Rollup merge of #114372 - RalfJung:const-pointer-as-int, r=oli-obk
const validation: point at where we found a pointer but expected an integer Instead of validation just printing "unable to turn pointer into bytes", make this a regular validation error that says where in the value the bad pointer was found. Also distinguish "expected integer, got pointer" from "expected pointer, got partial pointer or mix of pointers". To avoid duplicating things too much I refactored the diagnostics for validity a bit, so that "got uninit, expected X" and "got pointer, expected X" can share the "X" part. Also all the errors emitted for validation are now grouped under `const_eval_validation` so that they are in a single group in the ftl file. r? `@oli-obk`
This commit is contained in:
commit
00dcc7b97c
34 changed files with 544 additions and 408 deletions
|
@ -15,9 +15,6 @@ const_eval_await_non_const =
|
||||||
cannot convert `{$ty}` into a future in {const_eval_const_context}s
|
cannot convert `{$ty}` into a future in {const_eval_const_context}s
|
||||||
const_eval_bounds_check_failed =
|
const_eval_bounds_check_failed =
|
||||||
indexing out of bounds: the len is {$len} but the index is {$index}
|
indexing out of bounds: the len is {$len} but the index is {$index}
|
||||||
const_eval_box_to_mut = {$front_matter}: encountered a box pointing to mutable memory in a constant
|
|
||||||
const_eval_box_to_static = {$front_matter}: encountered a box pointing to a static variable in a constant
|
|
||||||
const_eval_box_to_uninhabited = {$front_matter}: encountered a box pointing to uninhabited type {$ty}
|
|
||||||
const_eval_call_nonzero_intrinsic =
|
const_eval_call_nonzero_intrinsic =
|
||||||
`{$name}` called on 0
|
`{$name}` called on 0
|
||||||
|
|
||||||
|
@ -41,18 +38,12 @@ const_eval_const_context = {$kind ->
|
||||||
const_eval_copy_nonoverlapping_overlapping =
|
const_eval_copy_nonoverlapping_overlapping =
|
||||||
`copy_nonoverlapping` called on overlapping ranges
|
`copy_nonoverlapping` called on overlapping ranges
|
||||||
|
|
||||||
const_eval_dangling_box_no_provenance = {$front_matter}: encountered a dangling box ({$pointer} has no provenance)
|
|
||||||
const_eval_dangling_box_out_of_bounds = {$front_matter}: encountered a dangling box (going beyond the bounds of its allocation)
|
|
||||||
const_eval_dangling_box_use_after_free = {$front_matter}: encountered a dangling box (use-after-free)
|
|
||||||
const_eval_dangling_int_pointer =
|
const_eval_dangling_int_pointer =
|
||||||
{$bad_pointer_message}: {$pointer} is a dangling pointer (it has no provenance)
|
{$bad_pointer_message}: {$pointer} is a dangling pointer (it has no provenance)
|
||||||
const_eval_dangling_null_pointer =
|
const_eval_dangling_null_pointer =
|
||||||
{$bad_pointer_message}: null pointer is a dangling pointer (it has no provenance)
|
{$bad_pointer_message}: null pointer is a dangling pointer (it has no provenance)
|
||||||
const_eval_dangling_ptr_in_final = encountered dangling pointer in final constant
|
const_eval_dangling_ptr_in_final = encountered dangling pointer in final constant
|
||||||
|
|
||||||
const_eval_dangling_ref_no_provenance = {$front_matter}: encountered a dangling reference ({$pointer} has no provenance)
|
|
||||||
const_eval_dangling_ref_out_of_bounds = {$front_matter}: encountered a dangling reference (going beyond the bounds of its allocation)
|
|
||||||
const_eval_dangling_ref_use_after_free = {$front_matter}: encountered a dangling reference (use-after-free)
|
|
||||||
const_eval_dead_local =
|
const_eval_dead_local =
|
||||||
accessing a dead local variable
|
accessing a dead local variable
|
||||||
const_eval_dealloc_immutable =
|
const_eval_dealloc_immutable =
|
||||||
|
@ -105,7 +96,6 @@ const_eval_error = {$error_kind ->
|
||||||
const_eval_exact_div_has_remainder =
|
const_eval_exact_div_has_remainder =
|
||||||
exact_div: {$a} cannot be divided by {$b} without remainder
|
exact_div: {$a} cannot be divided by {$b} without remainder
|
||||||
|
|
||||||
const_eval_expected_non_ptr = {$front_matter}: encountered `{$value}`, but expected plain (non-pointer) bytes
|
|
||||||
const_eval_fn_ptr_call =
|
const_eval_fn_ptr_call =
|
||||||
function pointers need an RFC before allowed to be called in {const_eval_const_context}s
|
function pointers need an RFC before allowed to be called in {const_eval_const_context}s
|
||||||
const_eval_for_loop_into_iter_non_const =
|
const_eval_for_loop_into_iter_non_const =
|
||||||
|
@ -156,8 +146,6 @@ const_eval_invalid_align_details =
|
||||||
|
|
||||||
const_eval_invalid_bool =
|
const_eval_invalid_bool =
|
||||||
interpreting an invalid 8-bit value as a bool: 0x{$value}
|
interpreting an invalid 8-bit value as a bool: 0x{$value}
|
||||||
const_eval_invalid_box_meta = {$front_matter}: encountered invalid box metadata: total size is bigger than largest supported object
|
|
||||||
const_eval_invalid_box_slice_meta = {$front_matter}: encountered invalid box metadata: slice is bigger than largest supported object
|
|
||||||
const_eval_invalid_char =
|
const_eval_invalid_char =
|
||||||
interpreting an invalid 32-bit value as a char: 0x{$value}
|
interpreting an invalid 32-bit value as a char: 0x{$value}
|
||||||
const_eval_invalid_dealloc =
|
const_eval_invalid_dealloc =
|
||||||
|
@ -168,16 +156,12 @@ const_eval_invalid_dealloc =
|
||||||
*[other] {""}
|
*[other] {""}
|
||||||
}
|
}
|
||||||
|
|
||||||
const_eval_invalid_enum_tag = {$front_matter}: encountered {$value}, but expected a valid enum tag
|
|
||||||
const_eval_invalid_fn_ptr = {$front_matter}: encountered {$value}, but expected a function pointer
|
|
||||||
const_eval_invalid_function_pointer =
|
const_eval_invalid_function_pointer =
|
||||||
using {$pointer} as function pointer but it does not point to a function
|
using {$pointer} as function pointer but it does not point to a function
|
||||||
const_eval_invalid_meta =
|
const_eval_invalid_meta =
|
||||||
invalid metadata in wide pointer: total size is bigger than largest supported object
|
invalid metadata in wide pointer: total size is bigger than largest supported object
|
||||||
const_eval_invalid_meta_slice =
|
const_eval_invalid_meta_slice =
|
||||||
invalid metadata in wide pointer: slice is bigger than largest supported object
|
invalid metadata in wide pointer: slice is bigger than largest supported object
|
||||||
const_eval_invalid_ref_meta = {$front_matter}: encountered invalid reference metadata: total size is bigger than largest supported object
|
|
||||||
const_eval_invalid_ref_slice_meta = {$front_matter}: encountered invalid reference metadata: slice is bigger than largest supported object
|
|
||||||
const_eval_invalid_str =
|
const_eval_invalid_str =
|
||||||
this string is not valid UTF-8: {$err}
|
this string is not valid UTF-8: {$err}
|
||||||
const_eval_invalid_tag =
|
const_eval_invalid_tag =
|
||||||
|
@ -189,14 +173,10 @@ const_eval_invalid_uninit_bytes =
|
||||||
reading memory at {$alloc}{$access}, but memory is uninitialized at {$uninit}, and this operation requires initialized memory
|
reading memory at {$alloc}{$access}, but memory is uninitialized at {$uninit}, and this operation requires initialized memory
|
||||||
const_eval_invalid_uninit_bytes_unknown =
|
const_eval_invalid_uninit_bytes_unknown =
|
||||||
using uninitialized data, but this operation requires initialized memory
|
using uninitialized data, but this operation requires initialized memory
|
||||||
const_eval_invalid_value = constructing invalid value
|
|
||||||
const_eval_invalid_value_with_path = constructing invalid value at {$path}
|
|
||||||
## The `front_matter`s here refer to either `middle_invalid_value` or `middle_invalid_value_with_path`.
|
|
||||||
|
|
||||||
const_eval_invalid_vtable_pointer =
|
const_eval_invalid_vtable_pointer =
|
||||||
using {$pointer} as vtable pointer but it does not point to a vtable
|
using {$pointer} as vtable pointer but it does not point to a vtable
|
||||||
|
|
||||||
const_eval_invalid_vtable_ptr = {$front_matter}: encountered {$value}, but expected a vtable pointer
|
|
||||||
|
|
||||||
const_eval_live_drop =
|
const_eval_live_drop =
|
||||||
destructor of `{$dropped_ty}` cannot be evaluated at compile-time
|
destructor of `{$dropped_ty}` cannot be evaluated at compile-time
|
||||||
|
@ -218,14 +198,13 @@ const_eval_max_num_nodes_in_const = maximum number of nodes exceeded in constant
|
||||||
const_eval_memory_access_test = memory access failed
|
const_eval_memory_access_test = memory access failed
|
||||||
const_eval_memory_exhausted =
|
const_eval_memory_exhausted =
|
||||||
tried to allocate more memory than available to compiler
|
tried to allocate more memory than available to compiler
|
||||||
|
|
||||||
const_eval_modified_global =
|
const_eval_modified_global =
|
||||||
modifying a static's initial value from another static's initializer
|
modifying a static's initial value from another static's initializer
|
||||||
|
|
||||||
const_eval_mut_deref =
|
const_eval_mut_deref =
|
||||||
mutation through a reference is not allowed in {const_eval_const_context}s
|
mutation through a reference is not allowed in {const_eval_const_context}s
|
||||||
|
|
||||||
const_eval_mutable_ref_in_const = {$front_matter}: encountered mutable reference in a `const`
|
|
||||||
const_eval_never_val = {$front_matter}: encountered a value of the never type `!`
|
|
||||||
const_eval_non_const_fmt_macro_call =
|
const_eval_non_const_fmt_macro_call =
|
||||||
cannot call non-const formatting macro in {const_eval_const_context}s
|
cannot call non-const formatting macro in {const_eval_const_context}s
|
||||||
|
|
||||||
|
@ -241,10 +220,6 @@ const_eval_noreturn_asm_returned =
|
||||||
const_eval_not_enough_caller_args =
|
const_eval_not_enough_caller_args =
|
||||||
calling a function with fewer arguments than it requires
|
calling a function with fewer arguments than it requires
|
||||||
|
|
||||||
const_eval_null_box = {$front_matter}: encountered a null box
|
|
||||||
const_eval_null_fn_ptr = {$front_matter}: encountered a null function pointer
|
|
||||||
const_eval_null_ref = {$front_matter}: encountered a null reference
|
|
||||||
const_eval_nullable_ptr_out_of_range = {$front_matter}: encountered a potentially null pointer, but expected something that cannot possibly fail to be {$in_range}
|
|
||||||
const_eval_nullary_intrinsic_fail =
|
const_eval_nullary_intrinsic_fail =
|
||||||
could not evaluate nullary intrinsic
|
could not evaluate nullary intrinsic
|
||||||
|
|
||||||
|
@ -257,7 +232,6 @@ const_eval_offset_from_underflow =
|
||||||
|
|
||||||
const_eval_operator_non_const =
|
const_eval_operator_non_const =
|
||||||
cannot call non-const operator in {const_eval_const_context}s
|
cannot call non-const operator in {const_eval_const_context}s
|
||||||
const_eval_out_of_range = {$front_matter}: encountered {$value}, but expected something {$in_range}
|
|
||||||
const_eval_overflow =
|
const_eval_overflow =
|
||||||
overflow executing `{$name}`
|
overflow executing `{$name}`
|
||||||
|
|
||||||
|
@ -287,7 +261,6 @@ const_eval_ptr_as_bytes_1 =
|
||||||
this code performed an operation that depends on the underlying bytes representing a pointer
|
this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
const_eval_ptr_as_bytes_2 =
|
const_eval_ptr_as_bytes_2 =
|
||||||
the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
const_eval_ptr_out_of_range = {$front_matter}: encountered a pointer, but expected something that cannot possibly fail to be {$in_range}
|
|
||||||
const_eval_question_branch_non_const =
|
const_eval_question_branch_non_const =
|
||||||
`?` cannot determine the branch of `{$ty}` in {const_eval_const_context}s
|
`?` cannot determine the branch of `{$ty}` in {const_eval_const_context}s
|
||||||
|
|
||||||
|
@ -315,8 +288,8 @@ const_eval_raw_ptr_to_int =
|
||||||
|
|
||||||
const_eval_read_extern_static =
|
const_eval_read_extern_static =
|
||||||
cannot read from extern static ({$did})
|
cannot read from extern static ({$did})
|
||||||
const_eval_read_pointer_as_bytes =
|
const_eval_read_pointer_as_int =
|
||||||
unable to turn pointer into raw bytes
|
unable to turn pointer into integer
|
||||||
const_eval_realloc_or_alloc_with_offset =
|
const_eval_realloc_or_alloc_with_offset =
|
||||||
{$kind ->
|
{$kind ->
|
||||||
[dealloc] deallocating
|
[dealloc] deallocating
|
||||||
|
@ -324,9 +297,6 @@ const_eval_realloc_or_alloc_with_offset =
|
||||||
*[other] {""}
|
*[other] {""}
|
||||||
} {$ptr} which does not point to the beginning of an object
|
} {$ptr} which does not point to the beginning of an object
|
||||||
|
|
||||||
const_eval_ref_to_mut = {$front_matter}: encountered a reference pointing to mutable memory in a constant
|
|
||||||
const_eval_ref_to_static = {$front_matter}: encountered a reference pointing to a static variable in a constant
|
|
||||||
const_eval_ref_to_uninhabited = {$front_matter}: encountered a reference pointing to uninhabited type {$ty}
|
|
||||||
const_eval_remainder_by_zero =
|
const_eval_remainder_by_zero =
|
||||||
calculating the remainder with a divisor of zero
|
calculating the remainder with a divisor of zero
|
||||||
const_eval_remainder_overflow =
|
const_eval_remainder_overflow =
|
||||||
|
@ -363,8 +333,6 @@ const_eval_transient_mut_borrow_raw = raw mutable references are not allowed in
|
||||||
|
|
||||||
const_eval_try_block_from_output_non_const =
|
const_eval_try_block_from_output_non_const =
|
||||||
`try` block cannot convert `{$ty}` to the result in {const_eval_const_context}s
|
`try` block cannot convert `{$ty}` to the result in {const_eval_const_context}s
|
||||||
const_eval_unaligned_box = {$front_matter}: encountered an unaligned box (required {$required_bytes} byte alignment but found {$found_bytes})
|
|
||||||
const_eval_unaligned_ref = {$front_matter}: encountered an unaligned reference (required {$required_bytes} byte alignment but found {$found_bytes})
|
|
||||||
const_eval_unallowed_fn_pointer_call = function pointer calls are not allowed in {const_eval_const_context}s
|
const_eval_unallowed_fn_pointer_call = function pointer calls are not allowed in {const_eval_const_context}s
|
||||||
|
|
||||||
const_eval_unallowed_heap_allocations =
|
const_eval_unallowed_heap_allocations =
|
||||||
|
@ -408,29 +376,14 @@ const_eval_undefined_behavior =
|
||||||
const_eval_undefined_behavior_note =
|
const_eval_undefined_behavior_note =
|
||||||
The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
|
|
||||||
const_eval_uninhabited_enum_tag = {$front_matter}: encountered an uninhabited enum variant
|
|
||||||
const_eval_uninhabited_enum_variant_read =
|
const_eval_uninhabited_enum_variant_read =
|
||||||
read discriminant of an uninhabited enum variant
|
read discriminant of an uninhabited enum variant
|
||||||
const_eval_uninhabited_enum_variant_written =
|
const_eval_uninhabited_enum_variant_written =
|
||||||
writing discriminant of an uninhabited enum variant
|
writing discriminant of an uninhabited enum variant
|
||||||
const_eval_uninhabited_val = {$front_matter}: encountered a value of uninhabited type `{$ty}`
|
|
||||||
const_eval_uninit = {$front_matter}: encountered uninitialized bytes
|
|
||||||
const_eval_uninit_bool = {$front_matter}: encountered uninitialized memory, but expected a boolean
|
|
||||||
const_eval_uninit_box = {$front_matter}: encountered uninitialized memory, but expected a box
|
|
||||||
const_eval_uninit_char = {$front_matter}: encountered uninitialized memory, but expected a unicode scalar value
|
|
||||||
const_eval_uninit_enum_tag = {$front_matter}: encountered uninitialized bytes, but expected a valid enum tag
|
|
||||||
const_eval_uninit_float = {$front_matter}: encountered uninitialized memory, but expected a floating point number
|
|
||||||
const_eval_uninit_fn_ptr = {$front_matter}: encountered uninitialized memory, but expected a function pointer
|
|
||||||
const_eval_uninit_init_scalar = {$front_matter}: encountered uninitialized memory, but expected initialized scalar value
|
|
||||||
const_eval_uninit_int = {$front_matter}: encountered uninitialized memory, but expected an integer
|
|
||||||
const_eval_uninit_raw_ptr = {$front_matter}: encountered uninitialized memory, but expected a raw pointer
|
|
||||||
const_eval_uninit_ref = {$front_matter}: encountered uninitialized memory, but expected a reference
|
|
||||||
const_eval_uninit_str = {$front_matter}: encountered uninitialized data in `str`
|
|
||||||
const_eval_unreachable = entering unreachable code
|
const_eval_unreachable = entering unreachable code
|
||||||
const_eval_unreachable_unwind =
|
const_eval_unreachable_unwind =
|
||||||
unwinding past a stack frame that does not allow unwinding
|
unwinding past a stack frame that does not allow unwinding
|
||||||
|
|
||||||
const_eval_unsafe_cell = {$front_matter}: encountered `UnsafeCell` in a `const`
|
|
||||||
const_eval_unsigned_offset_from_overflow =
|
const_eval_unsigned_offset_from_overflow =
|
||||||
`ptr_offset_from_unsigned` called when first pointer has smaller offset than second: {$a_offset} < {$b_offset}
|
`ptr_offset_from_unsigned` called when first pointer has smaller offset than second: {$a_offset} < {$b_offset}
|
||||||
|
|
||||||
|
@ -453,8 +406,63 @@ const_eval_unwind_past_top =
|
||||||
const_eval_upcast_mismatch =
|
const_eval_upcast_mismatch =
|
||||||
upcast on a pointer whose vtable does not match its type
|
upcast on a pointer whose vtable does not match its type
|
||||||
|
|
||||||
|
## The `front_matter`s here refer to either `const_eval_front_matter_invalid_value` or `const_eval_front_matter_invalid_value_with_path`.
|
||||||
|
## (We'd love to sort this differently to make that more clear but tidy won't let us...)
|
||||||
|
const_eval_validation_box_to_mut = {$front_matter}: encountered a box pointing to mutable memory in a constant
|
||||||
|
const_eval_validation_box_to_static = {$front_matter}: encountered a box pointing to a static variable in a constant
|
||||||
|
const_eval_validation_box_to_uninhabited = {$front_matter}: encountered a box pointing to uninhabited type {$ty}
|
||||||
|
const_eval_validation_dangling_box_no_provenance = {$front_matter}: encountered a dangling box ({$pointer} has no provenance)
|
||||||
|
const_eval_validation_dangling_box_out_of_bounds = {$front_matter}: encountered a dangling box (going beyond the bounds of its allocation)
|
||||||
|
const_eval_validation_dangling_box_use_after_free = {$front_matter}: encountered a dangling box (use-after-free)
|
||||||
|
const_eval_validation_dangling_ref_no_provenance = {$front_matter}: encountered a dangling reference ({$pointer} has no provenance)
|
||||||
|
const_eval_validation_dangling_ref_out_of_bounds = {$front_matter}: encountered a dangling reference (going beyond the bounds of its allocation)
|
||||||
|
const_eval_validation_dangling_ref_use_after_free = {$front_matter}: encountered a dangling reference (use-after-free)
|
||||||
|
|
||||||
|
const_eval_validation_expected_bool = expected a boolean
|
||||||
|
const_eval_validation_expected_box = expected a box
|
||||||
|
const_eval_validation_expected_char = expected a unicode scalar value
|
||||||
|
const_eval_validation_expected_enum_tag = expected a valid enum tag
|
||||||
|
const_eval_validation_expected_float = expected a floating point number
|
||||||
|
const_eval_validation_expected_fn_ptr = expected a function pointer
|
||||||
|
const_eval_validation_expected_init_scalar = expected initialized scalar value
|
||||||
|
const_eval_validation_expected_int = expected an integer
|
||||||
|
const_eval_validation_expected_raw_ptr = expected a raw pointer
|
||||||
|
const_eval_validation_expected_ref = expected a reference
|
||||||
|
const_eval_validation_expected_str = expected a string
|
||||||
|
|
||||||
|
const_eval_validation_front_matter_invalid_value = constructing invalid value
|
||||||
|
const_eval_validation_front_matter_invalid_value_with_path = constructing invalid value at {$path}
|
||||||
|
|
||||||
const_eval_validation_invalid_bool = {$front_matter}: encountered {$value}, but expected a boolean
|
const_eval_validation_invalid_bool = {$front_matter}: encountered {$value}, but expected a boolean
|
||||||
|
const_eval_validation_invalid_box_meta = {$front_matter}: encountered invalid box metadata: total size is bigger than largest supported object
|
||||||
|
const_eval_validation_invalid_box_slice_meta = {$front_matter}: encountered invalid box metadata: slice is bigger than largest supported object
|
||||||
const_eval_validation_invalid_char = {$front_matter}: encountered {$value}, but expected a valid unicode scalar value (in `0..=0x10FFFF` but not in `0xD800..=0xDFFF`)
|
const_eval_validation_invalid_char = {$front_matter}: encountered {$value}, but expected a valid unicode scalar value (in `0..=0x10FFFF` but not in `0xD800..=0xDFFF`)
|
||||||
|
|
||||||
|
const_eval_validation_invalid_enum_tag = {$front_matter}: encountered {$value}, but expected a valid enum tag
|
||||||
|
const_eval_validation_invalid_fn_ptr = {$front_matter}: encountered {$value}, but expected a function pointer
|
||||||
|
const_eval_validation_invalid_ref_meta = {$front_matter}: encountered invalid reference metadata: total size is bigger than largest supported object
|
||||||
|
const_eval_validation_invalid_ref_slice_meta = {$front_matter}: encountered invalid reference metadata: slice is bigger than largest supported object
|
||||||
|
const_eval_validation_invalid_vtable_ptr = {$front_matter}: encountered {$value}, but expected a vtable pointer
|
||||||
|
const_eval_validation_mutable_ref_in_const = {$front_matter}: encountered mutable reference in a `const`
|
||||||
|
const_eval_validation_never_val = {$front_matter}: encountered a value of the never type `!`
|
||||||
|
const_eval_validation_null_box = {$front_matter}: encountered a null box
|
||||||
|
const_eval_validation_null_fn_ptr = {$front_matter}: encountered a null function pointer
|
||||||
|
const_eval_validation_null_ref = {$front_matter}: encountered a null reference
|
||||||
|
const_eval_validation_nullable_ptr_out_of_range = {$front_matter}: encountered a potentially null pointer, but expected something that cannot possibly fail to be {$in_range}
|
||||||
|
const_eval_validation_out_of_range = {$front_matter}: encountered {$value}, but expected something {$in_range}
|
||||||
|
const_eval_validation_partial_pointer = {$front_matter}: encountered a partial pointer or a mix of pointers
|
||||||
|
const_eval_validation_pointer_as_int = {$front_matter}: encountered a pointer, but {$expected}
|
||||||
|
const_eval_validation_ptr_out_of_range = {$front_matter}: encountered a pointer, but expected something that cannot possibly fail to be {$in_range}
|
||||||
|
const_eval_validation_ref_to_mut = {$front_matter}: encountered a reference pointing to mutable memory in a constant
|
||||||
|
const_eval_validation_ref_to_static = {$front_matter}: encountered a reference pointing to a static variable in a constant
|
||||||
|
const_eval_validation_ref_to_uninhabited = {$front_matter}: encountered a reference pointing to uninhabited type {$ty}
|
||||||
|
const_eval_validation_unaligned_box = {$front_matter}: encountered an unaligned box (required {$required_bytes} byte alignment but found {$found_bytes})
|
||||||
|
const_eval_validation_unaligned_ref = {$front_matter}: encountered an unaligned reference (required {$required_bytes} byte alignment but found {$found_bytes})
|
||||||
|
const_eval_validation_uninhabited_enum_variant = {$front_matter}: encountered an uninhabited enum variant
|
||||||
|
const_eval_validation_uninhabited_val = {$front_matter}: encountered a value of uninhabited type `{$ty}`
|
||||||
|
const_eval_validation_uninit = {$front_matter}: encountered uninitialized memory, but {$expected}
|
||||||
|
const_eval_validation_unsafe_cell = {$front_matter}: encountered `UnsafeCell` in a `const`
|
||||||
|
|
||||||
const_eval_write_to_read_only =
|
const_eval_write_to_read_only =
|
||||||
writing to {$allocation} which is read-only
|
writing to {$allocation} which is read-only
|
||||||
const_eval_zst_pointer_out_of_bounds =
|
const_eval_zst_pointer_out_of_bounds =
|
||||||
|
|
|
@ -513,7 +513,7 @@ impl<'a> ReportErrorExt for UndefinedBehaviorInfo<'a> {
|
||||||
ScalarSizeMismatch(_) => const_eval_scalar_size_mismatch,
|
ScalarSizeMismatch(_) => const_eval_scalar_size_mismatch,
|
||||||
UninhabitedEnumVariantWritten(_) => const_eval_uninhabited_enum_variant_written,
|
UninhabitedEnumVariantWritten(_) => const_eval_uninhabited_enum_variant_written,
|
||||||
UninhabitedEnumVariantRead(_) => const_eval_uninhabited_enum_variant_read,
|
UninhabitedEnumVariantRead(_) => const_eval_uninhabited_enum_variant_read,
|
||||||
Validation(e) => e.diagnostic_message(),
|
ValidationError(e) => e.diagnostic_message(),
|
||||||
Custom(x) => (x.msg)(),
|
Custom(x) => (x.msg)(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -587,13 +587,13 @@ impl<'a> ReportErrorExt for UndefinedBehaviorInfo<'a> {
|
||||||
InvalidUninitBytes(Some((alloc, info))) => {
|
InvalidUninitBytes(Some((alloc, info))) => {
|
||||||
builder.set_arg("alloc", alloc);
|
builder.set_arg("alloc", alloc);
|
||||||
builder.set_arg("access", info.access);
|
builder.set_arg("access", info.access);
|
||||||
builder.set_arg("uninit", info.uninit);
|
builder.set_arg("uninit", info.bad);
|
||||||
}
|
}
|
||||||
ScalarSizeMismatch(info) => {
|
ScalarSizeMismatch(info) => {
|
||||||
builder.set_arg("target_size", info.target_size);
|
builder.set_arg("target_size", info.target_size);
|
||||||
builder.set_arg("data_size", info.data_size);
|
builder.set_arg("data_size", info.data_size);
|
||||||
}
|
}
|
||||||
Validation(e) => e.add_args(handler, builder),
|
ValidationError(e) => e.add_args(handler, builder),
|
||||||
Custom(custom) => {
|
Custom(custom) => {
|
||||||
(custom.add_args)(&mut |name, value| {
|
(custom.add_args)(&mut |name, value| {
|
||||||
builder.set_arg(name, value);
|
builder.set_arg(name, value);
|
||||||
|
@ -608,74 +608,72 @@ impl<'tcx> ReportErrorExt for ValidationErrorInfo<'tcx> {
|
||||||
use crate::fluent_generated::*;
|
use crate::fluent_generated::*;
|
||||||
use rustc_middle::mir::interpret::ValidationErrorKind::*;
|
use rustc_middle::mir::interpret::ValidationErrorKind::*;
|
||||||
match self.kind {
|
match self.kind {
|
||||||
PtrToUninhabited { ptr_kind: PointerKind::Box, .. } => const_eval_box_to_uninhabited,
|
PtrToUninhabited { ptr_kind: PointerKind::Box, .. } => {
|
||||||
PtrToUninhabited { ptr_kind: PointerKind::Ref, .. } => const_eval_ref_to_uninhabited,
|
const_eval_validation_box_to_uninhabited
|
||||||
|
}
|
||||||
|
PtrToUninhabited { ptr_kind: PointerKind::Ref, .. } => {
|
||||||
|
const_eval_validation_ref_to_uninhabited
|
||||||
|
}
|
||||||
|
|
||||||
PtrToStatic { ptr_kind: PointerKind::Box } => const_eval_box_to_static,
|
PtrToStatic { ptr_kind: PointerKind::Box } => const_eval_validation_box_to_static,
|
||||||
PtrToStatic { ptr_kind: PointerKind::Ref } => const_eval_ref_to_static,
|
PtrToStatic { ptr_kind: PointerKind::Ref } => const_eval_validation_ref_to_static,
|
||||||
|
|
||||||
PtrToMut { ptr_kind: PointerKind::Box } => const_eval_box_to_mut,
|
PtrToMut { ptr_kind: PointerKind::Box } => const_eval_validation_box_to_mut,
|
||||||
PtrToMut { ptr_kind: PointerKind::Ref } => const_eval_ref_to_mut,
|
PtrToMut { ptr_kind: PointerKind::Ref } => const_eval_validation_ref_to_mut,
|
||||||
|
|
||||||
ExpectedNonPtr { .. } => const_eval_expected_non_ptr,
|
PointerAsInt { .. } => const_eval_validation_pointer_as_int,
|
||||||
MutableRefInConst => const_eval_mutable_ref_in_const,
|
PartialPointer => const_eval_validation_partial_pointer,
|
||||||
NullFnPtr => const_eval_null_fn_ptr,
|
MutableRefInConst => const_eval_validation_mutable_ref_in_const,
|
||||||
NeverVal => const_eval_never_val,
|
NullFnPtr => const_eval_validation_null_fn_ptr,
|
||||||
NullablePtrOutOfRange { .. } => const_eval_nullable_ptr_out_of_range,
|
NeverVal => const_eval_validation_never_val,
|
||||||
PtrOutOfRange { .. } => const_eval_ptr_out_of_range,
|
NullablePtrOutOfRange { .. } => const_eval_validation_nullable_ptr_out_of_range,
|
||||||
OutOfRange { .. } => const_eval_out_of_range,
|
PtrOutOfRange { .. } => const_eval_validation_ptr_out_of_range,
|
||||||
UnsafeCell => const_eval_unsafe_cell,
|
OutOfRange { .. } => const_eval_validation_out_of_range,
|
||||||
UninhabitedVal { .. } => const_eval_uninhabited_val,
|
UnsafeCell => const_eval_validation_unsafe_cell,
|
||||||
InvalidEnumTag { .. } => const_eval_invalid_enum_tag,
|
UninhabitedVal { .. } => const_eval_validation_uninhabited_val,
|
||||||
UninhabitedEnumTag => const_eval_uninhabited_enum_tag,
|
InvalidEnumTag { .. } => const_eval_validation_invalid_enum_tag,
|
||||||
UninitEnumTag => const_eval_uninit_enum_tag,
|
UninhabitedEnumVariant => const_eval_validation_uninhabited_enum_variant,
|
||||||
UninitStr => const_eval_uninit_str,
|
Uninit { .. } => const_eval_validation_uninit,
|
||||||
Uninit { expected: ExpectedKind::Bool } => const_eval_uninit_bool,
|
InvalidVTablePtr { .. } => const_eval_validation_invalid_vtable_ptr,
|
||||||
Uninit { expected: ExpectedKind::Reference } => const_eval_uninit_ref,
|
|
||||||
Uninit { expected: ExpectedKind::Box } => const_eval_uninit_box,
|
|
||||||
Uninit { expected: ExpectedKind::RawPtr } => const_eval_uninit_raw_ptr,
|
|
||||||
Uninit { expected: ExpectedKind::InitScalar } => const_eval_uninit_init_scalar,
|
|
||||||
Uninit { expected: ExpectedKind::Char } => const_eval_uninit_char,
|
|
||||||
Uninit { expected: ExpectedKind::Float } => const_eval_uninit_float,
|
|
||||||
Uninit { expected: ExpectedKind::Int } => const_eval_uninit_int,
|
|
||||||
Uninit { expected: ExpectedKind::FnPtr } => const_eval_uninit_fn_ptr,
|
|
||||||
UninitVal => const_eval_uninit,
|
|
||||||
InvalidVTablePtr { .. } => const_eval_invalid_vtable_ptr,
|
|
||||||
InvalidMetaSliceTooLarge { ptr_kind: PointerKind::Box } => {
|
InvalidMetaSliceTooLarge { ptr_kind: PointerKind::Box } => {
|
||||||
const_eval_invalid_box_slice_meta
|
const_eval_validation_invalid_box_slice_meta
|
||||||
}
|
}
|
||||||
InvalidMetaSliceTooLarge { ptr_kind: PointerKind::Ref } => {
|
InvalidMetaSliceTooLarge { ptr_kind: PointerKind::Ref } => {
|
||||||
const_eval_invalid_ref_slice_meta
|
const_eval_validation_invalid_ref_slice_meta
|
||||||
}
|
}
|
||||||
|
|
||||||
InvalidMetaTooLarge { ptr_kind: PointerKind::Box } => const_eval_invalid_box_meta,
|
InvalidMetaTooLarge { ptr_kind: PointerKind::Box } => {
|
||||||
InvalidMetaTooLarge { ptr_kind: PointerKind::Ref } => const_eval_invalid_ref_meta,
|
const_eval_validation_invalid_box_meta
|
||||||
UnalignedPtr { ptr_kind: PointerKind::Ref, .. } => const_eval_unaligned_ref,
|
}
|
||||||
UnalignedPtr { ptr_kind: PointerKind::Box, .. } => const_eval_unaligned_box,
|
InvalidMetaTooLarge { ptr_kind: PointerKind::Ref } => {
|
||||||
|
const_eval_validation_invalid_ref_meta
|
||||||
|
}
|
||||||
|
UnalignedPtr { ptr_kind: PointerKind::Ref, .. } => const_eval_validation_unaligned_ref,
|
||||||
|
UnalignedPtr { ptr_kind: PointerKind::Box, .. } => const_eval_validation_unaligned_box,
|
||||||
|
|
||||||
NullPtr { ptr_kind: PointerKind::Box } => const_eval_null_box,
|
NullPtr { ptr_kind: PointerKind::Box } => const_eval_validation_null_box,
|
||||||
NullPtr { ptr_kind: PointerKind::Ref } => const_eval_null_ref,
|
NullPtr { ptr_kind: PointerKind::Ref } => const_eval_validation_null_ref,
|
||||||
DanglingPtrNoProvenance { ptr_kind: PointerKind::Box, .. } => {
|
DanglingPtrNoProvenance { ptr_kind: PointerKind::Box, .. } => {
|
||||||
const_eval_dangling_box_no_provenance
|
const_eval_validation_dangling_box_no_provenance
|
||||||
}
|
}
|
||||||
DanglingPtrNoProvenance { ptr_kind: PointerKind::Ref, .. } => {
|
DanglingPtrNoProvenance { ptr_kind: PointerKind::Ref, .. } => {
|
||||||
const_eval_dangling_ref_no_provenance
|
const_eval_validation_dangling_ref_no_provenance
|
||||||
}
|
}
|
||||||
DanglingPtrOutOfBounds { ptr_kind: PointerKind::Box } => {
|
DanglingPtrOutOfBounds { ptr_kind: PointerKind::Box } => {
|
||||||
const_eval_dangling_box_out_of_bounds
|
const_eval_validation_dangling_box_out_of_bounds
|
||||||
}
|
}
|
||||||
DanglingPtrOutOfBounds { ptr_kind: PointerKind::Ref } => {
|
DanglingPtrOutOfBounds { ptr_kind: PointerKind::Ref } => {
|
||||||
const_eval_dangling_ref_out_of_bounds
|
const_eval_validation_dangling_ref_out_of_bounds
|
||||||
}
|
}
|
||||||
DanglingPtrUseAfterFree { ptr_kind: PointerKind::Box } => {
|
DanglingPtrUseAfterFree { ptr_kind: PointerKind::Box } => {
|
||||||
const_eval_dangling_box_use_after_free
|
const_eval_validation_dangling_box_use_after_free
|
||||||
}
|
}
|
||||||
DanglingPtrUseAfterFree { ptr_kind: PointerKind::Ref } => {
|
DanglingPtrUseAfterFree { ptr_kind: PointerKind::Ref } => {
|
||||||
const_eval_dangling_ref_use_after_free
|
const_eval_validation_dangling_ref_use_after_free
|
||||||
}
|
}
|
||||||
InvalidBool { .. } => const_eval_validation_invalid_bool,
|
InvalidBool { .. } => const_eval_validation_invalid_bool,
|
||||||
InvalidChar { .. } => const_eval_validation_invalid_char,
|
InvalidChar { .. } => const_eval_validation_invalid_char,
|
||||||
InvalidFnPtr { .. } => const_eval_invalid_fn_ptr,
|
InvalidFnPtr { .. } => const_eval_validation_invalid_fn_ptr,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -683,13 +681,21 @@ impl<'tcx> ReportErrorExt for ValidationErrorInfo<'tcx> {
|
||||||
use crate::fluent_generated as fluent;
|
use crate::fluent_generated as fluent;
|
||||||
use rustc_middle::mir::interpret::ValidationErrorKind::*;
|
use rustc_middle::mir::interpret::ValidationErrorKind::*;
|
||||||
|
|
||||||
|
if let PointerAsInt { .. } | PartialPointer = self.kind {
|
||||||
|
err.help(fluent::const_eval_ptr_as_bytes_1);
|
||||||
|
err.help(fluent::const_eval_ptr_as_bytes_2);
|
||||||
|
}
|
||||||
|
|
||||||
let message = if let Some(path) = self.path {
|
let message = if let Some(path) = self.path {
|
||||||
handler.eagerly_translate_to_string(
|
handler.eagerly_translate_to_string(
|
||||||
fluent::const_eval_invalid_value_with_path,
|
fluent::const_eval_validation_front_matter_invalid_value_with_path,
|
||||||
[("path".into(), DiagnosticArgValue::Str(path.into()))].iter().map(|(a, b)| (a, b)),
|
[("path".into(), DiagnosticArgValue::Str(path.into()))].iter().map(|(a, b)| (a, b)),
|
||||||
)
|
)
|
||||||
} else {
|
} else {
|
||||||
handler.eagerly_translate_to_string(fluent::const_eval_invalid_value, [].into_iter())
|
handler.eagerly_translate_to_string(
|
||||||
|
fluent::const_eval_validation_front_matter_invalid_value,
|
||||||
|
[].into_iter(),
|
||||||
|
)
|
||||||
};
|
};
|
||||||
|
|
||||||
err.set_arg("front_matter", message);
|
err.set_arg("front_matter", message);
|
||||||
|
@ -729,8 +735,24 @@ impl<'tcx> ReportErrorExt for ValidationErrorInfo<'tcx> {
|
||||||
PtrToUninhabited { ty, .. } | UninhabitedVal { ty } => {
|
PtrToUninhabited { ty, .. } | UninhabitedVal { ty } => {
|
||||||
err.set_arg("ty", ty);
|
err.set_arg("ty", ty);
|
||||||
}
|
}
|
||||||
ExpectedNonPtr { value }
|
PointerAsInt { expected } | Uninit { expected } => {
|
||||||
| InvalidEnumTag { value }
|
let msg = match expected {
|
||||||
|
ExpectedKind::Reference => fluent::const_eval_validation_expected_ref,
|
||||||
|
ExpectedKind::Box => fluent::const_eval_validation_expected_box,
|
||||||
|
ExpectedKind::RawPtr => fluent::const_eval_validation_expected_raw_ptr,
|
||||||
|
ExpectedKind::InitScalar => fluent::const_eval_validation_expected_init_scalar,
|
||||||
|
ExpectedKind::Bool => fluent::const_eval_validation_expected_bool,
|
||||||
|
ExpectedKind::Char => fluent::const_eval_validation_expected_char,
|
||||||
|
ExpectedKind::Float => fluent::const_eval_validation_expected_float,
|
||||||
|
ExpectedKind::Int => fluent::const_eval_validation_expected_int,
|
||||||
|
ExpectedKind::FnPtr => fluent::const_eval_validation_expected_fn_ptr,
|
||||||
|
ExpectedKind::EnumTag => fluent::const_eval_validation_expected_enum_tag,
|
||||||
|
ExpectedKind::Str => fluent::const_eval_validation_expected_str,
|
||||||
|
};
|
||||||
|
let msg = handler.eagerly_translate_to_string(msg, [].into_iter());
|
||||||
|
err.set_arg("expected", msg);
|
||||||
|
}
|
||||||
|
InvalidEnumTag { value }
|
||||||
| InvalidVTablePtr { value }
|
| InvalidVTablePtr { value }
|
||||||
| InvalidBool { value }
|
| InvalidBool { value }
|
||||||
| InvalidChar { value }
|
| InvalidChar { value }
|
||||||
|
@ -758,15 +780,12 @@ impl<'tcx> ReportErrorExt for ValidationErrorInfo<'tcx> {
|
||||||
| NullFnPtr
|
| NullFnPtr
|
||||||
| NeverVal
|
| NeverVal
|
||||||
| UnsafeCell
|
| UnsafeCell
|
||||||
| UninitEnumTag
|
|
||||||
| UninitStr
|
|
||||||
| Uninit { .. }
|
|
||||||
| UninitVal
|
|
||||||
| InvalidMetaSliceTooLarge { .. }
|
| InvalidMetaSliceTooLarge { .. }
|
||||||
| InvalidMetaTooLarge { .. }
|
| InvalidMetaTooLarge { .. }
|
||||||
| DanglingPtrUseAfterFree { .. }
|
| DanglingPtrUseAfterFree { .. }
|
||||||
| DanglingPtrOutOfBounds { .. }
|
| DanglingPtrOutOfBounds { .. }
|
||||||
| UninhabitedEnumTag => {}
|
| UninhabitedEnumVariant
|
||||||
|
| PartialPointer => {}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -776,9 +795,9 @@ impl ReportErrorExt for UnsupportedOpInfo {
|
||||||
use crate::fluent_generated::*;
|
use crate::fluent_generated::*;
|
||||||
match self {
|
match self {
|
||||||
UnsupportedOpInfo::Unsupported(s) => s.clone().into(),
|
UnsupportedOpInfo::Unsupported(s) => s.clone().into(),
|
||||||
UnsupportedOpInfo::PartialPointerOverwrite(_) => const_eval_partial_pointer_overwrite,
|
UnsupportedOpInfo::OverwritePartialPointer(_) => const_eval_partial_pointer_overwrite,
|
||||||
UnsupportedOpInfo::PartialPointerCopy(_) => const_eval_partial_pointer_copy,
|
UnsupportedOpInfo::ReadPartialPointer(_) => const_eval_partial_pointer_copy,
|
||||||
UnsupportedOpInfo::ReadPointerAsBytes => const_eval_read_pointer_as_bytes,
|
UnsupportedOpInfo::ReadPointerAsInt(_) => const_eval_read_pointer_as_int,
|
||||||
UnsupportedOpInfo::ThreadLocalStatic(_) => const_eval_thread_local_static,
|
UnsupportedOpInfo::ThreadLocalStatic(_) => const_eval_thread_local_static,
|
||||||
UnsupportedOpInfo::ReadExternStatic(_) => const_eval_read_extern_static,
|
UnsupportedOpInfo::ReadExternStatic(_) => const_eval_read_extern_static,
|
||||||
}
|
}
|
||||||
|
@ -787,13 +806,16 @@ impl ReportErrorExt for UnsupportedOpInfo {
|
||||||
use crate::fluent_generated::*;
|
use crate::fluent_generated::*;
|
||||||
|
|
||||||
use UnsupportedOpInfo::*;
|
use UnsupportedOpInfo::*;
|
||||||
if let ReadPointerAsBytes | PartialPointerOverwrite(_) | PartialPointerCopy(_) = self {
|
if let ReadPointerAsInt(_) | OverwritePartialPointer(_) | ReadPartialPointer(_) = self {
|
||||||
builder.help(const_eval_ptr_as_bytes_1);
|
builder.help(const_eval_ptr_as_bytes_1);
|
||||||
builder.help(const_eval_ptr_as_bytes_2);
|
builder.help(const_eval_ptr_as_bytes_2);
|
||||||
}
|
}
|
||||||
match self {
|
match self {
|
||||||
Unsupported(_) | ReadPointerAsBytes => {}
|
// `ReadPointerAsInt(Some(info))` is never printed anyway, it only serves as an error to
|
||||||
PartialPointerOverwrite(ptr) | PartialPointerCopy(ptr) => {
|
// be further processed by validity checking which then turns it into something nice to
|
||||||
|
// print. So it's not worth the effort of having diagnostics that can print the `info`.
|
||||||
|
Unsupported(_) | ReadPointerAsInt(_) => {}
|
||||||
|
OverwritePartialPointer(ptr) | ReadPartialPointer(ptr) => {
|
||||||
builder.set_arg("ptr", ptr);
|
builder.set_arg("ptr", ptr);
|
||||||
}
|
}
|
||||||
ThreadLocalStatic(did) | ReadExternStatic(did) => {
|
ThreadLocalStatic(did) | ReadExternStatic(did) => {
|
||||||
|
|
|
@ -25,13 +25,17 @@ use rustc_target::abi::{
|
||||||
|
|
||||||
use std::hash::Hash;
|
use std::hash::Hash;
|
||||||
|
|
||||||
// for the validation errors
|
|
||||||
use super::UndefinedBehaviorInfo::*;
|
|
||||||
use super::{
|
use super::{
|
||||||
AllocId, CheckInAllocMsg, GlobalAlloc, ImmTy, Immediate, InterpCx, InterpResult, MPlaceTy,
|
AllocId, CheckInAllocMsg, GlobalAlloc, ImmTy, Immediate, InterpCx, InterpResult, MPlaceTy,
|
||||||
Machine, MemPlaceMeta, OpTy, Pointer, Projectable, Scalar, ValueVisitor,
|
Machine, MemPlaceMeta, OpTy, Pointer, Projectable, Scalar, ValueVisitor,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// for the validation errors
|
||||||
|
use super::InterpError::UndefinedBehavior as Ub;
|
||||||
|
use super::InterpError::Unsupported as Unsup;
|
||||||
|
use super::UndefinedBehaviorInfo::*;
|
||||||
|
use super::UnsupportedOpInfo::*;
|
||||||
|
|
||||||
macro_rules! throw_validation_failure {
|
macro_rules! throw_validation_failure {
|
||||||
($where:expr, $kind: expr) => {{
|
($where:expr, $kind: expr) => {{
|
||||||
let where_ = &$where;
|
let where_ = &$where;
|
||||||
|
@ -43,7 +47,7 @@ macro_rules! throw_validation_failure {
|
||||||
None
|
None
|
||||||
};
|
};
|
||||||
|
|
||||||
throw_ub!(Validation(ValidationErrorInfo { path, kind: $kind }))
|
throw_ub!(ValidationError(ValidationErrorInfo { path, kind: $kind }))
|
||||||
}};
|
}};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -85,16 +89,16 @@ macro_rules! try_validation {
|
||||||
Ok(x) => x,
|
Ok(x) => x,
|
||||||
// We catch the error and turn it into a validation failure. We are okay with
|
// We catch the error and turn it into a validation failure. We are okay with
|
||||||
// allocation here as this can only slow down builds that fail anyway.
|
// allocation here as this can only slow down builds that fail anyway.
|
||||||
Err(e) => match e.into_parts() {
|
Err(e) => match e.kind() {
|
||||||
$(
|
$(
|
||||||
(InterpError::UndefinedBehavior($($p)|+), _) =>
|
$($p)|+ =>
|
||||||
throw_validation_failure!(
|
throw_validation_failure!(
|
||||||
$where,
|
$where,
|
||||||
$kind
|
$kind
|
||||||
)
|
)
|
||||||
),+,
|
),+,
|
||||||
#[allow(unreachable_patterns)]
|
#[allow(unreachable_patterns)]
|
||||||
(e, rest) => Err::<!, _>($crate::interpret::InterpErrorInfo::from_parts(e, rest))?,
|
_ => Err::<!, _>(e)?,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}};
|
}};
|
||||||
|
@ -294,7 +298,13 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValidityVisitor<'rt, 'mir, '
|
||||||
Ok(try_validation!(
|
Ok(try_validation!(
|
||||||
self.ecx.read_immediate(op),
|
self.ecx.read_immediate(op),
|
||||||
self.path,
|
self.path,
|
||||||
InvalidUninitBytes(None) => Uninit { expected }
|
Ub(InvalidUninitBytes(None)) =>
|
||||||
|
Uninit { expected },
|
||||||
|
// The `Unsup` cases can only occur during CTFE
|
||||||
|
Unsup(ReadPointerAsInt(_)) =>
|
||||||
|
PointerAsInt { expected },
|
||||||
|
Unsup(ReadPartialPointer(_)) =>
|
||||||
|
PartialPointer,
|
||||||
))
|
))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -319,8 +329,8 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValidityVisitor<'rt, 'mir, '
|
||||||
let (_ty, _trait) = try_validation!(
|
let (_ty, _trait) = try_validation!(
|
||||||
self.ecx.get_ptr_vtable(vtable),
|
self.ecx.get_ptr_vtable(vtable),
|
||||||
self.path,
|
self.path,
|
||||||
DanglingIntPointer(..) |
|
Ub(DanglingIntPointer(..) | InvalidVTablePointer(..)) =>
|
||||||
InvalidVTablePointer(..) => InvalidVTablePtr { value: format!("{vtable}") }
|
InvalidVTablePtr { value: format!("{vtable}") }
|
||||||
);
|
);
|
||||||
// FIXME: check if the type/trait match what ty::Dynamic says?
|
// FIXME: check if the type/trait match what ty::Dynamic says?
|
||||||
}
|
}
|
||||||
|
@ -356,7 +366,7 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValidityVisitor<'rt, 'mir, '
|
||||||
let size_and_align = try_validation!(
|
let size_and_align = try_validation!(
|
||||||
self.ecx.size_and_align_of_mplace(&place),
|
self.ecx.size_and_align_of_mplace(&place),
|
||||||
self.path,
|
self.path,
|
||||||
InvalidMeta(msg) => match msg {
|
Ub(InvalidMeta(msg)) => match msg {
|
||||||
InvalidMetaKind::SliceTooBig => InvalidMetaSliceTooLarge { ptr_kind },
|
InvalidMetaKind::SliceTooBig => InvalidMetaSliceTooLarge { ptr_kind },
|
||||||
InvalidMetaKind::TooBig => InvalidMetaTooLarge { ptr_kind },
|
InvalidMetaKind::TooBig => InvalidMetaTooLarge { ptr_kind },
|
||||||
}
|
}
|
||||||
|
@ -375,23 +385,23 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValidityVisitor<'rt, 'mir, '
|
||||||
CheckInAllocMsg::InboundsTest, // will anyway be replaced by validity message
|
CheckInAllocMsg::InboundsTest, // will anyway be replaced by validity message
|
||||||
),
|
),
|
||||||
self.path,
|
self.path,
|
||||||
AlignmentCheckFailed { required, has } => UnalignedPtr {
|
Ub(AlignmentCheckFailed { required, has }) => UnalignedPtr {
|
||||||
ptr_kind,
|
ptr_kind,
|
||||||
required_bytes: required.bytes(),
|
required_bytes: required.bytes(),
|
||||||
found_bytes: has.bytes()
|
found_bytes: has.bytes()
|
||||||
},
|
},
|
||||||
DanglingIntPointer(0, _) => NullPtr { ptr_kind },
|
Ub(DanglingIntPointer(0, _)) => NullPtr { ptr_kind },
|
||||||
DanglingIntPointer(i, _) => DanglingPtrNoProvenance {
|
Ub(DanglingIntPointer(i, _)) => DanglingPtrNoProvenance {
|
||||||
ptr_kind,
|
ptr_kind,
|
||||||
// FIXME this says "null pointer" when null but we need translate
|
// FIXME this says "null pointer" when null but we need translate
|
||||||
pointer: format!("{}", Pointer::<Option<AllocId>>::from_addr_invalid(i))
|
pointer: format!("{}", Pointer::<Option<AllocId>>::from_addr_invalid(*i))
|
||||||
},
|
},
|
||||||
PointerOutOfBounds { .. } => DanglingPtrOutOfBounds {
|
Ub(PointerOutOfBounds { .. }) => DanglingPtrOutOfBounds {
|
||||||
ptr_kind
|
ptr_kind
|
||||||
},
|
},
|
||||||
// This cannot happen during const-eval (because interning already detects
|
// This cannot happen during const-eval (because interning already detects
|
||||||
// dangling pointers), but it can happen in Miri.
|
// dangling pointers), but it can happen in Miri.
|
||||||
PointerUseAfterFree(..) => DanglingPtrUseAfterFree {
|
Ub(PointerUseAfterFree(..)) => DanglingPtrUseAfterFree {
|
||||||
ptr_kind,
|
ptr_kind,
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
|
@ -477,7 +487,7 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValidityVisitor<'rt, 'mir, '
|
||||||
try_validation!(
|
try_validation!(
|
||||||
value.to_bool(),
|
value.to_bool(),
|
||||||
self.path,
|
self.path,
|
||||||
InvalidBool(..) => ValidationErrorKind::InvalidBool {
|
Ub(InvalidBool(..)) => ValidationErrorKind::InvalidBool {
|
||||||
value: format!("{value:x}"),
|
value: format!("{value:x}"),
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
|
@ -488,7 +498,7 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValidityVisitor<'rt, 'mir, '
|
||||||
try_validation!(
|
try_validation!(
|
||||||
value.to_char(),
|
value.to_char(),
|
||||||
self.path,
|
self.path,
|
||||||
InvalidChar(..) => ValidationErrorKind::InvalidChar {
|
Ub(InvalidChar(..)) => ValidationErrorKind::InvalidChar {
|
||||||
value: format!("{value:x}"),
|
value: format!("{value:x}"),
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
|
@ -497,7 +507,7 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValidityVisitor<'rt, 'mir, '
|
||||||
ty::Float(_) | ty::Int(_) | ty::Uint(_) => {
|
ty::Float(_) | ty::Int(_) | ty::Uint(_) => {
|
||||||
// NOTE: Keep this in sync with the array optimization for int/float
|
// NOTE: Keep this in sync with the array optimization for int/float
|
||||||
// types below!
|
// types below!
|
||||||
let value = self.read_scalar(
|
self.read_scalar(
|
||||||
value,
|
value,
|
||||||
if matches!(ty.kind(), ty::Float(..)) {
|
if matches!(ty.kind(), ty::Float(..)) {
|
||||||
ExpectedKind::Float
|
ExpectedKind::Float
|
||||||
|
@ -505,14 +515,6 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValidityVisitor<'rt, 'mir, '
|
||||||
ExpectedKind::Int
|
ExpectedKind::Int
|
||||||
},
|
},
|
||||||
)?;
|
)?;
|
||||||
// As a special exception we *do* match on a `Scalar` here, since we truly want
|
|
||||||
// to know its underlying representation (and *not* cast it to an integer).
|
|
||||||
if matches!(value, Scalar::Ptr(..)) {
|
|
||||||
throw_validation_failure!(
|
|
||||||
self.path,
|
|
||||||
ExpectedNonPtr { value: format!("{value:x}") }
|
|
||||||
)
|
|
||||||
}
|
|
||||||
Ok(true)
|
Ok(true)
|
||||||
}
|
}
|
||||||
ty::RawPtr(..) => {
|
ty::RawPtr(..) => {
|
||||||
|
@ -546,10 +548,8 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValidityVisitor<'rt, 'mir, '
|
||||||
let _fn = try_validation!(
|
let _fn = try_validation!(
|
||||||
self.ecx.get_ptr_fn(ptr),
|
self.ecx.get_ptr_fn(ptr),
|
||||||
self.path,
|
self.path,
|
||||||
DanglingIntPointer(..) |
|
Ub(DanglingIntPointer(..) | InvalidFunctionPointer(..)) =>
|
||||||
InvalidFunctionPointer(..) => InvalidFnPtr {
|
InvalidFnPtr { value: format!("{ptr}") },
|
||||||
value: format!("{ptr}"),
|
|
||||||
},
|
|
||||||
);
|
);
|
||||||
// FIXME: Check if the signature matches
|
// FIXME: Check if the signature matches
|
||||||
} else {
|
} else {
|
||||||
|
@ -657,11 +657,12 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValueVisitor<'mir, 'tcx, M>
|
||||||
Ok(try_validation!(
|
Ok(try_validation!(
|
||||||
this.ecx.read_discriminant(op),
|
this.ecx.read_discriminant(op),
|
||||||
this.path,
|
this.path,
|
||||||
InvalidTag(val) => InvalidEnumTag {
|
Ub(InvalidTag(val)) => InvalidEnumTag {
|
||||||
value: format!("{val:x}"),
|
value: format!("{val:x}"),
|
||||||
},
|
},
|
||||||
UninhabitedEnumVariantRead(_) => UninhabitedEnumTag,
|
Ub(UninhabitedEnumVariantRead(_)) => UninhabitedEnumVariant,
|
||||||
InvalidUninitBytes(None) => UninitEnumTag,
|
// Uninit / bad provenance are not possible since the field was already previously
|
||||||
|
// checked at its integer type.
|
||||||
))
|
))
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
@ -740,7 +741,8 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValueVisitor<'mir, 'tcx, M>
|
||||||
try_validation!(
|
try_validation!(
|
||||||
self.ecx.read_bytes_ptr_strip_provenance(mplace.ptr, Size::from_bytes(len)),
|
self.ecx.read_bytes_ptr_strip_provenance(mplace.ptr, Size::from_bytes(len)),
|
||||||
self.path,
|
self.path,
|
||||||
InvalidUninitBytes(..) => { UninitStr },
|
Ub(InvalidUninitBytes(..)) => Uninit { expected: ExpectedKind::Str },
|
||||||
|
Unsup(ReadPointerAsInt(_)) => PointerAsInt { expected: ExpectedKind::Str }
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
ty::Array(tys, ..) | ty::Slice(tys)
|
ty::Array(tys, ..) | ty::Slice(tys)
|
||||||
|
@ -752,6 +754,7 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValueVisitor<'mir, 'tcx, M>
|
||||||
if matches!(tys.kind(), ty::Int(..) | ty::Uint(..) | ty::Float(..))
|
if matches!(tys.kind(), ty::Int(..) | ty::Uint(..) | ty::Float(..))
|
||||||
=>
|
=>
|
||||||
{
|
{
|
||||||
|
let expected = if tys.is_integral() { ExpectedKind::Int } else { ExpectedKind::Float };
|
||||||
// Optimized handling for arrays of integer/float type.
|
// Optimized handling for arrays of integer/float type.
|
||||||
|
|
||||||
// This is the length of the array/slice.
|
// This is the length of the array/slice.
|
||||||
|
@ -770,7 +773,7 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValueVisitor<'mir, 'tcx, M>
|
||||||
Left(mplace) => mplace,
|
Left(mplace) => mplace,
|
||||||
Right(imm) => match *imm {
|
Right(imm) => match *imm {
|
||||||
Immediate::Uninit =>
|
Immediate::Uninit =>
|
||||||
throw_validation_failure!(self.path, UninitVal),
|
throw_validation_failure!(self.path, Uninit { expected }),
|
||||||
Immediate::Scalar(..) | Immediate::ScalarPair(..) =>
|
Immediate::Scalar(..) | Immediate::ScalarPair(..) =>
|
||||||
bug!("arrays/slices can never have Scalar/ScalarPair layout"),
|
bug!("arrays/slices can never have Scalar/ScalarPair layout"),
|
||||||
}
|
}
|
||||||
|
@ -796,17 +799,21 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValueVisitor<'mir, 'tcx, M>
|
||||||
// For some errors we might be able to provide extra information.
|
// For some errors we might be able to provide extra information.
|
||||||
// (This custom logic does not fit the `try_validation!` macro.)
|
// (This custom logic does not fit the `try_validation!` macro.)
|
||||||
match err.kind() {
|
match err.kind() {
|
||||||
err_ub!(InvalidUninitBytes(Some((_alloc_id, access)))) => {
|
Ub(InvalidUninitBytes(Some((_alloc_id, access)))) | Unsup(ReadPointerAsInt(Some((_alloc_id, access)))) => {
|
||||||
// Some byte was uninitialized, determine which
|
// Some byte was uninitialized, determine which
|
||||||
// element that byte belongs to so we can
|
// element that byte belongs to so we can
|
||||||
// provide an index.
|
// provide an index.
|
||||||
let i = usize::try_from(
|
let i = usize::try_from(
|
||||||
access.uninit.start.bytes() / layout.size.bytes(),
|
access.bad.start.bytes() / layout.size.bytes(),
|
||||||
)
|
)
|
||||||
.unwrap();
|
.unwrap();
|
||||||
self.path.push(PathElem::ArrayElem(i));
|
self.path.push(PathElem::ArrayElem(i));
|
||||||
|
|
||||||
throw_validation_failure!(self.path, UninitVal)
|
if matches!(err.kind(), Ub(InvalidUninitBytes(_))) {
|
||||||
|
throw_validation_failure!(self.path, Uninit { expected })
|
||||||
|
} else {
|
||||||
|
throw_validation_failure!(self.path, PointerAsInt { expected })
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Propagate upwards (that will also check for unexpected errors).
|
// Propagate upwards (that will also check for unexpected errors).
|
||||||
|
@ -892,17 +899,22 @@ impl<'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> InterpCx<'mir, 'tcx, M> {
|
||||||
// Run it.
|
// Run it.
|
||||||
match visitor.visit_value(&op) {
|
match visitor.visit_value(&op) {
|
||||||
Ok(()) => Ok(()),
|
Ok(()) => Ok(()),
|
||||||
// Pass through validation failures.
|
// Pass through validation failures and "invalid program" issues.
|
||||||
Err(err) if matches!(err.kind(), err_ub!(Validation { .. })) => Err(err),
|
Err(err)
|
||||||
// Complain about any other kind of UB error -- those are bad because we'd like to
|
if matches!(
|
||||||
|
err.kind(),
|
||||||
|
err_ub!(ValidationError { .. }) | InterpError::InvalidProgram(_)
|
||||||
|
) =>
|
||||||
|
{
|
||||||
|
Err(err)
|
||||||
|
}
|
||||||
|
// Complain about any other kind of error -- those are bad because we'd like to
|
||||||
// report them in a way that shows *where* in the value the issue lies.
|
// report them in a way that shows *where* in the value the issue lies.
|
||||||
Err(err) if matches!(err.kind(), InterpError::UndefinedBehavior(_)) => {
|
Err(err) => {
|
||||||
let (err, backtrace) = err.into_parts();
|
let (err, backtrace) = err.into_parts();
|
||||||
backtrace.print_backtrace();
|
backtrace.print_backtrace();
|
||||||
bug!("Unexpected Undefined Behavior error during validation: {err:?}");
|
bug!("Unexpected Undefined Behavior error during validation: {err:?}");
|
||||||
}
|
}
|
||||||
// Pass through everything else.
|
|
||||||
Err(err) => Err(err),
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -18,9 +18,9 @@ use rustc_span::DUMMY_SP;
|
||||||
use rustc_target::abi::{Align, HasDataLayout, Size};
|
use rustc_target::abi::{Align, HasDataLayout, Size};
|
||||||
|
|
||||||
use super::{
|
use super::{
|
||||||
read_target_uint, write_target_uint, AllocId, InterpError, InterpResult, Pointer, Provenance,
|
read_target_uint, write_target_uint, AllocId, BadBytesAccess, InterpError, InterpResult,
|
||||||
ResourceExhaustionInfo, Scalar, ScalarSizeMismatch, UndefinedBehaviorInfo, UninitBytesAccess,
|
Pointer, PointerArithmetic, Provenance, ResourceExhaustionInfo, Scalar, ScalarSizeMismatch,
|
||||||
UnsupportedOpInfo,
|
UndefinedBehaviorInfo, UnsupportedOpInfo,
|
||||||
};
|
};
|
||||||
use crate::ty;
|
use crate::ty;
|
||||||
use init_mask::*;
|
use init_mask::*;
|
||||||
|
@ -173,13 +173,13 @@ pub enum AllocError {
|
||||||
/// A scalar had the wrong size.
|
/// A scalar had the wrong size.
|
||||||
ScalarSizeMismatch(ScalarSizeMismatch),
|
ScalarSizeMismatch(ScalarSizeMismatch),
|
||||||
/// Encountered a pointer where we needed raw bytes.
|
/// Encountered a pointer where we needed raw bytes.
|
||||||
ReadPointerAsBytes,
|
ReadPointerAsInt(Option<BadBytesAccess>),
|
||||||
/// Partially overwriting a pointer.
|
/// Partially overwriting a pointer.
|
||||||
PartialPointerOverwrite(Size),
|
OverwritePartialPointer(Size),
|
||||||
/// Partially copying a pointer.
|
/// Partially copying a pointer.
|
||||||
PartialPointerCopy(Size),
|
ReadPartialPointer(Size),
|
||||||
/// Using uninitialized data where it is not allowed.
|
/// Using uninitialized data where it is not allowed.
|
||||||
InvalidUninitBytes(Option<UninitBytesAccess>),
|
InvalidUninitBytes(Option<BadBytesAccess>),
|
||||||
}
|
}
|
||||||
pub type AllocResult<T = ()> = Result<T, AllocError>;
|
pub type AllocResult<T = ()> = Result<T, AllocError>;
|
||||||
|
|
||||||
|
@ -196,12 +196,14 @@ impl AllocError {
|
||||||
ScalarSizeMismatch(s) => {
|
ScalarSizeMismatch(s) => {
|
||||||
InterpError::UndefinedBehavior(UndefinedBehaviorInfo::ScalarSizeMismatch(s))
|
InterpError::UndefinedBehavior(UndefinedBehaviorInfo::ScalarSizeMismatch(s))
|
||||||
}
|
}
|
||||||
ReadPointerAsBytes => InterpError::Unsupported(UnsupportedOpInfo::ReadPointerAsBytes),
|
ReadPointerAsInt(info) => InterpError::Unsupported(
|
||||||
PartialPointerOverwrite(offset) => InterpError::Unsupported(
|
UnsupportedOpInfo::ReadPointerAsInt(info.map(|b| (alloc_id, b))),
|
||||||
UnsupportedOpInfo::PartialPointerOverwrite(Pointer::new(alloc_id, offset)),
|
|
||||||
),
|
),
|
||||||
PartialPointerCopy(offset) => InterpError::Unsupported(
|
OverwritePartialPointer(offset) => InterpError::Unsupported(
|
||||||
UnsupportedOpInfo::PartialPointerCopy(Pointer::new(alloc_id, offset)),
|
UnsupportedOpInfo::OverwritePartialPointer(Pointer::new(alloc_id, offset)),
|
||||||
|
),
|
||||||
|
ReadPartialPointer(offset) => InterpError::Unsupported(
|
||||||
|
UnsupportedOpInfo::ReadPartialPointer(Pointer::new(alloc_id, offset)),
|
||||||
),
|
),
|
||||||
InvalidUninitBytes(info) => InterpError::UndefinedBehavior(
|
InvalidUninitBytes(info) => InterpError::UndefinedBehavior(
|
||||||
UndefinedBehaviorInfo::InvalidUninitBytes(info.map(|b| (alloc_id, b))),
|
UndefinedBehaviorInfo::InvalidUninitBytes(info.map(|b| (alloc_id, b))),
|
||||||
|
@ -433,14 +435,26 @@ impl<Prov: Provenance, Extra, Bytes: AllocBytes> Allocation<Prov, Extra, Bytes>
|
||||||
range: AllocRange,
|
range: AllocRange,
|
||||||
) -> AllocResult<&[u8]> {
|
) -> AllocResult<&[u8]> {
|
||||||
self.init_mask.is_range_initialized(range).map_err(|uninit_range| {
|
self.init_mask.is_range_initialized(range).map_err(|uninit_range| {
|
||||||
AllocError::InvalidUninitBytes(Some(UninitBytesAccess {
|
AllocError::InvalidUninitBytes(Some(BadBytesAccess {
|
||||||
access: range,
|
access: range,
|
||||||
uninit: uninit_range,
|
bad: uninit_range,
|
||||||
}))
|
}))
|
||||||
})?;
|
})?;
|
||||||
if !Prov::OFFSET_IS_ADDR {
|
if !Prov::OFFSET_IS_ADDR {
|
||||||
if !self.provenance.range_empty(range, cx) {
|
if !self.provenance.range_empty(range, cx) {
|
||||||
return Err(AllocError::ReadPointerAsBytes);
|
// Find the provenance.
|
||||||
|
let (offset, _prov) = self
|
||||||
|
.provenance
|
||||||
|
.range_get_ptrs(range, cx)
|
||||||
|
.first()
|
||||||
|
.copied()
|
||||||
|
.expect("there must be provenance somewhere here");
|
||||||
|
let start = offset.max(range.start); // the pointer might begin before `range`!
|
||||||
|
let end = (offset + cx.pointer_size()).min(range.end()); // the pointer might end after `range`!
|
||||||
|
return Err(AllocError::ReadPointerAsInt(Some(BadBytesAccess {
|
||||||
|
access: range,
|
||||||
|
bad: AllocRange::from(start..end),
|
||||||
|
})));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Ok(self.get_bytes_unchecked(range))
|
Ok(self.get_bytes_unchecked(range))
|
||||||
|
@ -536,23 +550,25 @@ impl<Prov: Provenance, Extra, Bytes: AllocBytes> Allocation<Prov, Extra, Bytes>
|
||||||
// Now use this provenance.
|
// Now use this provenance.
|
||||||
let ptr = Pointer::new(prov, Size::from_bytes(bits));
|
let ptr = Pointer::new(prov, Size::from_bytes(bits));
|
||||||
return Ok(Scalar::from_maybe_pointer(ptr, cx));
|
return Ok(Scalar::from_maybe_pointer(ptr, cx));
|
||||||
|
} else {
|
||||||
|
// Without OFFSET_IS_ADDR, the only remaining case we can handle is total absence of
|
||||||
|
// provenance.
|
||||||
|
if self.provenance.range_empty(range, cx) {
|
||||||
|
return Ok(Scalar::from_uint(bits, range.size));
|
||||||
|
}
|
||||||
|
// Else we have mixed provenance, that doesn't work.
|
||||||
|
return Err(AllocError::ReadPartialPointer(range.start));
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
// We are *not* reading a pointer.
|
// We are *not* reading a pointer.
|
||||||
// If we can just ignore provenance, do exactly that.
|
// If we can just ignore provenance or there is none, that's easy.
|
||||||
if Prov::OFFSET_IS_ADDR {
|
if Prov::OFFSET_IS_ADDR || self.provenance.range_empty(range, cx) {
|
||||||
// We just strip provenance.
|
// We just strip provenance.
|
||||||
return Ok(Scalar::from_uint(bits, range.size));
|
return Ok(Scalar::from_uint(bits, range.size));
|
||||||
}
|
}
|
||||||
|
// There is some provenance and we don't have OFFSET_IS_ADDR. This doesn't work.
|
||||||
|
return Err(AllocError::ReadPointerAsInt(None));
|
||||||
}
|
}
|
||||||
|
|
||||||
// Fallback path for when we cannot treat provenance bytewise or ignore it.
|
|
||||||
assert!(!Prov::OFFSET_IS_ADDR);
|
|
||||||
if !self.provenance.range_empty(range, cx) {
|
|
||||||
return Err(AllocError::ReadPointerAsBytes);
|
|
||||||
}
|
|
||||||
// There is no provenance, we can just return the bits.
|
|
||||||
Ok(Scalar::from_uint(bits, range.size))
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Writes a *non-ZST* scalar.
|
/// Writes a *non-ZST* scalar.
|
||||||
|
|
|
@ -66,7 +66,11 @@ impl<Prov: Provenance> ProvenanceMap<Prov> {
|
||||||
/// Returns all ptr-sized provenance in the given range.
|
/// Returns all ptr-sized provenance in the given range.
|
||||||
/// If the range has length 0, returns provenance that crosses the edge between `start-1` and
|
/// If the range has length 0, returns provenance that crosses the edge between `start-1` and
|
||||||
/// `start`.
|
/// `start`.
|
||||||
fn range_get_ptrs(&self, range: AllocRange, cx: &impl HasDataLayout) -> &[(Size, Prov)] {
|
pub(super) fn range_get_ptrs(
|
||||||
|
&self,
|
||||||
|
range: AllocRange,
|
||||||
|
cx: &impl HasDataLayout,
|
||||||
|
) -> &[(Size, Prov)] {
|
||||||
// We have to go back `pointer_size - 1` bytes, as that one would still overlap with
|
// We have to go back `pointer_size - 1` bytes, as that one would still overlap with
|
||||||
// the beginning of this range.
|
// the beginning of this range.
|
||||||
let adjusted_start = Size::from_bytes(
|
let adjusted_start = Size::from_bytes(
|
||||||
|
@ -158,7 +162,7 @@ impl<Prov: Provenance> ProvenanceMap<Prov> {
|
||||||
if first < start {
|
if first < start {
|
||||||
if !Prov::OFFSET_IS_ADDR {
|
if !Prov::OFFSET_IS_ADDR {
|
||||||
// We can't split up the provenance into less than a pointer.
|
// We can't split up the provenance into less than a pointer.
|
||||||
return Err(AllocError::PartialPointerOverwrite(first));
|
return Err(AllocError::OverwritePartialPointer(first));
|
||||||
}
|
}
|
||||||
// Insert the remaining part in the bytewise provenance.
|
// Insert the remaining part in the bytewise provenance.
|
||||||
let prov = self.ptrs[&first];
|
let prov = self.ptrs[&first];
|
||||||
|
@ -171,7 +175,7 @@ impl<Prov: Provenance> ProvenanceMap<Prov> {
|
||||||
let begin_of_last = last - cx.data_layout().pointer_size;
|
let begin_of_last = last - cx.data_layout().pointer_size;
|
||||||
if !Prov::OFFSET_IS_ADDR {
|
if !Prov::OFFSET_IS_ADDR {
|
||||||
// We can't split up the provenance into less than a pointer.
|
// We can't split up the provenance into less than a pointer.
|
||||||
return Err(AllocError::PartialPointerOverwrite(begin_of_last));
|
return Err(AllocError::OverwritePartialPointer(begin_of_last));
|
||||||
}
|
}
|
||||||
// Insert the remaining part in the bytewise provenance.
|
// Insert the remaining part in the bytewise provenance.
|
||||||
let prov = self.ptrs[&begin_of_last];
|
let prov = self.ptrs[&begin_of_last];
|
||||||
|
@ -246,10 +250,10 @@ impl<Prov: Provenance> ProvenanceMap<Prov> {
|
||||||
if !Prov::OFFSET_IS_ADDR {
|
if !Prov::OFFSET_IS_ADDR {
|
||||||
// There can't be any bytewise provenance, and we cannot split up the begin/end overlap.
|
// There can't be any bytewise provenance, and we cannot split up the begin/end overlap.
|
||||||
if let Some(entry) = begin_overlap {
|
if let Some(entry) = begin_overlap {
|
||||||
return Err(AllocError::PartialPointerCopy(entry.0));
|
return Err(AllocError::ReadPartialPointer(entry.0));
|
||||||
}
|
}
|
||||||
if let Some(entry) = end_overlap {
|
if let Some(entry) = end_overlap {
|
||||||
return Err(AllocError::PartialPointerCopy(entry.0));
|
return Err(AllocError::ReadPartialPointer(entry.0));
|
||||||
}
|
}
|
||||||
debug_assert!(self.bytes.is_none());
|
debug_assert!(self.bytes.is_none());
|
||||||
} else {
|
} else {
|
||||||
|
|
|
@ -134,10 +134,6 @@ impl InterpErrorBacktrace {
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<'tcx> InterpErrorInfo<'tcx> {
|
impl<'tcx> InterpErrorInfo<'tcx> {
|
||||||
pub fn from_parts(kind: InterpError<'tcx>, backtrace: InterpErrorBacktrace) -> Self {
|
|
||||||
Self(Box::new(InterpErrorInfoInner { kind, backtrace }))
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn into_parts(self) -> (InterpError<'tcx>, InterpErrorBacktrace) {
|
pub fn into_parts(self) -> (InterpError<'tcx>, InterpErrorBacktrace) {
|
||||||
let InterpErrorInfo(box InterpErrorInfoInner { kind, backtrace }) = self;
|
let InterpErrorInfo(box InterpErrorInfoInner { kind, backtrace }) = self;
|
||||||
(kind, backtrace)
|
(kind, backtrace)
|
||||||
|
@ -226,13 +222,13 @@ impl IntoDiagnosticArg for InvalidMetaKind {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Details of an access to uninitialized bytes where it is not allowed.
|
/// Details of an access to uninitialized bytes / bad pointer bytes where it is not allowed.
|
||||||
#[derive(Debug, Clone, Copy)]
|
#[derive(Debug, Clone, Copy)]
|
||||||
pub struct UninitBytesAccess {
|
pub struct BadBytesAccess {
|
||||||
/// Range of the original memory access.
|
/// Range of the original memory access.
|
||||||
pub access: AllocRange,
|
pub access: AllocRange,
|
||||||
/// Range of the uninit memory that was encountered. (Might not be maximal.)
|
/// Range of the bad memory that was encountered. (Might not be maximal.)
|
||||||
pub uninit: AllocRange,
|
pub bad: AllocRange,
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Information about a size mismatch.
|
/// Information about a size mismatch.
|
||||||
|
@ -316,7 +312,7 @@ pub enum UndefinedBehaviorInfo<'a> {
|
||||||
/// Using a string that is not valid UTF-8,
|
/// Using a string that is not valid UTF-8,
|
||||||
InvalidStr(std::str::Utf8Error),
|
InvalidStr(std::str::Utf8Error),
|
||||||
/// Using uninitialized data where it is not allowed.
|
/// Using uninitialized data where it is not allowed.
|
||||||
InvalidUninitBytes(Option<(AllocId, UninitBytesAccess)>),
|
InvalidUninitBytes(Option<(AllocId, BadBytesAccess)>),
|
||||||
/// Working with a local that is not currently live.
|
/// Working with a local that is not currently live.
|
||||||
DeadLocal,
|
DeadLocal,
|
||||||
/// Data size is not equal to target size.
|
/// Data size is not equal to target size.
|
||||||
|
@ -326,7 +322,7 @@ pub enum UndefinedBehaviorInfo<'a> {
|
||||||
/// An uninhabited enum variant is projected.
|
/// An uninhabited enum variant is projected.
|
||||||
UninhabitedEnumVariantRead(VariantIdx),
|
UninhabitedEnumVariantRead(VariantIdx),
|
||||||
/// Validation error.
|
/// Validation error.
|
||||||
Validation(ValidationErrorInfo<'a>),
|
ValidationError(ValidationErrorInfo<'a>),
|
||||||
// FIXME(fee1-dead) these should all be actual variants of the enum instead of dynamically
|
// FIXME(fee1-dead) these should all be actual variants of the enum instead of dynamically
|
||||||
// dispatched
|
// dispatched
|
||||||
/// A custom (free-form) error, created by `err_ub_custom!`.
|
/// A custom (free-form) error, created by `err_ub_custom!`.
|
||||||
|
@ -368,6 +364,8 @@ pub enum ExpectedKind {
|
||||||
Float,
|
Float,
|
||||||
Int,
|
Int,
|
||||||
FnPtr,
|
FnPtr,
|
||||||
|
EnumTag,
|
||||||
|
Str,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<PointerKind> for ExpectedKind {
|
impl From<PointerKind> for ExpectedKind {
|
||||||
|
@ -381,10 +379,11 @@ impl From<PointerKind> for ExpectedKind {
|
||||||
|
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
pub enum ValidationErrorKind<'tcx> {
|
pub enum ValidationErrorKind<'tcx> {
|
||||||
|
PointerAsInt { expected: ExpectedKind },
|
||||||
|
PartialPointer,
|
||||||
PtrToUninhabited { ptr_kind: PointerKind, ty: Ty<'tcx> },
|
PtrToUninhabited { ptr_kind: PointerKind, ty: Ty<'tcx> },
|
||||||
PtrToStatic { ptr_kind: PointerKind },
|
PtrToStatic { ptr_kind: PointerKind },
|
||||||
PtrToMut { ptr_kind: PointerKind },
|
PtrToMut { ptr_kind: PointerKind },
|
||||||
ExpectedNonPtr { value: String },
|
|
||||||
MutableRefInConst,
|
MutableRefInConst,
|
||||||
NullFnPtr,
|
NullFnPtr,
|
||||||
NeverVal,
|
NeverVal,
|
||||||
|
@ -394,11 +393,8 @@ pub enum ValidationErrorKind<'tcx> {
|
||||||
UnsafeCell,
|
UnsafeCell,
|
||||||
UninhabitedVal { ty: Ty<'tcx> },
|
UninhabitedVal { ty: Ty<'tcx> },
|
||||||
InvalidEnumTag { value: String },
|
InvalidEnumTag { value: String },
|
||||||
UninhabitedEnumTag,
|
UninhabitedEnumVariant,
|
||||||
UninitEnumTag,
|
|
||||||
UninitStr,
|
|
||||||
Uninit { expected: ExpectedKind },
|
Uninit { expected: ExpectedKind },
|
||||||
UninitVal,
|
|
||||||
InvalidVTablePtr { value: String },
|
InvalidVTablePtr { value: String },
|
||||||
InvalidMetaSliceTooLarge { ptr_kind: PointerKind },
|
InvalidMetaSliceTooLarge { ptr_kind: PointerKind },
|
||||||
InvalidMetaTooLarge { ptr_kind: PointerKind },
|
InvalidMetaTooLarge { ptr_kind: PointerKind },
|
||||||
|
@ -426,12 +422,12 @@ pub enum UnsupportedOpInfo {
|
||||||
//
|
//
|
||||||
/// Overwriting parts of a pointer; without knowing absolute addresses, the resulting state
|
/// Overwriting parts of a pointer; without knowing absolute addresses, the resulting state
|
||||||
/// cannot be represented by the CTFE interpreter.
|
/// cannot be represented by the CTFE interpreter.
|
||||||
PartialPointerOverwrite(Pointer<AllocId>),
|
OverwritePartialPointer(Pointer<AllocId>),
|
||||||
/// Attempting to `copy` parts of a pointer to somewhere else; without knowing absolute
|
/// Attempting to read or copy parts of a pointer to somewhere else; without knowing absolute
|
||||||
/// addresses, the resulting state cannot be represented by the CTFE interpreter.
|
/// addresses, the resulting state cannot be represented by the CTFE interpreter.
|
||||||
PartialPointerCopy(Pointer<AllocId>),
|
ReadPartialPointer(Pointer<AllocId>),
|
||||||
/// Encountered a pointer where we needed raw bytes.
|
/// Encountered a pointer where we needed an integer.
|
||||||
ReadPointerAsBytes,
|
ReadPointerAsInt(Option<(AllocId, BadBytesAccess)>),
|
||||||
/// Accessing thread local statics
|
/// Accessing thread local statics
|
||||||
ThreadLocalStatic(DefId),
|
ThreadLocalStatic(DefId),
|
||||||
/// Accessing an unsupported extern static.
|
/// Accessing an unsupported extern static.
|
||||||
|
@ -497,7 +493,7 @@ impl InterpError<'_> {
|
||||||
matches!(
|
matches!(
|
||||||
self,
|
self,
|
||||||
InterpError::Unsupported(UnsupportedOpInfo::Unsupported(_))
|
InterpError::Unsupported(UnsupportedOpInfo::Unsupported(_))
|
||||||
| InterpError::UndefinedBehavior(UndefinedBehaviorInfo::Validation { .. })
|
| InterpError::UndefinedBehavior(UndefinedBehaviorInfo::ValidationError { .. })
|
||||||
| InterpError::UndefinedBehavior(UndefinedBehaviorInfo::Ub(_))
|
| InterpError::UndefinedBehavior(UndefinedBehaviorInfo::Ub(_))
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
|
@ -142,11 +142,11 @@ use crate::ty::GenericArgKind;
|
||||||
use crate::ty::{self, Instance, Ty, TyCtxt};
|
use crate::ty::{self, Instance, Ty, TyCtxt};
|
||||||
|
|
||||||
pub use self::error::{
|
pub use self::error::{
|
||||||
struct_error, CheckInAllocMsg, ErrorHandled, EvalToAllocationRawResult, EvalToConstValueResult,
|
struct_error, BadBytesAccess, CheckInAllocMsg, ErrorHandled, EvalToAllocationRawResult,
|
||||||
EvalToValTreeResult, ExpectedKind, InterpError, InterpErrorInfo, InterpResult, InvalidMetaKind,
|
EvalToConstValueResult, EvalToValTreeResult, ExpectedKind, InterpError, InterpErrorInfo,
|
||||||
InvalidProgramInfo, MachineStopType, PointerKind, ReportedErrorInfo, ResourceExhaustionInfo,
|
InterpResult, InvalidMetaKind, InvalidProgramInfo, MachineStopType, PointerKind,
|
||||||
ScalarSizeMismatch, UndefinedBehaviorInfo, UninitBytesAccess, UnsupportedOpInfo,
|
ReportedErrorInfo, ResourceExhaustionInfo, ScalarSizeMismatch, UndefinedBehaviorInfo,
|
||||||
ValidationErrorInfo, ValidationErrorKind,
|
UnsupportedOpInfo, ValidationErrorInfo, ValidationErrorKind,
|
||||||
};
|
};
|
||||||
|
|
||||||
pub use self::value::{get_slice_bytes, ConstAlloc, ConstValue, Scalar};
|
pub use self::value::{get_slice_bytes, ConstAlloc, ConstValue, Scalar};
|
||||||
|
|
|
@ -378,15 +378,16 @@ impl<'tcx, Prov: Provenance> Scalar<Prov> {
|
||||||
#[inline]
|
#[inline]
|
||||||
pub fn to_bits(self, target_size: Size) -> InterpResult<'tcx, u128> {
|
pub fn to_bits(self, target_size: Size) -> InterpResult<'tcx, u128> {
|
||||||
assert_ne!(target_size.bytes(), 0, "you should never look at the bits of a ZST");
|
assert_ne!(target_size.bytes(), 0, "you should never look at the bits of a ZST");
|
||||||
self.try_to_int().map_err(|_| err_unsup!(ReadPointerAsBytes))?.to_bits(target_size).map_err(
|
self.try_to_int()
|
||||||
|size| {
|
.map_err(|_| err_unsup!(ReadPointerAsInt(None)))?
|
||||||
|
.to_bits(target_size)
|
||||||
|
.map_err(|size| {
|
||||||
err_ub!(ScalarSizeMismatch(ScalarSizeMismatch {
|
err_ub!(ScalarSizeMismatch(ScalarSizeMismatch {
|
||||||
target_size: target_size.bytes(),
|
target_size: target_size.bytes(),
|
||||||
data_size: size.bytes(),
|
data_size: size.bytes(),
|
||||||
}))
|
}))
|
||||||
.into()
|
.into()
|
||||||
},
|
})
|
||||||
)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#[inline(always)]
|
#[inline(always)]
|
||||||
|
|
|
@ -273,6 +273,8 @@ pub fn report_error<'tcx, 'mir>(
|
||||||
} else {
|
} else {
|
||||||
#[rustfmt::skip]
|
#[rustfmt::skip]
|
||||||
let title = match e.kind() {
|
let title = match e.kind() {
|
||||||
|
UndefinedBehavior(UndefinedBehaviorInfo::ValidationError(e)) if matches!(e.kind, ValidationErrorKind::PointerAsInt { .. } | ValidationErrorKind::PartialPointer) =>
|
||||||
|
bug!("This validation error should be impossible in Miri: {:?}", e.kind),
|
||||||
UndefinedBehavior(_) =>
|
UndefinedBehavior(_) =>
|
||||||
"Undefined Behavior",
|
"Undefined Behavior",
|
||||||
ResourceExhaustion(_) =>
|
ResourceExhaustion(_) =>
|
||||||
|
@ -377,7 +379,7 @@ pub fn report_error<'tcx, 'mir>(
|
||||||
if let Some((alloc_id, access)) = extra {
|
if let Some((alloc_id, access)) = extra {
|
||||||
eprintln!(
|
eprintln!(
|
||||||
"Uninitialized memory occurred at {alloc_id:?}{range:?}, in this allocation:",
|
"Uninitialized memory occurred at {alloc_id:?}{range:?}, in this allocation:",
|
||||||
range = access.uninit,
|
range = access.bad,
|
||||||
);
|
);
|
||||||
eprintln!("{:?}", ecx.dump_alloc(alloc_id));
|
eprintln!("{:?}", ecx.dump_alloc(alloc_id));
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,8 +1,8 @@
|
||||||
error: Undefined Behavior: constructing invalid value at .value[0]: encountered uninitialized bytes
|
error: Undefined Behavior: constructing invalid value at .value[0]: encountered uninitialized memory, but expected a floating point number
|
||||||
--> $DIR/uninit_float.rs:LL:CC
|
--> $DIR/uninit_float.rs:LL:CC
|
||||||
|
|
|
|
||||||
LL | let _val: [f32; 1] = unsafe { std::mem::uninitialized() };
|
LL | let _val: [f32; 1] = unsafe { std::mem::uninitialized() };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .value[0]: encountered uninitialized bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .value[0]: encountered uninitialized memory, but expected a floating point number
|
||||||
|
|
|
|
||||||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||||
|
|
|
@ -1,8 +1,8 @@
|
||||||
error: Undefined Behavior: constructing invalid value at .value[0]: encountered uninitialized bytes
|
error: Undefined Behavior: constructing invalid value at .value[0]: encountered uninitialized memory, but expected an integer
|
||||||
--> $DIR/uninit_integer.rs:LL:CC
|
--> $DIR/uninit_integer.rs:LL:CC
|
||||||
|
|
|
|
||||||
LL | let _val = unsafe { std::mem::MaybeUninit::<[usize; 1]>::uninit().assume_init() };
|
LL | let _val = unsafe { std::mem::MaybeUninit::<[usize; 1]>::uninit().assume_init() };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .value[0]: encountered uninitialized bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .value[0]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
|
||||||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||||
|
|
|
@ -41,7 +41,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/forbidden_slices.rs:26:1
|
--> $DIR/forbidden_slices.rs:26:1
|
||||||
|
|
|
|
||||||
LL | pub static S4: &[u8] = unsafe { from_raw_parts((&D1) as *const _ as _, 1) };
|
LL | pub static S4: &[u8] = unsafe { from_raw_parts((&D1) as *const _ as _, 1) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
||||||
|
@ -52,8 +52,9 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/forbidden_slices.rs:28:1
|
--> $DIR/forbidden_slices.rs:28:1
|
||||||
|
|
|
|
||||||
LL | pub static S5: &[u8] = unsafe { from_raw_parts((&D3) as *const _ as _, size_of::<&u32>()) };
|
LL | pub static S5: &[u8] = unsafe { from_raw_parts((&D3) as *const _ as _, size_of::<&u32>()) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered a pointer, but expected an integer
|
||||||
|
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
||||||
HEX_DUMP
|
HEX_DUMP
|
||||||
}
|
}
|
||||||
|
@ -75,7 +76,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/forbidden_slices.rs:33:1
|
--> $DIR/forbidden_slices.rs:33:1
|
||||||
|
|
|
|
||||||
LL | pub static S7: &[u16] = unsafe {
|
LL | pub static S7: &[u16] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[1]: encountered uninitialized bytes
|
| ^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[1]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
||||||
|
@ -143,7 +144,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/forbidden_slices.rs:53:1
|
--> $DIR/forbidden_slices.rs:53:1
|
||||||
|
|
|
|
||||||
LL | pub static R4: &[u8] = unsafe {
|
LL | pub static R4: &[u8] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
||||||
|
@ -154,8 +155,9 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/forbidden_slices.rs:58:1
|
--> $DIR/forbidden_slices.rs:58:1
|
||||||
|
|
|
|
||||||
LL | pub static R5: &[u8] = unsafe {
|
LL | pub static R5: &[u8] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered a pointer, but expected an integer
|
||||||
|
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
||||||
HEX_DUMP
|
HEX_DUMP
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,7 +2,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:26:49
|
--> $DIR/const-pointer-values-in-various-types.rs:26:49
|
||||||
|
|
|
|
||||||
LL | const I32_REF_USIZE_UNION: usize = unsafe { Nonsense { int_32_ref: &3 }.u };
|
LL | const I32_REF_USIZE_UNION: usize = unsafe { Nonsense { int_32_ref: &3 }.u };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -11,7 +11,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:29:43
|
--> $DIR/const-pointer-values-in-various-types.rs:29:43
|
||||||
|
|
|
|
||||||
LL | const I32_REF_U8_UNION: u8 = unsafe { Nonsense { int_32_ref: &3 }.uint_8 };
|
LL | const I32_REF_U8_UNION: u8 = unsafe { Nonsense { int_32_ref: &3 }.uint_8 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -20,7 +20,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:32:45
|
--> $DIR/const-pointer-values-in-various-types.rs:32:45
|
||||||
|
|
|
|
||||||
LL | const I32_REF_U16_UNION: u16 = unsafe { Nonsense { int_32_ref: &3 }.uint_16 };
|
LL | const I32_REF_U16_UNION: u16 = unsafe { Nonsense { int_32_ref: &3 }.uint_16 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -29,7 +29,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:35:45
|
--> $DIR/const-pointer-values-in-various-types.rs:35:45
|
||||||
|
|
|
|
||||||
LL | const I32_REF_U32_UNION: u32 = unsafe { Nonsense { int_32_ref: &3 }.uint_32 };
|
LL | const I32_REF_U32_UNION: u32 = unsafe { Nonsense { int_32_ref: &3 }.uint_32 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -38,7 +38,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:38:45
|
--> $DIR/const-pointer-values-in-various-types.rs:38:45
|
||||||
|
|
|
|
||||||
LL | const I32_REF_U64_UNION: u64 = unsafe { Nonsense { int_32_ref: &3 }.uint_64 };
|
LL | const I32_REF_U64_UNION: u64 = unsafe { Nonsense { int_32_ref: &3 }.uint_64 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -53,7 +53,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:45:43
|
--> $DIR/const-pointer-values-in-various-types.rs:45:43
|
||||||
|
|
|
|
||||||
LL | const I32_REF_I8_UNION: i8 = unsafe { Nonsense { int_32_ref: &3 }.int_8 };
|
LL | const I32_REF_I8_UNION: i8 = unsafe { Nonsense { int_32_ref: &3 }.int_8 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -62,7 +62,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:48:45
|
--> $DIR/const-pointer-values-in-various-types.rs:48:45
|
||||||
|
|
|
|
||||||
LL | const I32_REF_I16_UNION: i16 = unsafe { Nonsense { int_32_ref: &3 }.int_16 };
|
LL | const I32_REF_I16_UNION: i16 = unsafe { Nonsense { int_32_ref: &3 }.int_16 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -71,7 +71,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:51:45
|
--> $DIR/const-pointer-values-in-various-types.rs:51:45
|
||||||
|
|
|
|
||||||
LL | const I32_REF_I32_UNION: i32 = unsafe { Nonsense { int_32_ref: &3 }.int_32 };
|
LL | const I32_REF_I32_UNION: i32 = unsafe { Nonsense { int_32_ref: &3 }.int_32 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -80,7 +80,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:54:45
|
--> $DIR/const-pointer-values-in-various-types.rs:54:45
|
||||||
|
|
|
|
||||||
LL | const I32_REF_I64_UNION: i64 = unsafe { Nonsense { int_32_ref: &3 }.int_64 };
|
LL | const I32_REF_I64_UNION: i64 = unsafe { Nonsense { int_32_ref: &3 }.int_64 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -95,7 +95,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:61:45
|
--> $DIR/const-pointer-values-in-various-types.rs:61:45
|
||||||
|
|
|
|
||||||
LL | const I32_REF_F32_UNION: f32 = unsafe { Nonsense { int_32_ref: &3 }.float_32 };
|
LL | const I32_REF_F32_UNION: f32 = unsafe { Nonsense { int_32_ref: &3 }.float_32 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -104,7 +104,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:64:45
|
--> $DIR/const-pointer-values-in-various-types.rs:64:45
|
||||||
|
|
|
|
||||||
LL | const I32_REF_F64_UNION: f64 = unsafe { Nonsense { int_32_ref: &3 }.float_64 };
|
LL | const I32_REF_F64_UNION: f64 = unsafe { Nonsense { int_32_ref: &3 }.float_64 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -113,7 +113,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:67:47
|
--> $DIR/const-pointer-values-in-various-types.rs:67:47
|
||||||
|
|
|
|
||||||
LL | const I32_REF_BOOL_UNION: bool = unsafe { Nonsense { int_32_ref: &3 }.truthy_falsey };
|
LL | const I32_REF_BOOL_UNION: bool = unsafe { Nonsense { int_32_ref: &3 }.truthy_falsey };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -122,7 +122,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:70:47
|
--> $DIR/const-pointer-values-in-various-types.rs:70:47
|
||||||
|
|
|
|
||||||
LL | const I32_REF_CHAR_UNION: char = unsafe { Nonsense { int_32_ref: &3 }.character };
|
LL | const I32_REF_CHAR_UNION: char = unsafe { Nonsense { int_32_ref: &3 }.character };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -131,7 +131,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:73:39
|
--> $DIR/const-pointer-values-in-various-types.rs:73:39
|
||||||
|
|
|
|
||||||
LL | const STR_U8_UNION: u8 = unsafe { Nonsense { stringy: "3" }.uint_8 };
|
LL | const STR_U8_UNION: u8 = unsafe { Nonsense { stringy: "3" }.uint_8 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -140,7 +140,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:76:41
|
--> $DIR/const-pointer-values-in-various-types.rs:76:41
|
||||||
|
|
|
|
||||||
LL | const STR_U16_UNION: u16 = unsafe { Nonsense { stringy: "3" }.uint_16 };
|
LL | const STR_U16_UNION: u16 = unsafe { Nonsense { stringy: "3" }.uint_16 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -149,7 +149,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:79:41
|
--> $DIR/const-pointer-values-in-various-types.rs:79:41
|
||||||
|
|
|
|
||||||
LL | const STR_U32_UNION: u32 = unsafe { Nonsense { stringy: "3" }.uint_32 };
|
LL | const STR_U32_UNION: u32 = unsafe { Nonsense { stringy: "3" }.uint_32 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -158,7 +158,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:82:41
|
--> $DIR/const-pointer-values-in-various-types.rs:82:41
|
||||||
|
|
|
|
||||||
LL | const STR_U64_UNION: u64 = unsafe { Nonsense { stringy: "3" }.uint_64 };
|
LL | const STR_U64_UNION: u64 = unsafe { Nonsense { stringy: "3" }.uint_64 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -167,7 +167,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:85:43
|
--> $DIR/const-pointer-values-in-various-types.rs:85:43
|
||||||
|
|
|
|
||||||
LL | const STR_U128_UNION: u128 = unsafe { Nonsense { stringy: "3" }.uint_128 };
|
LL | const STR_U128_UNION: u128 = unsafe { Nonsense { stringy: "3" }.uint_128 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -176,7 +176,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:88:39
|
--> $DIR/const-pointer-values-in-various-types.rs:88:39
|
||||||
|
|
|
|
||||||
LL | const STR_I8_UNION: i8 = unsafe { Nonsense { stringy: "3" }.int_8 };
|
LL | const STR_I8_UNION: i8 = unsafe { Nonsense { stringy: "3" }.int_8 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -185,7 +185,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:91:41
|
--> $DIR/const-pointer-values-in-various-types.rs:91:41
|
||||||
|
|
|
|
||||||
LL | const STR_I16_UNION: i16 = unsafe { Nonsense { stringy: "3" }.int_16 };
|
LL | const STR_I16_UNION: i16 = unsafe { Nonsense { stringy: "3" }.int_16 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -194,7 +194,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:94:41
|
--> $DIR/const-pointer-values-in-various-types.rs:94:41
|
||||||
|
|
|
|
||||||
LL | const STR_I32_UNION: i32 = unsafe { Nonsense { stringy: "3" }.int_32 };
|
LL | const STR_I32_UNION: i32 = unsafe { Nonsense { stringy: "3" }.int_32 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -203,7 +203,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:97:41
|
--> $DIR/const-pointer-values-in-various-types.rs:97:41
|
||||||
|
|
|
|
||||||
LL | const STR_I64_UNION: i64 = unsafe { Nonsense { stringy: "3" }.int_64 };
|
LL | const STR_I64_UNION: i64 = unsafe { Nonsense { stringy: "3" }.int_64 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -212,7 +212,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:100:43
|
--> $DIR/const-pointer-values-in-various-types.rs:100:43
|
||||||
|
|
|
|
||||||
LL | const STR_I128_UNION: i128 = unsafe { Nonsense { stringy: "3" }.int_128 };
|
LL | const STR_I128_UNION: i128 = unsafe { Nonsense { stringy: "3" }.int_128 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -221,7 +221,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:103:41
|
--> $DIR/const-pointer-values-in-various-types.rs:103:41
|
||||||
|
|
|
|
||||||
LL | const STR_F32_UNION: f32 = unsafe { Nonsense { stringy: "3" }.float_32 };
|
LL | const STR_F32_UNION: f32 = unsafe { Nonsense { stringy: "3" }.float_32 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -230,7 +230,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:106:41
|
--> $DIR/const-pointer-values-in-various-types.rs:106:41
|
||||||
|
|
|
|
||||||
LL | const STR_F64_UNION: f64 = unsafe { Nonsense { stringy: "3" }.float_64 };
|
LL | const STR_F64_UNION: f64 = unsafe { Nonsense { stringy: "3" }.float_64 };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -239,7 +239,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:109:43
|
--> $DIR/const-pointer-values-in-various-types.rs:109:43
|
||||||
|
|
|
|
||||||
LL | const STR_BOOL_UNION: bool = unsafe { Nonsense { stringy: "3" }.truthy_falsey };
|
LL | const STR_BOOL_UNION: bool = unsafe { Nonsense { stringy: "3" }.truthy_falsey };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -248,7 +248,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/const-pointer-values-in-various-types.rs:112:43
|
--> $DIR/const-pointer-values-in-various-types.rs:112:43
|
||||||
|
|
|
|
||||||
LL | const STR_CHAR_UNION: char = unsafe { Nonsense { stringy: "3" }.character };
|
LL | const STR_CHAR_UNION: char = unsafe { Nonsense { stringy: "3" }.character };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
|
@ -266,7 +266,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:144:1
|
--> $DIR/raw-bytes.rs:144:1
|
||||||
|
|
|
|
||||||
LL | const STR_NO_INIT: &str = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
LL | const STR_NO_INIT: &str = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>: encountered uninitialized data in `str`
|
| ^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>: encountered uninitialized memory, but expected a string
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 8, align: 4) {
|
= note: the raw bytes of the constant (size: 8, align: 4) {
|
||||||
|
@ -277,7 +277,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:146:1
|
--> $DIR/raw-bytes.rs:146:1
|
||||||
|
|
|
|
||||||
LL | const MYSTR_NO_INIT: &MyStr = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
LL | const MYSTR_NO_INIT: &MyStr = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>.0: encountered uninitialized data in `str`
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>.0: encountered uninitialized memory, but expected a string
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 8, align: 4) {
|
= note: the raw bytes of the constant (size: 8, align: 4) {
|
||||||
|
@ -288,8 +288,9 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:148:1
|
--> $DIR/raw-bytes.rs:148:1
|
||||||
|
|
|
|
||||||
LL | const MYSTR_NO_INIT_ISSUE83182: &MyStr = unsafe { mem::transmute::<&[_], _>(&[&()]) };
|
LL | const MYSTR_NO_INIT_ISSUE83182: &MyStr = unsafe { mem::transmute::<&[_], _>(&[&()]) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>.0: encountered a pointer, but expected a string
|
||||||
|
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 8, align: 4) {
|
= note: the raw bytes of the constant (size: 8, align: 4) {
|
||||||
╾ALLOC_ID╼ 01 00 00 00 │ ╾──╼....
|
╾ALLOC_ID╼ 01 00 00 00 │ ╾──╼....
|
||||||
}
|
}
|
||||||
|
@ -516,7 +517,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:215:1
|
--> $DIR/raw-bytes.rs:215:1
|
||||||
|
|
|
|
||||||
LL | pub static S4: &[u8] = unsafe { from_raw_parts((&D1) as *const _ as _, 1) };
|
LL | pub static S4: &[u8] = unsafe { from_raw_parts((&D1) as *const _ as _, 1) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 8, align: 4) {
|
= note: the raw bytes of the constant (size: 8, align: 4) {
|
||||||
|
@ -527,8 +528,9 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:218:1
|
--> $DIR/raw-bytes.rs:218:1
|
||||||
|
|
|
|
||||||
LL | pub static S5: &[u8] = unsafe { from_raw_parts((&D3) as *const _ as _, mem::size_of::<&u32>()) };
|
LL | pub static S5: &[u8] = unsafe { from_raw_parts((&D3) as *const _ as _, mem::size_of::<&u32>()) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered a pointer, but expected an integer
|
||||||
|
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 8, align: 4) {
|
= note: the raw bytes of the constant (size: 8, align: 4) {
|
||||||
╾ALLOC_ID╼ 04 00 00 00 │ ╾──╼....
|
╾ALLOC_ID╼ 04 00 00 00 │ ╾──╼....
|
||||||
}
|
}
|
||||||
|
@ -550,7 +552,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:225:1
|
--> $DIR/raw-bytes.rs:225:1
|
||||||
|
|
|
|
||||||
LL | pub static S7: &[u16] = unsafe {
|
LL | pub static S7: &[u16] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[1]: encountered uninitialized bytes
|
| ^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[1]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 8, align: 4) {
|
= note: the raw bytes of the constant (size: 8, align: 4) {
|
||||||
|
@ -561,7 +563,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:232:1
|
--> $DIR/raw-bytes.rs:232:1
|
||||||
|
|
|
|
||||||
LL | pub static R4: &[u8] = unsafe {
|
LL | pub static R4: &[u8] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 8, align: 4) {
|
= note: the raw bytes of the constant (size: 8, align: 4) {
|
||||||
|
@ -572,8 +574,9 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:237:1
|
--> $DIR/raw-bytes.rs:237:1
|
||||||
|
|
|
|
||||||
LL | pub static R5: &[u8] = unsafe {
|
LL | pub static R5: &[u8] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered a pointer, but expected an integer
|
||||||
|
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 8, align: 4) {
|
= note: the raw bytes of the constant (size: 8, align: 4) {
|
||||||
╾ALLOC_ID╼ 04 00 00 00 │ ╾──╼....
|
╾ALLOC_ID╼ 04 00 00 00 │ ╾──╼....
|
||||||
}
|
}
|
||||||
|
|
|
@ -266,7 +266,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:144:1
|
--> $DIR/raw-bytes.rs:144:1
|
||||||
|
|
|
|
||||||
LL | const STR_NO_INIT: &str = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
LL | const STR_NO_INIT: &str = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>: encountered uninitialized data in `str`
|
| ^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>: encountered uninitialized memory, but expected a string
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 16, align: 8) {
|
= note: the raw bytes of the constant (size: 16, align: 8) {
|
||||||
|
@ -277,7 +277,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:146:1
|
--> $DIR/raw-bytes.rs:146:1
|
||||||
|
|
|
|
||||||
LL | const MYSTR_NO_INIT: &MyStr = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
LL | const MYSTR_NO_INIT: &MyStr = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>.0: encountered uninitialized data in `str`
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>.0: encountered uninitialized memory, but expected a string
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 16, align: 8) {
|
= note: the raw bytes of the constant (size: 16, align: 8) {
|
||||||
|
@ -288,8 +288,9 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:148:1
|
--> $DIR/raw-bytes.rs:148:1
|
||||||
|
|
|
|
||||||
LL | const MYSTR_NO_INIT_ISSUE83182: &MyStr = unsafe { mem::transmute::<&[_], _>(&[&()]) };
|
LL | const MYSTR_NO_INIT_ISSUE83182: &MyStr = unsafe { mem::transmute::<&[_], _>(&[&()]) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>.0: encountered a pointer, but expected a string
|
||||||
|
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 16, align: 8) {
|
= note: the raw bytes of the constant (size: 16, align: 8) {
|
||||||
╾ALLOC_ID╼ 01 00 00 00 00 00 00 00 │ ╾──────╼........
|
╾ALLOC_ID╼ 01 00 00 00 00 00 00 00 │ ╾──────╼........
|
||||||
}
|
}
|
||||||
|
@ -516,7 +517,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:215:1
|
--> $DIR/raw-bytes.rs:215:1
|
||||||
|
|
|
|
||||||
LL | pub static S4: &[u8] = unsafe { from_raw_parts((&D1) as *const _ as _, 1) };
|
LL | pub static S4: &[u8] = unsafe { from_raw_parts((&D1) as *const _ as _, 1) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 16, align: 8) {
|
= note: the raw bytes of the constant (size: 16, align: 8) {
|
||||||
|
@ -527,8 +528,9 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:218:1
|
--> $DIR/raw-bytes.rs:218:1
|
||||||
|
|
|
|
||||||
LL | pub static S5: &[u8] = unsafe { from_raw_parts((&D3) as *const _ as _, mem::size_of::<&u32>()) };
|
LL | pub static S5: &[u8] = unsafe { from_raw_parts((&D3) as *const _ as _, mem::size_of::<&u32>()) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered a pointer, but expected an integer
|
||||||
|
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 16, align: 8) {
|
= note: the raw bytes of the constant (size: 16, align: 8) {
|
||||||
╾ALLOC_ID╼ 08 00 00 00 00 00 00 00 │ ╾──────╼........
|
╾ALLOC_ID╼ 08 00 00 00 00 00 00 00 │ ╾──────╼........
|
||||||
}
|
}
|
||||||
|
@ -550,7 +552,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:225:1
|
--> $DIR/raw-bytes.rs:225:1
|
||||||
|
|
|
|
||||||
LL | pub static S7: &[u16] = unsafe {
|
LL | pub static S7: &[u16] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[1]: encountered uninitialized bytes
|
| ^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[1]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 16, align: 8) {
|
= note: the raw bytes of the constant (size: 16, align: 8) {
|
||||||
|
@ -561,7 +563,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:232:1
|
--> $DIR/raw-bytes.rs:232:1
|
||||||
|
|
|
|
||||||
LL | pub static R4: &[u8] = unsafe {
|
LL | pub static R4: &[u8] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 16, align: 8) {
|
= note: the raw bytes of the constant (size: 16, align: 8) {
|
||||||
|
@ -572,8 +574,9 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/raw-bytes.rs:237:1
|
--> $DIR/raw-bytes.rs:237:1
|
||||||
|
|
|
|
||||||
LL | pub static R5: &[u8] = unsafe {
|
LL | pub static R5: &[u8] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>[0]: encountered a pointer, but expected an integer
|
||||||
|
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: 16, align: 8) {
|
= note: the raw bytes of the constant (size: 16, align: 8) {
|
||||||
╾ALLOC_ID╼ 08 00 00 00 00 00 00 00 │ ╾──────╼........
|
╾ALLOC_ID╼ 08 00 00 00 00 00 00 00 │ ╾──────╼........
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,7 +2,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ref_to_int_match.rs:24:27
|
--> $DIR/ref_to_int_match.rs:24:27
|
||||||
|
|
|
|
||||||
LL | const BAR: Int = unsafe { Foo { r: &42 }.f };
|
LL | const BAR: Int = unsafe { Foo { r: &42 }.f };
|
||||||
| ^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
|
@ -2,7 +2,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ref_to_int_match.rs:24:27
|
--> $DIR/ref_to_int_match.rs:24:27
|
||||||
|
|
|
|
||||||
LL | const BAR: Int = unsafe { Foo { r: &42 }.f };
|
LL | const BAR: Int = unsafe { Foo { r: &42 }.f };
|
||||||
| ^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
|
@ -13,7 +13,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-enum.rs:30:1
|
--> $DIR/ub-enum.rs:30:1
|
||||||
|
|
|
|
||||||
LL | const BAD_ENUM_PTR: Enum = unsafe { mem::transmute(&1) };
|
LL | const BAD_ENUM_PTR: Enum = unsafe { mem::transmute(&1) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -22,7 +22,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-enum.rs:33:1
|
--> $DIR/ub-enum.rs:33:1
|
||||||
|
|
|
|
||||||
LL | const BAD_ENUM_WRAPPED: Wrap<Enum> = unsafe { mem::transmute(&1) };
|
LL | const BAD_ENUM_WRAPPED: Wrap<Enum> = unsafe { mem::transmute(&1) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -42,7 +42,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-enum.rs:47:1
|
--> $DIR/ub-enum.rs:47:1
|
||||||
|
|
|
|
||||||
LL | const BAD_ENUM2_PTR: Enum2 = unsafe { mem::transmute(&0) };
|
LL | const BAD_ENUM2_PTR: Enum2 = unsafe { mem::transmute(&0) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -51,7 +51,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-enum.rs:50:1
|
--> $DIR/ub-enum.rs:50:1
|
||||||
|
|
|
|
||||||
LL | const BAD_ENUM2_WRAPPED: Wrap<Enum2> = unsafe { mem::transmute(&0) };
|
LL | const BAD_ENUM2_WRAPPED: Wrap<Enum2> = unsafe { mem::transmute(&0) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -66,7 +66,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-enum.rs:64:1
|
--> $DIR/ub-enum.rs:64:1
|
||||||
|
|
|
|
||||||
LL | const BAD_ENUM2_OPTION_PTR: Option<Enum2> = unsafe { mem::transmute(&0) };
|
LL | const BAD_ENUM2_OPTION_PTR: Option<Enum2> = unsafe { mem::transmute(&0) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
|
@ -13,7 +13,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-enum.rs:30:1
|
--> $DIR/ub-enum.rs:30:1
|
||||||
|
|
|
|
||||||
LL | const BAD_ENUM_PTR: Enum = unsafe { mem::transmute(&1) };
|
LL | const BAD_ENUM_PTR: Enum = unsafe { mem::transmute(&1) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -22,7 +22,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-enum.rs:33:1
|
--> $DIR/ub-enum.rs:33:1
|
||||||
|
|
|
|
||||||
LL | const BAD_ENUM_WRAPPED: Wrap<Enum> = unsafe { mem::transmute(&1) };
|
LL | const BAD_ENUM_WRAPPED: Wrap<Enum> = unsafe { mem::transmute(&1) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -42,7 +42,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-enum.rs:47:1
|
--> $DIR/ub-enum.rs:47:1
|
||||||
|
|
|
|
||||||
LL | const BAD_ENUM2_PTR: Enum2 = unsafe { mem::transmute(&0) };
|
LL | const BAD_ENUM2_PTR: Enum2 = unsafe { mem::transmute(&0) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -51,7 +51,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-enum.rs:50:1
|
--> $DIR/ub-enum.rs:50:1
|
||||||
|
|
|
|
||||||
LL | const BAD_ENUM2_WRAPPED: Wrap<Enum2> = unsafe { mem::transmute(&0) };
|
LL | const BAD_ENUM2_WRAPPED: Wrap<Enum2> = unsafe { mem::transmute(&0) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -66,7 +66,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-enum.rs:64:1
|
--> $DIR/ub-enum.rs:64:1
|
||||||
|
|
|
|
||||||
LL | const BAD_ENUM2_OPTION_PTR: Option<Enum2> = unsafe { mem::transmute(&0) };
|
LL | const BAD_ENUM2_OPTION_PTR: Option<Enum2> = unsafe { mem::transmute(&0) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
|
@ -1,20 +1,35 @@
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/ub-int-array.rs:15:9
|
--> $DIR/ub-int-array.rs:19:1
|
||||||
|
|
|
|
||||||
LL | MaybeUninit { uninit: () }.init,
|
LL | const UNINIT_INT_0: [u32; 3] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ using uninitialized data, but this operation requires initialized memory
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at [0]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
|
= note: the raw bytes of the constant (size: 12, align: 4) {
|
||||||
|
__ __ __ __ 01 00 00 00 02 00 00 00 │ ░░░░........
|
||||||
|
}
|
||||||
|
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/ub-int-array.rs:30:13
|
--> $DIR/ub-int-array.rs:24:1
|
||||||
|
|
|
|
||||||
LL | MaybeUninit { uninit: () }.init,
|
LL | const UNINIT_INT_1: [u32; 3] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ using uninitialized data, but this operation requires initialized memory
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at [1]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
|
= note: the raw bytes of the constant (size: 12, align: 4) {
|
||||||
|
00 00 00 00 01 __ 01 01 02 02 __ 02 │ .....░....░.
|
||||||
|
}
|
||||||
|
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/ub-int-array.rs:56:13
|
--> $DIR/ub-int-array.rs:42:1
|
||||||
|
|
|
|
||||||
LL | MaybeUninit { uninit: () }.init,
|
LL | const UNINIT_INT_2: [u32; 3] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ using uninitialized data, but this operation requires initialized memory
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at [2]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
|
= note: the raw bytes of the constant (size: 12, align: 4) {
|
||||||
|
00 00 00 00 01 01 01 01 02 02 02 __ │ ...........░
|
||||||
|
}
|
||||||
|
|
||||||
error: aborting due to 3 previous errors
|
error: aborting due to 3 previous errors
|
||||||
|
|
||||||
|
|
|
@ -1,20 +1,35 @@
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/ub-int-array.rs:15:9
|
--> $DIR/ub-int-array.rs:19:1
|
||||||
|
|
|
|
||||||
LL | MaybeUninit { uninit: () }.init,
|
LL | const UNINIT_INT_0: [u32; 3] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ using uninitialized data, but this operation requires initialized memory
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at [0]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
|
= note: the raw bytes of the constant (size: 12, align: 4) {
|
||||||
|
__ __ __ __ 01 00 00 00 02 00 00 00 │ ░░░░........
|
||||||
|
}
|
||||||
|
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/ub-int-array.rs:30:13
|
--> $DIR/ub-int-array.rs:24:1
|
||||||
|
|
|
|
||||||
LL | MaybeUninit { uninit: () }.init,
|
LL | const UNINIT_INT_1: [u32; 3] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ using uninitialized data, but this operation requires initialized memory
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at [1]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
|
= note: the raw bytes of the constant (size: 12, align: 4) {
|
||||||
|
00 00 00 00 01 __ 01 01 02 02 __ 02 │ .....░....░.
|
||||||
|
}
|
||||||
|
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/ub-int-array.rs:56:13
|
--> $DIR/ub-int-array.rs:42:1
|
||||||
|
|
|
|
||||||
LL | MaybeUninit { uninit: () }.init,
|
LL | const UNINIT_INT_2: [u32; 3] = unsafe {
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ using uninitialized data, but this operation requires initialized memory
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at [2]: encountered uninitialized memory, but expected an integer
|
||||||
|
|
|
||||||
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
|
= note: the raw bytes of the constant (size: 12, align: 4) {
|
||||||
|
00 00 00 00 01 01 01 01 02 02 02 __ │ ...........░
|
||||||
|
}
|
||||||
|
|
||||||
error: aborting due to 3 previous errors
|
error: aborting due to 3 previous errors
|
||||||
|
|
||||||
|
|
|
@ -10,54 +10,52 @@ union MaybeUninit<T: Copy> {
|
||||||
init: T,
|
init: T,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
impl<T: Copy> MaybeUninit<T> {
|
||||||
|
const fn new(t: T) -> Self {
|
||||||
|
MaybeUninit { init: t }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
const UNINIT_INT_0: [u32; 3] = unsafe {
|
const UNINIT_INT_0: [u32; 3] = unsafe {
|
||||||
[
|
//~^ ERROR it is undefined behavior to use this value
|
||||||
MaybeUninit { uninit: () }.init,
|
//~| invalid value at [0]
|
||||||
//~^ ERROR evaluation of constant value failed
|
mem::transmute([MaybeUninit { uninit: () }, MaybeUninit::new(1), MaybeUninit::new(2)])
|
||||||
//~| uninitialized
|
|
||||||
1,
|
|
||||||
2,
|
|
||||||
]
|
|
||||||
};
|
};
|
||||||
const UNINIT_INT_1: [u32; 3] = unsafe {
|
const UNINIT_INT_1: [u32; 3] = unsafe {
|
||||||
mem::transmute(
|
//~^ ERROR it is undefined behavior to use this value
|
||||||
[
|
//~| invalid value at [1]
|
||||||
0u8,
|
mem::transmute([
|
||||||
0u8,
|
MaybeUninit::new(0u8),
|
||||||
0u8,
|
MaybeUninit::new(0u8),
|
||||||
0u8,
|
MaybeUninit::new(0u8),
|
||||||
1u8,
|
MaybeUninit::new(0u8),
|
||||||
MaybeUninit { uninit: () }.init,
|
MaybeUninit::new(1u8),
|
||||||
//~^ ERROR evaluation of constant value failed
|
MaybeUninit { uninit: () },
|
||||||
//~| uninitialized
|
MaybeUninit::new(1u8),
|
||||||
1u8,
|
MaybeUninit::new(1u8),
|
||||||
1u8,
|
MaybeUninit::new(2u8),
|
||||||
2u8,
|
MaybeUninit::new(2u8),
|
||||||
2u8,
|
MaybeUninit { uninit: () },
|
||||||
MaybeUninit { uninit: () }.init,
|
MaybeUninit::new(2u8),
|
||||||
2u8,
|
])
|
||||||
]
|
|
||||||
)
|
|
||||||
};
|
};
|
||||||
const UNINIT_INT_2: [u32; 3] = unsafe {
|
const UNINIT_INT_2: [u32; 3] = unsafe {
|
||||||
mem::transmute(
|
//~^ ERROR it is undefined behavior to use this value
|
||||||
[
|
//~| invalid value at [2]
|
||||||
0u8,
|
mem::transmute([
|
||||||
0u8,
|
MaybeUninit::new(0u8),
|
||||||
0u8,
|
MaybeUninit::new(0u8),
|
||||||
0u8,
|
MaybeUninit::new(0u8),
|
||||||
1u8,
|
MaybeUninit::new(0u8),
|
||||||
1u8,
|
MaybeUninit::new(1u8),
|
||||||
1u8,
|
MaybeUninit::new(1u8),
|
||||||
1u8,
|
MaybeUninit::new(1u8),
|
||||||
2u8,
|
MaybeUninit::new(1u8),
|
||||||
2u8,
|
MaybeUninit::new(2u8),
|
||||||
2u8,
|
MaybeUninit::new(2u8),
|
||||||
MaybeUninit { uninit: () }.init,
|
MaybeUninit::new(2u8),
|
||||||
//~^ ERROR evaluation of constant value failed
|
MaybeUninit { uninit: () },
|
||||||
//~| uninitialized
|
])
|
||||||
]
|
|
||||||
)
|
|
||||||
};
|
};
|
||||||
|
|
||||||
fn main() {}
|
fn main() {}
|
||||||
|
|
|
@ -46,7 +46,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-ref-ptr.rs:33:1
|
--> $DIR/ub-ref-ptr.rs:33:1
|
||||||
|
|
|
|
||||||
LL | const REF_AS_USIZE: usize = unsafe { mem::transmute(&0) };
|
LL | const REF_AS_USIZE: usize = unsafe { mem::transmute(&0) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -55,7 +55,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-ref-ptr.rs:36:39
|
--> $DIR/ub-ref-ptr.rs:36:39
|
||||||
|
|
|
|
||||||
LL | const REF_AS_USIZE_SLICE: &[usize] = &[unsafe { mem::transmute(&0) }];
|
LL | const REF_AS_USIZE_SLICE: &[usize] = &[unsafe { mem::transmute(&0) }];
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -70,7 +70,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-ref-ptr.rs:39:86
|
--> $DIR/ub-ref-ptr.rs:39:86
|
||||||
|
|
|
|
||||||
LL | const REF_AS_USIZE_BOX_SLICE: Box<[usize]> = unsafe { mem::transmute::<&[usize], _>(&[mem::transmute(&0)]) };
|
LL | const REF_AS_USIZE_BOX_SLICE: Box<[usize]> = unsafe { mem::transmute::<&[usize], _>(&[mem::transmute(&0)]) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
|
@ -24,7 +24,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-wide-ptr.rs:43:1
|
--> $DIR/ub-wide-ptr.rs:43:1
|
||||||
|
|
|
|
||||||
LL | const STR_LENGTH_PTR: &str = unsafe { mem::transmute((&42u8, &3)) };
|
LL | const STR_LENGTH_PTR: &str = unsafe { mem::transmute((&42u8, &3)) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -33,7 +33,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-wide-ptr.rs:46:1
|
--> $DIR/ub-wide-ptr.rs:46:1
|
||||||
|
|
|
|
||||||
LL | const MY_STR_LENGTH_PTR: &MyStr = unsafe { mem::transmute((&42u8, &3)) };
|
LL | const MY_STR_LENGTH_PTR: &MyStr = unsafe { mem::transmute((&42u8, &3)) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -53,7 +53,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/ub-wide-ptr.rs:52:1
|
--> $DIR/ub-wide-ptr.rs:52:1
|
||||||
|
|
|
|
||||||
LL | const STR_NO_INIT: &str = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
LL | const STR_NO_INIT: &str = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>: encountered uninitialized data in `str`
|
| ^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>: encountered uninitialized memory, but expected a string
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
||||||
|
@ -64,7 +64,7 @@ error[E0080]: it is undefined behavior to use this value
|
||||||
--> $DIR/ub-wide-ptr.rs:55:1
|
--> $DIR/ub-wide-ptr.rs:55:1
|
||||||
|
|
|
|
||||||
LL | const MYSTR_NO_INIT: &MyStr = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
LL | const MYSTR_NO_INIT: &MyStr = unsafe { mem::transmute::<&[_], _>(&[MaybeUninit::<u8> { uninit: () }]) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>.0: encountered uninitialized data in `str`
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<deref>.0: encountered uninitialized memory, but expected a string
|
||||||
|
|
|
|
||||||
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
|
||||||
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
||||||
|
@ -103,7 +103,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-wide-ptr.rs:75:1
|
--> $DIR/ub-wide-ptr.rs:75:1
|
||||||
|
|
|
|
||||||
LL | const SLICE_LENGTH_PTR: &[u8] = unsafe { mem::transmute((&42u8, &3)) };
|
LL | const SLICE_LENGTH_PTR: &[u8] = unsafe { mem::transmute((&42u8, &3)) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
@ -123,7 +123,7 @@ error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/ub-wide-ptr.rs:81:1
|
--> $DIR/ub-wide-ptr.rs:81:1
|
||||||
|
|
|
|
||||||
LL | const SLICE_LENGTH_PTR_BOX: Box<[u8]> = unsafe { mem::transmute((&42u8, &3)) };
|
LL | const SLICE_LENGTH_PTR_BOX: Box<[u8]> = unsafe { mem::transmute((&42u8, &3)) };
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
// revisions: no_flag with_flag
|
// revisions: no_flag with_flag
|
||||||
// [no_flag] check-pass
|
// [no_flag] check-pass
|
||||||
// [with_flag] compile-flags: -Zextra-const-ub-checks
|
// [with_flag] compile-flags: -Zextra-const-ub-checks
|
||||||
#![feature(never_type)]
|
#![feature(never_type, pointer_byte_offsets)]
|
||||||
|
|
||||||
use std::mem::transmute;
|
use std::mem::transmute;
|
||||||
use std::ptr::addr_of;
|
use std::ptr::addr_of;
|
||||||
|
@ -12,6 +12,9 @@ enum E { A, B }
|
||||||
#[derive(Clone, Copy)]
|
#[derive(Clone, Copy)]
|
||||||
enum Never {}
|
enum Never {}
|
||||||
|
|
||||||
|
#[repr(usize)]
|
||||||
|
enum PtrSizedEnum { V }
|
||||||
|
|
||||||
// An enum with uninhabited variants but also at least 2 inhabited variants -- so the uninhabited
|
// An enum with uninhabited variants but also at least 2 inhabited variants -- so the uninhabited
|
||||||
// variants *do* have a discriminant.
|
// variants *do* have a discriminant.
|
||||||
#[derive(Clone, Copy)]
|
#[derive(Clone, Copy)]
|
||||||
|
@ -31,12 +34,20 @@ const INVALID_BOOL: () = unsafe {
|
||||||
const INVALID_PTR_IN_INT: () = unsafe {
|
const INVALID_PTR_IN_INT: () = unsafe {
|
||||||
let _x: usize = transmute(&3u8);
|
let _x: usize = transmute(&3u8);
|
||||||
//[with_flag]~^ ERROR: evaluation of constant value failed
|
//[with_flag]~^ ERROR: evaluation of constant value failed
|
||||||
|
//[with_flag]~| invalid value
|
||||||
|
};
|
||||||
|
|
||||||
|
const INVALID_PTR_IN_ENUM: () = unsafe {
|
||||||
|
let _x: PtrSizedEnum = transmute(&3u8);
|
||||||
|
//[with_flag]~^ ERROR: evaluation of constant value failed
|
||||||
|
//[with_flag]~| invalid value
|
||||||
};
|
};
|
||||||
|
|
||||||
const INVALID_SLICE_TO_USIZE_TRANSMUTE: () = unsafe {
|
const INVALID_SLICE_TO_USIZE_TRANSMUTE: () = unsafe {
|
||||||
let x: &[u8] = &[0; 32];
|
let x: &[u8] = &[0; 32];
|
||||||
let _x: (usize, usize) = transmute(x);
|
let _x: (usize, usize) = transmute(x);
|
||||||
//[with_flag]~^ ERROR: evaluation of constant value failed
|
//[with_flag]~^ ERROR: evaluation of constant value failed
|
||||||
|
//[with_flag]~| invalid value
|
||||||
};
|
};
|
||||||
|
|
||||||
const UNALIGNED_PTR: () = unsafe {
|
const UNALIGNED_PTR: () = unsafe {
|
||||||
|
@ -50,6 +61,27 @@ const UNINHABITED_VARIANT: () = unsafe {
|
||||||
// Not using transmute, we want to hit the ImmTy code path.
|
// Not using transmute, we want to hit the ImmTy code path.
|
||||||
let v = *addr_of!(data).cast::<UninhDiscriminant>();
|
let v = *addr_of!(data).cast::<UninhDiscriminant>();
|
||||||
//[with_flag]~^ ERROR: evaluation of constant value failed
|
//[with_flag]~^ ERROR: evaluation of constant value failed
|
||||||
|
//[with_flag]~| invalid value
|
||||||
|
};
|
||||||
|
|
||||||
|
const PARTIAL_POINTER: () = unsafe {
|
||||||
|
#[repr(C, packed)]
|
||||||
|
struct Packed {
|
||||||
|
pad1: u8,
|
||||||
|
ptr: *const u8,
|
||||||
|
pad2: [u8; 7],
|
||||||
|
}
|
||||||
|
// `Align` ensures that the entire thing has pointer alignment again.
|
||||||
|
#[repr(C)]
|
||||||
|
struct Align {
|
||||||
|
p: Packed,
|
||||||
|
align: usize,
|
||||||
|
}
|
||||||
|
let mem = Packed { pad1: 0, ptr: &0u8 as *const u8, pad2: [0; 7] };
|
||||||
|
let mem = Align { p: mem, align: 0 };
|
||||||
|
let _val = *(&mem as *const Align as *const [*const u8; 2]);
|
||||||
|
//[with_flag]~^ ERROR: evaluation of constant value failed
|
||||||
|
//[with_flag]~| invalid value
|
||||||
};
|
};
|
||||||
|
|
||||||
// Regression tests for an ICE (related to <https://github.com/rust-lang/rust/issues/113988>).
|
// Regression tests for an ICE (related to <https://github.com/rust-lang/rust/issues/113988>).
|
||||||
|
|
|
@ -1,39 +1,57 @@
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/detect-extra-ub.rs:26:20
|
--> $DIR/detect-extra-ub.rs:29:20
|
||||||
|
|
|
|
||||||
LL | let _x: bool = transmute(3u8);
|
LL | let _x: bool = transmute(3u8);
|
||||||
| ^^^^^^^^^^^^^^ constructing invalid value: encountered 0x03, but expected a boolean
|
| ^^^^^^^^^^^^^^ constructing invalid value: encountered 0x03, but expected a boolean
|
||||||
|
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/detect-extra-ub.rs:32:21
|
--> $DIR/detect-extra-ub.rs:35:21
|
||||||
|
|
|
|
||||||
LL | let _x: usize = transmute(&3u8);
|
LL | let _x: usize = transmute(&3u8);
|
||||||
| ^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^^^^ constructing invalid value: encountered a pointer, but expected an integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/detect-extra-ub.rs:38:30
|
--> $DIR/detect-extra-ub.rs:41:28
|
||||||
|
|
|
||||||
|
LL | let _x: PtrSizedEnum = transmute(&3u8);
|
||||||
|
| ^^^^^^^^^^^^^^^ constructing invalid value at .<enum-tag>: encountered a pointer, but expected an integer
|
||||||
|
|
|
||||||
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
||||||
|
error[E0080]: evaluation of constant value failed
|
||||||
|
--> $DIR/detect-extra-ub.rs:48:30
|
||||||
|
|
|
|
||||||
LL | let _x: (usize, usize) = transmute(x);
|
LL | let _x: (usize, usize) = transmute(x);
|
||||||
| ^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
| ^^^^^^^^^^^^ constructing invalid value at .0: encountered a pointer, but expected an integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/detect-extra-ub.rs:43:20
|
--> $DIR/detect-extra-ub.rs:54:20
|
||||||
|
|
|
|
||||||
LL | let _x: &u32 = transmute(&[0u8; 4]);
|
LL | let _x: &u32 = transmute(&[0u8; 4]);
|
||||||
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value: encountered an unaligned reference (required 4 byte alignment but found 1)
|
| ^^^^^^^^^^^^^^^^^^^^ constructing invalid value: encountered an unaligned reference (required 4 byte alignment but found 1)
|
||||||
|
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/detect-extra-ub.rs:51:13
|
--> $DIR/detect-extra-ub.rs:62:13
|
||||||
|
|
|
|
||||||
LL | let v = *addr_of!(data).cast::<UninhDiscriminant>();
|
LL | let v = *addr_of!(data).cast::<UninhDiscriminant>();
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<enum-tag>: encountered an uninhabited enum variant
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at .<enum-tag>: encountered an uninhabited enum variant
|
||||||
|
|
||||||
error: aborting due to 5 previous errors
|
error[E0080]: evaluation of constant value failed
|
||||||
|
--> $DIR/detect-extra-ub.rs:82:16
|
||||||
|
|
|
||||||
|
LL | let _val = *(&mem as *const Align as *const [*const u8; 2]);
|
||||||
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ constructing invalid value at [0]: encountered a partial pointer or a mix of pointers
|
||||||
|
|
|
||||||
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
||||||
|
error: aborting due to 7 previous errors
|
||||||
|
|
||||||
For more information about this error, try `rustc --explain E0080`.
|
For more information about this error, try `rustc --explain E0080`.
|
||||||
|
|
|
@ -1,9 +0,0 @@
|
||||||
// Strip out raw byte dumps to make comparison platform-independent:
|
|
||||||
// normalize-stderr-test "(the raw bytes of the constant) \(size: [0-9]*, align: [0-9]*\)" -> "$1 (size: $$SIZE, align: $$ALIGN)"
|
|
||||||
// normalize-stderr-test "([0-9a-f][0-9a-f] |╾─*a(lloc)?[0-9]+(\+[a-z0-9]+)?─*╼ )+ *│.*" -> "HEX_DUMP"
|
|
||||||
|
|
||||||
use std::mem;
|
|
||||||
struct MyStr(str);
|
|
||||||
const MYSTR_NO_INIT: &MyStr = unsafe { mem::transmute::<&[_], _>(&[&()]) };
|
|
||||||
//~^ ERROR: it is undefined behavior to use this value
|
|
||||||
fn main() {}
|
|
|
@ -1,15 +0,0 @@
|
||||||
error[E0080]: it is undefined behavior to use this value
|
|
||||||
--> $DIR/issue-83182.rs:7:1
|
|
||||||
|
|
|
||||||
LL | const MYSTR_NO_INIT: &MyStr = unsafe { mem::transmute::<&[_], _>(&[&()]) };
|
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^ unable to turn pointer into raw bytes
|
|
||||||
|
|
|
||||||
= note: the raw bytes of the constant (size: $SIZE, align: $ALIGN) {
|
|
||||||
HEX_DUMP
|
|
||||||
}
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
|
||||||
|
|
||||||
error: aborting due to previous error
|
|
||||||
|
|
||||||
For more information about this error, try `rustc --explain E0080`.
|
|
|
@ -1,7 +1,7 @@
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: evaluation of constant value failed
|
||||||
--> $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
--> $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||||
|
|
|
|
||||||
= note: unable to turn pointer into raw bytes
|
= note: unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
note: inside `std::ptr::read::<u8>`
|
note: inside `std::ptr::read::<u8>`
|
||||||
--> $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
--> $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
// compile-flags: -Zunleash-the-miri-inside-of-you
|
// compile-flags: -Zunleash-the-miri-inside-of-you
|
||||||
#![feature(core_intrinsics)]
|
#![feature(core_intrinsics, pointer_byte_offsets)]
|
||||||
|
|
||||||
// During CTFE, we prevent pointer-to-int casts.
|
// During CTFE, we prevent pointer-to-int casts.
|
||||||
// Pointer comparisons are prevented in the trait system.
|
// Pointer comparisons are prevented in the trait system.
|
||||||
|
@ -15,7 +15,7 @@ static PTR_INT_TRANSMUTE: () = unsafe {
|
||||||
let x: usize = std::mem::transmute(&0);
|
let x: usize = std::mem::transmute(&0);
|
||||||
let _v = x + 0;
|
let _v = x + 0;
|
||||||
//~^ ERROR could not evaluate static initializer
|
//~^ ERROR could not evaluate static initializer
|
||||||
//~| unable to turn pointer into raw bytes
|
//~| unable to turn pointer into integer
|
||||||
};
|
};
|
||||||
|
|
||||||
// I'd love to test pointer comparison, but that is not possible since
|
// I'd love to test pointer comparison, but that is not possible since
|
||||||
|
|
|
@ -8,7 +8,7 @@ error[E0080]: could not evaluate static initializer
|
||||||
--> $DIR/ptr_arith.rs:16:14
|
--> $DIR/ptr_arith.rs:16:14
|
||||||
|
|
|
|
||||||
LL | let _v = x + 0;
|
LL | let _v = x + 0;
|
||||||
| ^ unable to turn pointer into raw bytes
|
| ^ unable to turn pointer into integer
|
||||||
|
|
|
|
||||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||||
|
|
17
tests/ui/intrinsics/intrinsic-raw_eq-const-bad.rs
Normal file
17
tests/ui/intrinsics/intrinsic-raw_eq-const-bad.rs
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
#![feature(core_intrinsics)]
|
||||||
|
#![feature(const_intrinsic_raw_eq)]
|
||||||
|
|
||||||
|
const RAW_EQ_PADDING: bool = unsafe {
|
||||||
|
std::intrinsics::raw_eq(&(1_u8, 2_u16), &(1_u8, 2_u16))
|
||||||
|
//~^ ERROR evaluation of constant value failed
|
||||||
|
//~| requires initialized memory
|
||||||
|
};
|
||||||
|
|
||||||
|
const RAW_EQ_PTR: bool = unsafe {
|
||||||
|
std::intrinsics::raw_eq(&(&0), &(&1))
|
||||||
|
//~^ ERROR evaluation of constant value failed
|
||||||
|
//~| `raw_eq` on bytes with provenance
|
||||||
|
};
|
||||||
|
|
||||||
|
pub fn main() {
|
||||||
|
}
|
|
@ -1,9 +1,15 @@
|
||||||
error[E0080]: evaluation of constant value failed
|
error[E0080]: evaluation of constant value failed
|
||||||
--> $DIR/intrinsic-raw_eq-const-padding.rs:5:5
|
--> $DIR/intrinsic-raw_eq-const-bad.rs:5:5
|
||||||
|
|
|
|
||||||
LL | std::intrinsics::raw_eq(&(1_u8, 2_u16), &(1_u8, 2_u16))
|
LL | std::intrinsics::raw_eq(&(1_u8, 2_u16), &(1_u8, 2_u16))
|
||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ reading memory at alloc3[0x0..0x4], but memory is uninitialized at [0x1..0x2], and this operation requires initialized memory
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ reading memory at alloc3[0x0..0x4], but memory is uninitialized at [0x1..0x2], and this operation requires initialized memory
|
||||||
|
|
||||||
error: aborting due to previous error
|
error[E0080]: evaluation of constant value failed
|
||||||
|
--> $DIR/intrinsic-raw_eq-const-bad.rs:11:5
|
||||||
|
|
|
||||||
|
LL | std::intrinsics::raw_eq(&(&0), &(&1))
|
||||||
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ `raw_eq` on bytes with provenance
|
||||||
|
|
||||||
|
error: aborting due to 2 previous errors
|
||||||
|
|
||||||
For more information about this error, try `rustc --explain E0080`.
|
For more information about this error, try `rustc --explain E0080`.
|
|
@ -1,10 +0,0 @@
|
||||||
#![feature(core_intrinsics)]
|
|
||||||
#![feature(const_intrinsic_raw_eq)]
|
|
||||||
|
|
||||||
const BAD_RAW_EQ_CALL: bool = unsafe {
|
|
||||||
std::intrinsics::raw_eq(&(1_u8, 2_u16), &(1_u8, 2_u16))
|
|
||||||
//~^ ERROR evaluation of constant value failed
|
|
||||||
};
|
|
||||||
|
|
||||||
pub fn main() {
|
|
||||||
}
|
|
Loading…
Add table
Reference in a new issue