-
Notifications
You must be signed in to change notification settings - Fork 13.3k
Crash in glue$copy$$g14$t1$P1 #180
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
WONTFIX (not required for bootstrapping, also I think long since obsolete) |
ZuseZ4
referenced
this issue
in EnzymeAD/rust
Mar 7, 2023
* handle amdgcn intrinsics * constant addrspace is constant * make sure we don't use constant AS for shadow * Cleanup julia/amd Co-authored-by: Valentin Churavy <v.churavy@gmail.com>
celinval
pushed a commit
to celinval/rust-dev
that referenced
this issue
Nov 29, 2024
…ng#180) Towards rust-lang#150 ### Changes * Added a `CStr` Safety Invariant * Added a harness for `from_bytes_until_nul`, the harness covers: * The input slice contains a single null byte at the end; * The input slice contains no null bytes; * The input slice contains intermediate null bytes ### Discussion * [Safety invariant implementation](model-checking#150 (comment)) * [Input array generation](model-checking#181) ### Verification Result `./scripts/run-kani.sh --kani-args --harness ffi::c_str::verify` ``` // array size 16 Checking harness ffi::c_str::verify::check_from_bytes_until_nul... VERIFICATION RESULT: ** 0 of 140 failed (5 unreachable) VERIFICATION:- SUCCESSFUL Verification Time: 7.3023376s Complete - 1 successfully verified harnesses, 0 failures, 1 total. ``` By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 and MIT licenses.
This issue was closed.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
When running
rustc
on my repo, which has an AST parameterized over an arbitrary type T, I get:Even an empty source file passed to
rustc
triggers the error.The text was updated successfully, but these errors were encountered: