Remove now-redundant file/line info from const backtraces
This commit is contained in:
parent
10b75cbbb0
commit
7782a2b70d
388 changed files with 911 additions and 923 deletions
|
@ -17,7 +17,7 @@ use rustc_middle::ty::{
|
|||
};
|
||||
use rustc_mir_dataflow::storage::always_storage_live_locals;
|
||||
use rustc_session::Limit;
|
||||
use rustc_span::{Pos, Span};
|
||||
use rustc_span::Span;
|
||||
use rustc_target::abi::{call::FnAbi, Align, HasDataLayout, Size, TargetDataLayout};
|
||||
|
||||
use super::{
|
||||
|
@ -256,25 +256,13 @@ impl<'tcx> fmt::Display for FrameInfo<'tcx> {
|
|||
if tcx.def_key(self.instance.def_id()).disambiguated_data.data
|
||||
== DefPathData::ClosureExpr
|
||||
{
|
||||
write!(f, "inside closure")?;
|
||||
write!(f, "inside closure")
|
||||
} else {
|
||||
// Note: this triggers a `good_path_bug` state, which means that if we ever get here
|
||||
// we must emit a diagnostic. We should never display a `FrameInfo` unless we
|
||||
// actually want to emit a warning or error to the user.
|
||||
write!(f, "inside `{}`", self.instance)?;
|
||||
write!(f, "inside `{}`", self.instance)
|
||||
}
|
||||
if !self.span.is_dummy() {
|
||||
let sm = tcx.sess.source_map();
|
||||
let lo = sm.lookup_char_pos(self.span.lo());
|
||||
write!(
|
||||
f,
|
||||
" at {}:{}:{}",
|
||||
sm.filename_for_diagnostics(&lo.file.name),
|
||||
lo.line,
|
||||
lo.col.to_usize() + 1
|
||||
)?;
|
||||
}
|
||||
Ok(())
|
||||
})
|
||||
}
|
||||
}
|
||||
|
|
|
@ -2,13 +2,13 @@ error[E0080]: evaluation of constant value failed
|
|||
--> $DIR/issue-81899.rs:11:5
|
||||
|
|
||||
LL | const _CONST: &[u8] = &f(&[], |_| {});
|
||||
| -------------- inside `_CONST` at $DIR/issue-81899.rs:4:24
|
||||
| -------------- inside `_CONST`
|
||||
...
|
||||
LL | panic!()
|
||||
| ^^^^^^^^
|
||||
| |
|
||||
| the evaluated program panicked at 'explicit panic', $DIR/issue-81899.rs:11:5
|
||||
| inside `f::<[closure@$DIR/issue-81899.rs:4:31: 4:34]>` at $SRC_DIR/std/src/panic.rs:LL:COL
|
||||
| inside `f::<[closure@$DIR/issue-81899.rs:4:31: 4:34]>`
|
||||
|
|
||||
= note: this error originates in the macro `$crate::panic::panic_2015` which comes from the expansion of the macro `panic` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
|
|
|
@ -2,13 +2,13 @@ error[E0080]: evaluation of constant value failed
|
|||
--> $DIR/issue-88434-minimal-example.rs:10:5
|
||||
|
|
||||
LL | const _CONST: &() = &f(&|_| {});
|
||||
| ---------- inside `_CONST` at $DIR/issue-88434-minimal-example.rs:3:22
|
||||
| ---------- inside `_CONST`
|
||||
...
|
||||
LL | panic!()
|
||||
| ^^^^^^^^
|
||||
| |
|
||||
| the evaluated program panicked at 'explicit panic', $DIR/issue-88434-minimal-example.rs:10:5
|
||||
| inside `f::<[closure@$DIR/issue-88434-minimal-example.rs:3:25: 3:28]>` at $SRC_DIR/std/src/panic.rs:LL:COL
|
||||
| inside `f::<[closure@$DIR/issue-88434-minimal-example.rs:3:25: 3:28]>`
|
||||
|
|
||||
= note: this error originates in the macro `$crate::panic::panic_2015` which comes from the expansion of the macro `panic` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
|
|
|
@ -2,13 +2,13 @@ error[E0080]: evaluation of constant value failed
|
|||
--> $DIR/issue-88434-removal-index-should-be-less.rs:10:5
|
||||
|
|
||||
LL | const _CONST: &[u8] = &f(&[], |_| {});
|
||||
| -------------- inside `_CONST` at $DIR/issue-88434-removal-index-should-be-less.rs:3:24
|
||||
| -------------- inside `_CONST`
|
||||
...
|
||||
LL | panic!()
|
||||
| ^^^^^^^^
|
||||
| |
|
||||
| the evaluated program panicked at 'explicit panic', $DIR/issue-88434-removal-index-should-be-less.rs:10:5
|
||||
| inside `f::<[closure@$DIR/issue-88434-removal-index-should-be-less.rs:3:31: 3:34]>` at $SRC_DIR/std/src/panic.rs:LL:COL
|
||||
| inside `f::<[closure@$DIR/issue-88434-removal-index-should-be-less.rs:3:31: 3:34]>`
|
||||
|
|
||||
= note: this error originates in the macro `$crate::panic::panic_2015` which comes from the expansion of the macro `panic` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
|
|
|
@ -5,12 +5,12 @@ LL | intrinsics::size_of::<T>()
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| size_of called on unsized type `dyn Debug`
|
||||
| inside `std::mem::size_of::<dyn Debug>` at $SRC_DIR/core/src/mem/mod.rs:LL:COL
|
||||
| inside `std::mem::size_of::<dyn Debug>`
|
||||
|
|
||||
::: $DIR/issue-80742.rs:22:10
|
||||
|
|
||||
LL | [u8; size_of::<T>() + 1]: ,
|
||||
| -------------- inside `Inline::<dyn Debug>::{constant#0}` at $DIR/issue-80742.rs:22:10
|
||||
| -------------- inside `Inline::<dyn Debug>::{constant#0}`
|
||||
|
||||
error[E0599]: the function or associated item `new` exists for struct `Inline<dyn Debug>`, but its trait bounds were not satisfied
|
||||
--> $DIR/issue-80742.rs:30:36
|
||||
|
@ -36,12 +36,12 @@ LL | intrinsics::size_of::<T>()
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| size_of called on unsized type `dyn Debug`
|
||||
| inside `std::mem::size_of::<dyn Debug>` at $SRC_DIR/core/src/mem/mod.rs:LL:COL
|
||||
| inside `std::mem::size_of::<dyn Debug>`
|
||||
|
|
||||
::: $DIR/issue-80742.rs:14:10
|
||||
|
|
||||
LL | [u8; size_of::<T>() + 1]: ,
|
||||
| -------------- inside `Inline::<dyn Debug>::{constant#0}` at $DIR/issue-80742.rs:14:10
|
||||
| -------------- inside `Inline::<dyn Debug>::{constant#0}`
|
||||
|
||||
error[E0277]: the size for values of type `dyn Debug` cannot be known at compilation time
|
||||
--> $DIR/issue-80742.rs:30:15
|
||||
|
|
|
@ -5,10 +5,10 @@ LL | *(B as *const bool as *mut bool) = false;
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| writing to alloc7 which is read-only
|
||||
| inside `T::<&true>::set_false` at $DIR/issue-100313.rs:10:13
|
||||
| inside `T::<&true>::set_false`
|
||||
...
|
||||
LL | x.set_false();
|
||||
| ------------- inside `_` at $DIR/issue-100313.rs:18:5
|
||||
| ------------- inside `_`
|
||||
|
||||
error: aborting due to previous error
|
||||
|
||||
|
|
|
@ -5,12 +5,12 @@ LL | &*ptr::slice_from_raw_parts(data, len)
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| dereferencing pointer failed: null pointer is a dangling pointer (it has no provenance)
|
||||
| inside `std::slice::from_raw_parts::<'_, u32>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| inside `std::slice::from_raw_parts::<'_, u32>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:18:34
|
||||
|
|
||||
LL | pub static S0: &[u32] = unsafe { from_raw_parts(ptr::null(), 0) };
|
||||
| ------------------------------ inside `S0` at $DIR/forbidden_slices.rs:18:34
|
||||
| ------------------------------ inside `S0`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
@ -19,12 +19,12 @@ LL | &*ptr::slice_from_raw_parts(data, len)
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| dereferencing pointer failed: null pointer is a dangling pointer (it has no provenance)
|
||||
| inside `std::slice::from_raw_parts::<'_, ()>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| inside `std::slice::from_raw_parts::<'_, ()>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:19:33
|
||||
|
|
||||
LL | pub static S1: &[()] = unsafe { from_raw_parts(ptr::null(), 0) };
|
||||
| ------------------------------ inside `S1` at $DIR/forbidden_slices.rs:19:33
|
||||
| ------------------------------ inside `S1`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
@ -33,12 +33,12 @@ LL | &*ptr::slice_from_raw_parts(data, len)
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| dereferencing pointer failed: ALLOC_ID has size 4, so pointer to 8 bytes starting at offset 0 is out-of-bounds
|
||||
| inside `std::slice::from_raw_parts::<'_, u32>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| inside `std::slice::from_raw_parts::<'_, u32>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:22:34
|
||||
|
|
||||
LL | pub static S2: &[u32] = unsafe { from_raw_parts(&D0, 2) };
|
||||
| ---------------------- inside `S2` at $DIR/forbidden_slices.rs:22:34
|
||||
| ---------------------- inside `S2`
|
||||
|
||||
error[E0080]: it is undefined behavior to use this value
|
||||
--> $DIR/forbidden_slices.rs:25:1
|
||||
|
@ -92,12 +92,12 @@ LL | &*ptr::slice_from_raw_parts(data, len)
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| dereferencing pointer failed: ALLOC_ID has size 8, so pointer to 8 bytes starting at offset 1 is out-of-bounds
|
||||
| inside `std::slice::from_raw_parts::<'_, u64>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| inside `std::slice::from_raw_parts::<'_, u64>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:43:5
|
||||
|
|
||||
LL | from_raw_parts(ptr, 1)
|
||||
| ---------------------- inside `S8` at $DIR/forbidden_slices.rs:43:5
|
||||
| ---------------------- inside `S8`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -106,17 +106,17 @@ LL | unsafe { intrinsics::ptr_offset_from_unsigned(self, origin) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds offset_from: null pointer is a dangling pointer (it has no provenance)
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr`
|
||||
|
|
||||
::: $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { from_raw_parts(range.start, range.end.sub_ptr(range.start)) }
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:46:34
|
||||
|
|
||||
LL | pub static R0: &[u32] = unsafe { from_ptr_range(ptr::null()..ptr::null()) };
|
||||
| ---------------------------------------- inside `R0` at $DIR/forbidden_slices.rs:46:34
|
||||
| ---------------------------------------- inside `R0`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -125,17 +125,17 @@ LL | assert!(0 < pointee_size && pointee_size <= isize::MAX as usize);
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| the evaluated program panicked at 'assertion failed: 0 < pointee_size && pointee_size <= isize::MAX as usize', $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const ()>::sub_ptr` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const ()>::sub_ptr`
|
||||
|
|
||||
::: $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { from_raw_parts(range.start, range.end.sub_ptr(range.start)) }
|
||||
| ------------------------------ inside `from_ptr_range::<'_, ()>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| ------------------------------ inside `from_ptr_range::<'_, ()>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:47:33
|
||||
|
|
||||
LL | pub static R1: &[()] = unsafe { from_ptr_range(ptr::null()..ptr::null()) };
|
||||
| ---------------------------------------- inside `R1` at $DIR/forbidden_slices.rs:47:33
|
||||
| ---------------------------------------- inside `R1`
|
||||
|
|
||||
= note: this error originates in the macro `assert` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
|
@ -146,15 +146,15 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: ALLOC_ID has size 4, so pointer to 8 bytes starting at offset 0 is out-of-bounds
|
||||
| inside `ptr::const_ptr::<impl *const u32>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u32>::offset`
|
||||
...
|
||||
LL | unsafe { self.offset(count as isize) }
|
||||
| --------------------------- inside `ptr::const_ptr::<impl *const u32>::add` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| --------------------------- inside `ptr::const_ptr::<impl *const u32>::add`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:50:25
|
||||
|
|
||||
LL | from_ptr_range(ptr..ptr.add(2))
|
||||
| ---------- inside `R2` at $DIR/forbidden_slices.rs:50:25
|
||||
| ---------- inside `R2`
|
||||
|
||||
error[E0080]: it is undefined behavior to use this value
|
||||
--> $DIR/forbidden_slices.rs:52:1
|
||||
|
@ -208,15 +208,15 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: ALLOC_ID has size 8, so pointer to 8 bytes starting at offset 1 is out-of-bounds
|
||||
| inside `ptr::const_ptr::<impl *const u64>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u64>::offset`
|
||||
...
|
||||
LL | unsafe { self.offset(count as isize) }
|
||||
| --------------------------- inside `ptr::const_ptr::<impl *const u64>::add` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| --------------------------- inside `ptr::const_ptr::<impl *const u64>::add`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:74:25
|
||||
|
|
||||
LL | from_ptr_range(ptr..ptr.add(1))
|
||||
| ---------- inside `R8` at $DIR/forbidden_slices.rs:74:25
|
||||
| ---------- inside `R8`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -225,17 +225,17 @@ LL | unsafe { intrinsics::ptr_offset_from_unsigned(self, origin) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| `ptr_offset_from_unsigned` called on pointers into different allocations
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr`
|
||||
|
|
||||
::: $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { from_raw_parts(range.start, range.end.sub_ptr(range.start)) }
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:79:34
|
||||
|
|
||||
LL | pub static R9: &[u32] = unsafe { from_ptr_range(&D0..(&D0 as *const u32).add(1)) };
|
||||
| ----------------------------------------------- inside `R9` at $DIR/forbidden_slices.rs:79:34
|
||||
| ----------------------------------------------- inside `R9`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -244,17 +244,17 @@ LL | unsafe { intrinsics::ptr_offset_from_unsigned(self, origin) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| `ptr_offset_from_unsigned` called on pointers into different allocations
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr`
|
||||
|
|
||||
::: $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { from_raw_parts(range.start, range.end.sub_ptr(range.start)) }
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:80:35
|
||||
|
|
||||
LL | pub static R10: &[u32] = unsafe { from_ptr_range(&D0..&D0) };
|
||||
| ------------------------ inside `R10` at $DIR/forbidden_slices.rs:80:35
|
||||
| ------------------------ inside `R10`
|
||||
|
||||
error: aborting due to 18 previous errors
|
||||
|
||||
|
|
|
@ -5,12 +5,12 @@ LL | &*ptr::slice_from_raw_parts(data, len)
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| dereferencing pointer failed: null pointer is a dangling pointer (it has no provenance)
|
||||
| inside `std::slice::from_raw_parts::<'_, u32>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| inside `std::slice::from_raw_parts::<'_, u32>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:18:34
|
||||
|
|
||||
LL | pub static S0: &[u32] = unsafe { from_raw_parts(ptr::null(), 0) };
|
||||
| ------------------------------ inside `S0` at $DIR/forbidden_slices.rs:18:34
|
||||
| ------------------------------ inside `S0`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
@ -19,12 +19,12 @@ LL | &*ptr::slice_from_raw_parts(data, len)
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| dereferencing pointer failed: null pointer is a dangling pointer (it has no provenance)
|
||||
| inside `std::slice::from_raw_parts::<'_, ()>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| inside `std::slice::from_raw_parts::<'_, ()>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:19:33
|
||||
|
|
||||
LL | pub static S1: &[()] = unsafe { from_raw_parts(ptr::null(), 0) };
|
||||
| ------------------------------ inside `S1` at $DIR/forbidden_slices.rs:19:33
|
||||
| ------------------------------ inside `S1`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
@ -33,12 +33,12 @@ LL | &*ptr::slice_from_raw_parts(data, len)
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| dereferencing pointer failed: ALLOC_ID has size 4, so pointer to 8 bytes starting at offset 0 is out-of-bounds
|
||||
| inside `std::slice::from_raw_parts::<'_, u32>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| inside `std::slice::from_raw_parts::<'_, u32>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:22:34
|
||||
|
|
||||
LL | pub static S2: &[u32] = unsafe { from_raw_parts(&D0, 2) };
|
||||
| ---------------------- inside `S2` at $DIR/forbidden_slices.rs:22:34
|
||||
| ---------------------- inside `S2`
|
||||
|
||||
error[E0080]: it is undefined behavior to use this value
|
||||
--> $DIR/forbidden_slices.rs:25:1
|
||||
|
@ -92,12 +92,12 @@ LL | &*ptr::slice_from_raw_parts(data, len)
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| dereferencing pointer failed: ALLOC_ID has size 8, so pointer to 8 bytes starting at offset 1 is out-of-bounds
|
||||
| inside `std::slice::from_raw_parts::<'_, u64>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| inside `std::slice::from_raw_parts::<'_, u64>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:43:5
|
||||
|
|
||||
LL | from_raw_parts(ptr, 1)
|
||||
| ---------------------- inside `S8` at $DIR/forbidden_slices.rs:43:5
|
||||
| ---------------------- inside `S8`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -106,17 +106,17 @@ LL | unsafe { intrinsics::ptr_offset_from_unsigned(self, origin) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds offset_from: null pointer is a dangling pointer (it has no provenance)
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr`
|
||||
|
|
||||
::: $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { from_raw_parts(range.start, range.end.sub_ptr(range.start)) }
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:46:34
|
||||
|
|
||||
LL | pub static R0: &[u32] = unsafe { from_ptr_range(ptr::null()..ptr::null()) };
|
||||
| ---------------------------------------- inside `R0` at $DIR/forbidden_slices.rs:46:34
|
||||
| ---------------------------------------- inside `R0`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -125,17 +125,17 @@ LL | assert!(0 < pointee_size && pointee_size <= isize::MAX as usize);
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| the evaluated program panicked at 'assertion failed: 0 < pointee_size && pointee_size <= isize::MAX as usize', $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const ()>::sub_ptr` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const ()>::sub_ptr`
|
||||
|
|
||||
::: $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { from_raw_parts(range.start, range.end.sub_ptr(range.start)) }
|
||||
| ------------------------------ inside `from_ptr_range::<'_, ()>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| ------------------------------ inside `from_ptr_range::<'_, ()>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:47:33
|
||||
|
|
||||
LL | pub static R1: &[()] = unsafe { from_ptr_range(ptr::null()..ptr::null()) };
|
||||
| ---------------------------------------- inside `R1` at $DIR/forbidden_slices.rs:47:33
|
||||
| ---------------------------------------- inside `R1`
|
||||
|
|
||||
= note: this error originates in the macro `assert` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
|
@ -146,15 +146,15 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: ALLOC_ID has size 4, so pointer to 8 bytes starting at offset 0 is out-of-bounds
|
||||
| inside `ptr::const_ptr::<impl *const u32>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u32>::offset`
|
||||
...
|
||||
LL | unsafe { self.offset(count as isize) }
|
||||
| --------------------------- inside `ptr::const_ptr::<impl *const u32>::add` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| --------------------------- inside `ptr::const_ptr::<impl *const u32>::add`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:50:25
|
||||
|
|
||||
LL | from_ptr_range(ptr..ptr.add(2))
|
||||
| ---------- inside `R2` at $DIR/forbidden_slices.rs:50:25
|
||||
| ---------- inside `R2`
|
||||
|
||||
error[E0080]: it is undefined behavior to use this value
|
||||
--> $DIR/forbidden_slices.rs:52:1
|
||||
|
@ -208,15 +208,15 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: ALLOC_ID has size 8, so pointer to 8 bytes starting at offset 1 is out-of-bounds
|
||||
| inside `ptr::const_ptr::<impl *const u64>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u64>::offset`
|
||||
...
|
||||
LL | unsafe { self.offset(count as isize) }
|
||||
| --------------------------- inside `ptr::const_ptr::<impl *const u64>::add` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| --------------------------- inside `ptr::const_ptr::<impl *const u64>::add`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:74:25
|
||||
|
|
||||
LL | from_ptr_range(ptr..ptr.add(1))
|
||||
| ---------- inside `R8` at $DIR/forbidden_slices.rs:74:25
|
||||
| ---------- inside `R8`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -225,17 +225,17 @@ LL | unsafe { intrinsics::ptr_offset_from_unsigned(self, origin) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| `ptr_offset_from_unsigned` called on pointers into different allocations
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr`
|
||||
|
|
||||
::: $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { from_raw_parts(range.start, range.end.sub_ptr(range.start)) }
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:79:34
|
||||
|
|
||||
LL | pub static R9: &[u32] = unsafe { from_ptr_range(&D0..(&D0 as *const u32).add(1)) };
|
||||
| ----------------------------------------------- inside `R9` at $DIR/forbidden_slices.rs:79:34
|
||||
| ----------------------------------------------- inside `R9`
|
||||
|
||||
error[E0080]: could not evaluate static initializer
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -244,17 +244,17 @@ LL | unsafe { intrinsics::ptr_offset_from_unsigned(self, origin) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| `ptr_offset_from_unsigned` called on pointers into different allocations
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u32>::sub_ptr`
|
||||
|
|
||||
::: $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { from_raw_parts(range.start, range.end.sub_ptr(range.start)) }
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>` at $SRC_DIR/core/src/slice/raw.rs:LL:COL
|
||||
| ------------------------------ inside `from_ptr_range::<'_, u32>`
|
||||
|
|
||||
::: $DIR/forbidden_slices.rs:80:35
|
||||
|
|
||||
LL | pub static R10: &[u32] = unsafe { from_ptr_range(&D0..&D0) };
|
||||
| ------------------------ inside `R10` at $DIR/forbidden_slices.rs:80:35
|
||||
| ------------------------ inside `R10`
|
||||
|
||||
error: aborting due to 18 previous errors
|
||||
|
||||
|
|
|
@ -5,12 +5,12 @@ LL | copy_nonoverlapping(src, tmp.as_mut_ptr(), 1);
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| memory access failed: alloc5 has size 4, so pointer to 4 bytes starting at offset 4 is out-of-bounds
|
||||
| inside `std::ptr::read::<u32>` at $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||
| inside `std::ptr::read::<u32>`
|
||||
|
|
||||
::: $DIR/out_of_bounds_read.rs:12:33
|
||||
|
|
||||
LL | const _READ: u32 = unsafe { ptr::read(PAST_END_PTR) };
|
||||
| ----------------------- inside `_READ` at $DIR/out_of_bounds_read.rs:12:33
|
||||
| ----------------------- inside `_READ`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||
|
@ -19,17 +19,17 @@ LL | copy_nonoverlapping(src, tmp.as_mut_ptr(), 1);
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| memory access failed: alloc5 has size 4, so pointer to 4 bytes starting at offset 4 is out-of-bounds
|
||||
| inside `std::ptr::read::<u32>` at $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||
| inside `std::ptr::read::<u32>`
|
||||
|
|
||||
::: $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { read(self) }
|
||||
| ---------- inside `ptr::const_ptr::<impl *const u32>::read` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| ---------- inside `ptr::const_ptr::<impl *const u32>::read`
|
||||
|
|
||||
::: $DIR/out_of_bounds_read.rs:13:39
|
||||
|
|
||||
LL | const _CONST_READ: u32 = unsafe { PAST_END_PTR.read() };
|
||||
| ------------------- inside `_CONST_READ` at $DIR/out_of_bounds_read.rs:13:39
|
||||
| ------------------- inside `_CONST_READ`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||
|
@ -38,17 +38,17 @@ LL | copy_nonoverlapping(src, tmp.as_mut_ptr(), 1);
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| memory access failed: alloc5 has size 4, so pointer to 4 bytes starting at offset 4 is out-of-bounds
|
||||
| inside `std::ptr::read::<u32>` at $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||
| inside `std::ptr::read::<u32>`
|
||||
|
|
||||
::: $SRC_DIR/core/src/ptr/mut_ptr.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { read(self) }
|
||||
| ---------- inside `ptr::mut_ptr::<impl *mut u32>::read` at $SRC_DIR/core/src/ptr/mut_ptr.rs:LL:COL
|
||||
| ---------- inside `ptr::mut_ptr::<impl *mut u32>::read`
|
||||
|
|
||||
::: $DIR/out_of_bounds_read.rs:14:37
|
||||
|
|
||||
LL | const _MUT_READ: u32 = unsafe { (PAST_END_PTR as *mut u32).read() };
|
||||
| --------------------------------- inside `_MUT_READ` at $DIR/out_of_bounds_read.rs:14:37
|
||||
| --------------------------------- inside `_MUT_READ`
|
||||
|
||||
error: aborting due to 3 previous errors
|
||||
|
||||
|
|
|
@ -5,10 +5,10 @@ LL | x(y)
|
|||
| ^^^^
|
||||
| |
|
||||
| calling non-const function `double`
|
||||
| inside `bar` at $DIR/const_fn_ptr_fail2.rs:9:5
|
||||
| inside `bar`
|
||||
...
|
||||
LL | const Y: usize = bar(X, 2); // FIXME: should fail to typeck someday
|
||||
| --------- inside `Y` at $DIR/const_fn_ptr_fail2.rs:14:18
|
||||
| --------- inside `Y`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $DIR/const_fn_ptr_fail2.rs:9:5
|
||||
|
@ -17,10 +17,10 @@ LL | x(y)
|
|||
| ^^^^
|
||||
| |
|
||||
| calling non-const function `double`
|
||||
| inside `bar` at $DIR/const_fn_ptr_fail2.rs:9:5
|
||||
| inside `bar`
|
||||
...
|
||||
LL | const Z: usize = bar(double, 2); // FIXME: should fail to typeck someday
|
||||
| -------------- inside `Z` at $DIR/const_fn_ptr_fail2.rs:15:18
|
||||
| -------------- inside `Z`
|
||||
|
||||
warning: skipping const checks
|
||||
|
|
||||
|
|
|
@ -5,10 +5,10 @@ LL | b()
|
|||
| ^^^
|
||||
| |
|
||||
| the evaluated program panicked at 'hey', $DIR/const_panic_track_caller.rs:15:5
|
||||
| inside `c` at $DIR/const_panic_track_caller.rs:15:5
|
||||
| inside `c`
|
||||
...
|
||||
LL | const X: u32 = c();
|
||||
| --- inside `X` at $DIR/const_panic_track_caller.rs:21:16
|
||||
| --- inside `X`
|
||||
|
||||
error: aborting due to previous error
|
||||
|
||||
|
|
|
@ -2,13 +2,13 @@ error[E0080]: evaluation of constant value failed
|
|||
--> $DIR/alloc_intrinsic_errors.rs:9:17
|
||||
|
|
||||
LL | const FOO: i32 = foo();
|
||||
| ----- inside `FOO` at $DIR/alloc_intrinsic_errors.rs:6:18
|
||||
| ----- inside `FOO`
|
||||
...
|
||||
LL | let _ = intrinsics::const_allocate(4, 3) as *mut i32;
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| align has to be a power of 2, `3` is not a power of 2
|
||||
| inside `foo` at $DIR/alloc_intrinsic_errors.rs:9:17
|
||||
| inside `foo`
|
||||
|
||||
error: aborting due to previous error
|
||||
|
||||
|
|
|
@ -5,10 +5,10 @@ LL | panic!()
|
|||
| ^^^^^^^^
|
||||
| |
|
||||
| the evaluated program panicked at 'explicit panic', $DIR/unwind-abort.rs:4:5
|
||||
| inside `foo` at $SRC_DIR/std/src/panic.rs:LL:COL
|
||||
| inside `foo`
|
||||
...
|
||||
LL | const _: () = foo();
|
||||
| ----- inside `_` at $DIR/unwind-abort.rs:7:15
|
||||
| ----- inside `_`
|
||||
|
|
||||
= note: this error originates in the macro `$crate::panic::panic_2015` which comes from the expansion of the macro `panic` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
|
|
|
@ -17,10 +17,10 @@ LL | unsafe { std::mem::transmute(()) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| transmuting to uninhabited type
|
||||
| inside `foo` at $DIR/validate_uninhabited_zsts.rs:4:14
|
||||
| inside `foo`
|
||||
...
|
||||
LL | const FOO: [empty::Empty; 3] = [foo(); 3];
|
||||
| ----- inside `FOO` at $DIR/validate_uninhabited_zsts.rs:19:33
|
||||
| ----- inside `FOO`
|
||||
|
||||
error[E0080]: it is undefined behavior to use this value
|
||||
--> $DIR/validate_uninhabited_zsts.rs:21:1
|
||||
|
|
|
@ -17,10 +17,10 @@ LL | unsafe { std::mem::transmute(()) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| transmuting to uninhabited type
|
||||
| inside `foo` at $DIR/validate_uninhabited_zsts.rs:4:14
|
||||
| inside `foo`
|
||||
...
|
||||
LL | const FOO: [empty::Empty; 3] = [foo(); 3];
|
||||
| ----- inside `FOO` at $DIR/validate_uninhabited_zsts.rs:19:33
|
||||
| ----- inside `FOO`
|
||||
|
||||
error[E0080]: it is undefined behavior to use this value
|
||||
--> $DIR/validate_uninhabited_zsts.rs:21:1
|
||||
|
|
|
@ -5,15 +5,15 @@ LL | panic!("const-eval error: cannot use f32::to_bits on a
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| the evaluated program panicked at 'const-eval error: cannot use f32::to_bits on a NaN', $SRC_DIR/core/src/num/f32.rs:LL:COL
|
||||
| inside `core::f32::<impl f32>::to_bits::ct_f32_to_u32` at $SRC_DIR/core/src/panic.rs:LL:COL
|
||||
| inside `core::f32::<impl f32>::to_bits::ct_f32_to_u32`
|
||||
...
|
||||
LL | unsafe { intrinsics::const_eval_select((self,), ct_f32_to_u32, rt_f32_to_u32) }
|
||||
| -------------------------------------------------------------------- inside `core::f32::<impl f32>::to_bits` at $SRC_DIR/core/src/num/f32.rs:LL:COL
|
||||
| -------------------------------------------------------------------- inside `core::f32::<impl f32>::to_bits`
|
||||
|
|
||||
::: $DIR/const-float-bits-reject-conv.rs:28:30
|
||||
|
|
||||
LL | const MASKED_NAN1: u32 = f32::NAN.to_bits() ^ 0x002A_AAAA;
|
||||
| ------------------ inside `f32::MASKED_NAN1` at $DIR/const-float-bits-reject-conv.rs:28:30
|
||||
| ------------------ inside `f32::MASKED_NAN1`
|
||||
|
|
||||
= note: this error originates in the macro `$crate::panic::panic_2021` which comes from the expansion of the macro `panic` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
|
@ -24,15 +24,15 @@ LL | panic!("const-eval error: cannot use f32::to_bits on a
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| the evaluated program panicked at 'const-eval error: cannot use f32::to_bits on a NaN', $SRC_DIR/core/src/num/f32.rs:LL:COL
|
||||
| inside `core::f32::<impl f32>::to_bits::ct_f32_to_u32` at $SRC_DIR/core/src/panic.rs:LL:COL
|
||||
| inside `core::f32::<impl f32>::to_bits::ct_f32_to_u32`
|
||||
...
|
||||
LL | unsafe { intrinsics::const_eval_select((self,), ct_f32_to_u32, rt_f32_to_u32) }
|
||||
| -------------------------------------------------------------------- inside `core::f32::<impl f32>::to_bits` at $SRC_DIR/core/src/num/f32.rs:LL:COL
|
||||
| -------------------------------------------------------------------- inside `core::f32::<impl f32>::to_bits`
|
||||
|
|
||||
::: $DIR/const-float-bits-reject-conv.rs:30:30
|
||||
|
|
||||
LL | const MASKED_NAN2: u32 = f32::NAN.to_bits() ^ 0x0055_5555;
|
||||
| ------------------ inside `f32::MASKED_NAN2` at $DIR/const-float-bits-reject-conv.rs:30:30
|
||||
| ------------------ inside `f32::MASKED_NAN2`
|
||||
|
|
||||
= note: this error originates in the macro `$crate::panic::panic_2021` which comes from the expansion of the macro `panic` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
|
@ -67,15 +67,15 @@ LL | panic!("const-eval error: cannot use f64::to_bits on a
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| the evaluated program panicked at 'const-eval error: cannot use f64::to_bits on a NaN', $SRC_DIR/core/src/num/f64.rs:LL:COL
|
||||
| inside `core::f64::<impl f64>::to_bits::ct_f64_to_u64` at $SRC_DIR/core/src/panic.rs:LL:COL
|
||||
| inside `core::f64::<impl f64>::to_bits::ct_f64_to_u64`
|
||||
...
|
||||
LL | unsafe { intrinsics::const_eval_select((self,), ct_f64_to_u64, rt_f64_to_u64) }
|
||||
| -------------------------------------------------------------------- inside `core::f64::<impl f64>::to_bits` at $SRC_DIR/core/src/num/f64.rs:LL:COL
|
||||
| -------------------------------------------------------------------- inside `core::f64::<impl f64>::to_bits`
|
||||
|
|
||||
::: $DIR/const-float-bits-reject-conv.rs:50:30
|
||||
|
|
||||
LL | const MASKED_NAN1: u64 = f64::NAN.to_bits() ^ 0x000A_AAAA_AAAA_AAAA;
|
||||
| ------------------ inside `f64::MASKED_NAN1` at $DIR/const-float-bits-reject-conv.rs:50:30
|
||||
| ------------------ inside `f64::MASKED_NAN1`
|
||||
|
|
||||
= note: this error originates in the macro `$crate::panic::panic_2021` which comes from the expansion of the macro `panic` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
|
@ -86,15 +86,15 @@ LL | panic!("const-eval error: cannot use f64::to_bits on a
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| the evaluated program panicked at 'const-eval error: cannot use f64::to_bits on a NaN', $SRC_DIR/core/src/num/f64.rs:LL:COL
|
||||
| inside `core::f64::<impl f64>::to_bits::ct_f64_to_u64` at $SRC_DIR/core/src/panic.rs:LL:COL
|
||||
| inside `core::f64::<impl f64>::to_bits::ct_f64_to_u64`
|
||||
...
|
||||
LL | unsafe { intrinsics::const_eval_select((self,), ct_f64_to_u64, rt_f64_to_u64) }
|
||||
| -------------------------------------------------------------------- inside `core::f64::<impl f64>::to_bits` at $SRC_DIR/core/src/num/f64.rs:LL:COL
|
||||
| -------------------------------------------------------------------- inside `core::f64::<impl f64>::to_bits`
|
||||
|
|
||||
::: $DIR/const-float-bits-reject-conv.rs:52:30
|
||||
|
|
||||
LL | const MASKED_NAN2: u64 = f64::NAN.to_bits() ^ 0x0005_5555_5555_5555;
|
||||
| ------------------ inside `f64::MASKED_NAN2` at $DIR/const-float-bits-reject-conv.rs:52:30
|
||||
| ------------------ inside `f64::MASKED_NAN2`
|
||||
|
|
||||
= note: this error originates in the macro `$crate::panic::panic_2021` which comes from the expansion of the macro `panic` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
|
|
|
@ -5,10 +5,10 @@ LL | Some(&mut *(42 as *mut i32))
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| dereferencing pointer failed: 0x2a[noalloc] is a dangling pointer (it has no provenance)
|
||||
| inside `helper` at $DIR/mut_ref_in_final_dynamic_check.rs:13:10
|
||||
| inside `helper`
|
||||
...
|
||||
LL | const A: Option<&mut i32> = helper();
|
||||
| -------- inside `A` at $DIR/mut_ref_in_final_dynamic_check.rs:18:29
|
||||
| -------- inside `A`
|
||||
|
||||
error: encountered dangling pointer in final constant
|
||||
--> $DIR/mut_ref_in_final_dynamic_check.rs:25:1
|
||||
|
|
|
@ -5,15 +5,15 @@ LL | intrinsics::unreachable()
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| entering unreachable code
|
||||
| inside `unreachable_unchecked` at $SRC_DIR/core/src/hint.rs:LL:COL
|
||||
| inside `unreachable_unchecked`
|
||||
|
|
||||
::: $DIR/const_unsafe_unreachable_ub.rs:6:18
|
||||
|
|
||||
LL | false => std::hint::unreachable_unchecked(),
|
||||
| ---------------------------------- inside `foo` at $DIR/const_unsafe_unreachable_ub.rs:6:18
|
||||
| ---------------------------------- inside `foo`
|
||||
...
|
||||
LL | const BAR: bool = unsafe { foo(false) };
|
||||
| ---------- inside `BAR` at $DIR/const_unsafe_unreachable_ub.rs:10:28
|
||||
| ---------- inside `BAR`
|
||||
|
||||
error: aborting due to previous error
|
||||
|
||||
|
|
|
@ -35,17 +35,17 @@ LL | copy_nonoverlapping(src, tmp.as_mut_ptr(), 1);
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| accessing memory with alignment 1, but alignment 4 is required
|
||||
| inside `std::ptr::read::<u32>` at $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||
| inside `std::ptr::read::<u32>`
|
||||
|
|
||||
::: $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { read(self) }
|
||||
| ---------- inside `ptr::const_ptr::<impl *const u32>::read` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| ---------- inside `ptr::const_ptr::<impl *const u32>::read`
|
||||
|
|
||||
::: $DIR/detect-extra-ub.rs:38:9
|
||||
|
|
||||
LL | ptr.read();
|
||||
| ---------- inside `INNER` at $DIR/detect-extra-ub.rs:38:9
|
||||
| ---------- inside `INNER`
|
||||
|
||||
note: erroneous constant used
|
||||
--> $DIR/detect-extra-ub.rs:32:5
|
||||
|
|
|
@ -5,17 +5,17 @@ LL | copy_nonoverlapping(src, tmp.as_mut_ptr(), 1);
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| unable to copy parts of a pointer from memory at ALLOC
|
||||
| inside `std::ptr::read::<u8>` at $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||
| inside `std::ptr::read::<u8>`
|
||||
|
|
||||
::: $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
|
||||
LL | unsafe { read(self) }
|
||||
| ---------- inside `ptr::const_ptr::<impl *const u8>::read` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| ---------- inside `ptr::const_ptr::<impl *const u8>::read`
|
||||
|
|
||||
::: $DIR/issue-miri-1910.rs:8:5
|
||||
|
|
||||
LL | (&foo as *const _ as *const u8).add(one_and_a_half_pointers).read();
|
||||
| ------------------------------------------------------------------- inside `C` at $DIR/issue-miri-1910.rs:8:5
|
||||
| ------------------------------------------------------------------- inside `C`
|
||||
|
|
||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||
|
|
|
@ -5,10 +5,10 @@ LL | my_fn();
|
|||
| ^^^^^^^
|
||||
| |
|
||||
| calling a function with calling convention C using calling convention Rust
|
||||
| inside `call_rust_fn` at $DIR/abi-mismatch.rs:9:5
|
||||
| inside `call_rust_fn`
|
||||
...
|
||||
LL | static VAL: () = call_rust_fn(unsafe { std::mem::transmute(c_fn as extern "C" fn()) });
|
||||
| --------------------------------------------------------------------- inside `VAL` at $DIR/abi-mismatch.rs:15:18
|
||||
| --------------------------------------------------------------------- inside `VAL`
|
||||
|
||||
warning: skipping const checks
|
||||
|
|
||||
|
|
|
@ -5,13 +5,13 @@ LL | pub unsafe fn drop_in_place<T: ?Sized>(to_drop: *mut T) {
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| calling non-const function `<Vec<u32> as Drop>::drop`
|
||||
| inside `std::ptr::drop_in_place::<Vec<u32>> - shim(Some(Vec<u32>))` at $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||
| inside `std::ptr::drop_in_place::<(Vec<u32>, u32)> - shim(Some((Vec<u32>, u32)))` at $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||
| inside `std::ptr::drop_in_place::<Vec<u32>> - shim(Some(Vec<u32>))`
|
||||
| inside `std::ptr::drop_in_place::<(Vec<u32>, u32)> - shim(Some((Vec<u32>, u32)))`
|
||||
|
|
||||
::: $DIR/assoc_const.rs:12:31
|
||||
|
|
||||
LL | const F: u32 = (U::X, 42).1;
|
||||
| - inside `<String as Bar<Vec<u32>, String>>::F` at $DIR/assoc_const.rs:12:31
|
||||
| - inside `<String as Bar<Vec<u32>, String>>::F`
|
||||
|
||||
note: erroneous constant used
|
||||
--> $DIR/assoc_const.rs:29:13
|
||||
|
|
|
@ -5,12 +5,12 @@ LL | pub unsafe fn drop_in_place<T: ?Sized>(to_drop: *mut T) {
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| calling non-const function `<Vec<i32> as Drop>::drop`
|
||||
| inside `std::ptr::drop_in_place::<Vec<i32>> - shim(Some(Vec<i32>))` at $SRC_DIR/core/src/ptr/mod.rs:LL:COL
|
||||
| inside `std::ptr::drop_in_place::<Vec<i32>> - shim(Some(Vec<i32>))`
|
||||
|
|
||||
::: $DIR/drop.rs:17:1
|
||||
|
|
||||
LL | };
|
||||
| - inside `TEST_BAD` at $DIR/drop.rs:17:1
|
||||
| - inside `TEST_BAD`
|
||||
|
||||
warning: skipping const checks
|
||||
|
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
error[E0080]: evaluation of constant value failed
|
||||
/rustc/xyz/library/core/src/ptr/mod.rs:929:14: inside `swap_nonoverlapping::<MaybeUninit<u8>>` at /rustc/xyz/library/core/src/ptr/mod.rs:929:14
|
||||
/rustc/xyz/library/core/src/ptr/mod.rs:948:9: inside `ptr::swap_nonoverlapping_simple_untyped::<MaybeUninit<u8>>` at /rustc/xyz/library/core/src/ptr/mod.rs:948:9
|
||||
--> /rustc/xyz/library/core/src/ptr/mod.rs:1139:9
|
||||
note: unable to copy parts of a pointer from memory at alloc6+0x1
|
||||
note: inside `std::ptr::read::<MaybeUninit<MaybeUninit<u8>>>` at /rustc/xyz/library/core/src/ptr/mod.rs:1139:9
|
||||
/rustc/xyz/library/core/src/mem/mod.rs:776:17: inside `mem::swap_simple::<MaybeUninit<MaybeUninit<u8>>>` at /rustc/xyz/library/core/src/mem/mod.rs:776:17
|
||||
/rustc/xyz/library/core/src/ptr/mod.rs:925:14: inside `swap_nonoverlapping::<MaybeUninit<u8>>`
|
||||
/rustc/xyz/library/core/src/ptr/mod.rs:944:9: inside `ptr::swap_nonoverlapping_simple_untyped::<MaybeUninit<u8>>`
|
||||
--> /rustc/xyz/library/core/src/ptr/mod.rs:1135:9
|
||||
note: unable to copy parts of a pointer from memory at alloc10
|
||||
note: inside `std::ptr::read::<MaybeUninit<MaybeUninit<u8>>>`
|
||||
/rustc/xyz/library/core/src/mem/mod.rs:773:17: inside `mem::swap_simple::<MaybeUninit<MaybeUninit<u8>>>`
|
||||
|
|
||||
::: $DIR/missing_span_in_backtrace.rs:16:9
|
||||
|
|
||||
|
@ -13,7 +13,7 @@ LL | | &mut ptr1 as *mut _ as *mut MaybeUninit<u8>,
|
|||
LL | | &mut ptr2 as *mut _ as *mut MaybeUninit<u8>,
|
||||
LL | | mem::size_of::<&i32>(),
|
||||
LL | | );
|
||||
| |_________- inside `X` at $DIR/missing_span_in_backtrace.rs:16:9
|
||||
| |_________- inside `X`
|
||||
|
|
||||
= help: this code performed an operation that depends on the underlying bytes representing a pointer
|
||||
= help: the absolute address of a pointer is not known at compile-time, so such operations are not supported
|
||||
|
|
|
@ -11,12 +11,12 @@ LL | unsafe { intrinsics::ptr_offset_from(self, origin) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| `ptr_offset_from` called on pointers into different allocations
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset_from` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset_from`
|
||||
|
|
||||
::: $DIR/offset_from_ub.rs:24:14
|
||||
|
|
||||
LL | unsafe { (42 as *const u8).offset_from(&5u8) as usize }
|
||||
| ----------------------------------- inside `NOT_PTR` at $DIR/offset_from_ub.rs:24:14
|
||||
| ----------------------------------- inside `NOT_PTR`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $DIR/offset_from_ub.rs:31:14
|
||||
|
@ -91,12 +91,12 @@ LL | unsafe { intrinsics::ptr_offset_from(self, origin) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds offset_from: null pointer is a dangling pointer (it has no provenance)
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset_from` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset_from`
|
||||
|
|
||||
::: $DIR/offset_from_ub.rs:115:14
|
||||
|
|
||||
LL | unsafe { ptr2.offset_from(ptr1) }
|
||||
| ---------------------- inside `OFFSET_VERY_FAR1` at $DIR/offset_from_ub.rs:115:14
|
||||
| ---------------------- inside `OFFSET_VERY_FAR1`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -105,12 +105,12 @@ LL | unsafe { intrinsics::ptr_offset_from(self, origin) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds offset_from: null pointer is a dangling pointer (it has no provenance)
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset_from` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset_from`
|
||||
|
|
||||
::: $DIR/offset_from_ub.rs:121:14
|
||||
|
|
||||
LL | unsafe { ptr1.offset_from(ptr2.wrapping_offset(1)) }
|
||||
| ----------------------------------------- inside `OFFSET_VERY_FAR2` at $DIR/offset_from_ub.rs:121:14
|
||||
| ----------------------------------------- inside `OFFSET_VERY_FAR2`
|
||||
|
||||
error: aborting due to 15 previous errors
|
||||
|
||||
|
|
|
@ -5,12 +5,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| overflowing in-bounds pointer arithmetic
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:7:46
|
||||
|
|
||||
LL | pub const BEFORE_START: *const u8 = unsafe { (&0u8 as *const u8).offset(-1) };
|
||||
| ------------------------------ inside `BEFORE_START` at $DIR/offset_ub.rs:7:46
|
||||
| ------------------------------ inside `BEFORE_START`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -19,12 +19,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: allocN has size 1, so pointer to 2 bytes starting at offset 0 is out-of-bounds
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:8:43
|
||||
|
|
||||
LL | pub const AFTER_END: *const u8 = unsafe { (&0u8 as *const u8).offset(2) };
|
||||
| ----------------------------- inside `AFTER_END` at $DIR/offset_ub.rs:8:43
|
||||
| ----------------------------- inside `AFTER_END`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -33,12 +33,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: allocN has size 100, so pointer to 101 bytes starting at offset 0 is out-of-bounds
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:9:45
|
||||
|
|
||||
LL | pub const AFTER_ARRAY: *const u8 = unsafe { [0u8; 100].as_ptr().offset(101) };
|
||||
| ------------------------------- inside `AFTER_ARRAY` at $DIR/offset_ub.rs:9:45
|
||||
| ------------------------------- inside `AFTER_ARRAY`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -47,12 +47,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| overflowing in-bounds pointer arithmetic
|
||||
| inside `ptr::const_ptr::<impl *const u16>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u16>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:11:43
|
||||
|
|
||||
LL | pub const OVERFLOW: *const u16 = unsafe { [0u16; 1].as_ptr().offset(isize::MAX) };
|
||||
| ------------------------------------- inside `OVERFLOW` at $DIR/offset_ub.rs:11:43
|
||||
| ------------------------------------- inside `OVERFLOW`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -61,12 +61,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| overflowing in-bounds pointer arithmetic
|
||||
| inside `ptr::const_ptr::<impl *const u16>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u16>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:12:44
|
||||
|
|
||||
LL | pub const UNDERFLOW: *const u16 = unsafe { [0u16; 1].as_ptr().offset(isize::MIN) };
|
||||
| ------------------------------------- inside `UNDERFLOW` at $DIR/offset_ub.rs:12:44
|
||||
| ------------------------------------- inside `UNDERFLOW`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -75,12 +75,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| overflowing in-bounds pointer arithmetic
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:13:56
|
||||
|
|
||||
LL | pub const OVERFLOW_ADDRESS_SPACE: *const u8 = unsafe { (usize::MAX as *const u8).offset(2) };
|
||||
| ----------------------------------- inside `OVERFLOW_ADDRESS_SPACE` at $DIR/offset_ub.rs:13:56
|
||||
| ----------------------------------- inside `OVERFLOW_ADDRESS_SPACE`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -89,12 +89,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| overflowing in-bounds pointer arithmetic
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:14:57
|
||||
|
|
||||
LL | pub const UNDERFLOW_ADDRESS_SPACE: *const u8 = unsafe { (1 as *const u8).offset(-2) };
|
||||
| --------------------------- inside `UNDERFLOW_ADDRESS_SPACE` at $DIR/offset_ub.rs:14:57
|
||||
| --------------------------- inside `UNDERFLOW_ADDRESS_SPACE`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -103,12 +103,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: allocN has size 1, so pointer to 2 bytes starting at offset -4 is out-of-bounds
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:15:49
|
||||
|
|
||||
LL | pub const NEGATIVE_OFFSET: *const u8 = unsafe { [0u8; 1].as_ptr().wrapping_offset(-2).offset(-2) };
|
||||
| ------------------------------------------------ inside `NEGATIVE_OFFSET` at $DIR/offset_ub.rs:15:49
|
||||
| ------------------------------------------------ inside `NEGATIVE_OFFSET`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -117,12 +117,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: allocN has size 0, so pointer to 1 byte starting at offset 0 is out-of-bounds
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:17:50
|
||||
|
|
||||
LL | pub const ZERO_SIZED_ALLOC: *const u8 = unsafe { [0u8; 0].as_ptr().offset(1) };
|
||||
| --------------------------- inside `ZERO_SIZED_ALLOC` at $DIR/offset_ub.rs:17:50
|
||||
| --------------------------- inside `ZERO_SIZED_ALLOC`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/mut_ptr.rs:LL:COL
|
||||
|
@ -131,12 +131,12 @@ LL | unsafe { intrinsics::offset(self, count) as *mut T }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: 0x1[noalloc] is a dangling pointer (it has no provenance)
|
||||
| inside `ptr::mut_ptr::<impl *mut u8>::offset` at $SRC_DIR/core/src/ptr/mut_ptr.rs:LL:COL
|
||||
| inside `ptr::mut_ptr::<impl *mut u8>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:18:42
|
||||
|
|
||||
LL | pub const DANGLING: *const u8 = unsafe { ptr::NonNull::<u8>::dangling().as_ptr().offset(4) };
|
||||
| ------------------------------------------------- inside `DANGLING` at $DIR/offset_ub.rs:18:42
|
||||
| ------------------------------------------------- inside `DANGLING`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -145,12 +145,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: null pointer is a dangling pointer (it has no provenance)
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:21:50
|
||||
|
|
||||
LL | pub const NULL_OFFSET_ZERO: *const u8 = unsafe { ptr::null::<u8>().offset(0) };
|
||||
| --------------------------- inside `NULL_OFFSET_ZERO` at $DIR/offset_ub.rs:21:50
|
||||
| --------------------------- inside `NULL_OFFSET_ZERO`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
|
@ -159,12 +159,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: 0x7f..f[noalloc] is a dangling pointer (it has no provenance)
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const u8>::offset`
|
||||
|
|
||||
::: $DIR/offset_ub.rs:24:47
|
||||
|
|
||||
LL | pub const UNDERFLOW_ABS: *const u8 = unsafe { (usize::MAX as *const u8).offset(isize::MIN) };
|
||||
| -------------------------------------------- inside `UNDERFLOW_ABS` at $DIR/offset_ub.rs:24:47
|
||||
| -------------------------------------------- inside `UNDERFLOW_ABS`
|
||||
|
||||
error: aborting due to 12 previous errors
|
||||
|
||||
|
|
|
@ -5,12 +5,12 @@ LL | unsafe { intrinsics::offset(self, count) }
|
|||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| out-of-bounds pointer arithmetic: alloc3 has size $WORD, so pointer to $TWO_WORDS bytes starting at offset 0 is out-of-bounds
|
||||
| inside `ptr::const_ptr::<impl *const usize>::offset` at $SRC_DIR/core/src/ptr/const_ptr.rs:LL:COL
|
||||
| inside `ptr::const_ptr::<impl *const usize>::offset`
|
||||
|
|
||||
::: $DIR/ptr_comparisons.rs:50:34
|
||||
|
|
||||
LL | const _: *const usize = unsafe { (FOO as *const usize).offset(2) };
|
||||
| ------------------------------- inside `_` at $DIR/ptr_comparisons.rs:50:34
|
||||
| ------------------------------- inside `_`
|
||||
|
||||
error[E0080]: evaluation of constant value failed
|
||||
--> $DIR/ptr_comparisons.rs:53:33
|
||||
|
|
|
@ -16,11 +16,11 @@ LL | f(x);
|
|||
| ^^^^
|
||||
| |
|
||||
| reached the configured maximum number of stack frames
|
||||
| inside `f::<i32>` at $DIR/recursive.rs:4:5
|
||||
| [... 126 additional calls inside `f::<i32>` at $DIR/recursive.rs:4:5 ...]
|
||||
| inside `f::<i32>`
|
||||
| [... 126 additional calls inside `f::<i32>` ...]
|
||||
...
|
||||
LL | const X: () = f(1);
|
||||
| ---- inside `X` at $DIR/recursive.rs:8:15
|
||||
| ---- inside `X`
|
||||
|
||||
error: aborting due to previous error; 1 warning emitted
|
||||
|
||||
|
|
|
@ -5,140 +5,140 @@ LL | hint_unreachable()
|
|||
| ^^^^^^^^^^^^^^^^^^
|
||||
| |
|
||||
| reached the configured maximum number of stack frames
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<i32>` at $DIR/uninhabited-const-issue-61744.rs:4:5
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<!>`
|
||||
| inside `fake_type::<i32>`
|
||||
...
|
||||
LL | fake_type()
|
||||
| -----------
|
||||
| |
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable` at $DIR/uninhabited-const-issue-61744.rs:8:5
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
| inside `hint_unreachable`
|
||||
...
|
||||
LL | const CONSTANT: i32 = unsafe { fake_type() };
|
||||
| ----------- inside `<i32 as Const>::CONSTANT` at $DIR/uninhabited-const-issue-61744.rs:12:36
|
||||
| ----------- inside `<i32 as Const>::CONSTANT`
|
||||
|
||||
note: erroneous constant used
|
||||
--> $DIR/uninhabited-const-issue-61744.rs:18:10
|
||||
|
|
|
@ -5,140 +5,140 @@ LL | b()
|
|||
| ^^^
|
||||
| |
|
||||
| reached the configured maximum number of stack frames
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a` at $DIR/infinite-recursion-const-fn.rs:4:5
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
| inside `a`
|
||||
...
|
||||
LL | a()
|
||||
| ---
|
||||
| |
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b` at $DIR/infinite-recursion-const-fn.rs:7:5
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
| inside `b`
|
||||
LL | }
|
||||
LL | const ARR: [i32; a()] = [5; 6];
|
||||
| --- inside `ARR::{constant#0}` at $DIR/infinite-recursion-const-fn.rs:9:18
|
||||
| --- inside `ARR::{constant#0}`
|
||||
|
||||
error: aborting due to previous error
|
||||
|
||||
|
|
|
@ -2,12 +2,12 @@ error[E0080]: values of the type `[u8; SIZE]` are too big for the current archit
|
|||
--> $SRC_DIR/core/src/mem/mod.rs:LL:COL
|
||||
|
|
||||
LL | intrinsics::size_of::<T>()
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ inside `std::mem::size_of::<[u8; SIZE]>` at $SRC_DIR/core/src/mem/mod.rs:LL:COL
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ inside `std::mem::size_of::<[u8; SIZE]>`
|
||||
|
|
||||
::: $DIR/issue-55878.rs:7:26
|
||||
|
|
||||
LL | println!("Size: {}", std::mem::size_of::<[u8; u64::MAX as usize]>());
|
||||
| ---------------------------------------------- inside `main` at $DIR/issue-55878.rs:7:26
|
||||
| ---------------------------------------------- inside `main`
|
||||
|
||||
note: erroneous constant used
|
||||
--> $DIR/issue-55878.rs:7:26
|
||||
|
|
|
@ -6,7 +6,7 @@ LL | foo();
|
|||
|
|
||||
= help: this is likely not a bug in the program; it indicates that the program performed an operation that the interpreter does not support
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/function_not_in_so.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -9,8 +9,8 @@ LL | | panic!()
|
|||
LL | | }
|
||||
| |_^ the program aborted execution
|
||||
|
|
||||
= note: inside `panic_abort` at $DIR/abort-terminator.rs:LL:CC
|
||||
note: inside `main` at $DIR/abort-terminator.rs:LL:CC
|
||||
= note: inside `panic_abort`
|
||||
note: inside `main`
|
||||
--> $DIR/abort-terminator.rs:LL:CC
|
||||
|
|
||||
LL | panic_abort();
|
||||
|
|
|
@ -7,8 +7,8 @@ LL | unsafe { __rust_dealloc(ptr, layout.size(), layout.align()) }
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `std::alloc::dealloc` at RUSTLIB/alloc/src/alloc.rs:LL:CC
|
||||
note: inside `main` at $DIR/deallocate-bad-alignment.rs:LL:CC
|
||||
= note: inside `std::alloc::dealloc`
|
||||
note: inside `main`
|
||||
--> $DIR/deallocate-bad-alignment.rs:LL:CC
|
||||
|
|
||||
LL | dealloc(x, Layout::from_size_align_unchecked(1, 2));
|
||||
|
|
|
@ -7,8 +7,8 @@ LL | unsafe { __rust_dealloc(ptr, layout.size(), layout.align()) }
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `std::alloc::dealloc` at RUSTLIB/alloc/src/alloc.rs:LL:CC
|
||||
note: inside `main` at $DIR/deallocate-bad-size.rs:LL:CC
|
||||
= note: inside `std::alloc::dealloc`
|
||||
note: inside `main`
|
||||
--> $DIR/deallocate-bad-size.rs:LL:CC
|
||||
|
|
||||
LL | dealloc(x, Layout::from_size_align_unchecked(2, 1));
|
||||
|
|
|
@ -7,8 +7,8 @@ LL | unsafe { __rust_dealloc(ptr, layout.size(), layout.align()) }
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `std::alloc::dealloc` at RUSTLIB/alloc/src/alloc.rs:LL:CC
|
||||
note: inside `main` at $DIR/deallocate-twice.rs:LL:CC
|
||||
= note: inside `std::alloc::dealloc`
|
||||
note: inside `main`
|
||||
--> $DIR/deallocate-twice.rs:LL:CC
|
||||
|
|
||||
LL | dealloc(x, Layout::from_size_align_unchecked(1, 1));
|
||||
|
|
|
@ -7,9 +7,9 @@ LL | FREE();
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `std::sys::PLATFORM::alloc::<impl std::alloc::GlobalAlloc for std::alloc::System>::dealloc` at RUSTLIB/std/src/sys/PLATFORM/alloc.rs:LL:CC
|
||||
= note: inside `<std::alloc::System as std::alloc::Allocator>::deallocate` at RUSTLIB/std/src/alloc.rs:LL:CC
|
||||
note: inside `main` at $DIR/global_system_mixup.rs:LL:CC
|
||||
= note: inside `std::sys::PLATFORM::alloc::<impl std::alloc::GlobalAlloc for std::alloc::System>::dealloc`
|
||||
= note: inside `<std::alloc::System as std::alloc::Allocator>::deallocate`
|
||||
note: inside `main`
|
||||
--> $DIR/global_system_mixup.rs:LL:CC
|
||||
|
|
||||
LL | System.deallocate(ptr, l);
|
||||
|
|
|
@ -6,7 +6,7 @@ LL | __rust_alloc(1, 1);
|
|||
|
|
||||
= help: this is likely not a bug in the program; it indicates that the program performed an operation that the interpreter does not support
|
||||
= note: BACKTRACE:
|
||||
= note: inside `start` at $DIR/no_global_allocator.rs:LL:CC
|
||||
= note: inside `start`
|
||||
|
||||
error: aborting due to previous error
|
||||
|
||||
|
|
|
@ -7,8 +7,8 @@ LL | unsafe { __rust_realloc(ptr, layout.size(), layout.align(), new_size) }
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `std::alloc::realloc` at RUSTLIB/alloc/src/alloc.rs:LL:CC
|
||||
note: inside `main` at $DIR/reallocate-bad-size.rs:LL:CC
|
||||
= note: inside `std::alloc::realloc`
|
||||
note: inside `main`
|
||||
--> $DIR/reallocate-bad-size.rs:LL:CC
|
||||
|
|
||||
LL | let _y = realloc(x, Layout::from_size_align_unchecked(2, 1), 1);
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let _z = *x;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/reallocate-change-alloc.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,8 +7,8 @@ LL | unsafe { __rust_realloc(ptr, layout.size(), layout.align(), new_size) }
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `std::alloc::realloc` at RUSTLIB/alloc/src/alloc.rs:LL:CC
|
||||
note: inside `main` at $DIR/reallocate-dangling.rs:LL:CC
|
||||
= note: inside `std::alloc::realloc`
|
||||
note: inside `main`
|
||||
--> $DIR/reallocate-dangling.rs:LL:CC
|
||||
|
|
||||
LL | let _z = realloc(x, Layout::from_size_align_unchecked(1, 1), 1);
|
||||
|
|
|
@ -7,12 +7,12 @@ LL | unsafe { __rust_dealloc(ptr, layout.size(), layout.align()) }
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `std::alloc::dealloc` at RUSTLIB/alloc/src/alloc.rs:LL:CC
|
||||
= note: inside `<std::alloc::Global as std::alloc::Allocator>::deallocate` at RUSTLIB/alloc/src/alloc.rs:LL:CC
|
||||
= note: inside `alloc::alloc::box_free::<i32, std::alloc::Global>` at RUSTLIB/alloc/src/alloc.rs:LL:CC
|
||||
= note: inside `std::ptr::drop_in_place::<std::boxed::Box<i32>> - shim(Some(std::boxed::Box<i32>))` at RUSTLIB/core/src/ptr/mod.rs:LL:CC
|
||||
= note: inside `std::mem::drop::<std::boxed::Box<i32>>` at RUSTLIB/core/src/mem/mod.rs:LL:CC
|
||||
note: inside `main` at $DIR/stack_free.rs:LL:CC
|
||||
= note: inside `std::alloc::dealloc`
|
||||
= note: inside `<std::alloc::Global as std::alloc::Allocator>::deallocate`
|
||||
= note: inside `alloc::alloc::box_free::<i32, std::alloc::Global>`
|
||||
= note: inside `std::ptr::drop_in_place::<std::boxed::Box<i32>> - shim(Some(std::boxed::Box<i32>))`
|
||||
= note: inside `std::mem::drop::<std::boxed::Box<i32>>`
|
||||
note: inside `main`
|
||||
--> $DIR/stack_free.rs:LL:CC
|
||||
|
|
||||
LL | drop(bad_box);
|
||||
|
|
|
@ -20,8 +20,8 @@ help: <TAG> was later invalidated at offsets [0x0..0x1] by a Unique retag
|
|||
LL | let res = helper(val, ptr);
|
||||
| ^^^
|
||||
= note: BACKTRACE:
|
||||
= note: inside `helper` at $DIR/box-cell-alias.rs:LL:CC
|
||||
note: inside `main` at $DIR/box-cell-alias.rs:LL:CC
|
||||
= note: inside `helper`
|
||||
note: inside `main`
|
||||
--> $DIR/box-cell-alias.rs:LL:CC
|
||||
|
|
||||
LL | let res = helper(val, ptr);
|
||||
|
|
|
@ -11,7 +11,7 @@ LL | | )
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/branchless-select-i128-pointer.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -4,7 +4,7 @@ error: abnormal termination: Trace/breakpoint trap
|
|||
LL | core::intrinsics::breakpoint()
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Trace/breakpoint trap
|
||||
|
|
||||
= note: inside `main` at $DIR/breakpoint.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | panic!()
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `thread_start` at RUSTLIB/std/src/panic.rs:LL:CC
|
||||
= note: inside `thread_start`
|
||||
= note: this error originates in the macro `$crate::panic::panic_2015` which comes from the expansion of the macro `panic` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
error: aborting due to previous error
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | panic!()
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `thread_start` at RUSTLIB/std/src/panic.rs:LL:CC
|
||||
= note: inside `thread_start`
|
||||
= note: this error originates in the macro `$crate::panic::panic_2015` which comes from the expansion of the macro `panic` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
error: aborting due to previous error
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | assert_eq!(libc::pthread_join(native, ptr::null_mut()), 0);
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/libc_pthread_join_detached.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | assert_eq!(libc::pthread_join(native, ptr::null_mut()), 0);
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/libc_pthread_join_joined.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | assert_eq!(libc::pthread_join(thread_id, ptr::null_mut()), 0);
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/libc_pthread_join_main.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | ... assert_eq!(libc::pthread_join(native_copy, ptr::null_mut()), 0);
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/libc_pthread_join_multiple.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | assert_eq!(libc::pthread_join(native, ptr::null_mut()), 0);
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/libc_pthread_join_self.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -13,7 +13,7 @@ please report an issue at <https://github.com/rust-lang/miri/issues> if this is
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/read_only_atomic_cmpxchg.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -13,7 +13,7 @@ please report an issue at <https://github.com/rust-lang/miri/issues> if this is
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/read_only_atomic_load.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let _val = *dangling_ptr.0;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/thread_local_static_dealloc.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -12,7 +12,7 @@ LL | | }
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `thread_start` at $DIR/unwind_top_of_stack.rs:LL:CC
|
||||
= note: inside `thread_start`
|
||||
|
||||
error: aborting due to previous error
|
||||
|
||||
|
|
|
@ -6,7 +6,7 @@ LL | let res = syscall!(epoll_create1(libc::EPOLL_CLOEXEC));
|
|||
|
|
||||
= help: this is likely not a bug in the program; it indicates that the program performed an operation that the interpreter does not support
|
||||
= note: BACKTRACE:
|
||||
note: inside `main` at $DIR/tokio_mvp.rs:LL:CC
|
||||
note: inside `main`
|
||||
--> $DIR/tokio_mvp.rs:LL:CC
|
||||
|
|
||||
LL | #[tokio::main]
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let x = unsafe { ptr::addr_of!(*p) };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at RUSTLIB/core/src/ptr/mod.rs:LL:CC
|
||||
= note: inside `main`
|
||||
= note: this error originates in the macro `ptr::addr_of` (in Nightly builds, run with -Z macro-backtrace for more info)
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let x = unsafe { *p };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/dangling_pointer_deref.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let _x = unsafe { *p };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/dangling_zst_deref.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let _y = unsafe { &*x as *const u32 };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/deref-invalid-ptr.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let val = unsafe { (*xptr).1 };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/deref-partially-dangling.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let _ptr = unsafe { &*ptr };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/dyn_size.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let _x: () = unsafe { *ptr };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/maybe_null_pointer_deref_zst.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | unsafe { *ptr = zst_val };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/maybe_null_pointer_write_zst.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let x: i32 = unsafe { *std::ptr::null() };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/null_pointer_deref.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let x: () = unsafe { *std::ptr::null() };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/null_pointer_deref_zst.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | unsafe { *std::ptr::null_mut() = 0i32 };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/null_pointer_write.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | unsafe { std::ptr::null_mut::<[u8; 0]>().write(zst_val) };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/null_pointer_write_zst.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let x = unsafe { *v.as_ptr().wrapping_offset(5) };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/out_of_bounds_read1.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let x = unsafe { *v.as_ptr().wrapping_offset(5) };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/out_of_bounds_read2.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let val = *x;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/stack_temporary.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,8 +7,8 @@ LL | unsafe { &mut *(LEAK as *mut i32) };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `evil` at $DIR/storage_dead_dangling.rs:LL:CC
|
||||
note: inside `main` at $DIR/storage_dead_dangling.rs:LL:CC
|
||||
= note: inside `evil`
|
||||
note: inside `main`
|
||||
--> $DIR/storage_dead_dangling.rs:LL:CC
|
||||
|
|
||||
LL | evil();
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | let x = unsafe { *p };
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/wild_pointer_deref.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *pointer.load(Ordering::Relaxed)
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/alloc_read_race.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *pointer.load(Ordering::Relaxed) = 2;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/alloc_write_race.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | (&*c.0).load(Ordering::SeqCst)
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/atomic_read_na_write_race1.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *atomic_ref.get_mut() = 32;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/atomic_read_na_write_race2.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *atomic_ref.get_mut()
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/atomic_write_na_read_race1.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | (&*c.0).store(32, Ordering::SeqCst);
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/atomic_write_na_read_race2.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | (&*c.0).store(64, Ordering::SeqCst);
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/atomic_write_na_write_race1.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *atomic_ref.get_mut() = 32;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/atomic_write_na_write_race2.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *c.0 = 64;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/dangling_thread_async_race.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *c.0 = 64;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/dangling_thread_race.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -12,7 +12,7 @@ LL | | );
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/dealloc_read_race1.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *ptr.0
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/dealloc_read_race2.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | }
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/dealloc_read_race_stack.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -12,7 +12,7 @@ LL | | );
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/dealloc_write_race1.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *ptr.0 = 2;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/dealloc_write_race2.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | }
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/dealloc_write_race_stack.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *c.0 = 64;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/enable_after_join_to_main.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | unsafe { V = 2 }
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `main` at $DIR/fence_after_load.rs:LL:CC
|
||||
= note: inside `main`
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *c.0 = 64;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/read_write_race.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | stack_var
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/read_write_race_stack.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *c.0
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/relax_acquire_race.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *c.0
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/release_seq_race.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *c.0
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/release_seq_race_same_thread.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *c.0
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/rmw_race.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
|
@ -7,8 +7,8 @@ LL | }
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside `race` at $DIR/stack_pop_race.rs:LL:CC
|
||||
note: inside `main` at $DIR/stack_pop_race.rs:LL:CC
|
||||
= note: inside `race`
|
||||
note: inside `main`
|
||||
--> $DIR/stack_pop_race.rs:LL:CC
|
||||
|
|
||||
LL | race(0);
|
||||
|
|
|
@ -7,7 +7,7 @@ LL | *c.0 = 64;
|
|||
= help: this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior
|
||||
= help: see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information
|
||||
= note: BACKTRACE:
|
||||
= note: inside closure at $DIR/write_write_race.rs:LL:CC
|
||||
= note: inside closure
|
||||
|
||||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace
|
||||
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Reference in a new issue