You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
mir_transform_const_modify = attempting to modify a `const` item
2
+
.note = each usage of a `const` item creates a new temporary; the original `const` item will not be modified
3
+
4
+
mir_transform_const_mut_borrow = taking a mutable reference to a `const` item
5
+
.note = each usage of a `const` item creates a new temporary
6
+
.note2 = the mutable reference will refer to this temporary, not the original `const` item
7
+
.note3 = mutable reference created due to call to this method
8
+
9
+
mir_transform_const_defined_here = `const` item defined here
10
+
11
+
mir_transform_unaligned_packed_ref = reference to packed field is unaligned
12
+
.note = packed structs are only aligned by one byte, and many modern architectures penalize unaligned field accesses
13
+
.note_ub = creating a misaligned reference is undefined behavior (even if that reference is never dereferenced)
14
+
.help = copy the field contents to a local variable, or replace the reference with a raw pointer and use `read_unaligned`/`write_unaligned` (loads and stores via `*p` must be properly aligned even when using raw pointers)
.label = because it's nested under this `unsafe` block
18
+
19
+
mir_transform_requires_unsafe = {$details} is unsafe and requires unsafe {$op_in_unsafe_fn_allowed->
20
+
[true] function or block
21
+
*[false] block
22
+
}
23
+
.not_inherited = items do not inherit unsafety from separate enclosing items
24
+
25
+
mir_transform_call_to_unsafe_label = call to unsafe function
26
+
mir_transform_call_to_unsafe_note = consult the function's documentation for information on how to avoid undefined behavior
27
+
mir_transform_use_of_asm_label = use of inline assembly
28
+
mir_transform_use_of_asm_note = inline assembly is entirely unchecked and can cause undefined behavior
29
+
mir_transform_initializing_valid_range_label = initializing type with `rustc_layout_scalar_valid_range` attr
30
+
mir_transform_initializing_valid_range_note = initializing a layout restricted type's field with a value outside the valid range is undefined behavior
31
+
mir_transform_const_ptr2int_label = cast of pointer to int
32
+
mir_transform_const_ptr2int_note = casting pointers to integers in constants
33
+
mir_transform_use_of_static_mut_label = use of mutable static
34
+
mir_transform_use_of_static_mut_note = mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior
35
+
mir_transform_use_of_extern_static_label = use of extern static
36
+
mir_transform_use_of_extern_static_note = extern statics are not controlled by the Rust type system: invalid data, aliasing violations or data races will cause undefined behavior
37
+
mir_transform_deref_ptr_label = dereference of raw pointer
38
+
mir_transform_deref_ptr_note = raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
39
+
mir_transform_union_access_label = access to union field
40
+
mir_transform_union_access_note = the field may not be properly initialized: using uninitialized data will cause undefined behavior
41
+
mir_transform_mutation_layout_constrained_label = mutation of layout constrained field
42
+
mir_transform_mutation_layout_constrained_note = mutating layout constrained fields cannot statically be checked for valid values
43
+
mir_transform_mutation_layout_constrained_borrow_label = borrow of layout constrained field with interior mutability
44
+
mir_transform_mutation_layout_constrained_borrow_note = references to fields of layout constrained fields lose the constraints. Coupled with interior mutability, the field can be changed to invalid values
45
+
mir_transform_target_feature_call_label = call to function with `#[target_feature]`
46
+
mir_transform_target_feature_call_note = can only be called if the required target features are available
47
+
48
+
mir_transform_unsafe_op_in_unsafe_fn = {$details} is unsafe and requires unsafe block (error E0133)
49
+
50
+
mir_transform_arithmetic_overflow = this arithmetic operation will overflow
51
+
mir_transform_operation_will_panic = this operation will panic at runtime
52
+
53
+
mir_transform_ffi_unwind_call = call to {$foreign->
54
+
[true] foreign function
55
+
*[false] function pointer
56
+
} with FFI-unwind ABI
57
+
58
+
mir_transform_fn_item_ref = taking a reference to a function item does not give a function pointer
59
+
.suggestion = cast `{$ident}` to obtain a function pointer
60
+
61
+
mir_transform_must_not_suspend = {$pre}`{$def_path}`{$post} held across a suspend point, but should not be
62
+
.label = the value is held across this suspend point
63
+
.note = {$reason}
64
+
.help = consider using a block (`{"{ ... }"}`) to shrink the value's scope, ending before the suspend point
65
+
66
+
mir_transform_simd_shuffle_last_const = last argument of `simd_shuffle` is required to be a `const` item
0 commit comments