@@ -129,17 +129,20 @@ pub enum PathElem {
129
129
pub enum CtfeValidationMode {
130
130
/// Validation of a `static`
131
131
Static { mutbl : Mutability } ,
132
- /// Validation of a `const` (including promoteds).
132
+ /// Validation of a promoted.
133
+ Promoted ,
134
+ /// Validation of a `const`.
133
135
/// `allow_immutable_unsafe_cell` says whether we allow `UnsafeCell` in immutable memory (which is the
134
136
/// case for the top-level allocation of a `const`, where this is fine because the allocation will be
135
137
/// copied at each use site).
136
- Const { allow_immutable_unsafe_cell : bool , allow_extern_static_ptrs : bool } ,
138
+ Const { allow_immutable_unsafe_cell : bool } ,
137
139
}
138
140
139
141
impl CtfeValidationMode {
140
142
fn allow_immutable_unsafe_cell ( self ) -> bool {
141
143
match self {
142
144
CtfeValidationMode :: Static { .. } => false ,
145
+ CtfeValidationMode :: Promoted { .. } => false ,
143
146
CtfeValidationMode :: Const { allow_immutable_unsafe_cell, .. } => {
144
147
allow_immutable_unsafe_cell
145
148
}
@@ -149,6 +152,7 @@ impl CtfeValidationMode {
149
152
fn may_contain_mutable_ref ( self ) -> bool {
150
153
match self {
151
154
CtfeValidationMode :: Static { mutbl } => mutbl == Mutability :: Mut ,
155
+ CtfeValidationMode :: Promoted { .. } => false ,
152
156
CtfeValidationMode :: Const { .. } => false ,
153
157
}
154
158
}
@@ -476,34 +480,32 @@ impl<'rt, 'mir, 'tcx: 'mir, M: Machine<'mir, 'tcx>> ValidityVisitor<'rt, 'mir, '
476
480
throw_validation_failure ! ( self . path, MutableRefToImmutable ) ;
477
481
}
478
482
}
483
+ // Mode-specific checks
479
484
match self . ctfe_mode {
480
- Some ( CtfeValidationMode :: Static { .. } ) => {
485
+ Some (
486
+ CtfeValidationMode :: Static { .. }
487
+ | CtfeValidationMode :: Promoted { .. } ,
488
+ ) => {
481
489
// We skip recursively checking other statics. These statics must be sound by
482
490
// themselves, and the only way to get broken statics here is by using
483
491
// unsafe code.
484
492
// The reasons we don't check other statics is twofold. For one, in all
485
493
// sound cases, the static was already validated on its own, and second, we
486
494
// trigger cycle errors if we try to compute the value of the other static
487
- // and that static refers back to us.
495
+ // and that static refers back to us (potentially through a promoted) .
488
496
// This could miss some UB, but that's fine.
489
497
return Ok ( ( ) ) ;
490
498
}
491
- Some ( CtfeValidationMode :: Const {
492
- allow_extern_static_ptrs, ..
493
- } ) => {
499
+ Some ( CtfeValidationMode :: Const { .. } ) => {
494
500
// For consts on the other hand we have to recursively check;
495
501
// pattern matching assumes a valid value. However we better make
496
502
// sure this is not mutable.
497
503
if is_mut {
498
504
throw_validation_failure ! ( self . path, ConstRefToMutable ) ;
499
505
}
506
+ // We can't recursively validate `extern static`, so we better reject them.
500
507
if self . ecx . tcx . is_foreign_item ( did) {
501
- if !allow_extern_static_ptrs {
502
- throw_validation_failure ! ( self . path, ConstRefToExtern ) ;
503
- } else {
504
- // We can't validate this...
505
- return Ok ( ( ) ) ;
506
- }
508
+ throw_validation_failure ! ( self . path, ConstRefToExtern ) ;
507
509
}
508
510
}
509
511
None => { }
0 commit comments