forked from rust-lang/miri
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
bed7359
commit 183c128
Showing
2 changed files
with
54 additions
and
0 deletions.
There are no files selected for viewing
23 changes: 23 additions & 0 deletions
23
tests/fail/tree_borrows/repeated_foreign_read_lazy_conflicted.rs
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
//@compile-flags: -Zmiri-tree-borrows | ||
|
||
use std::ptr::addr_of_mut; | ||
|
||
fn do_something(_: u8) {} | ||
|
||
unsafe fn access_after_sub_1(x: &mut u8, orig_ptr: *mut u8) { | ||
// causes a second access, which should make the lazy part of `x` be `Reserved {conflicted: true}` | ||
do_something(*orig_ptr); | ||
// read from the conflicted pointer | ||
*(x as *mut u8).byte_sub(1) = 42; //~ ERROR: /write access through .* is forbidden/ | ||
} | ||
|
||
pub fn main() { | ||
unsafe { | ||
let mut alloc = [0u8, 0u8]; | ||
let orig_ptr = addr_of_mut!(alloc) as *mut u8; | ||
let foo = &mut *orig_ptr; | ||
// cause a foreign read access to foo | ||
do_something(alloc[0]); | ||
access_after_sub_1(&mut *(foo as *mut u8).byte_add(1), orig_ptr); | ||
} | ||
} |
31 changes: 31 additions & 0 deletions
31
tests/fail/tree_borrows/repeated_foreign_read_lazy_conflicted.stderr
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
error: Undefined Behavior: write access through <TAG> at ALLOC[0x0] is forbidden | ||
--> $DIR/repeated_foreign_read_lazy_conflicted.rs:LL:CC | ||
| | ||
LL | *(x as *mut u8).byte_sub(1) = 42; | ||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ write access through <TAG> at ALLOC[0x0] is forbidden | ||
| | ||
= help: this indicates a potential bug in the program: it performed an invalid operation, but the Tree Borrows rules it violated are still experimental | ||
= help: the accessed tag <TAG> has state Reserved (conflicted) which forbids this child write access | ||
help: the accessed tag <TAG> was created here, in the initial state Reserved | ||
--> $DIR/repeated_foreign_read_lazy_conflicted.rs:LL:CC | ||
| | ||
LL | unsafe fn access_after_sub_1(x: &mut u8, orig_ptr: *mut u8) { | ||
| ^ | ||
help: the accessed tag <TAG> later transitioned to Reserved (conflicted) due to a foreign read access at offsets [0x0..0x1] | ||
--> $DIR/repeated_foreign_read_lazy_conflicted.rs:LL:CC | ||
| | ||
LL | do_something(*orig_ptr); | ||
| ^^^^^^^^^ | ||
= help: this transition corresponds to a temporary loss of write permissions until function exit | ||
= note: BACKTRACE (of the first span): | ||
= note: inside `access_after_sub_1` at $DIR/repeated_foreign_read_lazy_conflicted.rs:LL:CC | ||
note: inside `main` | ||
--> $DIR/repeated_foreign_read_lazy_conflicted.rs:LL:CC | ||
| | ||
LL | access_after_sub_1(&mut *(foo as *mut u8).byte_add(1), orig_ptr); | ||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ||
|
||
note: some details are omitted, run with `MIRIFLAGS=-Zmiri-backtrace=full` for a verbose backtrace | ||
|
||
error: aborting due to 1 previous error | ||
|