use syntax::ast;
use syntax::symbol::Symbol;
+use syntax::feature_gate::{emit_feature_err, GateIssue};
use std::ops::Bound;
if let hir::Unsafety::Unsafe = sig.unsafety() {
self.require_unsafe("call to unsafe function",
"consult the function's documentation for information on how to avoid \
- undefined behavior", UnsafetyViolationKind::MinConstFn)
+ undefined behavior", UnsafetyViolationKind::GatedConstFnCall)
}
}
}
"initializing type with `rustc_layout_scalar_valid_range` attr",
"initializing a layout restricted type's field with a value outside \
the valid range is undefined behavior",
- UnsafetyViolationKind::MinConstFn,
+ UnsafetyViolationKind::GeneralAndConstFn,
),
}
}
(Safety::Safe, _) => {
for violation in violations {
let mut violation = violation.clone();
- if self.min_const_fn {
- // overwrite unsafety violation in const fn with a single hard error kind
- violation.kind = UnsafetyViolationKind::MinConstFn;
- } else if let UnsafetyViolationKind::MinConstFn = violation.kind {
- // outside of const fns we treat `MinConstFn` and `General` the same
- violation.kind = UnsafetyViolationKind::General;
+ match violation.kind {
+ UnsafetyViolationKind::GeneralAndConstFn |
+ UnsafetyViolationKind::General => {},
+ UnsafetyViolationKind::BorrowPacked(_) |
+ UnsafetyViolationKind::ExternStatic(_) => if self.min_const_fn {
+ // const fns don't need to be backwards compatible and can
+ // emit these violations as a hard error instead of a backwards
+ // compat lint
+ violation.kind = UnsafetyViolationKind::General;
+ },
+ UnsafetyViolationKind::GatedConstFnCall => {
+ // safe code can't call unsafe const fns, this `UnsafetyViolationKind`
+ // is only relevant for `Safety::ExplicitUnsafe` in `unsafe const fn`s
+ violation.kind = UnsafetyViolationKind::General;
+ }
}
if !self.violations.contains(&violation) {
self.violations.push(violation)
for violation in violations {
match violation.kind {
// these are allowed
- UnsafetyViolationKind::MinConstFn
+ UnsafetyViolationKind::GatedConstFnCall => {
// if `#![feature(min_const_unsafe_fn)]` is active
- if self.tcx.sess.features_untracked().min_const_unsafe_fn => {},
- _ => {
+ if !self.tcx.sess.features_untracked().min_const_unsafe_fn {
+ if !self.violations.contains(&violation) {
+ self.violations.push(violation.clone())
+ }
+ }
+ }
+ // these unsafe things are stable in const fn
+ UnsafetyViolationKind::GeneralAndConstFn => {},
+ UnsafetyViolationKind::General |
+ UnsafetyViolationKind::BorrowPacked(_) |
+ UnsafetyViolationKind::ExternStatic(_) => {
let mut violation = violation.clone();
- // overwrite unsafety violation in const fn with a hard error
- violation.kind = UnsafetyViolationKind::MinConstFn;
+ // const fns don't need to be backwards compatible and can
+ // emit these violations as a hard error instead of a backwards
+ // compat lint
+ violation.kind = UnsafetyViolationKind::General;
if !self.violations.contains(&violation) {
self.violations.push(violation)
}
source_info,
description: Symbol::intern(description).as_interned_str(),
details: Symbol::intern(details).as_interned_str(),
- kind: UnsafetyViolationKind::MinConstFn,
+ kind: UnsafetyViolationKind::GeneralAndConstFn,
}], &[]);
}
},
} in violations.iter() {
// Report an error.
match kind {
+ UnsafetyViolationKind::General if tcx.is_min_const_fn(def_id) => {
+ tcx.sess.struct_span_err(
+ source_info.span,
+ &format!("{} is unsafe and unsafe operations \
+ are not allowed in const fn", description))
+ .span_label(source_info.span, &description.as_str()[..])
+ .note(&details.as_str()[..])
+ .emit();
+ }
+ UnsafetyViolationKind::GeneralAndConstFn |
UnsafetyViolationKind::General => {
struct_span_err!(
tcx.sess, source_info.span, E0133,
.note(&details.as_str()[..])
.emit();
}
- UnsafetyViolationKind::MinConstFn => {
- tcx.sess.struct_span_err(
+ UnsafetyViolationKind::GatedConstFnCall => {
+ emit_feature_err(
+ &tcx.sess.parse_sess,
+ "min_const_unsafe_fn",
source_info.span,
- &format!("{} is unsafe and unsafe operations \
- are not allowed in const fn", description))
- .span_label(source_info.span, &description.as_str()[..])
- .note(&details.as_str()[..])
- .emit();
+ GateIssue::Language,
+ "calls to `const unsafe fn` in const fns are unstable",
+ );
+
}
UnsafetyViolationKind::ExternStatic(lint_node_id) => {
tcx.lint_node_note(SAFE_EXTERN_STATICS,
|
= help: add #![feature(const_fn_union)] to the crate attributes to enable
-error: call to unsafe function is unsafe and unsafe operations are not allowed in const fn
+error[E0658]: calls to `const unsafe fn` in const fns are unstable (see issue #55607)
--> $DIR/min_const_fn_unsafe.rs:21:14
|
-LL | unsafe { foo4() } //~ ERROR unsafe operations are not allowed in const fn
- | ^^^^^^ call to unsafe function
+LL | unsafe { foo4() } //~ ERROR calls to `const unsafe fn` in const fns are unstable
+ | ^^^^^^
|
- = note: consult the function's documentation for information on how to avoid undefined behavior
+ = help: add #![feature(min_const_unsafe_fn)] to the crate attributes to enable
-error: call to unsafe function is unsafe and unsafe operations are not allowed in const fn
+error[E0658]: calls to `const unsafe fn` in const fns are unstable (see issue #55607)
--> $DIR/min_const_fn_unsafe.rs:24:14
|
-LL | unsafe { foo5::<String>() } //~ ERROR unsafe operations are not allowed in const fn
- | ^^^^^^^^^^^^^^^^ call to unsafe function
+LL | unsafe { foo5::<String>() } //~ ERROR calls to `const unsafe fn` in const fns are unstable
+ | ^^^^^^^^^^^^^^^^
|
- = note: consult the function's documentation for information on how to avoid undefined behavior
+ = help: add #![feature(min_const_unsafe_fn)] to the crate attributes to enable
-error: call to unsafe function is unsafe and unsafe operations are not allowed in const fn
+error[E0658]: calls to `const unsafe fn` in const fns are unstable (see issue #55607)
--> $DIR/min_const_fn_unsafe.rs:27:14
|
-LL | unsafe { foo6::<Vec<std::cell::Cell<u32>>>() } //~ ERROR not allowed in const fn
- | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
+LL | unsafe { foo6::<Vec<std::cell::Cell<u32>>>() } //~ ERROR calls to `const unsafe fn` in const fns
+ | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
- = note: consult the function's documentation for information on how to avoid undefined behavior
+ = help: add #![feature(min_const_unsafe_fn)] to the crate attributes to enable
error: dereference of raw pointer is unsafe and unsafe operations are not allowed in const fn
--> $DIR/min_const_fn_unsafe.rs:29:51