self.dcx().emit_err(errors::AttrShouldBeAppliedToFn {
|
||||
attr_span: attr.span,
|
||||
defn_span: span,
|
||||
on_crate: hir_id == CRATE_HIR_ID,
|
||||
});
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -82,6 +82,15 @@ pub struct AttrShouldBeAppliedToFn {
|
|||
pub on_crate: bool,
|
||||
}
|
||||
|
||||
#[derive(Diagnostic)]
|
||||
#[diag(passes_should_be_applied_to_fn_or_unit_struct)]
|
||||
pub struct AttrShouldBeAppliedToFnOrUnitStruct {
|
||||
#[primary_span]
|
||||
pub attr_span: Span,
|
||||
#[label]
|
||||
pub defn_span: Span,
|
||||
}
|
||||
|
||||
#[derive(Diagnostic)]
|
||||
#[diag(passes_should_be_applied_to_fn, code = E0739)]
|
||||
pub struct TrackedCallerWrongLocation {
|
||||
|
|
|
@ -2893,6 +2893,7 @@ pub enum PpHirMode {
|
|||
}
|
||||
|
||||
#[derive(Copy, Clone, PartialEq, Debug)]
|
||||
/// Pretty print mode
|
||||
pub enum PpMode {
|
||||
/// Options that print the source code, i.e.
|
||||
/// `-Zunpretty=normal` and `-Zunpretty=expanded`
|
||||
|
|
|
@ -1852,6 +1852,7 @@ symbols! {
|
|||
stringify,
|
||||
struct_field_attributes,
|
||||
struct_inherit,
|
||||
struct_target_features,
|
||||
struct_variant,
|
||||
structural_match,
|
||||
structural_peq,
|
||||
|
|
|
@ -438,6 +438,8 @@ impl<'a, 'tcx> TypeErrCtxt<'a, 'tcx> {
|
|||
let is_target_feature_fn = if let ty::FnDef(def_id, _) =
|
||||
*leaf_trait_ref.skip_binder().self_ty().kind()
|
||||
{
|
||||
// FIXME(struct_target_features): should a function that inherits
|
||||
// target_features through arguments implement Fn traits?
|
||||
!self.tcx.codegen_fn_attrs(def_id).target_features.is_empty()
|
||||
} else {
|
||||
false
|
||||
|
|
|
@ -545,6 +545,8 @@ impl<'cx, 'tcx> SelectionContext<'cx, 'tcx> {
|
|||
// Provide an impl for suitable functions, rejecting `#[target_feature]` functions (RFC 2396).
|
||||
ty::FnDef(def_id, args) => {
|
||||
let tcx = self.tcx();
|
||||
// FIXME(struct_target_features): should a function that inherits target_features
|
||||
// through an argument implement Fn traits?
|
||||
if tcx.fn_sig(def_id).skip_binder().is_fn_trait_compatible()
|
||||
&& tcx.codegen_fn_attrs(def_id).target_features.is_empty()
|
||||
{
|
||||
|
|
|
@ -2949,7 +2949,7 @@ pub const unsafe fn typed_swap<T>(x: *mut T, y: *mut T) {
|
|||
/// sysroot which is built without ub_checks but with `#[rustc_preserve_ub_checks]`.
|
||||
/// For code that gets monomorphized in the user crate (i.e., generic functions and functions with
|
||||
/// `#[inline]`), gating assertions on `ub_checks()` rather than `cfg!(ub_checks)` means that
|
||||
/// assertions are enabled whenever the *user crate* has UB checks enabled. However if the
|
||||
/// assertions are enabled whenever the *user crate* has UB checks enabled. However, if the
|
||||
/// user has UB checks disabled, the checks will still get optimized out. This intrinsic is
|
||||
/// primarily used by [`ub_checks::assert_unsafe_precondition`].
|
||||
#[rustc_const_unstable(feature = "const_ub_checks", issue = "none")]
|
||||
|
@ -2957,7 +2957,7 @@ pub const unsafe fn typed_swap<T>(x: *mut T, y: *mut T) {
|
|||
#[inline(always)]
|
||||
#[rustc_intrinsic]
|
||||
pub const fn ub_checks() -> bool {
|
||||
cfg!(debug_assertions)
|
||||
cfg!(ub_checks)
|
||||
}
|
||||
|
||||
/// Allocates a block of memory at compile time.
|
||||
|
|
|
@ -203,6 +203,7 @@
|
|||
#![feature(cfg_sanitize)]
|
||||
#![feature(cfg_target_has_atomic)]
|
||||
#![feature(cfg_target_has_atomic_equal_alignment)]
|
||||
#![feature(cfg_ub_checks)]
|
||||
#![feature(const_for)]
|
||||
#![feature(const_mut_refs)]
|
||||
#![feature(const_precise_live_drops)]
|
||||
|
|
|
@ -19,7 +19,7 @@ pub use maybe_uninit::MaybeUninit;
|
|||
|
||||
mod transmutability;
|
||||
#[unstable(feature = "transmutability", issue = "99571")]
|
||||
pub use transmutability::{Assume, BikeshedIntrinsicFrom};
|
||||
pub use transmutability::{Assume, TransmuteFrom};
|
||||
|
||||
#[stable(feature = "rust1", since = "1.0.0")]
|
||||
#[doc(inline)]
|
||||
|
|
|
@ -11,10 +11,10 @@ use crate::marker::{ConstParamTy_, UnsizedConstParamTy};
|
|||
///
|
||||
/// # Safety
|
||||
///
|
||||
/// If `Dst: BikeshedIntrinsicFrom<Src, ASSUMPTIONS>`, the compiler guarantees
|
||||
/// that `Src` is soundly *union-transmutable* into a value of type `Dst`,
|
||||
/// provided that the programmer has guaranteed that the given
|
||||
/// [`ASSUMPTIONS`](Assume) are satisfied.
|
||||
/// If `Dst: TransmuteFrom<Src, ASSUMPTIONS>`, the compiler guarantees that
|
||||
/// `Src` is soundly *union-transmutable* into a value of type `Dst`, provided
|
||||
/// that the programmer has guaranteed that the given [`ASSUMPTIONS`](Assume)
|
||||
/// are satisfied.
|
||||
///
|
||||
/// A union-transmute is any bit-reinterpretation conversion in the form of:
|
||||
///
|
||||
|
@ -47,7 +47,7 @@ use crate::marker::{ConstParamTy_, UnsizedConstParamTy};
|
|||
#[cfg_attr(not(bootstrap), doc = "```rust")]
|
||||
/// #![feature(transmutability)]
|
||||
///
|
||||
/// use core::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
/// use core::mem::{Assume, TransmuteFrom};
|
||||
///
|
||||
/// let src = 42u8; // size = 1
|
||||
///
|
||||
|
@ -55,7 +55,7 @@ use crate::marker::{ConstParamTy_, UnsizedConstParamTy};
|
|||
/// struct Dst(u8); // size = 2
|
||||
//
|
||||
/// let _ = unsafe {
|
||||
/// <Dst as BikeshedIntrinsicFrom<u8, { Assume::SAFETY }>>::transmute(src)
|
||||
/// <Dst as TransmuteFrom<u8, { Assume::SAFETY }>>::transmute(src)
|
||||
/// };
|
||||
/// ```
|
||||
///
|
||||
|
@ -87,7 +87,7 @@ use crate::marker::{ConstParamTy_, UnsizedConstParamTy};
|
|||
#[lang = "transmute_trait"]
|
||||
#[rustc_deny_explicit_impl(implement_via_object = false)]
|
||||
#[rustc_coinductive]
|
||||
pub unsafe trait BikeshedIntrinsicFrom<Src, const ASSUME: Assume = { Assume::NOTHING }>
|
||||
pub unsafe trait TransmuteFrom<Src, const ASSUME: Assume = { Assume::NOTHING }>
|
||||
where
|
||||
Src: ?Sized,
|
||||
{
|
||||
|
@ -140,23 +140,21 @@ where
|
|||
}
|
||||
}
|
||||
|
||||
/// Configurable proof assumptions of [`BikeshedIntrinsicFrom`].
|
||||
/// Configurable proof assumptions of [`TransmuteFrom`].
|
||||
///
|
||||
/// When `false`, the respective proof obligation belongs to the compiler. When
|
||||
/// `true`, the onus of the safety proof belongs to the programmer.
|
||||
/// [`BikeshedIntrinsicFrom`].
|
||||
#[unstable(feature = "transmutability", issue = "99571")]
|
||||
#[lang = "transmute_opts"]
|
||||
#[derive(PartialEq, Eq, Clone, Copy, Debug)]
|
||||
pub struct Assume {
|
||||
/// When `false`, [`BikeshedIntrinsicFrom`] is not implemented for
|
||||
/// transmutations that might violate the the alignment requirements of
|
||||
/// references; e.g.:
|
||||
/// When `false`, [`TransmuteFrom`] is not implemented for transmutations
|
||||
/// that might violate the the alignment requirements of references; e.g.:
|
||||
///
|
||||
#[cfg_attr(bootstrap, doc = "```rust,ignore not runnable on bootstrap")]
|
||||
#[cfg_attr(not(bootstrap), doc = "```compile_fail,E0277")]
|
||||
/// #![feature(transmutability)]
|
||||
/// use core::mem::{align_of, BikeshedIntrinsicFrom};
|
||||
/// use core::mem::{align_of, TransmuteFrom};
|
||||
///
|
||||
/// assert_eq!(align_of::<[u8; 2]>(), 1);
|
||||
/// assert_eq!(align_of::<u16>(), 2);
|
||||
|
@ -165,18 +163,18 @@ pub struct Assume {
|
|||
///
|
||||
/// // SAFETY: No safety obligations.
|
||||
/// let dst: &u16 = unsafe {
|
||||
/// <_ as BikeshedIntrinsicFrom<_>>::transmute(src)
|
||||
/// <_ as TransmuteFrom<_>>::transmute(src)
|
||||
/// };
|
||||
/// ```
|
||||
///
|
||||
/// When `true`, [`BikeshedIntrinsicFrom`] assumes that *you* have ensured
|
||||
/// When `true`, [`TransmuteFrom`] assumes that *you* have ensured
|
||||
/// that references in the transmuted value satisfy the alignment
|
||||
/// requirements of their referent types; e.g.:
|
||||
///
|
||||
#[cfg_attr(bootstrap, doc = "```rust,ignore not runnable on bootstrap")]
|
||||
#[cfg_attr(not(bootstrap), doc = "```rust")]
|
||||
/// #![feature(pointer_is_aligned_to, transmutability)]
|
||||
/// use core::mem::{align_of, Assume, BikeshedIntrinsicFrom};
|
||||
/// use core::mem::{align_of, Assume, TransmuteFrom};
|
||||
///
|
||||
/// let src: &[u8; 2] = &[0xFF, 0xFF];
|
||||
///
|
||||
|
@ -184,7 +182,7 @@ pub struct Assume {
|
|||
/// // SAFETY: We have checked above that the address of `src` satisfies the
|
||||
/// // alignment requirements of `u16`.
|
||||
/// Some(unsafe {
|
||||
/// <_ as BikeshedIntrinsicFrom<_, { Assume::ALIGNMENT }>>::transmute(src)
|
||||
/// <_ as TransmuteFrom<_, { Assume::ALIGNMENT }>>::transmute(src)
|
||||
/// })
|
||||
/// } else {
|
||||
/// None
|
||||
|
@ -194,21 +192,21 @@ pub struct Assume {
|
|||
/// ```
|
||||
pub alignment: bool,
|
||||
|
||||
/// When `false`, [`BikeshedIntrinsicFrom`] is not implemented for
|
||||
/// transmutations that extend the lifetimes of references.
|
||||
/// When `false`, [`TransmuteFrom`] is not implemented for transmutations
|
||||
/// that extend the lifetimes of references.
|
||||
///
|
||||
/// When `true`, [`BikeshedIntrinsicFrom`] assumes that *you* have ensured
|
||||
/// that references in the transmuted value do not outlive their referents.
|
||||
/// When `true`, [`TransmuteFrom`] assumes that *you* have ensured that
|
||||
/// references in the transmuted value do not outlive their referents.
|
||||
pub lifetimes: bool,
|
||||
|
||||
/// When `false`, [`BikeshedIntrinsicFrom`] is not implemented for
|
||||
/// transmutations that might violate the library safety invariants of the
|
||||
/// destination type; e.g.:
|
||||
/// When `false`, [`TransmuteFrom`] is not implemented for transmutations
|
||||
/// that might violate the library safety invariants of the destination
|
||||
/// type; e.g.:
|
||||
///
|
||||
#[cfg_attr(bootstrap, doc = "```rust,ignore not runnable on bootstrap")]
|
||||
#[cfg_attr(not(bootstrap), doc = "```compile_fail,E0277")]
|
||||
/// #![feature(transmutability)]
|
||||
/// use core::mem::BikeshedIntrinsicFrom;
|
||||
/// use core::mem::TransmuteFrom;
|
||||
///
|
||||
/// let src: u8 = 3;
|
||||
///
|
||||
|
@ -219,18 +217,18 @@ pub struct Assume {
|
|||
///
|
||||
/// // SAFETY: No safety obligations.
|
||||
/// let dst: EvenU8 = unsafe {
|
||||
/// <_ as BikeshedIntrinsicFrom<_>>::transmute(src)
|
||||
/// <_ as TransmuteFrom<_>>::transmute(src)
|
||||
/// };
|
||||
/// ```
|
||||
///
|
||||
/// When `true`, [`BikeshedIntrinsicFrom`] assumes that *you* have ensured
|
||||
/// When `true`, [`TransmuteFrom`] assumes that *you* have ensured
|
||||
/// that undefined behavior does not arise from using the transmuted value;
|
||||
/// e.g.:
|
||||
///
|
||||
#[cfg_attr(bootstrap, doc = "```rust,ignore not runnable on bootstrap")]
|
||||
#[cfg_attr(not(bootstrap), doc = "```rust")]
|
||||
/// #![feature(transmutability)]
|
||||
/// use core::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
/// use core::mem::{Assume, TransmuteFrom};
|
||||
///
|
||||
/// let src: u8 = 42;
|
||||
///
|
||||
|
@ -242,7 +240,7 @@ pub struct Assume {
|
|||
/// let maybe_dst: Option<EvenU8> = if src % 2 == 0 {
|
||||
/// // SAFETY: We have checked above that the value of `src` is even.
|
||||
/// Some(unsafe {
|
||||
/// <_ as BikeshedIntrinsicFrom<_, { Assume::SAFETY }>>::transmute(src)
|
||||
/// <_ as TransmuteFrom<_, { Assume::SAFETY }>>::transmute(src)
|
||||
/// })
|
||||
/// } else {
|
||||
/// None
|
||||
|
@ -252,31 +250,31 @@ pub struct Assume {
|
|||
/// ```
|
||||
pub safety: bool,
|
||||
|
||||
/// When `false`, [`BikeshedIntrinsicFrom`] is not implemented for
|
||||
/// transmutations that might violate the language-level bit-validity
|
||||
/// invariant of the destination type; e.g.:
|
||||
/// When `false`, [`TransmuteFrom`] is not implemented for transmutations
|
||||
/// that might violate the language-level bit-validity invariant of the
|
||||
/// destination type; e.g.:
|
||||
///
|
||||
#[cfg_attr(bootstrap, doc = "```rust,ignore not runnable on bootstrap")]
|
||||
#[cfg_attr(not(bootstrap), doc = "```compile_fail,E0277")]
|
||||
/// #![feature(transmutability)]
|
||||
/// use core::mem::BikeshedIntrinsicFrom;
|
||||
/// use core::mem::TransmuteFrom;
|
||||
///
|
||||
/// let src: u8 = 3;
|
||||
///
|
||||
/// // SAFETY: No safety obligations.
|
||||
/// let dst: bool = unsafe {
|
||||
/// <_ as BikeshedIntrinsicFrom<_>>::transmute(src)
|
||||
/// <_ as TransmuteFrom<_>>::transmute(src)
|
||||
/// };
|
||||
/// ```
|
||||
///
|
||||
/// When `true`, [`BikeshedIntrinsicFrom`] assumes that *you* have ensured
|
||||
/// When `true`, [`TransmuteFrom`] assumes that *you* have ensured
|
||||
/// that the value being transmuted is a bit-valid instance of the
|
||||
/// transmuted value; e.g.:
|
||||
///
|
||||
#[cfg_attr(bootstrap, doc = "```rust,ignore not runnable on bootstrap")]
|
||||
#[cfg_attr(not(bootstrap), doc = "```rust")]
|
||||
/// #![feature(transmutability)]
|
||||
/// use core::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
/// use core::mem::{Assume, TransmuteFrom};
|
||||
///
|
||||
/// let src: u8 = 1;
|
||||
///
|
||||
|
@ -284,7 +282,7 @@ pub struct Assume {
|
|||
/// // SAFETY: We have checked above that the value of `src` is a bit-valid
|
||||
/// // instance of `bool`.
|
||||
/// Some(unsafe {
|
||||
/// <_ as BikeshedIntrinsicFrom<_, { Assume::VALIDITY }>>::transmute(src)
|
||||
/// <_ as TransmuteFrom<_, { Assume::VALIDITY }>>::transmute(src)
|
||||
/// })
|
||||
/// } else {
|
||||
/// None
|
||||
|
@ -301,35 +299,34 @@ impl ConstParamTy_ for Assume {}
|
|||
impl UnsizedConstParamTy for Assume {}
|
||||
|
||||
impl Assume {
|
||||
/// With this, [`BikeshedIntrinsicFrom`] does not assume you have ensured
|
||||
/// any safety obligations are met, and relies only upon its own analysis to
|
||||
/// (dis)prove transmutability.
|
||||
/// With this, [`TransmuteFrom`] does not assume you have ensured any safety
|
||||
/// obligations are met, and relies only upon its own analysis to (dis)prove
|
||||
/// transmutability.
|
||||
#[unstable(feature = "transmutability", issue = "99571")]
|
||||
pub const NOTHING: Self =
|
||||
Self { alignment: false, lifetimes: false, safety: false, validity: false };
|
||||
|
||||
/// With this, [`BikeshedIntrinsicFrom`] assumes only that you have ensured
|
||||
/// that references in the transmuted value satisfy the alignment
|
||||
/// requirements of their referent types. See [`Assume::alignment`] for
|
||||
/// examples.
|
||||
/// With this, [`TransmuteFrom`] assumes only that you have ensured that
|
||||
/// references in the transmuted value satisfy the alignment requirements of
|
||||
/// their referent types. See [`Assume::alignment`] for examples.
|
||||
#[unstable(feature = "transmutability", issue = "99571")]
|
||||
pub const ALIGNMENT: Self = Self { alignment: true, ..Self::NOTHING };
|
||||
|
||||
/// With this, [`BikeshedIntrinsicFrom`] assumes only that you have ensured
|
||||
/// that references in the transmuted value do not outlive their referents.
|
||||
/// See [`Assume::lifetimes`] for examples.
|
||||
/// With this, [`TransmuteFrom`] assumes only that you have ensured that
|
||||
/// references in the transmuted value do not outlive their referents. See
|
||||
/// [`Assume::lifetimes`] for examples.
|
||||
#[unstable(feature = "transmutability", issue = "99571")]
|
||||
pub const LIFETIMES: Self = Self { lifetimes: true, ..Self::NOTHING };
|
||||
|
||||
/// With this, [`BikeshedIntrinsicFrom`] assumes only that you have ensured
|
||||
/// that undefined behavior does not arise from using the transmuted value.
|
||||
/// See [`Assume::safety`] for examples.
|
||||
/// With this, [`TransmuteFrom`] assumes only that you have ensured that
|
||||
/// undefined behavior does not arise from using the transmuted value. See
|
||||
/// [`Assume::safety`] for examples.
|
||||
#[unstable(feature = "transmutability", issue = "99571")]
|
||||
pub const SAFETY: Self = Self { safety: true, ..Self::NOTHING };
|
||||
|
||||
/// With this, [`BikeshedIntrinsicFrom`] assumes only that you have ensured
|
||||
/// that the value being transmuted is a bit-valid instance of the
|
||||
/// transmuted value. See [`Assume::validity`] for examples.
|
||||
/// With this, [`TransmuteFrom`] assumes only that you have ensured that the
|
||||
/// value being transmuted is a bit-valid instance of the transmuted value.
|
||||
/// See [`Assume::validity`] for examples.
|
||||
#[unstable(feature = "transmutability", issue = "99571")]
|
||||
pub const VALIDITY: Self = Self { validity: true, ..Self::NOTHING };
|
||||
|
||||
|
@ -348,7 +345,7 @@ impl Assume {
|
|||
/// transmutability,
|
||||
/// )]
|
||||
/// #![allow(incomplete_features)]
|
||||
/// use core::mem::{align_of, Assume, BikeshedIntrinsicFrom};
|
||||
/// use core::mem::{align_of, Assume, TransmuteFrom};
|
||||
///
|
||||
/// /// Attempts to transmute `src` to `&Dst`.
|
||||
/// ///
|
||||
|
@ -360,7 +357,7 @@ impl Assume {
|
|||
/// /// alignment, are satisfied.
|
||||
/// unsafe fn try_transmute_ref<'a, Src, Dst, const ASSUME: Assume>(src: &'a Src) -> Option<&'a Dst>
|
||||
/// where
|
||||
/// &'a Dst: BikeshedIntrinsicFrom<&'a Src, { ASSUME.and(Assume::ALIGNMENT) }>,
|
||||
/// &'a Dst: TransmuteFrom<&'a Src, { ASSUME.and(Assume::ALIGNMENT) }>,
|
||||
/// {
|
||||
/// if <*const _>::is_aligned_to(src, align_of::<Dst>()) {
|
||||
/// // SAFETY: By the above dynamic check, we have ensured that the address
|
||||
|
@ -368,7 +365,7 @@ impl Assume {
|
|||
/// // on the caller, the safety obligations required by `ASSUME` have also
|
||||
/// // been satisfied.
|
||||
/// Some(unsafe {
|
||||
/// <_ as BikeshedIntrinsicFrom<_, { ASSUME.and(Assume::ALIGNMENT) }>>::transmute(src)
|
||||
/// <_ as TransmuteFrom<_, { ASSUME.and(Assume::ALIGNMENT) }>>::transmute(src)
|
||||
/// })
|
||||
/// } else {
|
||||
/// None
|
||||
|
|
|
@ -2888,8 +2888,8 @@ macro_rules! int_impl {
|
|||
///
|
||||
/// # Panics
|
||||
///
|
||||
/// This function will panic if `rhs` is 0 or if `self` is -1 and `rhs` is
|
||||
/// `Self::MIN`. This behavior is not affected by the `overflow-checks` flag.
|
||||
/// This function will panic if `rhs` is 0 or if `self` is `Self::MIN`
|
||||
/// and `rhs` is -1. This behavior is not affected by the `overflow-checks` flag.
|
||||
///
|
||||
/// # Examples
|
||||
///
|
||||
|
@ -2927,8 +2927,8 @@ macro_rules! int_impl {
|
|||
///
|
||||
/// # Panics
|
||||
///
|
||||
/// This function will panic if `rhs` is 0 or if `self` is -1 and `rhs` is
|
||||
/// `Self::MIN`. This behavior is not affected by the `overflow-checks` flag.
|
||||
/// This function will panic if `rhs` is 0 or if `self` is `Self::MIN` and
|
||||
/// `rhs` is -1. This behavior is not affected by the `overflow-checks` flag.
|
||||
///
|
||||
/// # Examples
|
||||
///
|
||||
|
@ -2943,6 +2943,11 @@ macro_rules! int_impl {
|
|||
/// assert_eq!(a.rem_euclid(-b), 3);
|
||||
/// assert_eq!((-a).rem_euclid(-b), 1);
|
||||
/// ```
|
||||
///
|
||||
/// This will panic:
|
||||
/// ```should_panic
|
||||
#[doc = concat!("let _ = ", stringify!($SelfT), "::MIN.rem_euclid(-1);")]
|
||||
/// ```
|
||||
#[doc(alias = "modulo", alias = "mod")]
|
||||
#[stable(feature = "euclidean_division", since = "1.38.0")]
|
||||
#[rustc_const_stable(feature = "const_euclidean_int_methods", since = "1.52.0")]
|
||||
|
@ -2971,8 +2976,8 @@ macro_rules! int_impl {
|
|||
///
|
||||
/// # Panics
|
||||
///
|
||||
/// This function will panic if `rhs` is 0 or if `self` is -1 and `rhs` is
|
||||
/// `Self::MIN`. This behavior is not affected by the `overflow-checks` flag.
|
||||
/// This function will panic if `rhs` is 0 or if `self` is `Self::MIN`
|
||||
/// and `rhs` is -1. This behavior is not affected by the `overflow-checks` flag.
|
||||
///
|
||||
/// # Examples
|
||||
///
|
||||
|
@ -3007,8 +3012,8 @@ macro_rules! int_impl {
|
|||
///
|
||||
/// # Panics
|
||||
///
|
||||
/// This function will panic if `rhs` is 0 or if `self` is -1 and `rhs` is
|
||||
/// `Self::MIN`. This behavior is not affected by the `overflow-checks` flag.
|
||||
/// This function will panic if `rhs` is 0 or if `self` is `Self::MIN`
|
||||
/// and `rhs` is -1. This behavior is not affected by the `overflow-checks` flag.
|
||||
///
|
||||
/// # Examples
|
||||
///
|
||||
|
|
|
@ -195,6 +195,7 @@ impl<'a> Location<'a> {
|
|||
|
||||
#[stable(feature = "panic_hook_display", since = "1.26.0")]
|
||||
impl fmt::Display for Location<'_> {
|
||||
#[inline]
|
||||
fn fmt(&self, formatter: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
write!(formatter, "{}:{}:{}", self.file, self.line, self.col)
|
||||
}
|
||||
|
|
|
@ -1370,7 +1370,15 @@ impl<Ptr: Deref> Pin<Ptr> {
|
|||
// SAFETY: see documentation on this function
|
||||
unsafe { Pin::new_unchecked(&*self.__pointer) }
|
||||
}
|
||||
}
|
||||
|
||||
// These methods being in a `Ptr: DerefMut` impl block concerns semver stability.
|
||||
// Currently, calling e.g. `.set()` on a `Pin<&T>` sees that `Ptr: DerefMut`
|
||||
// doesn't hold, and goes to check for a `.set()` method on `T`. But, if the
|
||||
// `where Ptr: DerefMut` bound is moved to the method, rustc sees the impl block
|
||||
// as a valid candidate, and doesn't go on to check other candidates when it
|
||||
// sees that the bound on the method.
|
||||
impl<Ptr: DerefMut> Pin<Ptr> {
|
||||
/// Gets a mutable reference to the pinned value this `Pin<Ptr>` points to.
|
||||
///
|
||||
/// This is a generic method to go from `&mut Pin<Pointer<T>>` to `Pin<&mut T>`.
|
||||
|
@ -1402,10 +1410,7 @@ impl<Ptr: Deref> Pin<Ptr> {
|
|||
/// ```
|
||||
#[stable(feature = "pin", since = "1.33.0")]
|
||||
#[inline(always)]
|
||||
pub fn as_mut(&mut self) -> Pin<&mut Ptr::Target>
|
||||
where
|
||||
Ptr: DerefMut,
|
||||
{
|
||||
pub fn as_mut(&mut self) -> Pin<&mut Ptr::Target> {
|
||||
// SAFETY: see documentation on this function
|
||||
unsafe { Pin::new_unchecked(&mut *self.__pointer) }
|
||||
}
|
||||
|
@ -1420,10 +1425,7 @@ impl<Ptr: Deref> Pin<Ptr> {
|
|||
#[unstable(feature = "pin_deref_mut", issue = "86918")]
|
||||
#[must_use = "`self` will be dropped if the result is not used"]
|
||||
#[inline(always)]
|
||||
pub fn as_deref_mut(self: Pin<&mut Pin<Ptr>>) -> Pin<&mut Ptr::Target>
|
||||
where
|
||||
Ptr: DerefMut,
|
||||
{
|
||||
pub fn as_deref_mut(self: Pin<&mut Pin<Ptr>>) -> Pin<&mut Ptr::Target> {
|
||||
// SAFETY: What we're asserting here is that going from
|
||||
//
|
||||
// Pin<&mut Pin<Ptr>>
|
||||
|
@ -1475,12 +1477,13 @@ impl<Ptr: Deref> Pin<Ptr> {
|
|||
#[inline(always)]
|
||||
pub fn set(&mut self, value: Ptr::Target)
|
||||
where
|
||||
Ptr: DerefMut,
|
||||
Ptr::Target: Sized,
|
||||
{
|
||||
*(self.__pointer) = value;
|
||||
}
|
||||
}
|
||||
|
||||
impl<Ptr: Deref> Pin<Ptr> {
|
||||
/// Unwraps this `Pin<Ptr>`, returning the underlying `Ptr`.
|
||||
///
|
||||
/// # Safety
|
||||
|
|
|
@ -3667,8 +3667,8 @@ impl<T> [T] {
|
|||
{
|
||||
// The panic code path was put into a cold function to not bloat the
|
||||
// call site.
|
||||
#[inline(never)]
|
||||
#[cold]
|
||||
#[cfg_attr(not(feature = "panic_immediate_abort"), inline(never), cold)]
|
||||
#[cfg_attr(feature = "panic_immediate_abort", inline)]
|
||||
#[track_caller]
|
||||
fn len_mismatch_fail(dst_len: usize, src_len: usize) -> ! {
|
||||
panic!(
|
||||
|
|
|
@ -840,7 +840,8 @@ unsafe fn bidirectional_merge<T: FreezeMarker, F: FnMut(&T, &T) -> bool>(
|
|||
}
|
||||
}
|
||||
|
||||
#[inline(never)]
|
||||
#[cfg_attr(not(feature = "panic_immediate_abort"), inline(never), cold)]
|
||||
#[cfg_attr(feature = "panic_immediate_abort", inline)]
|
||||
fn panic_on_ord_violation() -> ! {
|
||||
// This is indicative of a logic bug in the user-provided comparison function or Ord
|
||||
// implementation. They are expected to implement a total order as explained in the Ord
|
||||
|
|
|
@ -0,0 +1,7 @@
|
|||
# `struct_target_features`
|
||||
|
||||
The tracking issue for this feature is: [#129107]
|
||||
|
||||
[#129107]: https://github.com/rust-lang/rust/issues/129107
|
||||
|
||||
------------------------
|
|
@ -75,11 +75,11 @@ pub(crate) fn write_shared(
|
|||
let crate_name = krate.name(cx.tcx());
|
||||
let crate_name = crate_name.as_str(); // rand
|
||||
let crate_name_json = OrderedJson::serialize(crate_name).unwrap(); // "rand"
|
||||
let external_crates = hack_get_external_crate_names(&cx.dst)?;
|
||||
let external_crates = hack_get_external_crate_names(&cx.dst, &cx.shared.resource_suffix)?;
|
||||
let info = CrateInfo {
|
||||
src_files_js: SourcesPart::get(cx, &crate_name_json)?,
|
||||
search_index_js: SearchIndexPart::get(index, &cx.shared.resource_suffix)?,
|
||||
all_crates: AllCratesPart::get(crate_name_json.clone())?,
|
||||
all_crates: AllCratesPart::get(crate_name_json.clone(), &cx.shared.resource_suffix)?,
|
||||
crates_index: CratesIndexPart::get(&crate_name, &external_crates)?,
|
||||
trait_impl: TraitAliasPart::get(cx, &crate_name_json)?,
|
||||
type_impl: TypeAliasPart::get(cx, krate, &crate_name_json)?,
|
||||
|
@ -291,10 +291,13 @@ impl AllCratesPart {
|
|||
SortedTemplate::from_before_after("window.ALL_CRATES = [", "];")
|
||||
}
|
||||
|
||||
fn get(crate_name_json: OrderedJson) -> Result<PartsAndLocations<Self>, Error> {
|
||||
fn get(
|
||||
crate_name_json: OrderedJson,
|
||||
resource_suffix: &str,
|
||||
) -> Result<PartsAndLocations<Self>, Error> {
|
||||
// external hack_get_external_crate_names not needed here, because
|
||||
// there's no way that we write the search index but not crates.js
|
||||
let path = PathBuf::from("crates.js");
|
||||
let path = suffix_path("crates.js", resource_suffix);
|
||||
Ok(PartsAndLocations::with(path, crate_name_json))
|
||||
}
|
||||
}
|
||||
|
@ -305,8 +308,11 @@ impl AllCratesPart {
|
|||
///
|
||||
/// This is to match the current behavior of rustdoc, which allows you to get all crates
|
||||
/// on the index page, even if --enable-index-page is only passed to the last crate.
|
||||
fn hack_get_external_crate_names(doc_root: &Path) -> Result<Vec<String>, Error> {
|
||||
let path = doc_root.join("crates.js");
|
||||
fn hack_get_external_crate_names(
|
||||
doc_root: &Path,
|
||||
resource_suffix: &str,
|
||||
) -> Result<Vec<String>, Error> {
|
||||
let path = doc_root.join(suffix_path("crates.js", resource_suffix));
|
||||
let Ok(content) = fs::read_to_string(&path) else {
|
||||
// they didn't emit invocation specific, so we just say there were no crates
|
||||
return Ok(Vec::default());
|
||||
|
|
|
@ -6,10 +6,10 @@ use crate::html::render::write_shared::*;
|
|||
fn hack_external_crate_names() {
|
||||
let path = tempfile::TempDir::new().unwrap();
|
||||
let path = path.path();
|
||||
let crates = hack_get_external_crate_names(&path).unwrap();
|
||||
let crates = hack_get_external_crate_names(&path, "").unwrap();
|
||||
assert!(crates.is_empty());
|
||||
fs::write(path.join("crates.js"), r#"window.ALL_CRATES = ["a","b","c"];"#).unwrap();
|
||||
let crates = hack_get_external_crate_names(&path).unwrap();
|
||||
let crates = hack_get_external_crate_names(&path, "").unwrap();
|
||||
assert_eq!(crates, ["a".to_string(), "b".to_string(), "c".to_string()]);
|
||||
}
|
||||
|
||||
|
@ -60,7 +60,7 @@ fn all_crates_template() {
|
|||
|
||||
#[test]
|
||||
fn all_crates_parts() {
|
||||
let parts = AllCratesPart::get(OrderedJson::serialize("crate").unwrap()).unwrap();
|
||||
let parts = AllCratesPart::get(OrderedJson::serialize("crate").unwrap(), "").unwrap();
|
||||
assert_eq!(&parts.parts[0].0, Path::new("crates.js"));
|
||||
assert_eq!(&parts.parts[0].1.to_string(), r#""crate""#);
|
||||
}
|
||||
|
|
|
@ -946,16 +946,48 @@ impl<'tcx> Machine<'tcx> for MiriMachine<'tcx> {
|
|||
ecx.machine.validation == ValidationMode::Deep
|
||||
}
|
||||
|
||||
#[inline(always)]
|
||||
fn enforce_abi(_ecx: &MiriInterpCx<'tcx>) -> bool {
|
||||
true
|
||||
}
|
||||
|
||||
#[inline(always)]
|
||||
fn ignore_optional_overflow_checks(ecx: &MiriInterpCx<'tcx>) -> bool {
|
||||
!ecx.tcx.sess.overflow_checks()
|
||||
}
|
||||
|
||||
fn check_fn_target_features(
|
||||
ecx: &MiriInterpCx<'tcx>,
|
||||
instance: ty::Instance<'tcx>,
|
||||
) -> InterpResult<'tcx> {
|
||||
let attrs = ecx.tcx.codegen_fn_attrs(instance.def_id());
|
||||
if attrs
|
||||
.target_features
|
||||
.iter()
|
||||
.any(|feature| !ecx.tcx.sess.target_features.contains(&feature.name))
|
||||
{
|
||||
let unavailable = attrs
|
||||
.target_features
|
||||
.iter()
|
||||
.filter(|&feature| {
|
||||
!feature.implied && !ecx.tcx.sess.target_features.contains(&feature.name)
|
||||
})
|
||||
.fold(String::new(), |mut s, feature| {
|
||||
if !s.is_empty() {
|
||||
s.push_str(", ");
|
||||
}
|
||||
s.push_str(feature.name.as_str());
|
||||
s
|
||||
});
|
||||
let msg = format!(
|
||||
"calling a function that requires unavailable target features: {unavailable}"
|
||||
);
|
||||
// On WASM, this is not UB, but instead gets rejected during validation of the module
|
||||
// (see #84988).
|
||||
if ecx.tcx.sess.target.is_like_wasm {
|
||||
throw_machine_stop!(TerminationInfo::Abort(msg));
|
||||
} else {
|
||||
throw_ub_format!("{msg}");
|
||||
}
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
#[inline(always)]
|
||||
fn find_mir_or_eval_fn(
|
||||
ecx: &mut MiriInterpCx<'tcx>,
|
||||
|
@ -1060,6 +1092,10 @@ impl<'tcx> Machine<'tcx> for MiriMachine<'tcx> {
|
|||
ecx.generate_nan(inputs)
|
||||
}
|
||||
|
||||
fn ub_checks(ecx: &InterpCx<'tcx, Self>) -> InterpResult<'tcx, bool> {
|
||||
Ok(ecx.tcx.sess.ub_checks())
|
||||
}
|
||||
|
||||
fn thread_local_static_pointer(
|
||||
ecx: &mut MiriInterpCx<'tcx>,
|
||||
def_id: DefId,
|
||||
|
|
|
@ -2,7 +2,9 @@
|
|||
//@compile-flags: -C target-feature=-simd128
|
||||
|
||||
fn main() {
|
||||
// Calling functions with `#[target_feature]` is not unsound on WASM, see #84988
|
||||
// Calling functions with `#[target_feature]` is not unsound on WASM, see #84988.
|
||||
// But if the compiler actually uses the target feature, it will lead to an error when the module is loaded.
|
||||
// We emulate this with an "unsupported" error.
|
||||
assert!(!cfg!(target_feature = "simd128"));
|
||||
simd128_fn();
|
||||
}
|
37
tests/assembly/struct-target-features.rs
Normal file
37
tests/assembly/struct-target-features.rs
Normal file
|
@ -0,0 +1,37 @@
|
|||
//@ compile-flags: -O
|
||||
//@ assembly-output: emit-asm
|
||||
//@ only-x86_64
|
||||
|
||||
#![crate_type = "lib"]
|
||||
#![feature(struct_target_features)]
|
||||
|
||||
// Check that a struct_target_features type causes the compiler to effectively inline intrinsics.
|
||||
|
||||
use std::arch::x86_64::*;
|
||||
|
||||
#[target_feature(enable = "avx")]
|
||||
struct Avx {}
|
||||
|
||||
#[target_feature(enable = "fma")]
|
||||
struct Fma {}
|
||||
|
||||
pub fn add_simple(_: Avx, v: __m256) -> __m256 {
|
||||
// CHECK-NOT: call
|
||||
// CHECK: vaddps
|
||||
unsafe { _mm256_add_ps(v, v) }
|
||||
}
|
||||
|
||||
pub fn add_complex_type(_: (&Avx, ()), v: __m256) -> __m256 {
|
||||
// CHECK-NOT: call
|
||||
// CHECK: vaddps
|
||||
unsafe { _mm256_add_ps(v, v) }
|
||||
}
|
||||
|
||||
pub fn add_fma_combined(_: (&Avx, &Fma), v: __m256) -> (__m256, __m256) {
|
||||
// CHECK-NOT: call
|
||||
// CHECK-DAG: vaddps
|
||||
let r1 = unsafe { _mm256_add_ps(v, v) };
|
||||
// CHECK-DAG: vfmadd213ps
|
||||
let r2 = unsafe { _mm256_fmadd_ps(v, v, v) };
|
||||
(r1, r2)
|
||||
}
|
20
tests/codegen/naked-fn/aligned.rs
Normal file
20
tests/codegen/naked-fn/aligned.rs
Normal file
|
@ -0,0 +1,20 @@
|
|||
//@ compile-flags: -C no-prepopulate-passes -Copt-level=0
|
||||
//@ needs-asm-support
|
||||
//@ ignore-arm no "ret" mnemonic
|
||||
|
||||
#![crate_type = "lib"]
|
||||
#![feature(naked_functions, fn_align)]
|
||||
use std::arch::asm;
|
||||
|
||||
// CHECK: Function Attrs: naked
|
||||
// CHECK-NEXT: define{{.*}}void @naked_empty()
|
||||
// CHECK: align 16
|
||||
#[repr(align(16))]
|
||||
#[no_mangle]
|
||||
#[naked]
|
||||
pub unsafe extern "C" fn naked_empty() {
|
||||
// CHECK-NEXT: start:
|
||||
// CHECK-NEXT: call void asm
|
||||
// CHECK-NEXT: unreachable
|
||||
asm!("ret", options(noreturn));
|
||||
}
|
|
@ -3,11 +3,11 @@
|
|||
#![feature(transmutability)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, { Assume::NOTHING }>,
|
||||
Dst: TransmuteFrom<Src, { Assume::NOTHING }>,
|
||||
{
|
||||
}
|
||||
}
|
||||
|
|
|
@ -4,6 +4,6 @@
|
|||
trait OpaqueTrait {}
|
||||
type OpaqueType = impl OpaqueTrait;
|
||||
trait AnotherTrait {}
|
||||
impl<T: std::mem::BikeshedIntrinsicFrom<(), ()>> AnotherTrait for T {}
|
||||
impl<T: std::mem::TransmuteFrom<(), ()>> AnotherTrait for T {}
|
||||
impl AnotherTrait for OpaqueType {}
|
||||
pub fn main() {}
|
||||
|
|
|
@ -3,6 +3,6 @@
|
|||
#![feature(transmutability)]
|
||||
#![feature(unboxed_closures,effects)]
|
||||
|
||||
const fn test() -> impl std::mem::BikeshedIntrinsicFrom() {
|
||||
const fn test() -> impl std::mem::TransmuteFrom() {
|
||||
|| {}
|
||||
}
|
||||
|
|
|
@ -14,11 +14,11 @@ pub enum Error {
|
|||
}
|
||||
|
||||
mod assert {
|
||||
use std::mem::BikeshedIntrinsicFrom;
|
||||
use std::mem::TransmuteFrom;
|
||||
|
||||
pub fn is_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src>, // safety is NOT assumed
|
||||
Dst: TransmuteFrom<Src>, // safety is NOT assumed
|
||||
{
|
||||
}
|
||||
}
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
#![feature(generic_const_exprs)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_transmutable<
|
||||
Src,
|
||||
|
@ -15,7 +15,7 @@ mod assert {
|
|||
const ASSUME_VALIDITY: bool,
|
||||
>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<
|
||||
Dst: TransmuteFrom<
|
||||
Src,
|
||||
{ }
|
||||
>,
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
//@ known-bug: rust-lang/rust#126966
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src>,
|
||||
Dst: TransmuteFrom<Src>,
|
||||
{
|
||||
}
|
||||
}
|
||||
|
|
|
@ -20,6 +20,7 @@ fn main() {
|
|||
.input("x.rs")
|
||||
.run();
|
||||
assert!(Path::new("invocation-only/search-index-xxx.js").exists());
|
||||
assert!(Path::new("invocation-only/crates-xxx.js").exists());
|
||||
assert!(Path::new("invocation-only/settings.html").exists());
|
||||
assert!(Path::new("invocation-only/x/all.html").exists());
|
||||
assert!(Path::new("invocation-only/x/index.html").exists());
|
||||
|
|
48
tests/ui/asm/naked-with-invalid-repr-attr.rs
Normal file
48
tests/ui/asm/naked-with-invalid-repr-attr.rs
Normal file
|
@ -0,0 +1,48 @@
|
|||
//@ needs-asm-support
|
||||
#![feature(naked_functions)]
|
||||
#![feature(fn_align)]
|
||||
#![crate_type = "lib"]
|
||||
use std::arch::asm;
|
||||
|
||||
#[repr(C)]
|
||||
//~^ ERROR attribute should be applied to a struct, enum, or union [E0517]
|
||||
#[naked]
|
||||
extern "C" fn example1() {
|
||||
//~^ NOTE not a struct, enum, or union
|
||||
unsafe { asm!("", options(noreturn)) }
|
||||
}
|
||||
|
||||
#[repr(transparent)]
|
||||
//~^ ERROR attribute should be applied to a struct, enum, or union [E0517]
|
||||
#[naked]
|
||||
extern "C" fn example2() {
|
||||
//~^ NOTE not a struct, enum, or union
|
||||
unsafe { asm!("", options(noreturn)) }
|
||||
}
|
||||
|
||||
#[repr(align(16), C)]
|
||||
//~^ ERROR attribute should be applied to a struct, enum, or union [E0517]
|
||||
#[naked]
|
||||
extern "C" fn example3() {
|
||||
//~^ NOTE not a struct, enum, or union
|
||||
unsafe { asm!("", options(noreturn)) }
|
||||
}
|
||||
|
||||
// note: two errors because of packed and C
|
||||
#[repr(C, packed)]
|
||||
//~^ ERROR attribute should be applied to a struct or union [E0517]
|
||||
//~| ERROR attribute should be applied to a struct, enum, or union [E0517]
|
||||
#[naked]
|
||||
extern "C" fn example4() {
|
||||
//~^ NOTE not a struct, enum, or union
|
||||
//~| NOTE not a struct or union
|
||||
unsafe { asm!("", options(noreturn)) }
|
||||
}
|
||||
|
||||
#[repr(u8)]
|
||||
//~^ ERROR attribute should be applied to an enum [E0517]
|
||||
#[naked]
|
||||
extern "C" fn example5() {
|
||||
//~^ NOTE not an enum
|
||||
unsafe { asm!("", options(noreturn)) }
|
||||
}
|
77
tests/ui/asm/naked-with-invalid-repr-attr.stderr
Normal file
77
tests/ui/asm/naked-with-invalid-repr-attr.stderr
Normal file
|
@ -0,0 +1,77 @@
|
|||
error[E0517]: attribute should be applied to a struct, enum, or union
|
||||
--> $DIR/naked-with-invalid-repr-attr.rs:7:8
|
||||
|
|
||||
LL | #[repr(C)]
|
||||
| ^
|
||||
...
|
||||
LL | / extern "C" fn example1() {
|
||||
LL | |
|
||||
LL | | unsafe { asm!("", options(noreturn)) }
|
||||
LL | | }
|
||||
| |_- not a struct, enum, or union
|
||||
|
||||
error[E0517]: attribute should be applied to a struct, enum, or union
|
||||
--> $DIR/naked-with-invalid-repr-attr.rs:15:8
|
||||
|
|
||||
LL | #[repr(transparent)]
|
||||
| ^^^^^^^^^^^
|
||||
...
|
||||
LL | / extern "C" fn example2() {
|
||||
LL | |
|
||||
LL | | unsafe { asm!("", options(noreturn)) }
|
||||
LL | | }
|
||||
| |_- not a struct, enum, or union
|
||||
|
||||
error[E0517]: attribute should be applied to a struct, enum, or union
|
||||
--> $DIR/naked-with-invalid-repr-attr.rs:23:19
|
||||
|
|
||||
LL | #[repr(align(16), C)]
|
||||
| ^
|
||||
...
|
||||
LL | / extern "C" fn example3() {
|
||||
LL | |
|
||||
LL | | unsafe { asm!("", options(noreturn)) }
|
||||
LL | | }
|
||||
| |_- not a struct, enum, or union
|
||||
|
||||
error[E0517]: attribute should be applied to a struct, enum, or union
|
||||
--> $DIR/naked-with-invalid-repr-attr.rs:32:8
|
||||
|
|
||||
LL | #[repr(C, packed)]
|
||||
| ^
|
||||
...
|
||||
LL | / extern "C" fn example4() {
|
||||
LL | |
|
||||
LL | |
|
||||
LL | | unsafe { asm!("", options(noreturn)) }
|
||||
LL | | }
|
||||
| |_- not a struct, enum, or union
|
||||
|
||||
error[E0517]: attribute should be applied to a struct or union
|
||||
--> $DIR/naked-with-invalid-repr-attr.rs:32:11
|
||||
|
|
||||
LL | #[repr(C, packed)]
|
||||
| ^^^^^^
|
||||
...
|
||||
LL | / extern "C" fn example4() {
|
||||
LL | |
|
||||
LL | |
|
||||
LL | | unsafe { asm!("", options(noreturn)) }
|
||||
LL | | }
|
||||
| |_- not a struct or union
|
||||
|
||||
error[E0517]: attribute should be applied to an enum
|
||||
--> $DIR/naked-with-invalid-repr-attr.rs:42:8
|
||||
|
|
||||
LL | #[repr(u8)]
|
||||
| ^^
|
||||
...
|
||||
LL | / extern "C" fn example5() {
|
||||
LL | |
|
||||
LL | | unsafe { asm!("", options(noreturn)) }
|
||||
LL | | }
|
||||
| |_- not an enum
|
||||
|
||||
error: aborting due to 6 previous errors
|
||||
|
||||
For more information about this error, try `rustc --explain E0517`.
|
|
@ -4,11 +4,6 @@ error[E0391]: cycle detected when computing predicates of `Foo`
|
|||
LL | struct Foo {
|
||||
| ^^^^^^^^^^
|
||||
|
|
||||
note: ...which requires computing predicates of `Foo`...
|
||||
--> $DIR/cycle-iat-inside-of-adt.rs:7:1
|
||||
|
|
||||
LL | struct Foo {
|
||||
| ^^^^^^^^^^
|
||||
note: ...which requires computing inferred outlives predicates of `Foo`...
|
||||
--> $DIR/cycle-iat-inside-of-adt.rs:7:1
|
||||
|
|
||||
|
|
|
@ -4,11 +4,6 @@ error[E0391]: cycle detected when computing predicates of `user`
|
|||
LL | fn user<T>() where S<T>::P: std::fmt::Debug {}
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
|
|
||||
note: ...which requires computing predicates of `user`...
|
||||
--> $DIR/cycle-iat-inside-of-where-predicate.rs:8:1
|
||||
|
|
||||
LL | fn user<T>() where S<T>::P: std::fmt::Debug {}
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
note: ...which requires computing explicit predicates of `user`...
|
||||
--> $DIR/cycle-iat-inside-of-where-predicate.rs:8:1
|
||||
|
|
||||
|
|
|
@ -4,11 +4,11 @@
|
|||
#![allow(incomplete_features, unstable_features)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::BikeshedIntrinsicFrom;
|
||||
use std::mem::TransmuteFrom;
|
||||
|
||||
pub fn is_transmutable<Src, Dst, Context, const ASSUME: std::mem::Assume>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, Context, ASSUME>,
|
||||
Dst: TransmuteFrom<Src, Context, ASSUME>,
|
||||
//~^ ERROR trait takes at most 2 generic arguments but 3 generic arguments were supplied
|
||||
{
|
||||
}
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
error[E0107]: trait takes at most 2 generic arguments but 3 generic arguments were supplied
|
||||
--> $DIR/transmutable-ice-110969.rs:11:14
|
||||
|
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, Context, ASSUME>,
|
||||
| ^^^^^^^^^^^^^^^^^^^^^ -------- help: remove the unnecessary generic argument
|
||||
LL | Dst: TransmuteFrom<Src, Context, ASSUME>,
|
||||
| ^^^^^^^^^^^^^ -------- help: remove the unnecessary generic argument
|
||||
| |
|
||||
| expected at most 2 generic arguments
|
||||
|
||||
|
|
|
@ -1,6 +1,7 @@
|
|||
//@ only-x86_64
|
||||
// Set the base cpu explicitly, in case the default has been changed.
|
||||
//@ compile-flags: -C target-cpu=x86-64 -C target-feature=+ssse3
|
||||
//@ check-pass
|
||||
|
||||
#![crate_type = "lib"]
|
||||
|
||||
|
@ -9,7 +10,8 @@ const A: () = unsafe { ssse3_fn() };
|
|||
|
||||
// error (avx2 not enabled at compile time)
|
||||
const B: () = unsafe { avx2_fn() };
|
||||
//~^ ERROR evaluation of constant value failed
|
||||
// FIXME: currently we do not detect this UB, since we don't want the result of const-eval
|
||||
// to depend on `tcx.sess` which can differ between crates in a crate graph.
|
||||
|
||||
#[target_feature(enable = "ssse3")]
|
||||
const unsafe fn ssse3_fn() {}
|
||||
|
|
|
@ -1,9 +0,0 @@
|
|||
error[E0080]: evaluation of constant value failed
|
||||
--> $DIR/const_fn_target_feature.rs:11:24
|
||||
|
|
||||
LL | const B: () = unsafe { avx2_fn() };
|
||||
| ^^^^^^^^^ calling a function that requires unavailable target features: avx2
|
||||
|
||||
error: aborting due to 1 previous error
|
||||
|
||||
For more information about this error, try `rustc --explain E0080`.
|
|
@ -7,7 +7,9 @@
|
|||
#[cfg(target_feature = "simd128")]
|
||||
compile_error!("simd128 target feature should be disabled");
|
||||
|
||||
// Calling functions with `#[target_feature]` is not unsound on WASM, see #84988
|
||||
// Calling functions with `#[target_feature]` is not unsound on WASM, see #84988.
|
||||
// (It can still lead to a runtime error though so we'd be in our right to abort execution,
|
||||
// just not to declare it UB.)
|
||||
const A: () = simd128_fn();
|
||||
|
||||
#[target_feature(enable = "simd128")]
|
||||
|
|
|
@ -0,0 +1,4 @@
|
|||
#[target_feature(enable = "avx")] //~ ERROR attribute should be applied to a function definition
|
||||
struct Avx {}
|
||||
|
||||
fn main() {}
|
|
@ -0,0 +1,10 @@
|
|||
error: attribute should be applied to a function definition
|
||||
--> $DIR/feature-gate-struct-target-features.rs:1:1
|
||||
|
|
||||
LL | #[target_feature(enable = "avx")]
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
LL | struct Avx {}
|
||||
| ------------- not a function definition
|
||||
|
||||
error: aborting due to 1 previous error
|
||||
|
|
@ -13,5 +13,13 @@ const RAW_EQ_PTR: bool = unsafe {
|
|||
//~| unable to turn pointer into integer
|
||||
};
|
||||
|
||||
const RAW_EQ_NOT_ALIGNED: bool = unsafe {
|
||||
let arr = [0u8; 4];
|
||||
let aref = &*arr.as_ptr().cast::<i32>();
|
||||
std::intrinsics::raw_eq(aref, aref)
|
||||
//~^ ERROR evaluation of constant value failed
|
||||
//~| alignment
|
||||
};
|
||||
|
||||
pub fn main() {
|
||||
}
|
||||
|
|
|
@ -13,6 +13,12 @@ LL | std::intrinsics::raw_eq(&(&0), &(&1))
|
|||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||
|
||||
error: aborting due to 2 previous errors
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $DIR/intrinsic-raw_eq-const-bad.rs:19:5
|
||||
|
|
||||
LL | std::intrinsics::raw_eq(aref, aref)
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ accessing memory with alignment 1, but alignment 4 is required
|
||||
|
||||
error: aborting due to 3 previous errors
|
||||
|
||||
For more information about this error, try `rustc --explain E0080`.
|
||||
|
|
98
tests/ui/target-feature/struct-target-features.rs
Normal file
98
tests/ui/target-feature/struct-target-features.rs
Normal file
|
@ -0,0 +1,98 @@
|
|||
//@ only-x86_64
|
||||
#![feature(struct_target_features)]
|
||||
//~^ WARNING the feature `struct_target_features` is incomplete and may not be safe to use and/or cause compiler crashes
|
||||
#![feature(target_feature_11)]
|
||||
|
||||
use std::arch::x86_64::*;
|
||||
|
||||
#[target_feature(enable = "avx")]
|
||||
//~^ ERROR attribute should be applied to a function definition or unit struct
|
||||
struct Invalid(u32);
|
||||
|
||||
#[target_feature(enable = "avx")]
|
||||
struct Avx {}
|
||||
|
||||
#[target_feature(enable = "sse")]
|
||||
struct Sse();
|
||||
|
||||
#[target_feature(enable = "avx")]
|
||||
fn avx() {}
|
||||
|
||||
trait TFAssociatedType {
|
||||
type Assoc;
|
||||
}
|
||||
|
||||
impl TFAssociatedType for () {
|
||||
type Assoc = Avx;
|
||||
}
|
||||
|
||||
fn avx_self(_: <() as TFAssociatedType>::Assoc) {
|
||||
avx();
|
||||
}
|
||||
|
||||
fn avx_avx(_: Avx) {
|
||||
avx();
|
||||
}
|
||||
|
||||
extern "C" fn bad_fun(_: Avx) {}
|
||||
//~^ ERROR cannot use a struct with target features in a function with non-Rust ABI
|
||||
|
||||
#[inline(always)]
|
||||
//~^ ERROR cannot use `#[inline(always)]` with `#[target_feature]`
|
||||
fn inline_fun(_: Avx) {}
|
||||
//~^ ERROR cannot use a struct with target features in a #[inline(always)] function
|
||||
|
||||
trait Simd {
|
||||
fn do_something(&self);
|
||||
}
|
||||
|
||||
impl Simd for Avx {
|
||||
fn do_something(&self) {
|
||||
unsafe {
|
||||
println!("{:?}", _mm256_setzero_ps());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl Simd for Sse {
|
||||
fn do_something(&self) {
|
||||
unsafe {
|
||||
println!("{:?}", _mm_setzero_ps());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
struct WithAvx {
|
||||
#[allow(dead_code)]
|
||||
avx: Avx,
|
||||
}
|
||||
|
||||
impl Simd for WithAvx {
|
||||
fn do_something(&self) {
|
||||
unsafe {
|
||||
println!("{:?}", _mm256_setzero_ps());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[inline(never)]
|
||||
fn dosomething<S: Simd>(simd: &S) {
|
||||
simd.do_something();
|
||||
}
|
||||
|
||||
fn avxfn(_: &Avx) {}
|
||||
|
||||
fn main() {
|
||||
Avx {};
|
||||
//~^ ERROR initializing type with `target_feature` attr is unsafe and requires unsafe function or block [E0133]
|
||||
|
||||
if is_x86_feature_detected!("avx") {
|
||||
let avx = unsafe { Avx {} };
|
||||
avxfn(&avx);
|
||||
dosomething(&avx);
|
||||
dosomething(&WithAvx { avx });
|
||||
}
|
||||
if is_x86_feature_detected!("sse") {
|
||||
dosomething(&unsafe { Sse {} })
|
||||
}
|
||||
}
|
47
tests/ui/target-feature/struct-target-features.stderr
Normal file
47
tests/ui/target-feature/struct-target-features.stderr
Normal file
|
@ -0,0 +1,47 @@
|
|||
warning: the feature `struct_target_features` is incomplete and may not be safe to use and/or cause compiler crashes
|
||||
--> $DIR/struct-target-features.rs:2:12
|
||||
|
|
||||
LL | #![feature(struct_target_features)]
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^
|
||||
|
|
||||
= note: see issue #129107 <https://github.com/rust-lang/rust/issues/129107> for more information
|
||||
= note: `#[warn(incomplete_features)]` on by default
|
||||
|
||||
error: attribute should be applied to a function definition or unit struct
|
||||
--> $DIR/struct-target-features.rs:8:1
|
||||
|
|
||||
LL | #[target_feature(enable = "avx")]
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
LL |
|
||||
LL | struct Invalid(u32);
|
||||
| -------------------- not a function definition or a unit struct
|
||||
|
||||
error: cannot use a struct with target features in a function with non-Rust ABI
|
||||
--> $DIR/struct-target-features.rs:37:1
|
||||
|
|
||||
LL | extern "C" fn bad_fun(_: Avx) {}
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
error: cannot use a struct with target features in a #[inline(always)] function
|
||||
--> $DIR/struct-target-features.rs:42:1
|
||||
|
|
||||
LL | fn inline_fun(_: Avx) {}
|
||||
| ^^^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
error: cannot use `#[inline(always)]` with `#[target_feature]`
|
||||
--> $DIR/struct-target-features.rs:40:1
|
||||
|
|
||||
LL | #[inline(always)]
|
||||
| ^^^^^^^^^^^^^^^^^
|
||||
|
||||
error[E0133]: initializing type with `target_feature` attr is unsafe and requires unsafe function or block
|
||||
--> $DIR/struct-target-features.rs:86:5
|
||||
|
|
||||
LL | Avx {};
|
||||
| ^^^^^^ initializing type with `target_feature` attr
|
||||
|
|
||||
= note: this struct can only be constructed if the corresponding `target_feature`s are available
|
||||
|
||||
error: aborting due to 5 previous errors; 1 warning emitted
|
||||
|
||||
For more information about this error, try `rustc --explain E0133`.
|
|
@ -8,7 +8,7 @@
|
|||
#![allow(dead_code, incomplete_features, non_camel_case_types)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::BikeshedIntrinsicFrom;
|
||||
use std::mem::TransmuteFrom;
|
||||
|
||||
pub fn is_transmutable<
|
||||
Src,
|
||||
|
@ -16,7 +16,7 @@ mod assert {
|
|||
const ASSUME: std::mem::Assume,
|
||||
>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<
|
||||
Dst: TransmuteFrom<
|
||||
Src,
|
||||
ASSUME,
|
||||
>,
|
||||
|
|
|
@ -6,12 +6,12 @@
|
|||
#![allow(dead_code, incomplete_features, non_camel_case_types)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn array_like<T, E, const N: usize>()
|
||||
where
|
||||
T: BikeshedIntrinsicFrom<[E; N], { Assume::SAFETY }>,
|
||||
[E; N]: BikeshedIntrinsicFrom<T, { Assume::SAFETY }>
|
||||
T: TransmuteFrom<[E; N], { Assume::SAFETY }>,
|
||||
[E; N]: TransmuteFrom<T, { Assume::SAFETY }>
|
||||
{}
|
||||
}
|
||||
|
||||
|
|
|
@ -2,11 +2,11 @@
|
|||
#![feature(transmutability)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_maybe_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume {
|
||||
alignment: false,
|
||||
lifetimes: true,
|
||||
|
|
|
@ -10,7 +10,7 @@ note: required by a bound in `is_maybe_transmutable`
|
|||
LL | pub fn is_maybe_transmutable<Src, Dst>()
|
||||
| --------------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: false,
|
||||
|
|
|
@ -2,11 +2,11 @@
|
|||
#![feature(transmutability)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_maybe_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume {
|
||||
alignment: false,
|
||||
lifetimes: false,
|
||||
|
|
|
@ -1,11 +1,11 @@
|
|||
#![crate_type = "lib"]
|
||||
#![feature(transmutability)]
|
||||
mod assert {
|
||||
use std::mem::BikeshedIntrinsicFrom;
|
||||
use std::mem::TransmuteFrom;
|
||||
|
||||
pub fn is_maybe_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src>,
|
||||
Dst: TransmuteFrom<Src>,
|
||||
{
|
||||
}
|
||||
}
|
||||
|
|
|
@ -10,8 +10,8 @@ note: required by a bound in `is_maybe_transmutable`
|
|||
LL | pub fn is_maybe_transmutable<Src, Dst>()
|
||||
| --------------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src>,
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ required by this bound in `is_maybe_transmutable`
|
||||
LL | Dst: TransmuteFrom<Src>,
|
||||
| ^^^^^^^^^^^^^^^^^^ required by this bound in `is_maybe_transmutable`
|
||||
|
||||
error[E0277]: `ExplicitlyPadded` cannot be safely transmuted into `()`
|
||||
--> $DIR/huge-len.rs:24:55
|
||||
|
@ -25,8 +25,8 @@ note: required by a bound in `is_maybe_transmutable`
|
|||
LL | pub fn is_maybe_transmutable<Src, Dst>()
|
||||
| --------------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src>,
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ required by this bound in `is_maybe_transmutable`
|
||||
LL | Dst: TransmuteFrom<Src>,
|
||||
| ^^^^^^^^^^^^^^^^^^ required by this bound in `is_maybe_transmutable`
|
||||
|
||||
error: aborting due to 2 previous errors
|
||||
|
||||
|
|
|
@ -3,11 +3,11 @@
|
|||
#![allow(dead_code)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_maybe_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<
|
||||
Dst: TransmuteFrom<
|
||||
Src,
|
||||
{ Assume { alignment: true, lifetimes: true, safety: true, validity: true } },
|
||||
>,
|
||||
|
|
|
@ -6,11 +6,11 @@
|
|||
#![allow(dead_code, incomplete_features, non_camel_case_types)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_maybe_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, { Assume::SAFETY.and(Assume::VALIDITY) }>
|
||||
Dst: TransmuteFrom<Src, { Assume::SAFETY.and(Assume::VALIDITY) }>
|
||||
{}
|
||||
}
|
||||
|
||||
|
|
|
@ -6,11 +6,11 @@
|
|||
#![allow(dead_code, incomplete_features, non_camel_case_types)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_maybe_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume::ALIGNMENT
|
||||
.and(Assume::LIFETIMES)
|
||||
.and(Assume::SAFETY)
|
||||
|
|
|
@ -5,11 +5,11 @@
|
|||
#![allow(dead_code, incomplete_features, non_camel_case_types)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_maybe_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume::ALIGNMENT
|
||||
.and(Assume::LIFETIMES)
|
||||
.and(Assume::SAFETY)
|
||||
|
|
|
@ -10,7 +10,7 @@ note: required by a bound in `is_maybe_transmutable`
|
|||
LL | pub fn is_maybe_transmutable<Src, Dst>()
|
||||
| --------------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume::ALIGNMENT
|
||||
LL | | .and(Assume::LIFETIMES)
|
||||
|
@ -31,7 +31,7 @@ note: required by a bound in `is_maybe_transmutable`
|
|||
LL | pub fn is_maybe_transmutable<Src, Dst>()
|
||||
| --------------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume::ALIGNMENT
|
||||
LL | | .and(Assume::LIFETIMES)
|
||||
|
@ -52,7 +52,7 @@ note: required by a bound in `is_maybe_transmutable`
|
|||
LL | pub fn is_maybe_transmutable<Src, Dst>()
|
||||
| --------------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume::ALIGNMENT
|
||||
LL | | .and(Assume::LIFETIMES)
|
||||
|
@ -73,7 +73,7 @@ note: required by a bound in `is_maybe_transmutable`
|
|||
LL | pub fn is_maybe_transmutable<Src, Dst>()
|
||||
| --------------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume::ALIGNMENT
|
||||
LL | | .and(Assume::LIFETIMES)
|
||||
|
@ -94,7 +94,7 @@ note: required by a bound in `is_maybe_transmutable`
|
|||
LL | pub fn is_maybe_transmutable<Src, Dst>()
|
||||
| --------------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume::ALIGNMENT
|
||||
LL | | .and(Assume::LIFETIMES)
|
||||
|
@ -115,7 +115,7 @@ note: required by a bound in `is_maybe_transmutable`
|
|||
LL | pub fn is_maybe_transmutable<Src, Dst>()
|
||||
| --------------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume::ALIGNMENT
|
||||
LL | | .and(Assume::LIFETIMES)
|
||||
|
|
|
@ -5,11 +5,11 @@
|
|||
#![allow(dead_code, incomplete_features, non_camel_case_types)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume {
|
||||
alignment: false,
|
||||
lifetimes: false,
|
||||
|
@ -21,7 +21,7 @@ mod assert {
|
|||
|
||||
pub fn is_maybe_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume {
|
||||
alignment: false,
|
||||
lifetimes: false,
|
||||
|
|
|
@ -7,11 +7,11 @@
|
|||
use std::mem::MaybeUninit;
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume {
|
||||
alignment: false,
|
||||
lifetimes: false,
|
||||
|
@ -23,7 +23,7 @@ mod assert {
|
|||
|
||||
pub fn is_maybe_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume {
|
||||
alignment: false,
|
||||
lifetimes: false,
|
||||
|
|
|
@ -5,11 +5,11 @@
|
|||
#![allow(dead_code)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume {
|
||||
alignment: true,
|
||||
lifetimes: true,
|
||||
|
|
|
@ -10,7 +10,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -32,7 +32,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -54,7 +54,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -76,7 +76,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -98,7 +98,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -120,7 +120,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -142,7 +142,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -164,7 +164,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -186,7 +186,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -208,7 +208,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -230,7 +230,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -252,7 +252,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -274,7 +274,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -296,7 +296,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -318,7 +318,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -340,7 +340,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -362,7 +362,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -384,7 +384,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -406,7 +406,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
@ -428,7 +428,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume {
|
||||
LL | | alignment: true,
|
||||
|
|
|
@ -5,11 +5,11 @@
|
|||
#![allow(dead_code, incomplete_features, non_camel_case_types)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_maybe_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume {
|
||||
alignment: true,
|
||||
lifetimes: true,
|
||||
|
|
|
@ -6,11 +6,11 @@
|
|||
#![allow(dead_code)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume::ALIGNMENT
|
||||
.and(Assume::LIFETIMES)
|
||||
.and(Assume::SAFETY)
|
||||
|
|
|
@ -6,11 +6,11 @@
|
|||
#![allow(dead_code)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume::ALIGNMENT
|
||||
.and(Assume::LIFETIMES)
|
||||
.and(Assume::SAFETY)
|
||||
|
|
|
@ -10,7 +10,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume::ALIGNMENT
|
||||
LL | | .and(Assume::LIFETIMES)
|
||||
|
|
|
@ -6,11 +6,11 @@
|
|||
#![allow(dead_code)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::{Assume, BikeshedIntrinsicFrom};
|
||||
use std::mem::{Assume, TransmuteFrom};
|
||||
|
||||
pub fn is_transmutable<Src, Dst>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, {
|
||||
Dst: TransmuteFrom<Src, {
|
||||
Assume::ALIGNMENT
|
||||
.and(Assume::LIFETIMES)
|
||||
.and(Assume::SAFETY)
|
||||
|
|
|
@ -10,7 +10,7 @@ note: required by a bound in `is_transmutable`
|
|||
LL | pub fn is_transmutable<Src, Dst>()
|
||||
| --------------- required by a bound in this function
|
||||
LL | where
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, {
|
||||
LL | Dst: TransmuteFrom<Src, {
|
||||
| ______________^
|
||||
LL | | Assume::ALIGNMENT
|
||||
LL | | .and(Assume::LIFETIMES)
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
|
||||
fn assert_transmutable<T>()
|
||||
where
|
||||
(): std::mem::BikeshedIntrinsicFrom<T>
|
||||
(): std::mem::TransmuteFrom<T>
|
||||
{}
|
||||
|
||||
enum Uninhabited {}
|
||||
|
|
|
@ -1,11 +1,11 @@
|
|||
#![feature(transmutability)]
|
||||
|
||||
mod assert {
|
||||
use std::mem::BikeshedIntrinsicFrom;
|
||||
use std::mem::TransmuteFrom;
|
||||
|
||||
pub fn is_transmutable<Src, const ASSUME_ALIGNMENT: bool>()
|
||||
where
|
||||
Dst: BikeshedIntrinsicFrom<Src, ASSUME_ALIGNMENT>, //~ ERROR cannot find type `Dst` in this scope
|
||||
Dst: TransmuteFrom<Src, ASSUME_ALIGNMENT>, //~ ERROR cannot find type `Dst` in this scope
|
||||
//~| the constant `ASSUME_ALIGNMENT` is not of type `Assume`
|
||||
//~| ERROR: mismatched types
|
||||
{
|
||||
|
|
|
@ -1,23 +1,23 @@
|
|||
error[E0412]: cannot find type `Dst` in this scope
|
||||
--> $DIR/issue-101739-1.rs:8:9
|
||||
|
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, ASSUME_ALIGNMENT>,
|
||||
LL | Dst: TransmuteFrom<Src, ASSUME_ALIGNMENT>,
|
||||
| ^^^ not found in this scope
|
||||
|
||||
error: the constant `ASSUME_ALIGNMENT` is not of type `Assume`
|
||||
--> $DIR/issue-101739-1.rs:8:14
|
||||
|
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, ASSUME_ALIGNMENT>,
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ expected `Assume`, found `bool`
|
||||
LL | Dst: TransmuteFrom<Src, ASSUME_ALIGNMENT>,
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ expected `Assume`, found `bool`
|
||||
|
|
||||
note: required by a const generic parameter in `BikeshedIntrinsicFrom`
|
||||
note: required by a const generic parameter in `TransmuteFrom`
|
||||
--> $SRC_DIR/core/src/mem/transmutability.rs:LL:COL
|
||||
|
||||
error[E0308]: mismatched types
|
||||
--> $DIR/issue-101739-1.rs:8:41
|
||||
--> $DIR/issue-101739-1.rs:8:33
|
||||
|
|
||||
LL | Dst: BikeshedIntrinsicFrom<Src, ASSUME_ALIGNMENT>,
|
||||
| ^^^^^^^^^^^^^^^^ expected `Assume`, found `bool`
|
||||
LL | Dst: TransmuteFrom<Src, ASSUME_ALIGNMENT>,
|
||||
| ^^^^^^^^^^^^^^^^ expected `Assume`, found `bool`
|
||||
|
||||
error: aborting due to 3 previous errors
|
||||
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Reference in a new issue