Skip to content

Commit 2cd942d

Browse files
committed
stabilize const_mut_refs
1 parent a2a238f commit 2cd942d

File tree

148 files changed

+238
-1312
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

148 files changed

+238
-1312
lines changed

compiler/rustc_const_eval/messages.ftl

-7
Original file line numberDiff line numberDiff line change
@@ -230,9 +230,6 @@ const_eval_memory_exhausted =
230230
const_eval_modified_global =
231231
modifying a static's initial value from another static's initializer
232232
233-
const_eval_mut_deref =
234-
mutation through a reference is not allowed in {const_eval_const_context}s
235-
236233
const_eval_mutable_ptr_in_final = encountered mutable pointer in final value of {const_eval_intern_kind}
237234
238235
const_eval_nested_static_in_thread_local = #[thread_local] does not support implicit nested statics, please create explicit static items and refer to them instead
@@ -363,10 +360,6 @@ const_eval_too_generic =
363360
const_eval_too_many_caller_args =
364361
calling a function with more arguments than it expected
365362
366-
const_eval_transient_mut_borrow = mutable references are not allowed in {const_eval_const_context}s
367-
368-
const_eval_transient_mut_raw = raw mutable pointers are not allowed in {const_eval_const_context}s
369-
370363
const_eval_try_block_from_output_non_const =
371364
`try` block cannot convert `{$ty}` to the result in {const_eval_const_context}s
372365
const_eval_unallowed_fn_pointer_call = function pointer calls are not allowed in {const_eval_const_context}s

compiler/rustc_const_eval/src/check_consts/check.rs

+6-105
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ use rustc_mir_dataflow::Analysis;
1919
use rustc_span::{sym, Span, Symbol, DUMMY_SP};
2020
use rustc_trait_selection::error_reporting::InferCtxtErrorExt;
2121
use rustc_trait_selection::traits::{self, ObligationCauseCode, ObligationCtxt};
22-
use rustc_type_ir::visit::{TypeSuperVisitable, TypeVisitor};
2322
use tracing::{debug, instrument, trace};
2423

2524
use super::ops::{self, NonConstOp, Status};
@@ -163,24 +162,6 @@ impl<'mir, 'tcx> Qualifs<'mir, 'tcx> {
163162
}
164163
}
165164

166-
struct LocalReturnTyVisitor<'ck, 'mir, 'tcx> {
167-
kind: LocalKind,
168-
checker: &'ck mut Checker<'mir, 'tcx>,
169-
}
170-
171-
impl<'ck, 'mir, 'tcx> TypeVisitor<TyCtxt<'tcx>> for LocalReturnTyVisitor<'ck, 'mir, 'tcx> {
172-
fn visit_ty(&mut self, t: Ty<'tcx>) {
173-
match t.kind() {
174-
ty::FnPtr(..) => {}
175-
ty::Ref(_, _, hir::Mutability::Mut) => {
176-
self.checker.check_op(ops::mut_ref::MutRef(self.kind));
177-
t.super_visit_with(self)
178-
}
179-
_ => t.super_visit_with(self),
180-
}
181-
}
182-
}
183-
184165
pub struct Checker<'mir, 'tcx> {
185166
ccx: &'mir ConstCx<'mir, 'tcx>,
186167
qualifs: Qualifs<'mir, 'tcx>,
@@ -226,25 +207,6 @@ impl<'mir, 'tcx> Checker<'mir, 'tcx> {
226207
return;
227208
}
228209

229-
// The local type and predicate checks are not free and only relevant for `const fn`s.
230-
if self.const_kind() == hir::ConstContext::ConstFn {
231-
for (idx, local) in body.local_decls.iter_enumerated() {
232-
// Handle the return place below.
233-
if idx == RETURN_PLACE {
234-
continue;
235-
}
236-
237-
self.span = local.source_info.span;
238-
self.check_local_or_return_ty(local.ty, idx);
239-
}
240-
241-
// impl trait is gone in MIR, so check the return type of a const fn by its signature
242-
// instead of the type of the return place.
243-
self.span = body.local_decls[RETURN_PLACE].source_info.span;
244-
let return_ty = self.ccx.fn_sig().output();
245-
self.check_local_or_return_ty(return_ty.skip_binder(), RETURN_PLACE);
246-
}
247-
248210
if !tcx.has_attr(def_id, sym::rustc_do_not_const_check) {
249211
self.visit_body(body);
250212
}
@@ -344,24 +306,16 @@ impl<'mir, 'tcx> Checker<'mir, 'tcx> {
344306
self.check_op_spanned(ops::StaticAccess, span)
345307
}
346308

347-
fn check_local_or_return_ty(&mut self, ty: Ty<'tcx>, local: Local) {
348-
let kind = self.body.local_kind(local);
349-
350-
let mut visitor = LocalReturnTyVisitor { kind, checker: self };
351-
352-
visitor.visit_ty(ty);
353-
}
354-
355309
fn check_mut_borrow(&mut self, place: &Place<'_>, kind: hir::BorrowKind) {
356-
match self.const_kind() {
310+
let is_transient = match self.const_kind() {
357311
// In a const fn all borrows are transient or point to the places given via
358312
// references in the arguments (so we already checked them with
359313
// TransientMutBorrow/MutBorrow as appropriate).
360314
// The borrow checker guarantees that no new non-transient borrows are created.
361315
// NOTE: Once we have heap allocations during CTFE we need to figure out
362316
// how to prevent `const fn` to create long-lived allocations that point
363317
// to mutable memory.
364-
hir::ConstContext::ConstFn => self.check_op(ops::TransientMutBorrow(kind)),
318+
hir::ConstContext::ConstFn => true,
365319
_ => {
366320
// For indirect places, we are not creating a new permanent borrow, it's just as
367321
// transient as the already existing one. For reborrowing references this is handled
@@ -375,12 +329,11 @@ impl<'mir, 'tcx> Checker<'mir, 'tcx> {
375329
// `StorageDead` in every control flow path leading to a `return` terminator.
376330
// The good news is that interning will detect if any unexpected mutable
377331
// pointer slips through.
378-
if place.is_indirect() || self.local_has_storage_dead(place.local) {
379-
self.check_op(ops::TransientMutBorrow(kind));
380-
} else {
381-
self.check_op(ops::MutBorrow(kind));
382-
}
332+
place.is_indirect() || self.local_has_storage_dead(place.local)
383333
}
334+
};
335+
if !is_transient {
336+
self.check_op(ops::EscapingMutBorrow(kind));
384337
}
385338
}
386339
}
@@ -626,58 +579,6 @@ impl<'tcx> Visitor<'tcx> for Checker<'_, 'tcx> {
626579
}
627580
}
628581
}
629-
fn visit_projection_elem(
630-
&mut self,
631-
place_ref: PlaceRef<'tcx>,
632-
elem: PlaceElem<'tcx>,
633-
context: PlaceContext,
634-
location: Location,
635-
) {
636-
trace!(
637-
"visit_projection_elem: place_ref={:?} elem={:?} \
638-
context={:?} location={:?}",
639-
place_ref, elem, context, location,
640-
);
641-
642-
self.super_projection_elem(place_ref, elem, context, location);
643-
644-
match elem {
645-
ProjectionElem::Deref => {
646-
let base_ty = place_ref.ty(self.body, self.tcx).ty;
647-
if base_ty.is_unsafe_ptr() {
648-
if place_ref.projection.is_empty() {
649-
let decl = &self.body.local_decls[place_ref.local];
650-
// If this is a static, then this is not really dereferencing a pointer,
651-
// just directly accessing a static. That is not subject to any feature
652-
// gates (except for the one about whether statics can even be used, but
653-
// that is checked already by `visit_operand`).
654-
if let LocalInfo::StaticRef { .. } = *decl.local_info() {
655-
return;
656-
}
657-
}
658-
659-
// `*const T` is stable, `*mut T` is not
660-
if !base_ty.is_mutable_ptr() {
661-
return;
662-
}
663-
664-
self.check_op(ops::RawMutPtrDeref);
665-
}
666-
667-
if context.is_mutating_use() {
668-
self.check_op(ops::MutDeref);
669-
}
670-
}
671-
672-
ProjectionElem::ConstantIndex { .. }
673-
| ProjectionElem::Downcast(..)
674-
| ProjectionElem::OpaqueCast(..)
675-
| ProjectionElem::Subslice { .. }
676-
| ProjectionElem::Subtype(..)
677-
| ProjectionElem::Field(..)
678-
| ProjectionElem::Index(_) => {}
679-
}
680-
}
681582

682583
fn visit_source_info(&mut self, source_info: &SourceInfo) {
683584
trace!("visit_source_info: source_info={:?}", source_info);

compiler/rustc_const_eval/src/check_consts/ops.rs

+3-94
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ use rustc_hir as hir;
88
use rustc_hir::def_id::DefId;
99
use rustc_infer::infer::TyCtxtInferExt;
1010
use rustc_infer::traits::{ImplSource, Obligation, ObligationCause};
11-
use rustc_middle::mir::{self, CallSource};
11+
use rustc_middle::mir::CallSource;
1212
use rustc_middle::span_bug;
1313
use rustc_middle::ty::print::{with_no_trimmed_paths, PrintTraitRefExt as _};
1414
use rustc_middle::ty::{
@@ -463,9 +463,9 @@ impl<'tcx> NonConstOp<'tcx> for CellBorrow {
463463
/// This op is for `&mut` borrows in the trailing expression of a constant
464464
/// which uses the "enclosing scopes rule" to leak its locals into anonymous
465465
/// static or const items.
466-
pub struct MutBorrow(pub hir::BorrowKind);
466+
pub struct EscapingMutBorrow(pub hir::BorrowKind);
467467

468-
impl<'tcx> NonConstOp<'tcx> for MutBorrow {
468+
impl<'tcx> NonConstOp<'tcx> for EscapingMutBorrow {
469469
fn status_in_item(&self, _ccx: &ConstCx<'_, 'tcx>) -> Status {
470470
Status::Forbidden
471471
}
@@ -492,49 +492,6 @@ impl<'tcx> NonConstOp<'tcx> for MutBorrow {
492492
}
493493
}
494494

495-
#[derive(Debug)]
496-
pub struct TransientMutBorrow(pub hir::BorrowKind);
497-
498-
impl<'tcx> NonConstOp<'tcx> for TransientMutBorrow {
499-
fn status_in_item(&self, _: &ConstCx<'_, 'tcx>) -> Status {
500-
Status::Unstable(sym::const_mut_refs)
501-
}
502-
503-
fn build_error(&self, ccx: &ConstCx<'_, 'tcx>, span: Span) -> Diag<'tcx> {
504-
let kind = ccx.const_kind();
505-
match self.0 {
506-
hir::BorrowKind::Raw => ccx
507-
.tcx
508-
.sess
509-
.create_feature_err(errors::TransientMutRawErr { span, kind }, sym::const_mut_refs),
510-
hir::BorrowKind::Ref => ccx.tcx.sess.create_feature_err(
511-
errors::TransientMutBorrowErr { span, kind },
512-
sym::const_mut_refs,
513-
),
514-
}
515-
}
516-
}
517-
518-
#[derive(Debug)]
519-
pub struct MutDeref;
520-
impl<'tcx> NonConstOp<'tcx> for MutDeref {
521-
fn status_in_item(&self, _: &ConstCx<'_, 'tcx>) -> Status {
522-
Status::Unstable(sym::const_mut_refs)
523-
}
524-
525-
fn importance(&self) -> DiagImportance {
526-
// Usually a side-effect of a `TransientMutBorrow` somewhere.
527-
DiagImportance::Secondary
528-
}
529-
530-
fn build_error(&self, ccx: &ConstCx<'_, 'tcx>, span: Span) -> Diag<'tcx> {
531-
ccx.tcx.sess.create_feature_err(
532-
errors::MutDerefErr { span, kind: ccx.const_kind() },
533-
sym::const_mut_refs,
534-
)
535-
}
536-
}
537-
538495
/// A call to a `panic()` lang item where the first argument is _not_ a `&str`.
539496
#[derive(Debug)]
540497
pub struct PanicNonStr;
@@ -556,24 +513,6 @@ impl<'tcx> NonConstOp<'tcx> for RawPtrComparison {
556513
}
557514
}
558515

559-
#[derive(Debug)]
560-
pub struct RawMutPtrDeref;
561-
impl<'tcx> NonConstOp<'tcx> for RawMutPtrDeref {
562-
fn status_in_item(&self, _: &ConstCx<'_, '_>) -> Status {
563-
Status::Unstable(sym::const_mut_refs)
564-
}
565-
566-
#[allow(rustc::untranslatable_diagnostic)] // FIXME: make this translatable
567-
fn build_error(&self, ccx: &ConstCx<'_, 'tcx>, span: Span) -> Diag<'tcx> {
568-
feature_err(
569-
&ccx.tcx.sess,
570-
sym::const_mut_refs,
571-
span,
572-
format!("dereferencing raw mutable pointers in {}s is unstable", ccx.const_kind(),),
573-
)
574-
}
575-
}
576-
577516
/// Casting raw pointer or function pointer to an integer.
578517
/// Not currently intended to ever be allowed, even behind a feature gate: operation depends on
579518
/// allocation base addresses that are not known at compile-time.
@@ -620,33 +559,3 @@ impl<'tcx> NonConstOp<'tcx> for ThreadLocalAccess {
620559
ccx.dcx().create_err(errors::ThreadLocalAccessErr { span })
621560
}
622561
}
623-
624-
/// Types that cannot appear in the signature or locals of a `const fn`.
625-
pub mod mut_ref {
626-
use super::*;
627-
628-
#[derive(Debug)]
629-
pub struct MutRef(pub mir::LocalKind);
630-
impl<'tcx> NonConstOp<'tcx> for MutRef {
631-
fn status_in_item(&self, _ccx: &ConstCx<'_, 'tcx>) -> Status {
632-
Status::Unstable(sym::const_mut_refs)
633-
}
634-
635-
fn importance(&self) -> DiagImportance {
636-
match self.0 {
637-
mir::LocalKind::Temp => DiagImportance::Secondary,
638-
mir::LocalKind::ReturnPointer | mir::LocalKind::Arg => DiagImportance::Primary,
639-
}
640-
}
641-
642-
#[allow(rustc::untranslatable_diagnostic)] // FIXME: make this translatable
643-
fn build_error(&self, ccx: &ConstCx<'_, 'tcx>, span: Span) -> Diag<'tcx> {
644-
feature_err(
645-
&ccx.tcx.sess,
646-
sym::const_mut_refs,
647-
span,
648-
format!("mutable references are not allowed in {}s", ccx.const_kind()),
649-
)
650-
}
651-
}
652-
}

compiler/rustc_const_eval/src/errors.rs

-24
Original file line numberDiff line numberDiff line change
@@ -93,30 +93,6 @@ pub(crate) struct PanicNonStrErr {
9393
pub span: Span,
9494
}
9595

96-
#[derive(Diagnostic)]
97-
#[diag(const_eval_mut_deref, code = E0658)]
98-
pub(crate) struct MutDerefErr {
99-
#[primary_span]
100-
pub span: Span,
101-
pub kind: ConstContext,
102-
}
103-
104-
#[derive(Diagnostic)]
105-
#[diag(const_eval_transient_mut_borrow, code = E0658)]
106-
pub(crate) struct TransientMutBorrowErr {
107-
#[primary_span]
108-
pub span: Span,
109-
pub kind: ConstContext,
110-
}
111-
112-
#[derive(Diagnostic)]
113-
#[diag(const_eval_transient_mut_raw, code = E0658)]
114-
pub(crate) struct TransientMutRawErr {
115-
#[primary_span]
116-
pub span: Span,
117-
pub kind: ConstContext,
118-
}
119-
12096
#[derive(Diagnostic)]
12197
#[diag(const_eval_max_num_nodes_in_const)]
12298
pub(crate) struct MaxNumNodesInConstErr {

compiler/rustc_error_codes/src/error_codes/E0764.md

-4
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@ A mutable reference was used in a constant.
33
Erroneous code example:
44

55
```compile_fail,E0764
6-
#![feature(const_mut_refs)]
7-
86
fn main() {
97
const OH_NO: &'static mut usize = &mut 1; // error!
108
}
@@ -26,8 +24,6 @@ Remember: you cannot use a function call inside a constant or static. However,
2624
you can totally use it in constant functions:
2725

2826
```
29-
#![feature(const_mut_refs)]
30-
3127
const fn foo(x: usize) -> usize {
3228
let mut y = 1;
3329
let z = &mut y;

compiler/rustc_feature/src/accepted.rs

+2
Original file line numberDiff line numberDiff line change
@@ -139,6 +139,8 @@ declare_features! (
139139
(accepted, const_let, "1.33.0", Some(48821)),
140140
/// Allows the use of `loop` and `while` in constants.
141141
(accepted, const_loop, "1.46.0", Some(52000)),
142+
/// Allows using `&mut` in constant functions.
143+
(accepted, const_mut_refs, "CURRENT_RUSTC_VERSION", Some(57349)),
142144
/// Allows panicking during const eval (producing compile-time errors).
143145
(accepted, const_panic, "1.57.0", Some(51999)),
144146
/// Allows dereferencing raw pointers during const eval.

compiler/rustc_feature/src/unstable.rs

-2
Original file line numberDiff line numberDiff line change
@@ -404,8 +404,6 @@ declare_features! (
404404
(unstable, const_fn_floating_point_arithmetic, "1.48.0", Some(57241)),
405405
/// Allows `for _ in _` loops in const contexts.
406406
(unstable, const_for, "1.56.0", Some(87575)),
407-
/// Allows using `&mut` in constant functions.
408-
(unstable, const_mut_refs, "1.41.0", Some(57349)),
409407
/// Be more precise when looking for live drops in a const context.
410408
(unstable, const_precise_live_drops, "1.46.0", Some(73255)),
411409
/// Allows references to types with interior mutability within constants

compiler/rustc_lint_defs/src/builtin.rs

-1
Original file line numberDiff line numberDiff line change
@@ -4657,7 +4657,6 @@ declare_lint! {
46574657
/// ### Example
46584658
///
46594659
/// ```rust,compile_fail
4660-
/// #![feature(const_mut_refs)]
46614660
/// const WRITE_AFTER_CAST: () = unsafe {
46624661
/// let mut x = 0;
46634662
/// let ptr = &x as *const i32 as *mut i32;

0 commit comments

Comments
 (0)