Skip to content

Commit 1204400

Browse files
committedFeb 24, 2022
Auto merge of #94314 - matthiaskrgr:rollup-hmed8n7, r=matthiaskrgr
Rollup of 9 pull requests Successful merges: - #89887 (Change `char` type in debuginfo to DW_ATE_UTF) - #94267 (Remove unused ordering derivations and bounds for `SimplifiedTypeGen`) - #94270 (Miri: relax fn ptr check) - #94273 (add matching doc to errorkind) - #94283 (remove feature gate in control_flow examples) - #94288 (Cleanup a few Decoder methods) - #94292 (riscv32imc_esp_espidf: set max_atomic_width to 64) - #94296 (:arrow_up: rust-analyzer) - #94300 (Fix a typo in documentation of `array::IntoIter::new_unchecked`) Failed merges: r? `@ghost` `@rustbot` modify labels: rollup
2 parents e780264 + bdcdd1b commit 1204400

File tree

21 files changed

+156
-90
lines changed

21 files changed

+156
-90
lines changed
 

‎compiler/rustc_ast/src/ast.rs

+1-2
Original file line numberDiff line numberDiff line change
@@ -2418,8 +2418,7 @@ impl<S: Encoder> rustc_serialize::Encodable<S> for AttrId {
24182418
}
24192419

24202420
impl<D: Decoder> rustc_serialize::Decodable<D> for AttrId {
2421-
fn decode(d: &mut D) -> AttrId {
2422-
d.read_unit();
2421+
fn decode(_: &mut D) -> AttrId {
24232422
crate::attr::mk_attr_id()
24242423
}
24252424
}

‎compiler/rustc_codegen_llvm/src/debuginfo/metadata.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ const DW_ATE_signed: c_uint = 0x05;
8787
#[allow(non_upper_case_globals)]
8888
const DW_ATE_unsigned: c_uint = 0x07;
8989
#[allow(non_upper_case_globals)]
90-
const DW_ATE_unsigned_char: c_uint = 0x08;
90+
const DW_ATE_UTF: c_uint = 0x10;
9191

9292
pub const UNKNOWN_LINE_NUMBER: c_uint = 0;
9393
pub const UNKNOWN_COLUMN_NUMBER: c_uint = 0;
@@ -933,7 +933,7 @@ fn basic_type_metadata<'ll, 'tcx>(cx: &CodegenCx<'ll, 'tcx>, t: Ty<'tcx>) -> &'l
933933
ty::Never => ("!", DW_ATE_unsigned),
934934
ty::Tuple(elements) if elements.is_empty() => ("()", DW_ATE_unsigned),
935935
ty::Bool => ("bool", DW_ATE_boolean),
936-
ty::Char => ("char", DW_ATE_unsigned_char),
936+
ty::Char => ("char", DW_ATE_UTF),
937937
ty::Int(int_ty) if cpp_like_debuginfo => (int_ty.msvc_basic_name(), DW_ATE_signed),
938938
ty::Uint(uint_ty) if cpp_like_debuginfo => (uint_ty.msvc_basic_name(), DW_ATE_unsigned),
939939
ty::Float(float_ty) if cpp_like_debuginfo => (float_ty.msvc_basic_name(), DW_ATE_float),

‎compiler/rustc_const_eval/src/interpret/validity.rs

+18-13
Original file line numberDiff line numberDiff line change
@@ -567,22 +567,27 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValidityVisitor<'rt, 'mir, '
567567
}
568568
ty::FnPtr(_sig) => {
569569
let value = try_validation!(
570-
self.ecx.read_immediate(value),
570+
self.ecx.read_scalar(value).and_then(|v| v.check_init()),
571571
self.path,
572572
err_unsup!(ReadPointerAsBytes) => { "part of a pointer" } expected { "a proper pointer or integer value" },
573+
err_ub!(InvalidUninitBytes(None)) => { "uninitialized bytes" } expected { "a proper pointer or integer value" },
573574
);
574-
// Make sure we print a `ScalarMaybeUninit` (and not an `ImmTy`) in the error
575-
// message below.
576-
let value = value.to_scalar_or_uninit();
577-
let _fn = try_validation!(
578-
value.check_init().and_then(|ptr| self.ecx.memory.get_fn(self.ecx.scalar_to_ptr(ptr))),
579-
self.path,
580-
err_ub!(DanglingIntPointer(..)) |
581-
err_ub!(InvalidFunctionPointer(..)) |
582-
err_ub!(InvalidUninitBytes(None)) =>
583-
{ "{:x}", value } expected { "a function pointer" },
584-
);
585-
// FIXME: Check if the signature matches
575+
let ptr = self.ecx.scalar_to_ptr(value);
576+
// Ensure the pointer is non-null.
577+
if self.ecx.memory.ptr_may_be_null(ptr) {
578+
throw_validation_failure!(self.path, { "a potentially null function pointer" });
579+
}
580+
// If we check references recursively, also check that this points to a function.
581+
if let Some(_) = self.ref_tracking {
582+
let _fn = try_validation!(
583+
self.ecx.memory.get_fn(ptr),
584+
self.path,
585+
err_ub!(DanglingIntPointer(..)) |
586+
err_ub!(InvalidFunctionPointer(..)) =>
587+
{ "{:x}", value } expected { "a function pointer" },
588+
);
589+
// FIXME: Check if the signature matches
590+
}
586591
Ok(true)
587592
}
588593
ty::Never => throw_validation_failure!(self.path, { "a value of the never type `!`" }),

‎compiler/rustc_data_structures/src/fingerprint.rs

+1-3
Original file line numberDiff line numberDiff line change
@@ -153,9 +153,7 @@ impl<E: rustc_serialize::Encoder> Encodable<E> for Fingerprint {
153153
impl<D: rustc_serialize::Decoder> Decodable<D> for Fingerprint {
154154
#[inline]
155155
fn decode(d: &mut D) -> Self {
156-
let mut bytes = [0u8; 16];
157-
d.read_raw_bytes_into(&mut bytes);
158-
Fingerprint::from_le_bytes(bytes)
156+
Fingerprint::from_le_bytes(d.read_raw_bytes(16).try_into().unwrap())
159157
}
160158
}
161159

‎compiler/rustc_metadata/src/rmeta/decoder.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -316,7 +316,7 @@ impl<'a, 'tcx> DecodeContext<'a, 'tcx> {
316316
}
317317

318318
#[inline]
319-
pub fn read_raw_bytes(&mut self, len: usize) -> &'a [u8] {
319+
pub fn read_raw_bytes(&mut self, len: usize) -> &[u8] {
320320
self.opaque.read_raw_bytes(len)
321321
}
322322
}

‎compiler/rustc_middle/src/mir/predecessors.rs

+1-2
Original file line numberDiff line numberDiff line change
@@ -63,8 +63,7 @@ impl<S: serialize::Encoder> serialize::Encodable<S> for PredecessorCache {
6363

6464
impl<D: serialize::Decoder> serialize::Decodable<D> for PredecessorCache {
6565
#[inline]
66-
fn decode(d: &mut D) -> Self {
67-
let () = d.read_unit();
66+
fn decode(_: &mut D) -> Self {
6867
Self::new()
6968
}
7069
}

‎compiler/rustc_middle/src/ty/codec.rs

+3-5
Original file line numberDiff line numberDiff line change
@@ -465,8 +465,6 @@ macro_rules! implement_ty_decoder {
465465

466466
impl<$($typaram ),*> Decoder for $DecoderName<$($typaram),*> {
467467
$crate::__impl_decoder_methods! {
468-
read_unit -> ();
469-
470468
read_u128 -> u128;
471469
read_u64 -> u64;
472470
read_u32 -> u32;
@@ -485,12 +483,12 @@ macro_rules! implement_ty_decoder {
485483
read_f64 -> f64;
486484
read_f32 -> f32;
487485
read_char -> char;
488-
read_str -> Cow<'_, str>;
486+
read_str -> &str;
489487
}
490488

491489
#[inline]
492-
fn read_raw_bytes_into(&mut self, bytes: &mut [u8]) {
493-
self.opaque.read_raw_bytes_into(bytes)
490+
fn read_raw_bytes(&mut self, len: usize) -> &[u8] {
491+
self.opaque.read_raw_bytes(len)
494492
}
495493
}
496494
}

‎compiler/rustc_middle/src/ty/fast_reject.rs

+4-4
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ pub type SimplifiedType = SimplifiedTypeGen<DefId>;
1717
/// because we sometimes need to use SimplifiedTypeGen values as stable sorting
1818
/// keys (in which case we use a DefPathHash as id-type) but in the general case
1919
/// the non-stable but fast to construct DefId-version is the better choice.
20-
#[derive(Clone, Copy, Debug, PartialEq, Eq, Hash, PartialOrd, Ord, TyEncodable, TyDecodable)]
20+
#[derive(Clone, Copy, Debug, PartialEq, Eq, Hash, TyEncodable, TyDecodable)]
2121
pub enum SimplifiedTypeGen<D>
2222
where
2323
D: Copy + Debug + Eq,
@@ -124,7 +124,7 @@ pub fn simplify_type(
124124
}
125125
}
126126

127-
impl<D: Copy + Debug + Ord + Eq> SimplifiedTypeGen<D> {
127+
impl<D: Copy + Debug + Eq> SimplifiedTypeGen<D> {
128128
pub fn def(self) -> Option<D> {
129129
match self {
130130
AdtSimplifiedType(d)
@@ -140,7 +140,7 @@ impl<D: Copy + Debug + Ord + Eq> SimplifiedTypeGen<D> {
140140
pub fn map_def<U, F>(self, map: F) -> SimplifiedTypeGen<U>
141141
where
142142
F: Fn(D) -> U,
143-
U: Copy + Debug + Ord + Eq,
143+
U: Copy + Debug + Eq,
144144
{
145145
match self {
146146
BoolSimplifiedType => BoolSimplifiedType,
@@ -171,7 +171,7 @@ impl<D: Copy + Debug + Ord + Eq> SimplifiedTypeGen<D> {
171171

172172
impl<'a, D> HashStable<StableHashingContext<'a>> for SimplifiedTypeGen<D>
173173
where
174-
D: Copy + Debug + Ord + Eq + HashStable<StableHashingContext<'a>>,
174+
D: Copy + Debug + Eq + HashStable<StableHashingContext<'a>>,
175175
{
176176
fn hash_stable(&self, hcx: &mut StableHashingContext<'a>, hasher: &mut StableHasher) {
177177
mem::discriminant(self).hash_stable(hcx, hasher);

‎compiler/rustc_serialize/src/opaque.rs

+7-20
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
use crate::leb128::{self, max_leb128_len};
2-
use crate::serialize::{self, Encoder as _};
3-
use std::borrow::Cow;
2+
use crate::serialize::{self, Decoder as _, Encoder as _};
43
use std::convert::TryInto;
54
use std::fs::File;
65
use std::io::{self, Write};
@@ -549,25 +548,13 @@ impl<'a> Decoder<'a> {
549548
pub fn advance(&mut self, bytes: usize) {
550549
self.position += bytes;
551550
}
552-
553-
#[inline]
554-
pub fn read_raw_bytes(&mut self, bytes: usize) -> &'a [u8] {
555-
let start = self.position;
556-
self.position += bytes;
557-
&self.data[start..self.position]
558-
}
559551
}
560552

561553
macro_rules! read_leb128 {
562554
($dec:expr, $fun:ident) => {{ leb128::$fun($dec.data, &mut $dec.position) }};
563555
}
564556

565557
impl<'a> serialize::Decoder for Decoder<'a> {
566-
#[inline]
567-
fn read_unit(&mut self) -> () {
568-
()
569-
}
570-
571558
#[inline]
572559
fn read_u128(&mut self) -> u128 {
573560
read_leb128!(self, read_u128_leb128)
@@ -663,22 +650,22 @@ impl<'a> serialize::Decoder for Decoder<'a> {
663650
}
664651

665652
#[inline]
666-
fn read_str(&mut self) -> Cow<'_, str> {
653+
fn read_str(&mut self) -> &'a str {
667654
let len = self.read_usize();
668655
let sentinel = self.data[self.position + len];
669656
assert!(sentinel == STR_SENTINEL);
670657
let s = unsafe {
671658
std::str::from_utf8_unchecked(&self.data[self.position..self.position + len])
672659
};
673660
self.position += len + 1;
674-
Cow::Borrowed(s)
661+
s
675662
}
676663

677664
#[inline]
678-
fn read_raw_bytes_into(&mut self, s: &mut [u8]) {
665+
fn read_raw_bytes(&mut self, bytes: usize) -> &'a [u8] {
679666
let start = self.position;
680-
self.position += s.len();
681-
s.copy_from_slice(&self.data[start..self.position]);
667+
self.position += bytes;
668+
&self.data[start..self.position]
682669
}
683670
}
684671

@@ -746,10 +733,10 @@ impl<'a> serialize::Decodable<Decoder<'a>> for IntEncodedWithFixedSize {
746733
fn decode(decoder: &mut Decoder<'a>) -> IntEncodedWithFixedSize {
747734
let _start_pos = decoder.position();
748735
let bytes = decoder.read_raw_bytes(IntEncodedWithFixedSize::ENCODED_SIZE);
736+
let value = u64::from_le_bytes(bytes.try_into().unwrap());
749737
let _end_pos = decoder.position();
750738
debug_assert_eq!((_end_pos - _start_pos), IntEncodedWithFixedSize::ENCODED_SIZE);
751739

752-
let value = u64::from_le_bytes(bytes.try_into().unwrap());
753740
IntEncodedWithFixedSize(value)
754741
}
755742
}

‎compiler/rustc_serialize/src/serialize.rs

+5-9
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,6 @@ pub trait Encoder {
181181
// concise.
182182
pub trait Decoder {
183183
// Primitive types:
184-
fn read_unit(&mut self) -> ();
185184
fn read_usize(&mut self) -> usize;
186185
fn read_u128(&mut self) -> u128;
187186
fn read_u64(&mut self) -> u64;
@@ -198,8 +197,8 @@ pub trait Decoder {
198197
fn read_f64(&mut self) -> f64;
199198
fn read_f32(&mut self) -> f32;
200199
fn read_char(&mut self) -> char;
201-
fn read_str(&mut self) -> Cow<'_, str>;
202-
fn read_raw_bytes_into(&mut self, s: &mut [u8]);
200+
fn read_str(&mut self) -> &str;
201+
fn read_raw_bytes(&mut self, len: usize) -> &[u8];
203202
}
204203

205204
/// Trait for types that can be serialized
@@ -313,7 +312,7 @@ impl<S: Encoder> Encodable<S> for String {
313312

314313
impl<D: Decoder> Decodable<D> for String {
315314
fn decode(d: &mut D) -> String {
316-
d.read_str().into_owned()
315+
d.read_str().to_owned()
317316
}
318317
}
319318

@@ -324,9 +323,7 @@ impl<S: Encoder> Encodable<S> for () {
324323
}
325324

326325
impl<D: Decoder> Decodable<D> for () {
327-
fn decode(d: &mut D) -> () {
328-
d.read_unit()
329-
}
326+
fn decode(_: &mut D) -> () {}
330327
}
331328

332329
impl<S: Encoder, T> Encodable<S> for PhantomData<T> {
@@ -336,8 +333,7 @@ impl<S: Encoder, T> Encodable<S> for PhantomData<T> {
336333
}
337334

338335
impl<D: Decoder, T> Decodable<D> for PhantomData<T> {
339-
fn decode(d: &mut D) -> PhantomData<T> {
340-
d.read_unit();
336+
fn decode(_: &mut D) -> PhantomData<T> {
341337
PhantomData
342338
}
343339
}

‎compiler/rustc_target/src/spec/riscv32imc_esp_espidf.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,11 @@ pub fn target() -> Target {
1818
cpu: "generic-rv32".to_string(),
1919

2020
// While the RiscV32IMC architecture does not natively support atomics, ESP-IDF does support
21-
// the __atomic* and __sync* GCC builtins, so setting `max_atomic_width` to `Some(32)`
21+
// the __atomic* and __sync* GCC builtins, so setting `max_atomic_width` to `Some(64)`
2222
// and `atomic_cas` to `true` will cause the compiler to emit libcalls to these builtins.
2323
//
2424
// Support for atomics is necessary for the Rust STD library, which is supported by the ESP-IDF framework.
25-
max_atomic_width: Some(32),
25+
max_atomic_width: Some(64),
2626
atomic_cas: true,
2727

2828
features: "+m,+c".to_string(),

‎library/core/src/array/iter.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ impl<T, const N: usize> IntoIter<T, N> {
9393
///
9494
/// - The `buffer[initialized]` elements must all be initialized.
9595
/// - The range must be canonical, with `initialized.start <= initialized.end`.
96-
/// - The range must in in-bounds for the buffer, with `initialized.end <= N`.
96+
/// - The range must be in-bounds for the buffer, with `initialized.end <= N`.
9797
/// (Like how indexing `[0][100..100]` fails despite the range being empty.)
9898
///
9999
/// It's sound to have more elements initialized than mentioned, though that

‎library/core/src/ops/control_flow.rs

-2
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,6 @@ impl<B, C> ControlFlow<B, C> {
134134
/// # Examples
135135
///
136136
/// ```
137-
/// #![feature(control_flow_enum)]
138137
/// use std::ops::ControlFlow;
139138
///
140139
/// assert!(ControlFlow::<i32, String>::Break(3).is_break());
@@ -151,7 +150,6 @@ impl<B, C> ControlFlow<B, C> {
151150
/// # Examples
152151
///
153152
/// ```
154-
/// #![feature(control_flow_enum)]
155153
/// use std::ops::ControlFlow;
156154
///
157155
/// assert!(!ControlFlow::<i32, String>::Break(3).is_continue());

‎library/std/src/io/error.rs

+13
Original file line numberDiff line numberDiff line change
@@ -141,6 +141,19 @@ struct Custom {
141141
/// It is used with the [`io::Error`] type.
142142
///
143143
/// [`io::Error`]: Error
144+
///
145+
/// # Handling errors and matching on `ErrorKind`
146+
///
147+
/// In application code, use `match` for the `ErrorKind` values you are
148+
/// expecting; use `_` to match "all other errors".
149+
///
150+
/// In comprehensive and thorough tests that want to verify that a test doesn't
151+
/// return any known incorrect error kind, you may want to cut-and-paste the
152+
/// current full list of errors from here into your test code, and then match
153+
/// `_` as the correct case. This seems counterintuitive, but it will make your
154+
/// tests more robust. In particular, if you want to verify that your code does
155+
/// produce an unrecognized error kind, the robust solution is to check for all
156+
/// the recognized error kinds and fail in those cases.
144157
#[derive(Clone, Copy, Debug, Eq, Hash, Ord, PartialEq, PartialOrd)]
145158
#[stable(feature = "rust1", since = "1.0.0")]
146159
#[allow(deprecated)]

‎src/test/debuginfo/basic-types.rs

+2-1
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,8 @@
104104
// cdb-check:b : false [Type: bool]
105105
// cdb-command:dx i
106106
// cdb-check:i : -1 [Type: [...]]
107-
// The variable 'c' doesn't appear for some reason...
107+
// cdb-command:dx c
108+
// cdb-check:c : 0x61 'a' [Type: char32_t]
108109
// cdb-command:dx i8
109110
// cdb-check:i8 : 68 [Type: char]
110111
// cdb-command:dx i16

‎src/test/debuginfo/borrowed-basic.rs

+1-2
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,7 @@
1414
// gdb-check:$2 = -1
1515

1616
// gdb-command:print *char_ref
17-
// gdbg-check:$3 = 97
18-
// gdbr-check:$3 = 97 'a'
17+
// gdb-check:$3 = 97
1918

2019
// gdb-command:print *i8_ref
2120
// gdbg-check:$4 = 68 'D'

‎src/test/debuginfo/borrowed-unique-basic.rs

+1-2
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,7 @@
1616
// gdb-check:$2 = -1
1717

1818
// gdb-command:print *char_ref
19-
// gdbg-check:$3 = 97
20-
// gdbr-check:$3 = 97 'a'
19+
// gdb-check:$3 = 97
2120

2221
// gdb-command:print/d *i8_ref
2322
// gdb-check:$4 = 68

‎src/test/ui/consts/const-eval/ub-ref-ptr.32bit.stderr

+42-9
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ LL | const NULL_BOX: Box<u16> = unsafe { mem::transmute(0usize) };
4343
}
4444

4545
error[E0080]: it is undefined behavior to use this value
46-
--> $DIR/ub-ref-ptr.rs:30:1
46+
--> $DIR/ub-ref-ptr.rs:31:1
4747
|
4848
LL | const REF_AS_USIZE: usize = unsafe { mem::transmute(&0) };
4949
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered pointer to alloc15, but expected initialized plain (non-pointer) bytes
@@ -54,7 +54,7 @@ LL | const REF_AS_USIZE: usize = unsafe { mem::transmute(&0) };
5454
}
5555

5656
error[E0080]: it is undefined behavior to use this value
57-
--> $DIR/ub-ref-ptr.rs:33:1
57+
--> $DIR/ub-ref-ptr.rs:34:1
5858
|
5959
LL | const REF_AS_USIZE_SLICE: &[usize] = &[unsafe { mem::transmute(&0) }];
6060
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed at .<deref>: encountered a pointer, but expected plain (non-pointer) bytes
@@ -65,7 +65,7 @@ LL | const REF_AS_USIZE_SLICE: &[usize] = &[unsafe { mem::transmute(&0) }];
6565
}
6666

6767
error[E0080]: it is undefined behavior to use this value
68-
--> $DIR/ub-ref-ptr.rs:36:1
68+
--> $DIR/ub-ref-ptr.rs:37:1
6969
|
7070
LL | const REF_AS_USIZE_BOX_SLICE: Box<[usize]> = unsafe { mem::transmute::<&[usize], _>(&[mem::transmute(&0)]) };
7171
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed at .<deref>: encountered a pointer, but expected plain (non-pointer) bytes
@@ -76,7 +76,7 @@ LL | const REF_AS_USIZE_BOX_SLICE: Box<[usize]> = unsafe { mem::transmute::<&[us
7676
}
7777

7878
error[E0080]: it is undefined behavior to use this value
79-
--> $DIR/ub-ref-ptr.rs:39:1
79+
--> $DIR/ub-ref-ptr.rs:40:1
8080
|
8181
LL | const USIZE_AS_REF: &'static u8 = unsafe { mem::transmute(1337usize) };
8282
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered a dangling reference (address 0x539 is unallocated)
@@ -87,7 +87,7 @@ LL | const USIZE_AS_REF: &'static u8 = unsafe { mem::transmute(1337usize) };
8787
}
8888

8989
error[E0080]: it is undefined behavior to use this value
90-
--> $DIR/ub-ref-ptr.rs:42:1
90+
--> $DIR/ub-ref-ptr.rs:43:1
9191
|
9292
LL | const USIZE_AS_BOX: Box<u8> = unsafe { mem::transmute(1337usize) };
9393
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered a dangling box (address 0x539 is unallocated)
@@ -98,7 +98,7 @@ LL | const USIZE_AS_BOX: Box<u8> = unsafe { mem::transmute(1337usize) };
9898
}
9999

100100
error[E0080]: it is undefined behavior to use this value
101-
--> $DIR/ub-ref-ptr.rs:45:1
101+
--> $DIR/ub-ref-ptr.rs:46:1
102102
|
103103
LL | const UNINIT_PTR: *const i32 = unsafe { MaybeUninit { uninit: () }.init };
104104
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered uninitialized raw pointer
@@ -109,16 +109,49 @@ LL | const UNINIT_PTR: *const i32 = unsafe { MaybeUninit { uninit: () }.init };
109109
}
110110

111111
error[E0080]: it is undefined behavior to use this value
112-
--> $DIR/ub-ref-ptr.rs:47:1
112+
--> $DIR/ub-ref-ptr.rs:49:1
113+
|
114+
LL | const NULL_FN_PTR: fn() = unsafe { mem::transmute(0usize) };
115+
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered a potentially null function pointer
116+
|
117+
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
118+
= note: the raw bytes of the constant (size: 4, align: 4) {
119+
00 00 00 00 │ ....
120+
}
121+
122+
error[E0080]: it is undefined behavior to use this value
123+
--> $DIR/ub-ref-ptr.rs:51:1
113124
|
114125
LL | const UNINIT_FN_PTR: fn() = unsafe { MaybeUninit { uninit: () }.init };
115-
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered uninitialized bytes, but expected a function pointer
126+
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered uninitialized bytes, but expected a proper pointer or integer value
116127
|
117128
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
118129
= note: the raw bytes of the constant (size: 4, align: 4) {
119130
__ __ __ __ │ ░░░░
120131
}
121132

122-
error: aborting due to 11 previous errors
133+
error[E0080]: it is undefined behavior to use this value
134+
--> $DIR/ub-ref-ptr.rs:53:1
135+
|
136+
LL | const DANGLING_FN_PTR: fn() = unsafe { mem::transmute(13usize) };
137+
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered 0x0000000d, but expected a function pointer
138+
|
139+
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
140+
= note: the raw bytes of the constant (size: 4, align: 4) {
141+
0d 00 00 00 │ ....
142+
}
143+
144+
error[E0080]: it is undefined behavior to use this value
145+
--> $DIR/ub-ref-ptr.rs:55:1
146+
|
147+
LL | const DATA_FN_PTR: fn() = unsafe { mem::transmute(&13) };
148+
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered pointer to alloc41, but expected a function pointer
149+
|
150+
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
151+
= note: the raw bytes of the constant (size: 4, align: 4) {
152+
╾─alloc41─╼ │ ╾──╼
153+
}
154+
155+
error: aborting due to 14 previous errors
123156

124157
For more information about this error, try `rustc --explain E0080`.

‎src/test/ui/consts/const-eval/ub-ref-ptr.64bit.stderr

+42-9
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ LL | const NULL_BOX: Box<u16> = unsafe { mem::transmute(0usize) };
4343
}
4444

4545
error[E0080]: it is undefined behavior to use this value
46-
--> $DIR/ub-ref-ptr.rs:30:1
46+
--> $DIR/ub-ref-ptr.rs:31:1
4747
|
4848
LL | const REF_AS_USIZE: usize = unsafe { mem::transmute(&0) };
4949
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered pointer to alloc15, but expected initialized plain (non-pointer) bytes
@@ -54,7 +54,7 @@ LL | const REF_AS_USIZE: usize = unsafe { mem::transmute(&0) };
5454
}
5555

5656
error[E0080]: it is undefined behavior to use this value
57-
--> $DIR/ub-ref-ptr.rs:33:1
57+
--> $DIR/ub-ref-ptr.rs:34:1
5858
|
5959
LL | const REF_AS_USIZE_SLICE: &[usize] = &[unsafe { mem::transmute(&0) }];
6060
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed at .<deref>: encountered a pointer, but expected plain (non-pointer) bytes
@@ -65,7 +65,7 @@ LL | const REF_AS_USIZE_SLICE: &[usize] = &[unsafe { mem::transmute(&0) }];
6565
}
6666

6767
error[E0080]: it is undefined behavior to use this value
68-
--> $DIR/ub-ref-ptr.rs:36:1
68+
--> $DIR/ub-ref-ptr.rs:37:1
6969
|
7070
LL | const REF_AS_USIZE_BOX_SLICE: Box<[usize]> = unsafe { mem::transmute::<&[usize], _>(&[mem::transmute(&0)]) };
7171
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed at .<deref>: encountered a pointer, but expected plain (non-pointer) bytes
@@ -76,7 +76,7 @@ LL | const REF_AS_USIZE_BOX_SLICE: Box<[usize]> = unsafe { mem::transmute::<&[us
7676
}
7777

7878
error[E0080]: it is undefined behavior to use this value
79-
--> $DIR/ub-ref-ptr.rs:39:1
79+
--> $DIR/ub-ref-ptr.rs:40:1
8080
|
8181
LL | const USIZE_AS_REF: &'static u8 = unsafe { mem::transmute(1337usize) };
8282
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered a dangling reference (address 0x539 is unallocated)
@@ -87,7 +87,7 @@ LL | const USIZE_AS_REF: &'static u8 = unsafe { mem::transmute(1337usize) };
8787
}
8888

8989
error[E0080]: it is undefined behavior to use this value
90-
--> $DIR/ub-ref-ptr.rs:42:1
90+
--> $DIR/ub-ref-ptr.rs:43:1
9191
|
9292
LL | const USIZE_AS_BOX: Box<u8> = unsafe { mem::transmute(1337usize) };
9393
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered a dangling box (address 0x539 is unallocated)
@@ -98,7 +98,7 @@ LL | const USIZE_AS_BOX: Box<u8> = unsafe { mem::transmute(1337usize) };
9898
}
9999

100100
error[E0080]: it is undefined behavior to use this value
101-
--> $DIR/ub-ref-ptr.rs:45:1
101+
--> $DIR/ub-ref-ptr.rs:46:1
102102
|
103103
LL | const UNINIT_PTR: *const i32 = unsafe { MaybeUninit { uninit: () }.init };
104104
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered uninitialized raw pointer
@@ -109,16 +109,49 @@ LL | const UNINIT_PTR: *const i32 = unsafe { MaybeUninit { uninit: () }.init };
109109
}
110110

111111
error[E0080]: it is undefined behavior to use this value
112-
--> $DIR/ub-ref-ptr.rs:47:1
112+
--> $DIR/ub-ref-ptr.rs:49:1
113+
|
114+
LL | const NULL_FN_PTR: fn() = unsafe { mem::transmute(0usize) };
115+
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered a potentially null function pointer
116+
|
117+
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
118+
= note: the raw bytes of the constant (size: 8, align: 8) {
119+
00 00 00 00 00 00 00 00 │ ........
120+
}
121+
122+
error[E0080]: it is undefined behavior to use this value
123+
--> $DIR/ub-ref-ptr.rs:51:1
113124
|
114125
LL | const UNINIT_FN_PTR: fn() = unsafe { MaybeUninit { uninit: () }.init };
115-
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered uninitialized bytes, but expected a function pointer
126+
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered uninitialized bytes, but expected a proper pointer or integer value
116127
|
117128
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
118129
= note: the raw bytes of the constant (size: 8, align: 8) {
119130
__ __ __ __ __ __ __ __ │ ░░░░░░░░
120131
}
121132

122-
error: aborting due to 11 previous errors
133+
error[E0080]: it is undefined behavior to use this value
134+
--> $DIR/ub-ref-ptr.rs:53:1
135+
|
136+
LL | const DANGLING_FN_PTR: fn() = unsafe { mem::transmute(13usize) };
137+
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered 0x000000000000000d, but expected a function pointer
138+
|
139+
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
140+
= note: the raw bytes of the constant (size: 8, align: 8) {
141+
0d 00 00 00 00 00 00 00 │ ........
142+
}
143+
144+
error[E0080]: it is undefined behavior to use this value
145+
--> $DIR/ub-ref-ptr.rs:55:1
146+
|
147+
LL | const DATA_FN_PTR: fn() = unsafe { mem::transmute(&13) };
148+
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ type validation failed: encountered pointer to alloc41, but expected a function pointer
149+
|
150+
= note: The rules on what exactly is undefined behavior aren't clear, so this check might be overzealous. Please open an issue on the rustc repository if you believe it should not be considered undefined behavior.
151+
= note: the raw bytes of the constant (size: 8, align: 8) {
152+
╾───────alloc41───────╼ │ ╾──────╼
153+
}
154+
155+
error: aborting due to 14 previous errors
123156

124157
For more information about this error, try `rustc --explain E0080`.

‎src/test/ui/consts/const-eval/ub-ref-ptr.rs

+8
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ const NULL: &u16 = unsafe { mem::transmute(0usize) };
2424
const NULL_BOX: Box<u16> = unsafe { mem::transmute(0usize) };
2525
//~^ ERROR it is undefined behavior to use this value
2626

27+
2728
// It is very important that we reject this: We do promote `&(4 * REF_AS_USIZE)`,
2829
// but that would fail to compile; so we ended up breaking user code that would
2930
// have worked fine had we not promoted.
@@ -44,7 +45,14 @@ const USIZE_AS_BOX: Box<u8> = unsafe { mem::transmute(1337usize) };
4445

4546
const UNINIT_PTR: *const i32 = unsafe { MaybeUninit { uninit: () }.init };
4647
//~^ ERROR it is undefined behavior to use this value
48+
49+
const NULL_FN_PTR: fn() = unsafe { mem::transmute(0usize) };
50+
//~^ ERROR it is undefined behavior to use this value
4751
const UNINIT_FN_PTR: fn() = unsafe { MaybeUninit { uninit: () }.init };
4852
//~^ ERROR it is undefined behavior to use this value
53+
const DANGLING_FN_PTR: fn() = unsafe { mem::transmute(13usize) };
54+
//~^ ERROR it is undefined behavior to use this value
55+
const DATA_FN_PTR: fn() = unsafe { mem::transmute(&13) };
56+
//~^ ERROR it is undefined behavior to use this value
4957

5058
fn main() {}

‎src/tools/rust-analyzer

0 commit comments

Comments
 (0)
Please sign in to comment.