Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
int
Rust
提交
70c1cf15
R
Rust
项目概览
int
/
Rust
大约 1 年 前同步成功
通知
1
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
DevOps
流水线
流水线任务
计划
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
R
Rust
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
DevOps
DevOps
流水线
流水线任务
计划
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
流水线任务
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
70c1cf15
编写于
5月 15, 2021
作者:
R
Ralf Jung
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
32bit bless
上级
8af76cb6
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
28 addition
and
38 deletion
+28
-38
src/test/ui/consts/miri_unleashed/const_refers_to_static2.32bit.stderr
...onsts/miri_unleashed/const_refers_to_static2.32bit.stderr
+4
-8
src/test/ui/consts/miri_unleashed/const_refers_to_static_cross_crate.32bit.stderr
...unleashed/const_refers_to_static_cross_crate.32bit.stderr
+24
-30
未找到文件。
src/test/ui/consts/miri_unleashed/const_refers_to_static2.32bit.stderr
浏览文件 @
70c1cf15
...
...
@@ -3,8 +3,6 @@ error[E0080]: it is undefined behavior to use this value
|
LL | / const REF_INTERIOR_MUT: &usize = {
LL | |
LL | |
LL | |
LL | | static FOO: AtomicUsize = AtomicUsize::new(0);
LL | | unsafe { &*(&FOO as *const _ as *const usize) }
LL | | };
...
...
@@ -16,12 +14,10 @@ LL | | };
}
error[E0080]: it is undefined behavior to use this value
--> $DIR/const_refers_to_static2.rs:
20
:1
--> $DIR/const_refers_to_static2.rs:
18
:1
|
LL | / const READ_IMMUT: &usize = {
LL | |
LL | |
LL | |
LL | | static FOO: usize = 0;
LL | | &FOO
LL | | };
...
...
@@ -35,17 +31,17 @@ LL | | };
warning: skipping const checks
|
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static2.rs:1
6
:18
--> $DIR/const_refers_to_static2.rs:1
4
:18
|
LL | unsafe { &*(&FOO as *const _ as *const usize) }
| ^^^
help: skipping check for `const_raw_ptr_deref` feature
--> $DIR/const_refers_to_static2.rs:1
6
:14
--> $DIR/const_refers_to_static2.rs:1
4
:14
|
LL | unsafe { &*(&FOO as *const _ as *const usize) }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static2.rs:2
5
:6
--> $DIR/const_refers_to_static2.rs:2
1
:6
|
LL | &FOO
| ^^^
...
...
src/test/ui/consts/miri_unleashed/const_refers_to_static_cross_crate.32bit.stderr
浏览文件 @
70c1cf15
...
...
@@ -3,8 +3,6 @@ error[E0080]: it is undefined behavior to use this value
|
LL | / const SLICE_MUT: &[u8; 1] = {
LL | |
LL | |
LL | |
LL | | unsafe { &static_cross_crate::ZERO }
LL | | };
| |__^ type validation failed: encountered a reference pointing to a static variable
...
...
@@ -15,18 +13,16 @@ LL | | };
}
error: could not evaluate constant pattern
--> $DIR/const_refers_to_static_cross_crate.rs:4
7
:9
--> $DIR/const_refers_to_static_cross_crate.rs:4
0
:9
|
LL | SLICE_MUT => true,
| ^^^^^^^^^
error[E0080]: it is undefined behavior to use this value
--> $DIR/const_refers_to_static_cross_crate.rs:1
9
:1
--> $DIR/const_refers_to_static_cross_crate.rs:1
7
:1
|
LL | / const U8_MUT: &u8 = {
LL | |
LL | |
LL | |
LL | | unsafe { &static_cross_crate::ZERO[0] }
LL | | };
| |__^ type validation failed: encountered a reference pointing to a static variable
...
...
@@ -37,13 +33,13 @@ LL | | };
}
error: could not evaluate constant pattern
--> $DIR/const_refers_to_static_cross_crate.rs:
56
:9
--> $DIR/const_refers_to_static_cross_crate.rs:
49
:9
|
LL | U8_MUT => true,
| ^^^^^^
warning: any use of this value will cause an error
--> $DIR/const_refers_to_static_cross_crate.rs:2
9
:15
--> $DIR/const_refers_to_static_cross_crate.rs:2
5
:15
|
LL | / const U8_MUT2: &u8 = {
LL | | unsafe { &(*static_cross_crate::ZERO_REF)[0] }
...
...
@@ -51,12 +47,11 @@ LL | | unsafe { &(*static_cross_crate::ZERO_REF)[0] }
LL | |
LL | |
LL | |
LL | |
LL | | };
| |__-
|
note: the lint level is defined here
--> $DIR/const_refers_to_static_cross_crate.rs:2
7
:8
--> $DIR/const_refers_to_static_cross_crate.rs:2
3
:8
|
LL | #[warn(const_err)]
| ^^^^^^^^^
...
...
@@ -64,26 +59,25 @@ LL | #[warn(const_err)]
= note: for more information, see issue #71800 <https://github.com/rust-lang/rust/issues/71800>
error: could not evaluate constant pattern
--> $DIR/const_refers_to_static_cross_crate.rs:6
7
:9
--> $DIR/const_refers_to_static_cross_crate.rs:6
0
:9
|
LL | U8_MUT2 => true,
| ^^^^^^^
warning: any use of this value will cause an error
--> $DIR/const_refers_to_static_cross_crate.rs:3
7
:51
--> $DIR/const_refers_to_static_cross_crate.rs:3
2
:51
|
LL | / const U8_MUT3: &u8 = {
LL | | unsafe { match static_cross_crate::OPT_ZERO { Some(ref u) => u, None => panic!() } }
| | ^^^^^^^^^^^ constant accesses static
LL | |
LL | |
... |
LL | |
LL | | };
| |__-
|
note: the lint level is defined here
--> $DIR/const_refers_to_static_cross_crate.rs:3
5
:8
--> $DIR/const_refers_to_static_cross_crate.rs:3
0
:8
|
LL | #[warn(const_err)]
| ^^^^^^^^^
...
...
@@ -91,31 +85,31 @@ LL | #[warn(const_err)]
= note: for more information, see issue #71800 <https://github.com/rust-lang/rust/issues/71800>
error: could not evaluate constant pattern
--> $DIR/const_refers_to_static_cross_crate.rs:
75
:9
--> $DIR/const_refers_to_static_cross_crate.rs:
68
:9
|
LL | U8_MUT3 => true,
| ^^^^^^^
error: could not evaluate constant pattern
--> $DIR/const_refers_to_static_cross_crate.rs:4
7
:9
--> $DIR/const_refers_to_static_cross_crate.rs:4
0
:9
|
LL | SLICE_MUT => true,
| ^^^^^^^^^
error: could not evaluate constant pattern
--> $DIR/const_refers_to_static_cross_crate.rs:
56
:9
--> $DIR/const_refers_to_static_cross_crate.rs:
49
:9
|
LL | U8_MUT => true,
| ^^^^^^
error: could not evaluate constant pattern
--> $DIR/const_refers_to_static_cross_crate.rs:6
7
:9
--> $DIR/const_refers_to_static_cross_crate.rs:6
0
:9
|
LL | U8_MUT2 => true,
| ^^^^^^^
error: could not evaluate constant pattern
--> $DIR/const_refers_to_static_cross_crate.rs:
75
:9
--> $DIR/const_refers_to_static_cross_crate.rs:
68
:9
|
LL | U8_MUT3 => true,
| ^^^^^^^
...
...
@@ -123,57 +117,57 @@ LL | U8_MUT3 => true,
warning: skipping const checks
|
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static_cross_crate.rs:1
6
:15
--> $DIR/const_refers_to_static_cross_crate.rs:1
4
:15
|
LL | unsafe { &static_cross_crate::ZERO }
| ^^^^^^^^^^^^^^^^^^^^^^^^
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static_cross_crate.rs:1
6
:15
--> $DIR/const_refers_to_static_cross_crate.rs:1
4
:15
|
LL | unsafe { &static_cross_crate::ZERO }
| ^^^^^^^^^^^^^^^^^^^^^^^^
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static_cross_crate.rs:
23
:15
--> $DIR/const_refers_to_static_cross_crate.rs:
19
:15
|
LL | unsafe { &static_cross_crate::ZERO[0] }
| ^^^^^^^^^^^^^^^^^^^^^^^^
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static_cross_crate.rs:
23
:15
--> $DIR/const_refers_to_static_cross_crate.rs:
19
:15
|
LL | unsafe { &static_cross_crate::ZERO[0] }
| ^^^^^^^^^^^^^^^^^^^^^^^^
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static_cross_crate.rs:
23
:15
--> $DIR/const_refers_to_static_cross_crate.rs:
19
:15
|
LL | unsafe { &static_cross_crate::ZERO[0] }
| ^^^^^^^^^^^^^^^^^^^^^^^^
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static_cross_crate.rs:2
9
:17
--> $DIR/const_refers_to_static_cross_crate.rs:2
5
:17
|
LL | unsafe { &(*static_cross_crate::ZERO_REF)[0] }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static_cross_crate.rs:3
7
:20
--> $DIR/const_refers_to_static_cross_crate.rs:3
2
:20
|
LL | unsafe { match static_cross_crate::OPT_ZERO { Some(ref u) => u, None => panic!() } }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static_cross_crate.rs:3
7
:20
--> $DIR/const_refers_to_static_cross_crate.rs:3
2
:20
|
LL | unsafe { match static_cross_crate::OPT_ZERO { Some(ref u) => u, None => panic!() } }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static_cross_crate.rs:3
7
:20
--> $DIR/const_refers_to_static_cross_crate.rs:3
2
:20
|
LL | unsafe { match static_cross_crate::OPT_ZERO { Some(ref u) => u, None => panic!() } }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
help: skipping check for `const_panic` feature
--> $DIR/const_refers_to_static_cross_crate.rs:3
7
:77
--> $DIR/const_refers_to_static_cross_crate.rs:3
2
:77
|
LL | unsafe { match static_cross_crate::OPT_ZERO { Some(ref u) => u, None => panic!() } }
| ^^^^^^^^
help: skipping check that does not even have a feature gate
--> $DIR/const_refers_to_static_cross_crate.rs:3
7
:20
--> $DIR/const_refers_to_static_cross_crate.rs:3
2
:20
|
LL | unsafe { match static_cross_crate::OPT_ZERO { Some(ref u) => u, None => panic!() } }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录