1413 lines
47 KiB
Rust
1413 lines
47 KiB
Rust
use rustc_errors::codes::*;
|
|
use rustc_errors::{
|
|
Applicability, Diag, DiagArgValue, DiagCtxtHandle, Diagnostic, EmissionGuarantee, Level,
|
|
MultiSpan, Subdiagnostic, inline_fluent,
|
|
};
|
|
use rustc_macros::{Diagnostic, LintDiagnostic, Subdiagnostic};
|
|
use rustc_middle::ty::{self, Ty};
|
|
use rustc_pattern_analysis::errors::Uncovered;
|
|
use rustc_pattern_analysis::rustc::RustcPatCtxt;
|
|
use rustc_span::{Ident, Span, Symbol};
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("call to deprecated safe function `{$function}` is unsafe and requires unsafe block")]
|
|
pub(crate) struct CallToDeprecatedSafeFnRequiresUnsafe {
|
|
#[label("call to unsafe function")]
|
|
pub(crate) span: Span,
|
|
pub(crate) function: String,
|
|
pub(crate) guarantee: String,
|
|
#[subdiagnostic]
|
|
pub(crate) sub: CallToDeprecatedSafeFnRequiresUnsafeSub,
|
|
}
|
|
|
|
#[derive(Subdiagnostic)]
|
|
#[multipart_suggestion(
|
|
"you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code",
|
|
applicability = "machine-applicable"
|
|
)]
|
|
pub(crate) struct CallToDeprecatedSafeFnRequiresUnsafeSub {
|
|
pub(crate) start_of_line_suggestion: String,
|
|
#[suggestion_part(code = "{start_of_line_suggestion}")]
|
|
pub(crate) start_of_line: Span,
|
|
#[suggestion_part(code = "unsafe {{ ")]
|
|
pub(crate) left: Span,
|
|
#[suggestion_part(code = " }}")]
|
|
pub(crate) right: Span,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("call to unsafe function `{$function}` is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("consult the function's documentation for information on how to avoid undefined behavior")]
|
|
pub(crate) struct UnsafeOpInUnsafeFnCallToUnsafeFunctionRequiresUnsafe {
|
|
#[label("call to unsafe function")]
|
|
pub(crate) span: Span,
|
|
pub(crate) function: String,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("call to unsafe function is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("consult the function's documentation for information on how to avoid undefined behavior")]
|
|
pub(crate) struct UnsafeOpInUnsafeFnCallToUnsafeFunctionRequiresUnsafeNameless {
|
|
#[label("call to unsafe function")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("use of inline assembly is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("inline assembly is entirely unchecked and can cause undefined behavior")]
|
|
pub(crate) struct UnsafeOpInUnsafeFnUseOfInlineAssemblyRequiresUnsafe {
|
|
#[label("use of inline assembly")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("initializing type with `rustc_layout_scalar_valid_range` attr is unsafe and requires unsafe block", code = E0133)]
|
|
#[note(
|
|
"initializing a layout restricted type's field with a value outside the valid range is undefined behavior"
|
|
)]
|
|
pub(crate) struct UnsafeOpInUnsafeFnInitializingTypeWithRequiresUnsafe {
|
|
#[label("initializing type with `rustc_layout_scalar_valid_range` attr")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("initializing type with an unsafe field is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("unsafe fields may carry library invariants")]
|
|
pub(crate) struct UnsafeOpInUnsafeFnInitializingTypeWithUnsafeFieldRequiresUnsafe {
|
|
#[label("initialization of struct with unsafe field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("use of mutable static is unsafe and requires unsafe block", code = E0133)]
|
|
#[note(
|
|
"mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior"
|
|
)]
|
|
pub(crate) struct UnsafeOpInUnsafeFnUseOfMutableStaticRequiresUnsafe {
|
|
#[label("use of mutable static")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("use of extern static is unsafe and requires unsafe block", code = E0133)]
|
|
#[note(
|
|
"extern statics are not controlled by the Rust type system: invalid data, aliasing violations or data races will cause undefined behavior"
|
|
)]
|
|
pub(crate) struct UnsafeOpInUnsafeFnUseOfExternStaticRequiresUnsafe {
|
|
#[label("use of extern static")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("use of unsafe field is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("unsafe fields may carry library invariants")]
|
|
pub(crate) struct UnsafeOpInUnsafeFnUseOfUnsafeFieldRequiresUnsafe {
|
|
#[label("use of unsafe field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("dereference of raw pointer is unsafe and requires unsafe block", code = E0133)]
|
|
#[note(
|
|
"raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior"
|
|
)]
|
|
pub(crate) struct UnsafeOpInUnsafeFnDerefOfRawPointerRequiresUnsafe {
|
|
#[label("dereference of raw pointer")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("access to union field is unsafe and requires unsafe block", code = E0133)]
|
|
#[note(
|
|
"the field may not be properly initialized: using uninitialized data will cause undefined behavior"
|
|
)]
|
|
pub(crate) struct UnsafeOpInUnsafeFnAccessToUnionFieldRequiresUnsafe {
|
|
#[label("access to union field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag(
|
|
"mutation of layout constrained field is unsafe and requires unsafe block",
|
|
code = E0133
|
|
)]
|
|
#[note("mutating layout constrained fields cannot statically be checked for valid values")]
|
|
pub(crate) struct UnsafeOpInUnsafeFnMutationOfLayoutConstrainedFieldRequiresUnsafe {
|
|
#[label("mutation of layout constrained field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag(
|
|
"borrow of layout constrained field with interior mutability is unsafe and requires unsafe block",
|
|
code = E0133,
|
|
)]
|
|
pub(crate) struct UnsafeOpInUnsafeFnBorrowOfLayoutConstrainedFieldRequiresUnsafe {
|
|
#[label("borrow of layout constrained field with interior mutability")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag(
|
|
"unsafe binder cast is unsafe and requires unsafe block information that may be required to uphold safety guarantees of a type",
|
|
code = E0133,
|
|
)]
|
|
pub(crate) struct UnsafeOpInUnsafeFnUnsafeBinderCastRequiresUnsafe {
|
|
#[label("unsafe binder cast")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("call to function `{$function}` with `#[target_feature]` is unsafe and requires unsafe block", code = E0133)]
|
|
#[help(
|
|
"in order for the call to be safe, the context requires the following additional target {$missing_target_features_count ->
|
|
[1] feature
|
|
*[count] features
|
|
}: {$missing_target_features}"
|
|
)]
|
|
pub(crate) struct UnsafeOpInUnsafeFnCallToFunctionWithRequiresUnsafe {
|
|
#[label("call to function with `#[target_feature]`")]
|
|
pub(crate) span: Span,
|
|
pub(crate) function: String,
|
|
pub(crate) missing_target_features: DiagArgValue,
|
|
pub(crate) missing_target_features_count: usize,
|
|
#[note("the {$build_target_features} target {$build_target_features_count ->
|
|
[1] feature
|
|
*[count] features
|
|
} being enabled in the build configuration does not remove the requirement to list {$build_target_features_count ->
|
|
[1] it
|
|
*[count] them
|
|
} in `#[target_feature]`")]
|
|
pub(crate) note: bool,
|
|
pub(crate) build_target_features: DiagArgValue,
|
|
pub(crate) build_target_features_count: usize,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedLintNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("call to unsafe function `{$function}` is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("consult the function's documentation for information on how to avoid undefined behavior")]
|
|
pub(crate) struct CallToUnsafeFunctionRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("call to unsafe function")]
|
|
pub(crate) span: Span,
|
|
pub(crate) function: String,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("call to unsafe function is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("consult the function's documentation for information on how to avoid undefined behavior")]
|
|
pub(crate) struct CallToUnsafeFunctionRequiresUnsafeNameless {
|
|
#[primary_span]
|
|
#[label("call to unsafe function")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("call to unsafe function `{$function}` is unsafe and requires unsafe function or block", code = E0133)]
|
|
#[note("consult the function's documentation for information on how to avoid undefined behavior")]
|
|
pub(crate) struct CallToUnsafeFunctionRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("call to unsafe function")]
|
|
pub(crate) span: Span,
|
|
pub(crate) function: String,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag(
|
|
"call to unsafe function is unsafe and requires unsafe function or block",
|
|
code = E0133
|
|
)]
|
|
#[note("consult the function's documentation for information on how to avoid undefined behavior")]
|
|
pub(crate) struct CallToUnsafeFunctionRequiresUnsafeNamelessUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("call to unsafe function")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("use of inline assembly is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("inline assembly is entirely unchecked and can cause undefined behavior")]
|
|
pub(crate) struct UseOfInlineAssemblyRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("use of inline assembly")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("use of inline assembly is unsafe and requires unsafe function or block", code = E0133)]
|
|
#[note("inline assembly is entirely unchecked and can cause undefined behavior")]
|
|
pub(crate) struct UseOfInlineAssemblyRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("use of inline assembly")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("initializing type with `rustc_layout_scalar_valid_range` attr is unsafe and requires unsafe block", code = E0133)]
|
|
#[note(
|
|
"initializing a layout restricted type's field with a value outside the valid range is undefined behavior"
|
|
)]
|
|
pub(crate) struct InitializingTypeWithRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("initializing type with `rustc_layout_scalar_valid_range` attr")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("initializing type with an unsafe field is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("unsafe fields may carry library invariants")]
|
|
pub(crate) struct InitializingTypeWithUnsafeFieldRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("initialization of struct with unsafe field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag(
|
|
"initializing type with `rustc_layout_scalar_valid_range` attr is unsafe and requires unsafe function or block",
|
|
code = E0133
|
|
)]
|
|
#[note(
|
|
"initializing a layout restricted type's field with a value outside the valid range is undefined behavior"
|
|
)]
|
|
pub(crate) struct InitializingTypeWithRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("initializing type with `rustc_layout_scalar_valid_range` attr")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag(
|
|
"initializing type with an unsafe field is unsafe and requires unsafe block",
|
|
code = E0133
|
|
)]
|
|
#[note("unsafe fields may carry library invariants")]
|
|
pub(crate) struct InitializingTypeWithUnsafeFieldRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("initialization of struct with unsafe field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("use of mutable static is unsafe and requires unsafe block", code = E0133)]
|
|
#[note(
|
|
"mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior"
|
|
)]
|
|
pub(crate) struct UseOfMutableStaticRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("use of mutable static")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("use of mutable static is unsafe and requires unsafe function or block", code = E0133)]
|
|
#[note(
|
|
"mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior"
|
|
)]
|
|
pub(crate) struct UseOfMutableStaticRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("use of mutable static")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("use of extern static is unsafe and requires unsafe block", code = E0133)]
|
|
#[note(
|
|
"extern statics are not controlled by the Rust type system: invalid data, aliasing violations or data races will cause undefined behavior"
|
|
)]
|
|
pub(crate) struct UseOfExternStaticRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("use of extern static")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("use of extern static is unsafe and requires unsafe function or block", code = E0133)]
|
|
#[note(
|
|
"extern statics are not controlled by the Rust type system: invalid data, aliasing violations or data races will cause undefined behavior"
|
|
)]
|
|
pub(crate) struct UseOfExternStaticRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("use of extern static")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("use of unsafe field is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("unsafe fields may carry library invariants")]
|
|
pub(crate) struct UseOfUnsafeFieldRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("use of unsafe field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("use of unsafe field is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("unsafe fields may carry library invariants")]
|
|
pub(crate) struct UseOfUnsafeFieldRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("use of unsafe field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("dereference of raw pointer is unsafe and requires unsafe block", code = E0133)]
|
|
#[note(
|
|
"raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior"
|
|
)]
|
|
pub(crate) struct DerefOfRawPointerRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("dereference of raw pointer")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("dereference of raw pointer is unsafe and requires unsafe function or block", code = E0133)]
|
|
#[note(
|
|
"raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior"
|
|
)]
|
|
pub(crate) struct DerefOfRawPointerRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("dereference of raw pointer")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("access to union field is unsafe and requires unsafe block", code = E0133)]
|
|
#[note(
|
|
"the field may not be properly initialized: using uninitialized data will cause undefined behavior"
|
|
)]
|
|
pub(crate) struct AccessToUnionFieldRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("access to union field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("access to union field is unsafe and requires unsafe function or block", code = E0133)]
|
|
#[note(
|
|
"the field may not be properly initialized: using uninitialized data will cause undefined behavior"
|
|
)]
|
|
pub(crate) struct AccessToUnionFieldRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("access to union field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("mutation of layout constrained field is unsafe and requires unsafe block", code = E0133)]
|
|
#[note("mutating layout constrained fields cannot statically be checked for valid values")]
|
|
pub(crate) struct MutationOfLayoutConstrainedFieldRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("mutation of layout constrained field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag(
|
|
"mutation of layout constrained field is unsafe and requires unsafe function or block",
|
|
code = E0133
|
|
)]
|
|
#[note("mutating layout constrained fields cannot statically be checked for valid values")]
|
|
pub(crate) struct MutationOfLayoutConstrainedFieldRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("mutation of layout constrained field")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("borrow of layout constrained field with interior mutability is unsafe and requires unsafe block", code = E0133)]
|
|
#[note(
|
|
"references to fields of layout constrained fields lose the constraints. Coupled with interior mutability, the field can be changed to invalid values"
|
|
)]
|
|
pub(crate) struct BorrowOfLayoutConstrainedFieldRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("borrow of layout constrained field with interior mutability")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag(
|
|
"borrow of layout constrained field with interior mutability is unsafe and requires unsafe function or block",
|
|
code = E0133
|
|
)]
|
|
#[note(
|
|
"references to fields of layout constrained fields lose the constraints. Coupled with interior mutability, the field can be changed to invalid values"
|
|
)]
|
|
pub(crate) struct BorrowOfLayoutConstrainedFieldRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("borrow of layout constrained field with interior mutability")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("call to function `{$function}` with `#[target_feature]` is unsafe and requires unsafe block", code = E0133)]
|
|
#[help(
|
|
"in order for the call to be safe, the context requires the following additional target {$missing_target_features_count ->
|
|
[1] feature
|
|
*[count] features
|
|
}: {$missing_target_features}"
|
|
)]
|
|
pub(crate) struct CallToFunctionWithRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("call to function with `#[target_feature]`")]
|
|
pub(crate) span: Span,
|
|
pub(crate) function: String,
|
|
pub(crate) missing_target_features: DiagArgValue,
|
|
pub(crate) missing_target_features_count: usize,
|
|
#[note("the {$build_target_features} target {$build_target_features_count ->
|
|
[1] feature
|
|
*[count] features
|
|
} being enabled in the build configuration does not remove the requirement to list {$build_target_features_count ->
|
|
[1] it
|
|
*[count] them
|
|
} in `#[target_feature]`")]
|
|
pub(crate) note: bool,
|
|
pub(crate) build_target_features: DiagArgValue,
|
|
pub(crate) build_target_features_count: usize,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag(
|
|
"call to function `{$function}` with `#[target_feature]` is unsafe and requires unsafe function or block",
|
|
code = E0133,
|
|
)]
|
|
#[help(
|
|
"in order for the call to be safe, the context requires the following additional target {$missing_target_features_count ->
|
|
[1] feature
|
|
*[count] features
|
|
}: {$missing_target_features}"
|
|
)]
|
|
pub(crate) struct CallToFunctionWithRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("call to function with `#[target_feature]`")]
|
|
pub(crate) span: Span,
|
|
pub(crate) function: String,
|
|
pub(crate) missing_target_features: DiagArgValue,
|
|
pub(crate) missing_target_features_count: usize,
|
|
#[note("the {$build_target_features} target {$build_target_features_count ->
|
|
[1] feature
|
|
*[count] features
|
|
} being enabled in the build configuration does not remove the requirement to list {$build_target_features_count ->
|
|
[1] it
|
|
*[count] them
|
|
} in `#[target_feature]`")]
|
|
pub(crate) note: bool,
|
|
pub(crate) build_target_features: DiagArgValue,
|
|
pub(crate) build_target_features_count: usize,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag(
|
|
"unsafe binder cast is unsafe and requires unsafe block information that may be required to uphold safety guarantees of a type",
|
|
code = E0133,
|
|
)]
|
|
pub(crate) struct UnsafeBinderCastRequiresUnsafe {
|
|
#[primary_span]
|
|
#[label("unsafe binder cast")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag(
|
|
"unsafe binder cast is unsafe and requires unsafe block or unsafe fn information that may be required to uphold safety guarantees of a type",
|
|
code = E0133,
|
|
)]
|
|
pub(crate) struct UnsafeBinderCastRequiresUnsafeUnsafeOpInUnsafeFnAllowed {
|
|
#[primary_span]
|
|
#[label("unsafe binder cast")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) unsafe_not_inherited_note: Option<UnsafeNotInheritedNote>,
|
|
}
|
|
|
|
#[derive(Subdiagnostic)]
|
|
#[label("items do not inherit unsafety from separate enclosing items")]
|
|
pub(crate) struct UnsafeNotInheritedNote {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
}
|
|
|
|
pub(crate) struct UnsafeNotInheritedLintNote {
|
|
pub(crate) signature_span: Span,
|
|
pub(crate) body_span: Span,
|
|
}
|
|
|
|
impl Subdiagnostic for UnsafeNotInheritedLintNote {
|
|
fn add_to_diag<G: EmissionGuarantee>(self, diag: &mut Diag<'_, G>) {
|
|
diag.span_note(
|
|
self.signature_span,
|
|
inline_fluent!(
|
|
"an unsafe function restricts its caller, but its body is safe by default"
|
|
),
|
|
);
|
|
let body_start = self.body_span.shrink_to_lo();
|
|
let body_end = self.body_span.shrink_to_hi();
|
|
diag.tool_only_multipart_suggestion(
|
|
inline_fluent!("consider wrapping the function body in an unsafe block"),
|
|
vec![(body_start, "{ unsafe ".into()), (body_end, "}".into())],
|
|
Applicability::MachineApplicable,
|
|
);
|
|
}
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("unnecessary `unsafe` block")]
|
|
pub(crate) struct UnusedUnsafe {
|
|
#[label("unnecessary `unsafe` block")]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) enclosing: Option<UnusedUnsafeEnclosing>,
|
|
}
|
|
|
|
#[derive(Subdiagnostic)]
|
|
pub(crate) enum UnusedUnsafeEnclosing {
|
|
#[label("because it's nested under this `unsafe` block")]
|
|
Block {
|
|
#[primary_span]
|
|
span: Span,
|
|
},
|
|
}
|
|
|
|
pub(crate) struct NonExhaustivePatternsTypeNotEmpty<'p, 'tcx, 'm> {
|
|
pub(crate) cx: &'m RustcPatCtxt<'p, 'tcx>,
|
|
pub(crate) scrut_span: Span,
|
|
pub(crate) braces_span: Option<Span>,
|
|
pub(crate) ty: Ty<'tcx>,
|
|
}
|
|
|
|
impl<'a, G: EmissionGuarantee> Diagnostic<'a, G> for NonExhaustivePatternsTypeNotEmpty<'_, '_, '_> {
|
|
fn into_diag(self, dcx: DiagCtxtHandle<'a>, level: Level) -> Diag<'a, G> {
|
|
let mut diag = Diag::new(
|
|
dcx,
|
|
level,
|
|
inline_fluent!("non-exhaustive patterns: type `{$ty}` is non-empty"),
|
|
);
|
|
diag.span(self.scrut_span);
|
|
diag.code(E0004);
|
|
let peeled_ty = self.ty.peel_refs();
|
|
diag.arg("ty", self.ty);
|
|
diag.arg("peeled_ty", peeled_ty);
|
|
|
|
if let ty::Adt(def, _) = peeled_ty.kind() {
|
|
let def_span = self
|
|
.cx
|
|
.tcx
|
|
.hir_get_if_local(def.did())
|
|
.and_then(|node| node.ident())
|
|
.map(|ident| ident.span)
|
|
.unwrap_or_else(|| self.cx.tcx.def_span(def.did()));
|
|
|
|
// workaround to make test pass
|
|
let mut span: MultiSpan = def_span.into();
|
|
span.push_span_label(def_span, "");
|
|
|
|
diag.span_note(span, inline_fluent!("`{$peeled_ty}` defined here"));
|
|
}
|
|
|
|
let is_non_exhaustive = matches!(self.ty.kind(),
|
|
ty::Adt(def, _) if def.variant_list_has_applicable_non_exhaustive());
|
|
if is_non_exhaustive {
|
|
diag.note(inline_fluent!(
|
|
"the matched value is of type `{$ty}`, which is marked as non-exhaustive"
|
|
));
|
|
} else {
|
|
diag.note(inline_fluent!("the matched value is of type `{$ty}`"));
|
|
}
|
|
|
|
if let ty::Ref(_, sub_ty, _) = self.ty.kind() {
|
|
if !sub_ty.is_inhabited_from(self.cx.tcx, self.cx.module, self.cx.typing_env) {
|
|
diag.note(inline_fluent!("references are always considered inhabited"));
|
|
}
|
|
}
|
|
|
|
let sm = self.cx.tcx.sess.source_map();
|
|
if let Some(braces_span) = self.braces_span {
|
|
// Get the span for the empty match body `{}`.
|
|
let (indentation, more) = if let Some(snippet) = sm.indentation_before(self.scrut_span)
|
|
{
|
|
(format!("\n{snippet}"), " ")
|
|
} else {
|
|
(" ".to_string(), "")
|
|
};
|
|
diag.span_suggestion_verbose(
|
|
braces_span,
|
|
inline_fluent!("ensure that all possible cases are being handled by adding a match arm with a wildcard pattern as shown"),
|
|
format!(" {{{indentation}{more}_ => todo!(),{indentation}}}"),
|
|
Applicability::HasPlaceholders,
|
|
);
|
|
} else {
|
|
diag.help(inline_fluent!(
|
|
"ensure that all possible cases are being handled by adding a match arm with a wildcard pattern"
|
|
));
|
|
}
|
|
|
|
diag
|
|
}
|
|
}
|
|
|
|
#[derive(Subdiagnostic)]
|
|
#[note("match arms with guards don't count towards exhaustivity")]
|
|
pub(crate) struct NonExhaustiveMatchAllArmsGuarded;
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("statics cannot be referenced in patterns", code = E0158)]
|
|
pub(crate) struct StaticInPattern {
|
|
#[primary_span]
|
|
#[label("can't be used in patterns")]
|
|
pub(crate) span: Span,
|
|
#[label("`static` defined here")]
|
|
pub(crate) static_span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("constant parameters cannot be referenced in patterns", code = E0158)]
|
|
pub(crate) struct ConstParamInPattern {
|
|
#[primary_span]
|
|
#[label("can't be used in patterns")]
|
|
pub(crate) span: Span,
|
|
#[label("constant defined here")]
|
|
pub(crate) const_span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("runtime values cannot be referenced in patterns", code = E0080)]
|
|
pub(crate) struct NonConstPath {
|
|
#[primary_span]
|
|
#[label("references a runtime value")]
|
|
pub(crate) span: Span,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("unreachable pattern")]
|
|
pub(crate) struct UnreachablePattern<'tcx> {
|
|
#[label("no value can reach this")]
|
|
pub(crate) span: Option<Span>,
|
|
#[label("matches no values because `{$matches_no_values_ty}` is uninhabited")]
|
|
pub(crate) matches_no_values: Option<Span>,
|
|
pub(crate) matches_no_values_ty: Ty<'tcx>,
|
|
#[note(
|
|
"to learn more about uninhabited types, see https://doc.rust-lang.org/nomicon/exotic-sizes.html#empty-types"
|
|
)]
|
|
pub(crate) uninhabited_note: Option<()>,
|
|
#[label("matches any value")]
|
|
pub(crate) covered_by_catchall: Option<Span>,
|
|
#[subdiagnostic]
|
|
pub(crate) wanted_constant: Option<WantedConstant>,
|
|
#[note(
|
|
"there is a constant of the same name imported in another scope, which could have been used to pattern match against its value instead of introducing a new catch-all binding, but it needs to be imported in the pattern's scope"
|
|
)]
|
|
pub(crate) accessible_constant: Option<Span>,
|
|
#[note(
|
|
"there is a constant of the same name, which could have been used to pattern match against its value instead of introducing a new catch-all binding, but it is not accessible from this scope"
|
|
)]
|
|
pub(crate) inaccessible_constant: Option<Span>,
|
|
#[note(
|
|
"there is a binding of the same name; if you meant to pattern match against the value of that binding, that is a feature of constants that is not available for `let` bindings"
|
|
)]
|
|
pub(crate) pattern_let_binding: Option<Span>,
|
|
#[label("matches all the relevant values")]
|
|
pub(crate) covered_by_one: Option<Span>,
|
|
#[note("multiple earlier patterns match some of the same values")]
|
|
pub(crate) covered_by_many: Option<MultiSpan>,
|
|
pub(crate) covered_by_many_n_more_count: usize,
|
|
#[suggestion("remove the match arm", code = "", applicability = "machine-applicable")]
|
|
pub(crate) suggest_remove: Option<Span>,
|
|
}
|
|
|
|
#[derive(Subdiagnostic)]
|
|
#[suggestion(
|
|
"you might have meant to pattern match against the value of {$is_typo ->
|
|
[true] similarly named constant
|
|
*[false] constant
|
|
} `{$const_name}` instead of introducing a new catch-all binding",
|
|
code = "{const_path}",
|
|
applicability = "machine-applicable"
|
|
)]
|
|
pub(crate) struct WantedConstant {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
pub(crate) is_typo: bool,
|
|
pub(crate) const_name: String,
|
|
pub(crate) const_path: String,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("unreachable {$descr}")]
|
|
pub(crate) struct UnreachableDueToUninhabited<'desc, 'tcx> {
|
|
pub descr: &'desc str,
|
|
#[label("unreachable {$descr}")]
|
|
pub expr: Span,
|
|
#[label("any code following this expression is unreachable")]
|
|
#[note("this expression has type `{$ty}`, which is uninhabited")]
|
|
pub orig: Span,
|
|
pub ty: Ty<'tcx>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("constant pattern cannot depend on generic parameters", code = E0158)]
|
|
pub(crate) struct ConstPatternDependsOnGenericParameter {
|
|
#[primary_span]
|
|
#[label("`const` depends on a generic parameter")]
|
|
pub(crate) span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("could not evaluate constant pattern")]
|
|
pub(crate) struct CouldNotEvalConstPattern {
|
|
#[primary_span]
|
|
#[label("could not evaluate constant")]
|
|
pub(crate) span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("lower bound for range pattern must be less than or equal to upper bound", code = E0030)]
|
|
pub(crate) struct LowerRangeBoundMustBeLessThanOrEqualToUpper {
|
|
#[primary_span]
|
|
#[label("lower bound larger than upper bound")]
|
|
pub(crate) span: Span,
|
|
#[note(
|
|
"When matching against a range, the compiler verifies that the range is non-empty. Range patterns include both end-points, so this is equivalent to requiring the start of the range to be less than or equal to the end of the range."
|
|
)]
|
|
pub(crate) teach: bool,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("literal out of range for `{$ty}`")]
|
|
pub(crate) struct LiteralOutOfRange<'tcx> {
|
|
#[primary_span]
|
|
#[label("this value does not fit into the type `{$ty}` whose range is `{$min}..={$max}`")]
|
|
pub(crate) span: Span,
|
|
pub(crate) ty: Ty<'tcx>,
|
|
pub(crate) min: i128,
|
|
pub(crate) max: u128,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("lower bound for range pattern must be less than upper bound", code = E0579)]
|
|
pub(crate) struct LowerRangeBoundMustBeLessThanUpper {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("exclusive upper bound for a range bound cannot be the minimum", code = E0579)]
|
|
pub(crate) struct UpperRangeBoundCannotBeMin {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag(
|
|
"leading irrefutable {$count ->
|
|
[one] pattern
|
|
*[other] patterns
|
|
} in let chain"
|
|
)]
|
|
#[note(
|
|
"{$count ->
|
|
[one] this pattern
|
|
*[other] these patterns
|
|
} will always match"
|
|
)]
|
|
#[help(
|
|
"consider moving {$count ->
|
|
[one] it
|
|
*[other] them
|
|
} outside of the construct"
|
|
)]
|
|
pub(crate) struct LeadingIrrefutableLetPatterns {
|
|
pub(crate) count: usize,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag(
|
|
"trailing irrefutable {$count ->
|
|
[one] pattern
|
|
*[other] patterns
|
|
} in let chain"
|
|
)]
|
|
#[note(
|
|
"{$count ->
|
|
[one] this pattern
|
|
*[other] these patterns
|
|
} will always match"
|
|
)]
|
|
#[help(
|
|
"consider moving {$count ->
|
|
[one] it
|
|
*[other] them
|
|
} into the body"
|
|
)]
|
|
pub(crate) struct TrailingIrrefutableLetPatterns {
|
|
pub(crate) count: usize,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag("pattern binding `{$name}` is named the same as one of the variants of the type `{$ty_path}`", code = E0170)]
|
|
pub(crate) struct BindingsWithVariantName {
|
|
#[suggestion(
|
|
"to match on the variant, qualify the path",
|
|
code = "{ty_path}::{name}",
|
|
applicability = "machine-applicable"
|
|
)]
|
|
pub(crate) suggestion: Option<Span>,
|
|
pub(crate) ty_path: String,
|
|
pub(crate) name: Ident,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag(
|
|
"irrefutable `if let` {$count ->
|
|
[one] pattern
|
|
*[other] patterns
|
|
}"
|
|
)]
|
|
#[note(
|
|
"{$count ->
|
|
[one] this pattern
|
|
*[other] these patterns
|
|
} will always match, so the `if let` is useless"
|
|
)]
|
|
#[help("consider replacing the `if let` with a `let`")]
|
|
pub(crate) struct IrrefutableLetPatternsIfLet {
|
|
pub(crate) count: usize,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag(
|
|
"irrefutable `if let` guard {$count ->
|
|
[one] pattern
|
|
*[other] patterns
|
|
}"
|
|
)]
|
|
#[note(
|
|
"{$count ->
|
|
[one] this pattern
|
|
*[other] these patterns
|
|
} will always match, so the guard is useless"
|
|
)]
|
|
#[help("consider removing the guard and adding a `let` inside the match arm")]
|
|
pub(crate) struct IrrefutableLetPatternsIfLetGuard {
|
|
pub(crate) count: usize,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag(
|
|
"irrefutable `let...else` {$count ->
|
|
[one] pattern
|
|
*[other] patterns
|
|
}"
|
|
)]
|
|
#[note(
|
|
"{$count ->
|
|
[one] this pattern
|
|
*[other] these patterns
|
|
} will always match, so the `else` clause is useless"
|
|
)]
|
|
#[help("consider removing the `else` clause")]
|
|
pub(crate) struct IrrefutableLetPatternsLetElse {
|
|
pub(crate) count: usize,
|
|
}
|
|
|
|
#[derive(LintDiagnostic)]
|
|
#[diag(
|
|
"irrefutable `while let` {$count ->
|
|
[one] pattern
|
|
*[other] patterns
|
|
}"
|
|
)]
|
|
#[note(
|
|
"{$count ->
|
|
[one] this pattern
|
|
*[other] these patterns
|
|
} will always match, so the loop will never exit"
|
|
)]
|
|
#[help("consider instead using a `loop {\"{\"} ... {\"}\"}` with a `let` inside it")]
|
|
pub(crate) struct IrrefutableLetPatternsWhileLet {
|
|
pub(crate) count: usize,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("borrow of moved value")]
|
|
pub(crate) struct BorrowOfMovedValue<'tcx> {
|
|
#[primary_span]
|
|
#[label("value moved into `{$name}` here")]
|
|
#[label(
|
|
"move occurs because `{$name}` has type `{$ty}`, which does not implement the `Copy` trait"
|
|
)]
|
|
pub(crate) binding_span: Span,
|
|
#[label("value borrowed here after move")]
|
|
pub(crate) conflicts_ref: Vec<Span>,
|
|
pub(crate) name: Ident,
|
|
pub(crate) ty: Ty<'tcx>,
|
|
#[suggestion(
|
|
"borrow this binding in the pattern to avoid moving the value",
|
|
code = "ref ",
|
|
applicability = "machine-applicable"
|
|
)]
|
|
pub(crate) suggest_borrowing: Option<Span>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("cannot borrow value as mutable more than once at a time")]
|
|
pub(crate) struct MultipleMutBorrows {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) occurrences: Vec<Conflict>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("cannot borrow value as mutable because it is also borrowed as immutable")]
|
|
pub(crate) struct AlreadyBorrowed {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) occurrences: Vec<Conflict>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("cannot borrow value as immutable because it is also borrowed as mutable")]
|
|
pub(crate) struct AlreadyMutBorrowed {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) occurrences: Vec<Conflict>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("cannot move out of value because it is borrowed")]
|
|
pub(crate) struct MovedWhileBorrowed {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
#[subdiagnostic]
|
|
pub(crate) occurrences: Vec<Conflict>,
|
|
}
|
|
|
|
#[derive(Subdiagnostic)]
|
|
pub(crate) enum Conflict {
|
|
#[label("value is mutably borrowed by `{$name}` here")]
|
|
Mut {
|
|
#[primary_span]
|
|
span: Span,
|
|
name: Symbol,
|
|
},
|
|
#[label("value is borrowed by `{$name}` here")]
|
|
Ref {
|
|
#[primary_span]
|
|
span: Span,
|
|
name: Symbol,
|
|
},
|
|
#[label("value is moved into `{$name}` here")]
|
|
Moved {
|
|
#[primary_span]
|
|
span: Span,
|
|
name: Symbol,
|
|
},
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("cannot use unions in constant patterns")]
|
|
pub(crate) struct UnionPattern {
|
|
#[primary_span]
|
|
#[label("can't use a `union` here")]
|
|
pub(crate) span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("constant of non-structural type `{$ty}` in a pattern")]
|
|
pub(crate) struct TypeNotStructural<'tcx> {
|
|
#[primary_span]
|
|
#[label("constant of non-structural type")]
|
|
pub(crate) span: Span,
|
|
#[label("`{$ty}` must be annotated with `#[derive(PartialEq)]` to be usable in patterns")]
|
|
pub(crate) ty_def_span: Span,
|
|
pub(crate) ty: Ty<'tcx>,
|
|
#[note(
|
|
"the `PartialEq` trait must be derived, manual `impl`s are not sufficient; see https://doc.rust-lang.org/stable/std/marker/trait.StructuralPartialEq.html for details"
|
|
)]
|
|
pub(crate) manual_partialeq_impl_span: Option<Span>,
|
|
#[note(
|
|
"see https://doc.rust-lang.org/stable/std/marker/trait.StructuralPartialEq.html for details"
|
|
)]
|
|
pub(crate) manual_partialeq_impl_note: bool,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("constant of non-structural type `{$ty}` in a pattern")]
|
|
#[note(
|
|
"see https://doc.rust-lang.org/stable/std/marker/trait.StructuralPartialEq.html for details"
|
|
)]
|
|
pub(crate) struct TypeNotPartialEq<'tcx> {
|
|
#[primary_span]
|
|
#[label("constant of non-structural type")]
|
|
pub(crate) span: Span,
|
|
pub(crate) ty: Ty<'tcx>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("{$prefix} `{$non_sm_ty}` cannot be used in patterns")]
|
|
pub(crate) struct InvalidPattern<'tcx> {
|
|
#[primary_span]
|
|
#[label("{$prefix} can't be used in patterns")]
|
|
pub(crate) span: Span,
|
|
pub(crate) non_sm_ty: Ty<'tcx>,
|
|
pub(crate) prefix: String,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("cannot use unsized non-slice type `{$non_sm_ty}` in constant patterns")]
|
|
pub(crate) struct UnsizedPattern<'tcx> {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
pub(crate) non_sm_ty: Ty<'tcx>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("cannot use NaN in patterns")]
|
|
#[note("NaNs compare inequal to everything, even themselves, so this pattern would never match")]
|
|
#[help("try using the `is_nan` method instead")]
|
|
pub(crate) struct NaNPattern {
|
|
#[primary_span]
|
|
#[label("evaluates to `NaN`, which is not allowed in patterns")]
|
|
pub(crate) span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag(
|
|
"function pointers and raw pointers not derived from integers in patterns behave unpredictably and should not be relied upon"
|
|
)]
|
|
#[note("see https://github.com/rust-lang/rust/issues/70861 for details")]
|
|
pub(crate) struct PointerPattern {
|
|
#[primary_span]
|
|
#[label("can't be used in patterns")]
|
|
pub(crate) span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("mismatched types")]
|
|
#[note("the matched value is of type `{$ty}`")]
|
|
pub(crate) struct NonEmptyNeverPattern<'tcx> {
|
|
#[primary_span]
|
|
#[label("a never pattern must be used on an uninhabited type")]
|
|
pub(crate) span: Span,
|
|
pub(crate) ty: Ty<'tcx>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("refutable pattern in {$origin}", code = E0005)]
|
|
pub(crate) struct PatternNotCovered<'s, 'tcx> {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
pub(crate) origin: &'s str,
|
|
#[subdiagnostic]
|
|
pub(crate) uncovered: Uncovered,
|
|
#[subdiagnostic]
|
|
pub(crate) inform: Option<Inform>,
|
|
#[subdiagnostic]
|
|
pub(crate) interpreted_as_const: Option<InterpretedAsConst>,
|
|
#[subdiagnostic]
|
|
pub(crate) interpreted_as_const_sugg: Option<InterpretedAsConstSugg>,
|
|
#[subdiagnostic]
|
|
pub(crate) adt_defined_here: Option<AdtDefinedHere<'tcx>>,
|
|
#[note(
|
|
"pattern `{$witness_1}` is currently uninhabited, but this variant contains private fields which may become inhabited in the future"
|
|
)]
|
|
pub(crate) witness_1_is_privately_uninhabited: bool,
|
|
pub(crate) witness_1: String,
|
|
#[note("the matched value is of type `{$pattern_ty}`")]
|
|
pub(crate) _p: (),
|
|
pub(crate) pattern_ty: Ty<'tcx>,
|
|
#[subdiagnostic]
|
|
pub(crate) let_suggestion: Option<SuggestLet>,
|
|
#[subdiagnostic]
|
|
pub(crate) misc_suggestion: Option<MiscPatternSuggestion>,
|
|
}
|
|
|
|
#[derive(Subdiagnostic)]
|
|
#[note(
|
|
"`let` bindings require an \"irrefutable pattern\", like a `struct` or an `enum` with only one variant"
|
|
)]
|
|
#[note("for more information, visit https://doc.rust-lang.org/book/ch19-02-refutability.html")]
|
|
pub(crate) struct Inform;
|
|
|
|
#[derive(Subdiagnostic)]
|
|
#[label(
|
|
"missing patterns are not covered because `{$variable}` is interpreted as a constant pattern, not a new variable"
|
|
)]
|
|
pub(crate) struct InterpretedAsConst {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
pub(crate) variable: String,
|
|
}
|
|
|
|
pub(crate) struct AdtDefinedHere<'tcx> {
|
|
pub(crate) adt_def_span: Span,
|
|
pub(crate) ty: Ty<'tcx>,
|
|
pub(crate) variants: Vec<Variant>,
|
|
}
|
|
|
|
pub(crate) struct Variant {
|
|
pub(crate) span: Span,
|
|
}
|
|
|
|
impl<'tcx> Subdiagnostic for AdtDefinedHere<'tcx> {
|
|
fn add_to_diag<G: EmissionGuarantee>(self, diag: &mut Diag<'_, G>) {
|
|
diag.arg("ty", self.ty);
|
|
let mut spans = MultiSpan::from(self.adt_def_span);
|
|
|
|
for Variant { span } in self.variants {
|
|
spans.push_span_label(span, inline_fluent!("not covered"));
|
|
}
|
|
|
|
diag.span_note(spans, inline_fluent!("`{$ty}` defined here"));
|
|
}
|
|
}
|
|
|
|
#[derive(Subdiagnostic)]
|
|
#[suggestion(
|
|
"introduce a variable instead",
|
|
code = "{variable}_var",
|
|
applicability = "maybe-incorrect",
|
|
style = "verbose"
|
|
)]
|
|
pub(crate) struct InterpretedAsConstSugg {
|
|
#[primary_span]
|
|
pub(crate) span: Span,
|
|
pub(crate) variable: String,
|
|
}
|
|
|
|
#[derive(Subdiagnostic)]
|
|
pub(crate) enum SuggestLet {
|
|
#[multipart_suggestion(
|
|
"you might want to use `if let` to ignore the {$count ->
|
|
[one] variant that isn't
|
|
*[other] variants that aren't
|
|
} matched",
|
|
applicability = "has-placeholders"
|
|
)]
|
|
If {
|
|
#[suggestion_part(code = "if ")]
|
|
start_span: Span,
|
|
#[suggestion_part(code = " {{ todo!() }}")]
|
|
semi_span: Span,
|
|
count: usize,
|
|
},
|
|
#[suggestion(
|
|
"you might want to use `let...else` to handle the {$count ->
|
|
[one] variant that isn't
|
|
*[other] variants that aren't
|
|
} matched",
|
|
code = " else {{ todo!() }}",
|
|
applicability = "has-placeholders"
|
|
)]
|
|
Else {
|
|
#[primary_span]
|
|
end_span: Span,
|
|
count: usize,
|
|
},
|
|
}
|
|
|
|
#[derive(Subdiagnostic)]
|
|
pub(crate) enum MiscPatternSuggestion {
|
|
#[suggestion(
|
|
"alternatively, you could prepend the pattern with an underscore to define a new named variable; identifiers cannot begin with digits",
|
|
code = "_",
|
|
applicability = "maybe-incorrect"
|
|
)]
|
|
AttemptedIntegerLiteral {
|
|
#[primary_span]
|
|
start_span: Span,
|
|
},
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("invalid update of the `#[loop_match]` state")]
|
|
pub(crate) struct LoopMatchInvalidUpdate {
|
|
#[primary_span]
|
|
pub lhs: Span,
|
|
#[label("the assignment must update this variable")]
|
|
pub scrutinee: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("invalid match on `#[loop_match]` state")]
|
|
#[note("a local variable must be the scrutinee within a `#[loop_match]`")]
|
|
pub(crate) struct LoopMatchInvalidMatch {
|
|
#[primary_span]
|
|
pub span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("this `#[loop_match]` state value has type `{$ty}`, which is not supported")]
|
|
#[note("only integers, floats, bool, char, and enums without fields are supported")]
|
|
pub(crate) struct LoopMatchUnsupportedType<'tcx> {
|
|
#[primary_span]
|
|
pub span: Span,
|
|
pub ty: Ty<'tcx>,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("statements are not allowed in this position within a `#[loop_match]`")]
|
|
pub(crate) struct LoopMatchBadStatements {
|
|
#[primary_span]
|
|
pub span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("this expression must be a single `match` wrapped in a labeled block")]
|
|
pub(crate) struct LoopMatchBadRhs {
|
|
#[primary_span]
|
|
pub span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("expected a single assignment expression")]
|
|
pub(crate) struct LoopMatchMissingAssignment {
|
|
#[primary_span]
|
|
pub span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("match arms that are part of a `#[loop_match]` cannot have guards")]
|
|
pub(crate) struct LoopMatchArmWithGuard {
|
|
#[primary_span]
|
|
pub span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("could not determine the target branch for this `#[const_continue]`")]
|
|
#[help("try extracting the expression into a `const` item")]
|
|
pub(crate) struct ConstContinueNotMonomorphicConst {
|
|
#[primary_span]
|
|
pub span: Span,
|
|
|
|
#[subdiagnostic]
|
|
pub reason: ConstContinueNotMonomorphicConstReason,
|
|
}
|
|
|
|
#[derive(Subdiagnostic)]
|
|
pub(crate) enum ConstContinueNotMonomorphicConstReason {
|
|
#[label("constant parameters may use generics, and are not evaluated early enough")]
|
|
ConstantParameter {
|
|
#[primary_span]
|
|
span: Span,
|
|
},
|
|
|
|
#[label("`const` blocks may use generics, and are not evaluated early enough")]
|
|
ConstBlock {
|
|
#[primary_span]
|
|
span: Span,
|
|
},
|
|
|
|
#[label("this value must be a literal or a monomorphic const")]
|
|
Other {
|
|
#[primary_span]
|
|
span: Span,
|
|
},
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("could not determine the target branch for this `#[const_continue]`")]
|
|
pub(crate) struct ConstContinueBadConst {
|
|
#[primary_span]
|
|
#[label("this value is too generic")]
|
|
pub span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("a `#[const_continue]` must break to a label with a value")]
|
|
pub(crate) struct ConstContinueMissingLabelOrValue {
|
|
#[primary_span]
|
|
pub span: Span,
|
|
}
|
|
|
|
#[derive(Diagnostic)]
|
|
#[diag("the target of this `#[const_continue]` is not statically known")]
|
|
pub(crate) struct ConstContinueUnknownJumpTarget {
|
|
#[primary_span]
|
|
pub span: Span,
|
|
}
|