/rust/registry/src/index.crates.io-1949cf8c6b5b557f/zerocopy-0.8.31/src/pointer/ptr.rs
Line | Count | Source |
1 | | // Copyright 2023 The Fuchsia Authors |
2 | | // |
3 | | // Licensed under a BSD-style license <LICENSE-BSD>, Apache License, Version 2.0 |
4 | | // <LICENSE-APACHE or https://www.apache.org/licenses/LICENSE-2.0>, or the MIT |
5 | | // license <LICENSE-MIT or https://opensource.org/licenses/MIT>, at your option. |
6 | | // This file may not be copied, modified, or distributed except according to |
7 | | // those terms. |
8 | | |
9 | | use core::{ |
10 | | fmt::{Debug, Formatter}, |
11 | | marker::PhantomData, |
12 | | }; |
13 | | |
14 | | use crate::{ |
15 | | pointer::{ |
16 | | inner::PtrInner, |
17 | | invariant::*, |
18 | | transmute::{MutationCompatible, SizeEq, TransmuteFromPtr}, |
19 | | }, |
20 | | AlignmentError, CastError, CastType, KnownLayout, SizeError, TryFromBytes, ValidityError, |
21 | | }; |
22 | | |
23 | | /// Module used to gate access to [`Ptr`]'s fields. |
24 | | mod def { |
25 | | #[cfg(doc)] |
26 | | use super::super::invariant; |
27 | | use super::*; |
28 | | |
29 | | /// A raw pointer with more restrictions. |
30 | | /// |
31 | | /// `Ptr<T>` is similar to [`NonNull<T>`], but it is more restrictive in the |
32 | | /// following ways (note that these requirements only hold of non-zero-sized |
33 | | /// referents): |
34 | | /// - It must derive from a valid allocation. |
35 | | /// - It must reference a byte range which is contained inside the |
36 | | /// allocation from which it derives. |
37 | | /// - As a consequence, the byte range it references must have a size |
38 | | /// which does not overflow `isize`. |
39 | | /// |
40 | | /// Depending on how `Ptr` is parameterized, it may have additional |
41 | | /// invariants: |
42 | | /// - `ptr` conforms to the aliasing invariant of |
43 | | /// [`I::Aliasing`](invariant::Aliasing). |
44 | | /// - `ptr` conforms to the alignment invariant of |
45 | | /// [`I::Alignment`](invariant::Alignment). |
46 | | /// - `ptr` conforms to the validity invariant of |
47 | | /// [`I::Validity`](invariant::Validity). |
48 | | /// |
49 | | /// `Ptr<'a, T>` is [covariant] in `'a` and invariant in `T`. |
50 | | /// |
51 | | /// [`NonNull<T>`]: core::ptr::NonNull |
52 | | /// [covariant]: https://doc.rust-lang.org/reference/subtyping.html |
53 | | pub struct Ptr<'a, T, I> |
54 | | where |
55 | | T: ?Sized, |
56 | | I: Invariants, |
57 | | { |
58 | | /// # Invariants |
59 | | /// |
60 | | /// 0. `ptr` conforms to the aliasing invariant of |
61 | | /// [`I::Aliasing`](invariant::Aliasing). |
62 | | /// 1. `ptr` conforms to the alignment invariant of |
63 | | /// [`I::Alignment`](invariant::Alignment). |
64 | | /// 2. `ptr` conforms to the validity invariant of |
65 | | /// [`I::Validity`](invariant::Validity). |
66 | | // SAFETY: `PtrInner<'a, T>` is covariant in `'a` and invariant in `T`. |
67 | | ptr: PtrInner<'a, T>, |
68 | | _invariants: PhantomData<I>, |
69 | | } |
70 | | |
71 | | impl<'a, T, I> Ptr<'a, T, I> |
72 | | where |
73 | | T: 'a + ?Sized, |
74 | | I: Invariants, |
75 | | { |
76 | | /// Constructs a new `Ptr` from a [`PtrInner`]. |
77 | | /// |
78 | | /// # Safety |
79 | | /// |
80 | | /// The caller promises that: |
81 | | /// |
82 | | /// 0. `ptr` conforms to the aliasing invariant of |
83 | | /// [`I::Aliasing`](invariant::Aliasing). |
84 | | /// 1. `ptr` conforms to the alignment invariant of |
85 | | /// [`I::Alignment`](invariant::Alignment). |
86 | | /// 2. `ptr` conforms to the validity invariant of |
87 | | /// [`I::Validity`](invariant::Validity). |
88 | 1.99M | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { |
89 | | // SAFETY: The caller has promised to satisfy all safety invariants |
90 | | // of `Ptr`. |
91 | 1.99M | Self { ptr, _invariants: PhantomData } |
92 | 1.99M | } <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::from_inner Line | Count | Source | 88 | 124k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 124k | Self { ptr, _invariants: PhantomData } | 92 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::from_inner Line | Count | Source | 88 | 124k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 124k | Self { ptr, _invariants: PhantomData } | 92 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::from_inner Line | Count | Source | 88 | 248k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 248k | Self { ptr, _invariants: PhantomData } | 92 | 248k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::from_inner Line | Count | Source | 88 | 248k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 248k | Self { ptr, _invariants: PhantomData } | 92 | 248k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::from_inner Line | Count | Source | 88 | 124k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 124k | Self { ptr, _invariants: PhantomData } | 92 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<[half::binary16::f16], (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::from_inner Line | Count | Source | 88 | 124k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 124k | Self { ptr, _invariants: PhantomData } | 92 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::from_inner Line | Count | Source | 88 | 124k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 124k | Self { ptr, _invariants: PhantomData } | 92 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::from_inner Line | Count | Source | 88 | 124k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 124k | Self { ptr, _invariants: PhantomData } | 92 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::from_inner Line | Count | Source | 88 | 248k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 248k | Self { ptr, _invariants: PhantomData } | 92 | 248k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::from_inner Line | Count | Source | 88 | 248k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 248k | Self { ptr, _invariants: PhantomData } | 92 | 248k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::from_inner Line | Count | Source | 88 | 124k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 124k | Self { ptr, _invariants: PhantomData } | 92 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<[half::binary16::f16], (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::from_inner Line | Count | Source | 88 | 124k | pub(crate) unsafe fn from_inner(ptr: PtrInner<'a, T>) -> Ptr<'a, T, I> { | 89 | | // SAFETY: The caller has promised to satisfy all safety invariants | 90 | | // of `Ptr`. | 91 | 124k | Self { ptr, _invariants: PhantomData } | 92 | 124k | } |
Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<_, _>>::from_inner |
93 | | |
94 | | /// Converts this `Ptr<T>` to a [`PtrInner<T>`]. |
95 | | /// |
96 | | /// Note that this method does not consume `self`. The caller should |
97 | | /// watch out for `unsafe` code which uses the returned value in a way |
98 | | /// that violates the safety invariants of `self`. |
99 | 1.99M | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { |
100 | 1.99M | self.ptr |
101 | 1.99M | } <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::as_inner Line | Count | Source | 99 | 124k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 124k | self.ptr | 101 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::as_inner Line | Count | Source | 99 | 124k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 124k | self.ptr | 101 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::as_inner Line | Count | Source | 99 | 248k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 248k | self.ptr | 101 | 248k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::as_inner Line | Count | Source | 99 | 248k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 248k | self.ptr | 101 | 248k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::as_inner Line | Count | Source | 99 | 124k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 124k | self.ptr | 101 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<[half::binary16::f16], (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::as_inner Line | Count | Source | 99 | 124k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 124k | self.ptr | 101 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::as_inner Line | Count | Source | 99 | 124k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 124k | self.ptr | 101 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::as_inner Line | Count | Source | 99 | 124k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 124k | self.ptr | 101 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::as_inner Line | Count | Source | 99 | 248k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 248k | self.ptr | 101 | 248k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::as_inner Line | Count | Source | 99 | 248k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 248k | self.ptr | 101 | 248k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::as_inner Line | Count | Source | 99 | 124k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 124k | self.ptr | 101 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<[half::binary16::f16], (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::as_inner Line | Count | Source | 99 | 124k | pub(crate) fn as_inner(&self) -> PtrInner<'a, T> { | 100 | 124k | self.ptr | 101 | 124k | } |
Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<_, _>>::as_inner |
102 | | } |
103 | | } |
104 | | |
105 | | #[allow(unreachable_pub)] // This is a false positive on our MSRV toolchain. |
106 | | pub use def::Ptr; |
107 | | |
108 | | /// External trait implementations on [`Ptr`]. |
109 | | mod _external { |
110 | | use super::*; |
111 | | |
112 | | /// SAFETY: Shared pointers are safely `Copy`. `Ptr`'s other invariants |
113 | | /// (besides aliasing) are unaffected by the number of references that exist |
114 | | /// to `Ptr`'s referent. The notable cases are: |
115 | | /// - Alignment is a property of the referent type (`T`) and the address, |
116 | | /// both of which are unchanged |
117 | | /// - Let `S(T, V)` be the set of bit values permitted to appear in the |
118 | | /// referent of a `Ptr<T, I: Invariants<Validity = V>>`. Since this copy |
119 | | /// does not change `I::Validity` or `T`, `S(T, I::Validity)` is also |
120 | | /// unchanged. |
121 | | /// |
122 | | /// We are required to guarantee that the referents of the original `Ptr` |
123 | | /// and of the copy (which, of course, are actually the same since they |
124 | | /// live in the same byte address range) both remain in the set `S(T, |
125 | | /// I::Validity)`. Since this invariant holds on the original `Ptr`, it |
126 | | /// cannot be violated by the original `Ptr`, and thus the original `Ptr` |
127 | | /// cannot be used to violate this invariant on the copy. The inverse |
128 | | /// holds as well. |
129 | | impl<'a, T, I> Copy for Ptr<'a, T, I> |
130 | | where |
131 | | T: 'a + ?Sized, |
132 | | I: Invariants<Aliasing = Shared>, |
133 | | { |
134 | | } |
135 | | |
136 | | /// SAFETY: See the safety comment on `Copy`. |
137 | | impl<'a, T, I> Clone for Ptr<'a, T, I> |
138 | | where |
139 | | T: 'a + ?Sized, |
140 | | I: Invariants<Aliasing = Shared>, |
141 | | { |
142 | | #[inline] |
143 | 0 | fn clone(&self) -> Self { |
144 | 0 | *self |
145 | 0 | } |
146 | | } |
147 | | |
148 | | impl<'a, T, I> Debug for Ptr<'a, T, I> |
149 | | where |
150 | | T: 'a + ?Sized, |
151 | | I: Invariants, |
152 | | { |
153 | | #[inline] |
154 | 0 | fn fmt(&self, f: &mut Formatter<'_>) -> core::fmt::Result { |
155 | 0 | self.as_inner().as_non_null().fmt(f) |
156 | 0 | } |
157 | | } |
158 | | } |
159 | | |
160 | | /// Methods for converting to and from `Ptr` and Rust's safe reference types. |
161 | | mod _conversions { |
162 | | use super::*; |
163 | | |
164 | | /// `&'a T` → `Ptr<'a, T>` |
165 | | impl<'a, T> Ptr<'a, T, (Shared, Aligned, Valid)> |
166 | | where |
167 | | T: 'a + ?Sized, |
168 | | { |
169 | | /// Constructs a `Ptr` from a shared reference. |
170 | | #[doc(hidden)] |
171 | | #[inline] |
172 | 124k | pub fn from_ref(ptr: &'a T) -> Self { |
173 | 124k | let inner = PtrInner::from_ref(ptr); |
174 | | // SAFETY: |
175 | | // 0. `ptr`, by invariant on `&'a T`, conforms to the aliasing |
176 | | // invariant of `Shared`. |
177 | | // 1. `ptr`, by invariant on `&'a T`, conforms to the alignment |
178 | | // invariant of `Aligned`. |
179 | | // 2. `ptr`'s referent, by invariant on `&'a T`, is a bit-valid `T`. |
180 | | // This satisfies the requirement that a `Ptr<T, (_, _, Valid)>` |
181 | | // point to a bit-valid `T`. Even if `T` permits interior |
182 | | // mutation, this invariant guarantees that the returned `Ptr` |
183 | | // can only ever be used to modify the referent to store |
184 | | // bit-valid `T`s, which ensures that the returned `Ptr` cannot |
185 | | // be used to violate the soundness of the original `ptr: &'a T` |
186 | | // or of any other references that may exist to the same |
187 | | // referent. |
188 | 124k | unsafe { Self::from_inner(inner) } |
189 | 124k | } <zerocopy::pointer::ptr::def::Ptr<[half::binary16::f16], (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::from_ref Line | Count | Source | 172 | 124k | pub fn from_ref(ptr: &'a T) -> Self { | 173 | 124k | let inner = PtrInner::from_ref(ptr); | 174 | | // SAFETY: | 175 | | // 0. `ptr`, by invariant on `&'a T`, conforms to the aliasing | 176 | | // invariant of `Shared`. | 177 | | // 1. `ptr`, by invariant on `&'a T`, conforms to the alignment | 178 | | // invariant of `Aligned`. | 179 | | // 2. `ptr`'s referent, by invariant on `&'a T`, is a bit-valid `T`. | 180 | | // This satisfies the requirement that a `Ptr<T, (_, _, Valid)>` | 181 | | // point to a bit-valid `T`. Even if `T` permits interior | 182 | | // mutation, this invariant guarantees that the returned `Ptr` | 183 | | // can only ever be used to modify the referent to store | 184 | | // bit-valid `T`s, which ensures that the returned `Ptr` cannot | 185 | | // be used to violate the soundness of the original `ptr: &'a T` | 186 | | // or of any other references that may exist to the same | 187 | | // referent. | 188 | 124k | unsafe { Self::from_inner(inner) } | 189 | 124k | } |
Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<_, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::from_ref |
190 | | } |
191 | | |
192 | | /// `&'a mut T` → `Ptr<'a, T>` |
193 | | impl<'a, T> Ptr<'a, T, (Exclusive, Aligned, Valid)> |
194 | | where |
195 | | T: 'a + ?Sized, |
196 | | { |
197 | | /// Constructs a `Ptr` from an exclusive reference. |
198 | | #[inline] |
199 | 124k | pub(crate) fn from_mut(ptr: &'a mut T) -> Self { |
200 | 124k | let inner = PtrInner::from_mut(ptr); |
201 | | // SAFETY: |
202 | | // 0. `ptr`, by invariant on `&'a mut T`, conforms to the aliasing |
203 | | // invariant of `Exclusive`. |
204 | | // 1. `ptr`, by invariant on `&'a mut T`, conforms to the alignment |
205 | | // invariant of `Aligned`. |
206 | | // 2. `ptr`'s referent, by invariant on `&'a mut T`, is a bit-valid |
207 | | // `T`. This satisfies the requirement that a `Ptr<T, (_, _, |
208 | | // Valid)>` point to a bit-valid `T`. This invariant guarantees |
209 | | // that the returned `Ptr` can only ever be used to modify the |
210 | | // referent to store bit-valid `T`s, which ensures that the |
211 | | // returned `Ptr` cannot be used to violate the soundness of the |
212 | | // original `ptr: &'a mut T`. |
213 | 124k | unsafe { Self::from_inner(inner) } |
214 | 124k | } <zerocopy::pointer::ptr::def::Ptr<[half::binary16::f16], (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::from_mut Line | Count | Source | 199 | 124k | pub(crate) fn from_mut(ptr: &'a mut T) -> Self { | 200 | 124k | let inner = PtrInner::from_mut(ptr); | 201 | | // SAFETY: | 202 | | // 0. `ptr`, by invariant on `&'a mut T`, conforms to the aliasing | 203 | | // invariant of `Exclusive`. | 204 | | // 1. `ptr`, by invariant on `&'a mut T`, conforms to the alignment | 205 | | // invariant of `Aligned`. | 206 | | // 2. `ptr`'s referent, by invariant on `&'a mut T`, is a bit-valid | 207 | | // `T`. This satisfies the requirement that a `Ptr<T, (_, _, | 208 | | // Valid)>` point to a bit-valid `T`. This invariant guarantees | 209 | | // that the returned `Ptr` can only ever be used to modify the | 210 | | // referent to store bit-valid `T`s, which ensures that the | 211 | | // returned `Ptr` cannot be used to violate the soundness of the | 212 | | // original `ptr: &'a mut T`. | 213 | 124k | unsafe { Self::from_inner(inner) } | 214 | 124k | } |
Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<_, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::from_mut |
215 | | } |
216 | | |
217 | | /// `Ptr<'a, T>` → `&'a T` |
218 | | impl<'a, T, I> Ptr<'a, T, I> |
219 | | where |
220 | | T: 'a + ?Sized, |
221 | | I: Invariants<Alignment = Aligned, Validity = Valid>, |
222 | | I::Aliasing: Reference, |
223 | | { |
224 | | /// Converts `self` to a shared reference. |
225 | | // This consumes `self`, not `&self`, because `self` is, logically, a |
226 | | // pointer. For `I::Aliasing = invariant::Shared`, `Self: Copy`, and so |
227 | | // this doesn't prevent the caller from still using the pointer after |
228 | | // calling `as_ref`. |
229 | | #[allow(clippy::wrong_self_convention)] |
230 | 124k | pub(crate) fn as_ref(self) -> &'a T { |
231 | 124k | let raw = self.as_inner().as_non_null(); |
232 | | // SAFETY: `self` satisfies the `Aligned` invariant, so we know that |
233 | | // `raw` is validly-aligned for `T`. |
234 | | #[cfg(miri)] |
235 | | unsafe { |
236 | | crate::util::miri_promise_symbolic_alignment( |
237 | | raw.as_ptr().cast(), |
238 | | core::mem::align_of_val_raw(raw.as_ptr()), |
239 | | ); |
240 | | } |
241 | | // SAFETY: This invocation of `NonNull::as_ref` satisfies its |
242 | | // documented safety preconditions: |
243 | | // |
244 | | // 1. The pointer is properly aligned. This is ensured by-contract |
245 | | // on `Ptr`, because the `I::Alignment` is `Aligned`. |
246 | | // |
247 | | // 2. If the pointer's referent is not zero-sized, then the pointer |
248 | | // must be “dereferenceable” in the sense defined in the module |
249 | | // documentation; i.e.: |
250 | | // |
251 | | // > The memory range of the given size starting at the pointer |
252 | | // > must all be within the bounds of a single allocated object. |
253 | | // > [2] |
254 | | // |
255 | | // This is ensured by contract on all `PtrInner`s. |
256 | | // |
257 | | // 3. The pointer must point to a validly-initialized instance of |
258 | | // `T`. This is ensured by-contract on `Ptr`, because the |
259 | | // `I::Validity` is `Valid`. |
260 | | // |
261 | | // 4. You must enforce Rust’s aliasing rules. This is ensured by |
262 | | // contract on `Ptr`, because `I::Aliasing: Reference`. Either it |
263 | | // is `Shared` or `Exclusive`. If it is `Shared`, other |
264 | | // references may not mutate the referent outside of |
265 | | // `UnsafeCell`s. |
266 | | // |
267 | | // [1]: https://doc.rust-lang.org/std/ptr/struct.NonNull.html#method.as_ref |
268 | | // [2]: https://doc.rust-lang.org/std/ptr/index.html#safety |
269 | 124k | unsafe { raw.as_ref() } |
270 | 124k | } <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::as_ref Line | Count | Source | 230 | 124k | pub(crate) fn as_ref(self) -> &'a T { | 231 | 124k | let raw = self.as_inner().as_non_null(); | 232 | | // SAFETY: `self` satisfies the `Aligned` invariant, so we know that | 233 | | // `raw` is validly-aligned for `T`. | 234 | | #[cfg(miri)] | 235 | | unsafe { | 236 | | crate::util::miri_promise_symbolic_alignment( | 237 | | raw.as_ptr().cast(), | 238 | | core::mem::align_of_val_raw(raw.as_ptr()), | 239 | | ); | 240 | | } | 241 | | // SAFETY: This invocation of `NonNull::as_ref` satisfies its | 242 | | // documented safety preconditions: | 243 | | // | 244 | | // 1. The pointer is properly aligned. This is ensured by-contract | 245 | | // on `Ptr`, because the `I::Alignment` is `Aligned`. | 246 | | // | 247 | | // 2. If the pointer's referent is not zero-sized, then the pointer | 248 | | // must be “dereferenceable” in the sense defined in the module | 249 | | // documentation; i.e.: | 250 | | // | 251 | | // > The memory range of the given size starting at the pointer | 252 | | // > must all be within the bounds of a single allocated object. | 253 | | // > [2] | 254 | | // | 255 | | // This is ensured by contract on all `PtrInner`s. | 256 | | // | 257 | | // 3. The pointer must point to a validly-initialized instance of | 258 | | // `T`. This is ensured by-contract on `Ptr`, because the | 259 | | // `I::Validity` is `Valid`. | 260 | | // | 261 | | // 4. You must enforce Rust’s aliasing rules. This is ensured by | 262 | | // contract on `Ptr`, because `I::Aliasing: Reference`. Either it | 263 | | // is `Shared` or `Exclusive`. If it is `Shared`, other | 264 | | // references may not mutate the referent outside of | 265 | | // `UnsafeCell`s. | 266 | | // | 267 | | // [1]: https://doc.rust-lang.org/std/ptr/struct.NonNull.html#method.as_ref | 268 | | // [2]: https://doc.rust-lang.org/std/ptr/index.html#safety | 269 | 124k | unsafe { raw.as_ref() } | 270 | 124k | } |
Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<_, _>>::as_ref |
271 | | } |
272 | | |
273 | | impl<'a, T, I> Ptr<'a, T, I> |
274 | | where |
275 | | T: 'a + ?Sized, |
276 | | I: Invariants, |
277 | | I::Aliasing: Reference, |
278 | | { |
279 | | /// Reborrows `self`, producing another `Ptr`. |
280 | | /// |
281 | | /// Since `self` is borrowed immutably, this prevents any mutable |
282 | | /// methods from being called on `self` as long as the returned `Ptr` |
283 | | /// exists. |
284 | | #[doc(hidden)] |
285 | | #[inline] |
286 | | #[allow(clippy::needless_lifetimes)] // Allows us to name the lifetime in the safety comment below. |
287 | 0 | pub fn reborrow<'b>(&'b mut self) -> Ptr<'b, T, I> |
288 | 0 | where |
289 | 0 | 'a: 'b, |
290 | | { |
291 | | // SAFETY: The following all hold by invariant on `self`, and thus |
292 | | // hold of `ptr = self.as_inner()`: |
293 | | // 0. SEE BELOW. |
294 | | // 1. `ptr` conforms to the alignment invariant of |
295 | | // [`I::Alignment`](invariant::Alignment). |
296 | | // 2. `ptr` conforms to the validity invariant of |
297 | | // [`I::Validity`](invariant::Validity). `self` and the returned |
298 | | // `Ptr` permit the same bit values in their referents since they |
299 | | // have the same referent type (`T`) and the same validity |
300 | | // (`I::Validity`). Thus, regardless of what mutation is |
301 | | // permitted (`Exclusive` aliasing or `Shared`-aliased interior |
302 | | // mutation), neither can be used to write a value to the |
303 | | // referent which violates the other's validity invariant. |
304 | | // |
305 | | // For aliasing (0 above), since `I::Aliasing: Reference`, |
306 | | // there are two cases for `I::Aliasing`: |
307 | | // - For `invariant::Shared`: `'a` outlives `'b`, and so the |
308 | | // returned `Ptr` does not permit accessing the referent any |
309 | | // longer than is possible via `self`. For shared aliasing, it is |
310 | | // sound for multiple `Ptr`s to exist simultaneously which |
311 | | // reference the same memory, so creating a new one is not |
312 | | // problematic. |
313 | | // - For `invariant::Exclusive`: Since `self` is `&'b mut` and we |
314 | | // return a `Ptr` with lifetime `'b`, `self` is inaccessible to |
315 | | // the caller for the lifetime `'b` - in other words, `self` is |
316 | | // inaccessible to the caller as long as the returned `Ptr` |
317 | | // exists. Since `self` is an exclusive `Ptr`, no other live |
318 | | // references or `Ptr`s may exist which refer to the same memory |
319 | | // while `self` is live. Thus, as long as the returned `Ptr` |
320 | | // exists, no other references or `Ptr`s which refer to the same |
321 | | // memory may be live. |
322 | 0 | unsafe { Ptr::from_inner(self.as_inner()) } |
323 | 0 | } |
324 | | } |
325 | | |
326 | | /// `Ptr<'a, T>` → `&'a mut T` |
327 | | impl<'a, T> Ptr<'a, T, (Exclusive, Aligned, Valid)> |
328 | | where |
329 | | T: 'a + ?Sized, |
330 | | { |
331 | | /// Converts `self` to a mutable reference. |
332 | | #[allow(clippy::wrong_self_convention)] |
333 | 124k | pub(crate) fn as_mut(self) -> &'a mut T { |
334 | 124k | let mut raw = self.as_inner().as_non_null(); |
335 | | // SAFETY: `self` satisfies the `Aligned` invariant, so we know that |
336 | | // `raw` is validly-aligned for `T`. |
337 | | #[cfg(miri)] |
338 | | unsafe { |
339 | | crate::util::miri_promise_symbolic_alignment( |
340 | | raw.as_ptr().cast(), |
341 | | core::mem::align_of_val_raw(raw.as_ptr()), |
342 | | ); |
343 | | } |
344 | | // SAFETY: This invocation of `NonNull::as_mut` satisfies its |
345 | | // documented safety preconditions: |
346 | | // |
347 | | // 1. The pointer is properly aligned. This is ensured by-contract |
348 | | // on `Ptr`, because the `ALIGNMENT_INVARIANT` is `Aligned`. |
349 | | // |
350 | | // 2. If the pointer's referent is not zero-sized, then the pointer |
351 | | // must be “dereferenceable” in the sense defined in the module |
352 | | // documentation; i.e.: |
353 | | // |
354 | | // > The memory range of the given size starting at the pointer |
355 | | // > must all be within the bounds of a single allocated object. |
356 | | // > [2] |
357 | | // |
358 | | // This is ensured by contract on all `PtrInner`s. |
359 | | // |
360 | | // 3. The pointer must point to a validly-initialized instance of |
361 | | // `T`. This is ensured by-contract on `Ptr`, because the |
362 | | // validity invariant is `Valid`. |
363 | | // |
364 | | // 4. You must enforce Rust’s aliasing rules. This is ensured by |
365 | | // contract on `Ptr`, because the `ALIASING_INVARIANT` is |
366 | | // `Exclusive`. |
367 | | // |
368 | | // [1]: https://doc.rust-lang.org/std/ptr/struct.NonNull.html#method.as_mut |
369 | | // [2]: https://doc.rust-lang.org/std/ptr/index.html#safety |
370 | 124k | unsafe { raw.as_mut() } |
371 | 124k | } <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::as_mut Line | Count | Source | 333 | 124k | pub(crate) fn as_mut(self) -> &'a mut T { | 334 | 124k | let mut raw = self.as_inner().as_non_null(); | 335 | | // SAFETY: `self` satisfies the `Aligned` invariant, so we know that | 336 | | // `raw` is validly-aligned for `T`. | 337 | | #[cfg(miri)] | 338 | | unsafe { | 339 | | crate::util::miri_promise_symbolic_alignment( | 340 | | raw.as_ptr().cast(), | 341 | | core::mem::align_of_val_raw(raw.as_ptr()), | 342 | | ); | 343 | | } | 344 | | // SAFETY: This invocation of `NonNull::as_mut` satisfies its | 345 | | // documented safety preconditions: | 346 | | // | 347 | | // 1. The pointer is properly aligned. This is ensured by-contract | 348 | | // on `Ptr`, because the `ALIGNMENT_INVARIANT` is `Aligned`. | 349 | | // | 350 | | // 2. If the pointer's referent is not zero-sized, then the pointer | 351 | | // must be “dereferenceable” in the sense defined in the module | 352 | | // documentation; i.e.: | 353 | | // | 354 | | // > The memory range of the given size starting at the pointer | 355 | | // > must all be within the bounds of a single allocated object. | 356 | | // > [2] | 357 | | // | 358 | | // This is ensured by contract on all `PtrInner`s. | 359 | | // | 360 | | // 3. The pointer must point to a validly-initialized instance of | 361 | | // `T`. This is ensured by-contract on `Ptr`, because the | 362 | | // validity invariant is `Valid`. | 363 | | // | 364 | | // 4. You must enforce Rust’s aliasing rules. This is ensured by | 365 | | // contract on `Ptr`, because the `ALIASING_INVARIANT` is | 366 | | // `Exclusive`. | 367 | | // | 368 | | // [1]: https://doc.rust-lang.org/std/ptr/struct.NonNull.html#method.as_mut | 369 | | // [2]: https://doc.rust-lang.org/std/ptr/index.html#safety | 370 | 124k | unsafe { raw.as_mut() } | 371 | 124k | } |
Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<_, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::as_mut |
372 | | } |
373 | | |
374 | | /// `Ptr<'a, T>` → `Ptr<'a, U>` |
375 | | impl<'a, T: ?Sized, I> Ptr<'a, T, I> |
376 | | where |
377 | | I: Invariants, |
378 | | { |
379 | 497k | pub(crate) fn transmute<U, V, R>(self) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> |
380 | 497k | where |
381 | 497k | V: Validity, |
382 | 497k | U: TransmuteFromPtr<T, I::Aliasing, I::Validity, V, R> + SizeEq<T> + ?Sized, |
383 | | { |
384 | | // SAFETY: |
385 | | // - `SizeEq::cast_from_raw` promises to preserve address, |
386 | | // provenance, and the number of bytes in the referent |
387 | | // - If aliasing is `Shared`, then by `U: TransmuteFromPtr<T>`, at |
388 | | // least one of the following holds: |
389 | | // - `T: Immutable` and `U: Immutable`, in which case it is |
390 | | // trivially sound for shared code to operate on a `&T` and `&U` |
391 | | // at the same time, as neither can perform interior mutation |
392 | | // - It is directly guaranteed that it is sound for shared code to |
393 | | // operate on these references simultaneously |
394 | | // - By `U: TransmuteFromPtr<T, I::Aliasing, I::Validity, V>`, it is |
395 | | // sound to perform this transmute. |
396 | 497k | unsafe { self.transmute_unchecked(SizeEq::cast_from_raw) } |
397 | 497k | } <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::transmute::<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, zerocopy::pointer::invariant::Initialized, (zerocopy::pointer::transmute::BecauseMutationCompatible, (zerocopy::pointer::transmute::BecauseRead, (zerocopy::pointer::invariant::BecauseImmutable, zerocopy::pointer::invariant::BecauseImmutable)))> Line | Count | Source | 379 | 124k | pub(crate) fn transmute<U, V, R>(self) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 380 | 124k | where | 381 | 124k | V: Validity, | 382 | 124k | U: TransmuteFromPtr<T, I::Aliasing, I::Validity, V, R> + SizeEq<T> + ?Sized, | 383 | | { | 384 | | // SAFETY: | 385 | | // - `SizeEq::cast_from_raw` promises to preserve address, | 386 | | // provenance, and the number of bytes in the referent | 387 | | // - If aliasing is `Shared`, then by `U: TransmuteFromPtr<T>`, at | 388 | | // least one of the following holds: | 389 | | // - `T: Immutable` and `U: Immutable`, in which case it is | 390 | | // trivially sound for shared code to operate on a `&T` and `&U` | 391 | | // at the same time, as neither can perform interior mutation | 392 | | // - It is directly guaranteed that it is sound for shared code to | 393 | | // operate on these references simultaneously | 394 | | // - By `U: TransmuteFromPtr<T, I::Aliasing, I::Validity, V>`, it is | 395 | | // sound to perform this transmute. | 396 | 124k | unsafe { self.transmute_unchecked(SizeEq::cast_from_raw) } | 397 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<[half::binary16::f16], (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::transmute::<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, zerocopy::pointer::invariant::Valid, zerocopy::pointer::invariant::BecauseImmutable> Line | Count | Source | 379 | 124k | pub(crate) fn transmute<U, V, R>(self) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 380 | 124k | where | 381 | 124k | V: Validity, | 382 | 124k | U: TransmuteFromPtr<T, I::Aliasing, I::Validity, V, R> + SizeEq<T> + ?Sized, | 383 | | { | 384 | | // SAFETY: | 385 | | // - `SizeEq::cast_from_raw` promises to preserve address, | 386 | | // provenance, and the number of bytes in the referent | 387 | | // - If aliasing is `Shared`, then by `U: TransmuteFromPtr<T>`, at | 388 | | // least one of the following holds: | 389 | | // - `T: Immutable` and `U: Immutable`, in which case it is | 390 | | // trivially sound for shared code to operate on a `&T` and `&U` | 391 | | // at the same time, as neither can perform interior mutation | 392 | | // - It is directly guaranteed that it is sound for shared code to | 393 | | // operate on these references simultaneously | 394 | | // - By `U: TransmuteFromPtr<T, I::Aliasing, I::Validity, V>`, it is | 395 | | // sound to perform this transmute. | 396 | 124k | unsafe { self.transmute_unchecked(SizeEq::cast_from_raw) } | 397 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::transmute::<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, zerocopy::pointer::invariant::Initialized, (zerocopy::pointer::transmute::BecauseMutationCompatible, (zerocopy::pointer::transmute::BecauseRead, (zerocopy::pointer::invariant::BecauseExclusive, zerocopy::pointer::invariant::BecauseExclusive)))> Line | Count | Source | 379 | 124k | pub(crate) fn transmute<U, V, R>(self) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 380 | 124k | where | 381 | 124k | V: Validity, | 382 | 124k | U: TransmuteFromPtr<T, I::Aliasing, I::Validity, V, R> + SizeEq<T> + ?Sized, | 383 | | { | 384 | | // SAFETY: | 385 | | // - `SizeEq::cast_from_raw` promises to preserve address, | 386 | | // provenance, and the number of bytes in the referent | 387 | | // - If aliasing is `Shared`, then by `U: TransmuteFromPtr<T>`, at | 388 | | // least one of the following holds: | 389 | | // - `T: Immutable` and `U: Immutable`, in which case it is | 390 | | // trivially sound for shared code to operate on a `&T` and `&U` | 391 | | // at the same time, as neither can perform interior mutation | 392 | | // - It is directly guaranteed that it is sound for shared code to | 393 | | // operate on these references simultaneously | 394 | | // - By `U: TransmuteFromPtr<T, I::Aliasing, I::Validity, V>`, it is | 395 | | // sound to perform this transmute. | 396 | 124k | unsafe { self.transmute_unchecked(SizeEq::cast_from_raw) } | 397 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<[half::binary16::f16], (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::transmute::<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, zerocopy::pointer::invariant::Valid, (zerocopy::pointer::transmute::BecauseMutationCompatible, (zerocopy::pointer::transmute::BecauseRead, (zerocopy::pointer::invariant::BecauseExclusive, zerocopy::pointer::invariant::BecauseExclusive)))> Line | Count | Source | 379 | 124k | pub(crate) fn transmute<U, V, R>(self) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 380 | 124k | where | 381 | 124k | V: Validity, | 382 | 124k | U: TransmuteFromPtr<T, I::Aliasing, I::Validity, V, R> + SizeEq<T> + ?Sized, | 383 | | { | 384 | | // SAFETY: | 385 | | // - `SizeEq::cast_from_raw` promises to preserve address, | 386 | | // provenance, and the number of bytes in the referent | 387 | | // - If aliasing is `Shared`, then by `U: TransmuteFromPtr<T>`, at | 388 | | // least one of the following holds: | 389 | | // - `T: Immutable` and `U: Immutable`, in which case it is | 390 | | // trivially sound for shared code to operate on a `&T` and `&U` | 391 | | // at the same time, as neither can perform interior mutation | 392 | | // - It is directly guaranteed that it is sound for shared code to | 393 | | // operate on these references simultaneously | 394 | | // - By `U: TransmuteFromPtr<T, I::Aliasing, I::Validity, V>`, it is | 395 | | // sound to perform this transmute. | 396 | 124k | unsafe { self.transmute_unchecked(SizeEq::cast_from_raw) } | 397 | 124k | } |
Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<_, _>>::transmute::<_, _, _> |
398 | | |
399 | | #[doc(hidden)] |
400 | | #[inline(always)] |
401 | | #[must_use] |
402 | 497k | pub fn recall_validity<V, R>(self) -> Ptr<'a, T, (I::Aliasing, I::Alignment, V)> |
403 | 497k | where |
404 | 497k | V: Validity, |
405 | 497k | T: TransmuteFromPtr<T, I::Aliasing, I::Validity, V, R>, |
406 | | { |
407 | | // SAFETY: |
408 | | // - This cast is a no-op, and so trivially preserves address, |
409 | | // referent size, and provenance |
410 | | // - It is trivially sound to have multiple `&T` referencing the |
411 | | // same referent simultaneously |
412 | | // - By `T: TransmuteFromPtr<T, I::Aliasing, I::Validity, V>`, it is |
413 | | // sound to perform this transmute. |
414 | 497k | let ptr = unsafe { self.transmute_unchecked(SizeEq::cast_from_raw) }; |
415 | | // SAFETY: `self` and `ptr` have the same address and referent type. |
416 | | // Therefore, if `self` satisfies `I::Alignment`, then so does |
417 | | // `ptr`. |
418 | 497k | unsafe { ptr.assume_alignment::<I::Alignment>() } |
419 | 497k | } <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::recall_validity::<zerocopy::pointer::invariant::Valid, zerocopy::pointer::invariant::BecauseImmutable> Line | Count | Source | 402 | 124k | pub fn recall_validity<V, R>(self) -> Ptr<'a, T, (I::Aliasing, I::Alignment, V)> | 403 | 124k | where | 404 | 124k | V: Validity, | 405 | 124k | T: TransmuteFromPtr<T, I::Aliasing, I::Validity, V, R>, | 406 | | { | 407 | | // SAFETY: | 408 | | // - This cast is a no-op, and so trivially preserves address, | 409 | | // referent size, and provenance | 410 | | // - It is trivially sound to have multiple `&T` referencing the | 411 | | // same referent simultaneously | 412 | | // - By `T: TransmuteFromPtr<T, I::Aliasing, I::Validity, V>`, it is | 413 | | // sound to perform this transmute. | 414 | 124k | let ptr = unsafe { self.transmute_unchecked(SizeEq::cast_from_raw) }; | 415 | | // SAFETY: `self` and `ptr` have the same address and referent type. | 416 | | // Therefore, if `self` satisfies `I::Alignment`, then so does | 417 | | // `ptr`. | 418 | 124k | unsafe { ptr.assume_alignment::<I::Alignment>() } | 419 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::recall_validity::<zerocopy::pointer::invariant::Initialized, zerocopy::pointer::invariant::BecauseImmutable> Line | Count | Source | 402 | 124k | pub fn recall_validity<V, R>(self) -> Ptr<'a, T, (I::Aliasing, I::Alignment, V)> | 403 | 124k | where | 404 | 124k | V: Validity, | 405 | 124k | T: TransmuteFromPtr<T, I::Aliasing, I::Validity, V, R>, | 406 | | { | 407 | | // SAFETY: | 408 | | // - This cast is a no-op, and so trivially preserves address, | 409 | | // referent size, and provenance | 410 | | // - It is trivially sound to have multiple `&T` referencing the | 411 | | // same referent simultaneously | 412 | | // - By `T: TransmuteFromPtr<T, I::Aliasing, I::Validity, V>`, it is | 413 | | // sound to perform this transmute. | 414 | 124k | let ptr = unsafe { self.transmute_unchecked(SizeEq::cast_from_raw) }; | 415 | | // SAFETY: `self` and `ptr` have the same address and referent type. | 416 | | // Therefore, if `self` satisfies `I::Alignment`, then so does | 417 | | // `ptr`. | 418 | 124k | unsafe { ptr.assume_alignment::<I::Alignment>() } | 419 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::recall_validity::<zerocopy::pointer::invariant::Valid, (zerocopy::pointer::transmute::BecauseMutationCompatible, (zerocopy::pointer::transmute::BecauseRead, (zerocopy::pointer::invariant::BecauseExclusive, zerocopy::pointer::invariant::BecauseExclusive)))> Line | Count | Source | 402 | 124k | pub fn recall_validity<V, R>(self) -> Ptr<'a, T, (I::Aliasing, I::Alignment, V)> | 403 | 124k | where | 404 | 124k | V: Validity, | 405 | 124k | T: TransmuteFromPtr<T, I::Aliasing, I::Validity, V, R>, | 406 | | { | 407 | | // SAFETY: | 408 | | // - This cast is a no-op, and so trivially preserves address, | 409 | | // referent size, and provenance | 410 | | // - It is trivially sound to have multiple `&T` referencing the | 411 | | // same referent simultaneously | 412 | | // - By `T: TransmuteFromPtr<T, I::Aliasing, I::Validity, V>`, it is | 413 | | // sound to perform this transmute. | 414 | 124k | let ptr = unsafe { self.transmute_unchecked(SizeEq::cast_from_raw) }; | 415 | | // SAFETY: `self` and `ptr` have the same address and referent type. | 416 | | // Therefore, if `self` satisfies `I::Alignment`, then so does | 417 | | // `ptr`. | 418 | 124k | unsafe { ptr.assume_alignment::<I::Alignment>() } | 419 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::recall_validity::<zerocopy::pointer::invariant::Initialized, (zerocopy::pointer::transmute::BecauseMutationCompatible, (zerocopy::pointer::transmute::BecauseRead, (zerocopy::pointer::invariant::BecauseExclusive, zerocopy::pointer::invariant::BecauseExclusive)))> Line | Count | Source | 402 | 124k | pub fn recall_validity<V, R>(self) -> Ptr<'a, T, (I::Aliasing, I::Alignment, V)> | 403 | 124k | where | 404 | 124k | V: Validity, | 405 | 124k | T: TransmuteFromPtr<T, I::Aliasing, I::Validity, V, R>, | 406 | | { | 407 | | // SAFETY: | 408 | | // - This cast is a no-op, and so trivially preserves address, | 409 | | // referent size, and provenance | 410 | | // - It is trivially sound to have multiple `&T` referencing the | 411 | | // same referent simultaneously | 412 | | // - By `T: TransmuteFromPtr<T, I::Aliasing, I::Validity, V>`, it is | 413 | | // sound to perform this transmute. | 414 | 124k | let ptr = unsafe { self.transmute_unchecked(SizeEq::cast_from_raw) }; | 415 | | // SAFETY: `self` and `ptr` have the same address and referent type. | 416 | | // Therefore, if `self` satisfies `I::Alignment`, then so does | 417 | | // `ptr`. | 418 | 124k | unsafe { ptr.assume_alignment::<I::Alignment>() } | 419 | 124k | } |
Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::recall_validity::<zerocopy::pointer::invariant::Valid, zerocopy::pointer::invariant::BecauseImmutable> Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::recall_validity::<zerocopy::pointer::invariant::Initialized, zerocopy::pointer::invariant::BecauseImmutable> Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::recall_validity::<zerocopy::pointer::invariant::Valid, (zerocopy::pointer::transmute::BecauseMutationCompatible, (zerocopy::pointer::transmute::BecauseRead, (zerocopy::pointer::invariant::BecauseExclusive, zerocopy::pointer::invariant::BecauseExclusive)))> Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::recall_validity::<zerocopy::pointer::invariant::Initialized, (zerocopy::pointer::transmute::BecauseMutationCompatible, (zerocopy::pointer::transmute::BecauseRead, (zerocopy::pointer::invariant::BecauseExclusive, zerocopy::pointer::invariant::BecauseExclusive)))> Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::recall_validity::<zerocopy::pointer::invariant::Valid, (zerocopy::pointer::transmute::BecauseMutationCompatible, (zerocopy::pointer::transmute::BecauseRead, (zerocopy::pointer::invariant::BecauseExclusive, zerocopy::pointer::invariant::BecauseExclusive)))> Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::recall_validity::<zerocopy::pointer::invariant::Initialized, (zerocopy::pointer::transmute::BecauseMutationCompatible, (zerocopy::pointer::transmute::BecauseRead, (zerocopy::pointer::invariant::BecauseExclusive, zerocopy::pointer::invariant::BecauseExclusive)))> Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<_, _>>::recall_validity::<_, _> Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::recall_validity::<zerocopy::pointer::invariant::Valid, zerocopy::pointer::invariant::BecauseImmutable> Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::recall_validity::<zerocopy::pointer::invariant::Initialized, zerocopy::pointer::invariant::BecauseImmutable> |
420 | | |
421 | | /// Casts to a different (unsized) target type without checking interior |
422 | | /// mutability. |
423 | | /// |
424 | | /// Callers should prefer [`cast_unsized`] where possible. |
425 | | /// |
426 | | /// [`cast_unsized`]: Ptr::cast_unsized |
427 | | /// |
428 | | /// # Safety |
429 | | /// |
430 | | /// The caller promises that `u = cast(p)` is a pointer cast with the |
431 | | /// following properties: |
432 | | /// - `u` addresses a subset of the bytes addressed by `p` |
433 | | /// - `u` has the same provenance as `p` |
434 | | /// - If `I::Aliasing` is [`Shared`], it must not be possible for safe |
435 | | /// code, operating on a `&T` and `&U` with the same referent |
436 | | /// simultaneously, to cause undefined behavior |
437 | | /// - It is sound to transmute a pointer of type `T` with aliasing |
438 | | /// `I::Aliasing` and validity `I::Validity` to a pointer of type `U` |
439 | | /// with aliasing `I::Aliasing` and validity `V`. This is a subtle |
440 | | /// soundness requirement that is a function of `T`, `U`, |
441 | | /// `I::Aliasing`, `I::Validity`, and `V`, and may depend upon the |
442 | | /// presence, absence, or specific location of `UnsafeCell`s in `T` |
443 | | /// and/or `U`. See [`Validity`] for more details. |
444 | | #[doc(hidden)] |
445 | | #[inline] |
446 | 995k | pub unsafe fn transmute_unchecked<U: ?Sized, V, F>( |
447 | 995k | self, |
448 | 995k | cast: F, |
449 | 995k | ) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> |
450 | 995k | where |
451 | 995k | V: Validity, |
452 | 995k | F: FnOnce(PtrInner<'a, T>) -> PtrInner<'a, U>, |
453 | | { |
454 | 995k | let ptr = cast(self.as_inner()); |
455 | | |
456 | | // SAFETY: |
457 | | // |
458 | | // The following safety arguments rely on the fact that the caller |
459 | | // promises that `cast` returns a `PtrInner` which addresses a |
460 | | // prefix of the bytes of `*self`, and so properties that hold of |
461 | | // `*self` also hold of `*ptr`. |
462 | | // |
463 | | // 0. `ptr` conforms to the aliasing invariant of `I::Aliasing`: |
464 | | // - `Exclusive`: `self` is the only `Ptr` or reference which is |
465 | | // permitted to read or modify the referent for the lifetime |
466 | | // `'a`. Since we consume `self` by value, the returned pointer |
467 | | // remains the only `Ptr` or reference which is permitted to |
468 | | // read or modify the referent for the lifetime `'a`. |
469 | | // - `Shared`: Since `self` has aliasing `Shared`, we know that |
470 | | // no other code may mutate the referent during the lifetime |
471 | | // `'a`, except via `UnsafeCell`s, and except as permitted by |
472 | | // `T`'s library safety invariants. The caller promises that |
473 | | // any safe operations which can be permitted on a `&T` and a |
474 | | // `&U` simultaneously must be sound. Thus, no operations on a |
475 | | // `&U` could violate `&T`'s library safety invariants, and |
476 | | // vice-versa. Since any mutation via shared references outside |
477 | | // of `UnsafeCell`s is unsound, this must be impossible using |
478 | | // `&T` and `&U`. |
479 | | // - `Inaccessible`: There are no restrictions we need to uphold. |
480 | | // 1. `ptr` trivially satisfies the alignment invariant `Unaligned`. |
481 | | // 2. The caller promises that `ptr` conforms to the validity |
482 | | // invariant `V` with respect to its referent type, `U`. |
483 | 995k | unsafe { Ptr::from_inner(ptr) } |
484 | 995k | } <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::transmute_unchecked::<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, zerocopy::pointer::invariant::Valid, <<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]> as zerocopy::pointer::transmute::SizeEq<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>>>::cast_from_raw> Line | Count | Source | 446 | 124k | pub unsafe fn transmute_unchecked<U: ?Sized, V, F>( | 447 | 124k | self, | 448 | 124k | cast: F, | 449 | 124k | ) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 450 | 124k | where | 451 | 124k | V: Validity, | 452 | 124k | F: FnOnce(PtrInner<'a, T>) -> PtrInner<'a, U>, | 453 | | { | 454 | 124k | let ptr = cast(self.as_inner()); | 455 | | | 456 | | // SAFETY: | 457 | | // | 458 | | // The following safety arguments rely on the fact that the caller | 459 | | // promises that `cast` returns a `PtrInner` which addresses a | 460 | | // prefix of the bytes of `*self`, and so properties that hold of | 461 | | // `*self` also hold of `*ptr`. | 462 | | // | 463 | | // 0. `ptr` conforms to the aliasing invariant of `I::Aliasing`: | 464 | | // - `Exclusive`: `self` is the only `Ptr` or reference which is | 465 | | // permitted to read or modify the referent for the lifetime | 466 | | // `'a`. Since we consume `self` by value, the returned pointer | 467 | | // remains the only `Ptr` or reference which is permitted to | 468 | | // read or modify the referent for the lifetime `'a`. | 469 | | // - `Shared`: Since `self` has aliasing `Shared`, we know that | 470 | | // no other code may mutate the referent during the lifetime | 471 | | // `'a`, except via `UnsafeCell`s, and except as permitted by | 472 | | // `T`'s library safety invariants. The caller promises that | 473 | | // any safe operations which can be permitted on a `&T` and a | 474 | | // `&U` simultaneously must be sound. Thus, no operations on a | 475 | | // `&U` could violate `&T`'s library safety invariants, and | 476 | | // vice-versa. Since any mutation via shared references outside | 477 | | // of `UnsafeCell`s is unsound, this must be impossible using | 478 | | // `&T` and `&U`. | 479 | | // - `Inaccessible`: There are no restrictions we need to uphold. | 480 | | // 1. `ptr` trivially satisfies the alignment invariant `Unaligned`. | 481 | | // 2. The caller promises that `ptr` conforms to the validity | 482 | | // invariant `V` with respect to its referent type, `U`. | 483 | 124k | unsafe { Ptr::from_inner(ptr) } | 484 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::transmute_unchecked::<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, zerocopy::pointer::invariant::Initialized, <<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]> as zerocopy::pointer::transmute::SizeEq<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>>>::cast_from_raw> Line | Count | Source | 446 | 124k | pub unsafe fn transmute_unchecked<U: ?Sized, V, F>( | 447 | 124k | self, | 448 | 124k | cast: F, | 449 | 124k | ) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 450 | 124k | where | 451 | 124k | V: Validity, | 452 | 124k | F: FnOnce(PtrInner<'a, T>) -> PtrInner<'a, U>, | 453 | | { | 454 | 124k | let ptr = cast(self.as_inner()); | 455 | | | 456 | | // SAFETY: | 457 | | // | 458 | | // The following safety arguments rely on the fact that the caller | 459 | | // promises that `cast` returns a `PtrInner` which addresses a | 460 | | // prefix of the bytes of `*self`, and so properties that hold of | 461 | | // `*self` also hold of `*ptr`. | 462 | | // | 463 | | // 0. `ptr` conforms to the aliasing invariant of `I::Aliasing`: | 464 | | // - `Exclusive`: `self` is the only `Ptr` or reference which is | 465 | | // permitted to read or modify the referent for the lifetime | 466 | | // `'a`. Since we consume `self` by value, the returned pointer | 467 | | // remains the only `Ptr` or reference which is permitted to | 468 | | // read or modify the referent for the lifetime `'a`. | 469 | | // - `Shared`: Since `self` has aliasing `Shared`, we know that | 470 | | // no other code may mutate the referent during the lifetime | 471 | | // `'a`, except via `UnsafeCell`s, and except as permitted by | 472 | | // `T`'s library safety invariants. The caller promises that | 473 | | // any safe operations which can be permitted on a `&T` and a | 474 | | // `&U` simultaneously must be sound. Thus, no operations on a | 475 | | // `&U` could violate `&T`'s library safety invariants, and | 476 | | // vice-versa. Since any mutation via shared references outside | 477 | | // of `UnsafeCell`s is unsound, this must be impossible using | 478 | | // `&T` and `&U`. | 479 | | // - `Inaccessible`: There are no restrictions we need to uphold. | 480 | | // 1. `ptr` trivially satisfies the alignment invariant `Unaligned`. | 481 | | // 2. The caller promises that `ptr` conforms to the validity | 482 | | // invariant `V` with respect to its referent type, `U`. | 483 | 124k | unsafe { Ptr::from_inner(ptr) } | 484 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::transmute_unchecked::<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, zerocopy::pointer::invariant::Initialized, <<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]> as zerocopy::pointer::transmute::SizeEq<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>>>::cast_from_raw> Line | Count | Source | 446 | 124k | pub unsafe fn transmute_unchecked<U: ?Sized, V, F>( | 447 | 124k | self, | 448 | 124k | cast: F, | 449 | 124k | ) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 450 | 124k | where | 451 | 124k | V: Validity, | 452 | 124k | F: FnOnce(PtrInner<'a, T>) -> PtrInner<'a, U>, | 453 | | { | 454 | 124k | let ptr = cast(self.as_inner()); | 455 | | | 456 | | // SAFETY: | 457 | | // | 458 | | // The following safety arguments rely on the fact that the caller | 459 | | // promises that `cast` returns a `PtrInner` which addresses a | 460 | | // prefix of the bytes of `*self`, and so properties that hold of | 461 | | // `*self` also hold of `*ptr`. | 462 | | // | 463 | | // 0. `ptr` conforms to the aliasing invariant of `I::Aliasing`: | 464 | | // - `Exclusive`: `self` is the only `Ptr` or reference which is | 465 | | // permitted to read or modify the referent for the lifetime | 466 | | // `'a`. Since we consume `self` by value, the returned pointer | 467 | | // remains the only `Ptr` or reference which is permitted to | 468 | | // read or modify the referent for the lifetime `'a`. | 469 | | // - `Shared`: Since `self` has aliasing `Shared`, we know that | 470 | | // no other code may mutate the referent during the lifetime | 471 | | // `'a`, except via `UnsafeCell`s, and except as permitted by | 472 | | // `T`'s library safety invariants. The caller promises that | 473 | | // any safe operations which can be permitted on a `&T` and a | 474 | | // `&U` simultaneously must be sound. Thus, no operations on a | 475 | | // `&U` could violate `&T`'s library safety invariants, and | 476 | | // vice-versa. Since any mutation via shared references outside | 477 | | // of `UnsafeCell`s is unsound, this must be impossible using | 478 | | // `&T` and `&U`. | 479 | | // - `Inaccessible`: There are no restrictions we need to uphold. | 480 | | // 1. `ptr` trivially satisfies the alignment invariant `Unaligned`. | 481 | | // 2. The caller promises that `ptr` conforms to the validity | 482 | | // invariant `V` with respect to its referent type, `U`. | 483 | 124k | unsafe { Ptr::from_inner(ptr) } | 484 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<[half::binary16::f16], (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::transmute_unchecked::<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, zerocopy::pointer::invariant::Valid, <<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]> as zerocopy::pointer::transmute::SizeEq<[half::binary16::f16]>>::cast_from_raw> Line | Count | Source | 446 | 124k | pub unsafe fn transmute_unchecked<U: ?Sized, V, F>( | 447 | 124k | self, | 448 | 124k | cast: F, | 449 | 124k | ) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 450 | 124k | where | 451 | 124k | V: Validity, | 452 | 124k | F: FnOnce(PtrInner<'a, T>) -> PtrInner<'a, U>, | 453 | | { | 454 | 124k | let ptr = cast(self.as_inner()); | 455 | | | 456 | | // SAFETY: | 457 | | // | 458 | | // The following safety arguments rely on the fact that the caller | 459 | | // promises that `cast` returns a `PtrInner` which addresses a | 460 | | // prefix of the bytes of `*self`, and so properties that hold of | 461 | | // `*self` also hold of `*ptr`. | 462 | | // | 463 | | // 0. `ptr` conforms to the aliasing invariant of `I::Aliasing`: | 464 | | // - `Exclusive`: `self` is the only `Ptr` or reference which is | 465 | | // permitted to read or modify the referent for the lifetime | 466 | | // `'a`. Since we consume `self` by value, the returned pointer | 467 | | // remains the only `Ptr` or reference which is permitted to | 468 | | // read or modify the referent for the lifetime `'a`. | 469 | | // - `Shared`: Since `self` has aliasing `Shared`, we know that | 470 | | // no other code may mutate the referent during the lifetime | 471 | | // `'a`, except via `UnsafeCell`s, and except as permitted by | 472 | | // `T`'s library safety invariants. The caller promises that | 473 | | // any safe operations which can be permitted on a `&T` and a | 474 | | // `&U` simultaneously must be sound. Thus, no operations on a | 475 | | // `&U` could violate `&T`'s library safety invariants, and | 476 | | // vice-versa. Since any mutation via shared references outside | 477 | | // of `UnsafeCell`s is unsound, this must be impossible using | 478 | | // `&T` and `&U`. | 479 | | // - `Inaccessible`: There are no restrictions we need to uphold. | 480 | | // 1. `ptr` trivially satisfies the alignment invariant `Unaligned`. | 481 | | // 2. The caller promises that `ptr` conforms to the validity | 482 | | // invariant `V` with respect to its referent type, `U`. | 483 | 124k | unsafe { Ptr::from_inner(ptr) } | 484 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::transmute_unchecked::<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, zerocopy::pointer::invariant::Valid, <<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]> as zerocopy::pointer::transmute::SizeEq<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>>>::cast_from_raw> Line | Count | Source | 446 | 124k | pub unsafe fn transmute_unchecked<U: ?Sized, V, F>( | 447 | 124k | self, | 448 | 124k | cast: F, | 449 | 124k | ) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 450 | 124k | where | 451 | 124k | V: Validity, | 452 | 124k | F: FnOnce(PtrInner<'a, T>) -> PtrInner<'a, U>, | 453 | | { | 454 | 124k | let ptr = cast(self.as_inner()); | 455 | | | 456 | | // SAFETY: | 457 | | // | 458 | | // The following safety arguments rely on the fact that the caller | 459 | | // promises that `cast` returns a `PtrInner` which addresses a | 460 | | // prefix of the bytes of `*self`, and so properties that hold of | 461 | | // `*self` also hold of `*ptr`. | 462 | | // | 463 | | // 0. `ptr` conforms to the aliasing invariant of `I::Aliasing`: | 464 | | // - `Exclusive`: `self` is the only `Ptr` or reference which is | 465 | | // permitted to read or modify the referent for the lifetime | 466 | | // `'a`. Since we consume `self` by value, the returned pointer | 467 | | // remains the only `Ptr` or reference which is permitted to | 468 | | // read or modify the referent for the lifetime `'a`. | 469 | | // - `Shared`: Since `self` has aliasing `Shared`, we know that | 470 | | // no other code may mutate the referent during the lifetime | 471 | | // `'a`, except via `UnsafeCell`s, and except as permitted by | 472 | | // `T`'s library safety invariants. The caller promises that | 473 | | // any safe operations which can be permitted on a `&T` and a | 474 | | // `&U` simultaneously must be sound. Thus, no operations on a | 475 | | // `&U` could violate `&T`'s library safety invariants, and | 476 | | // vice-versa. Since any mutation via shared references outside | 477 | | // of `UnsafeCell`s is unsound, this must be impossible using | 478 | | // `&T` and `&U`. | 479 | | // - `Inaccessible`: There are no restrictions we need to uphold. | 480 | | // 1. `ptr` trivially satisfies the alignment invariant `Unaligned`. | 481 | | // 2. The caller promises that `ptr` conforms to the validity | 482 | | // invariant `V` with respect to its referent type, `U`. | 483 | 124k | unsafe { Ptr::from_inner(ptr) } | 484 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::transmute_unchecked::<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, zerocopy::pointer::invariant::Initialized, <<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]> as zerocopy::pointer::transmute::SizeEq<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>>>::cast_from_raw> Line | Count | Source | 446 | 124k | pub unsafe fn transmute_unchecked<U: ?Sized, V, F>( | 447 | 124k | self, | 448 | 124k | cast: F, | 449 | 124k | ) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 450 | 124k | where | 451 | 124k | V: Validity, | 452 | 124k | F: FnOnce(PtrInner<'a, T>) -> PtrInner<'a, U>, | 453 | | { | 454 | 124k | let ptr = cast(self.as_inner()); | 455 | | | 456 | | // SAFETY: | 457 | | // | 458 | | // The following safety arguments rely on the fact that the caller | 459 | | // promises that `cast` returns a `PtrInner` which addresses a | 460 | | // prefix of the bytes of `*self`, and so properties that hold of | 461 | | // `*self` also hold of `*ptr`. | 462 | | // | 463 | | // 0. `ptr` conforms to the aliasing invariant of `I::Aliasing`: | 464 | | // - `Exclusive`: `self` is the only `Ptr` or reference which is | 465 | | // permitted to read or modify the referent for the lifetime | 466 | | // `'a`. Since we consume `self` by value, the returned pointer | 467 | | // remains the only `Ptr` or reference which is permitted to | 468 | | // read or modify the referent for the lifetime `'a`. | 469 | | // - `Shared`: Since `self` has aliasing `Shared`, we know that | 470 | | // no other code may mutate the referent during the lifetime | 471 | | // `'a`, except via `UnsafeCell`s, and except as permitted by | 472 | | // `T`'s library safety invariants. The caller promises that | 473 | | // any safe operations which can be permitted on a `&T` and a | 474 | | // `&U` simultaneously must be sound. Thus, no operations on a | 475 | | // `&U` could violate `&T`'s library safety invariants, and | 476 | | // vice-versa. Since any mutation via shared references outside | 477 | | // of `UnsafeCell`s is unsound, this must be impossible using | 478 | | // `&T` and `&U`. | 479 | | // - `Inaccessible`: There are no restrictions we need to uphold. | 480 | | // 1. `ptr` trivially satisfies the alignment invariant `Unaligned`. | 481 | | // 2. The caller promises that `ptr` conforms to the validity | 482 | | // invariant `V` with respect to its referent type, `U`. | 483 | 124k | unsafe { Ptr::from_inner(ptr) } | 484 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::transmute_unchecked::<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, zerocopy::pointer::invariant::Initialized, <<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]> as zerocopy::pointer::transmute::SizeEq<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>>>::cast_from_raw> Line | Count | Source | 446 | 124k | pub unsafe fn transmute_unchecked<U: ?Sized, V, F>( | 447 | 124k | self, | 448 | 124k | cast: F, | 449 | 124k | ) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 450 | 124k | where | 451 | 124k | V: Validity, | 452 | 124k | F: FnOnce(PtrInner<'a, T>) -> PtrInner<'a, U>, | 453 | | { | 454 | 124k | let ptr = cast(self.as_inner()); | 455 | | | 456 | | // SAFETY: | 457 | | // | 458 | | // The following safety arguments rely on the fact that the caller | 459 | | // promises that `cast` returns a `PtrInner` which addresses a | 460 | | // prefix of the bytes of `*self`, and so properties that hold of | 461 | | // `*self` also hold of `*ptr`. | 462 | | // | 463 | | // 0. `ptr` conforms to the aliasing invariant of `I::Aliasing`: | 464 | | // - `Exclusive`: `self` is the only `Ptr` or reference which is | 465 | | // permitted to read or modify the referent for the lifetime | 466 | | // `'a`. Since we consume `self` by value, the returned pointer | 467 | | // remains the only `Ptr` or reference which is permitted to | 468 | | // read or modify the referent for the lifetime `'a`. | 469 | | // - `Shared`: Since `self` has aliasing `Shared`, we know that | 470 | | // no other code may mutate the referent during the lifetime | 471 | | // `'a`, except via `UnsafeCell`s, and except as permitted by | 472 | | // `T`'s library safety invariants. The caller promises that | 473 | | // any safe operations which can be permitted on a `&T` and a | 474 | | // `&U` simultaneously must be sound. Thus, no operations on a | 475 | | // `&U` could violate `&T`'s library safety invariants, and | 476 | | // vice-versa. Since any mutation via shared references outside | 477 | | // of `UnsafeCell`s is unsound, this must be impossible using | 478 | | // `&T` and `&U`. | 479 | | // - `Inaccessible`: There are no restrictions we need to uphold. | 480 | | // 1. `ptr` trivially satisfies the alignment invariant `Unaligned`. | 481 | | // 2. The caller promises that `ptr` conforms to the validity | 482 | | // invariant `V` with respect to its referent type, `U`. | 483 | 124k | unsafe { Ptr::from_inner(ptr) } | 484 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<[half::binary16::f16], (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)>>::transmute_unchecked::<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, zerocopy::pointer::invariant::Valid, <<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]> as zerocopy::pointer::transmute::SizeEq<[half::binary16::f16]>>::cast_from_raw> Line | Count | Source | 446 | 124k | pub unsafe fn transmute_unchecked<U: ?Sized, V, F>( | 447 | 124k | self, | 448 | 124k | cast: F, | 449 | 124k | ) -> Ptr<'a, U, (I::Aliasing, Unaligned, V)> | 450 | 124k | where | 451 | 124k | V: Validity, | 452 | 124k | F: FnOnce(PtrInner<'a, T>) -> PtrInner<'a, U>, | 453 | | { | 454 | 124k | let ptr = cast(self.as_inner()); | 455 | | | 456 | | // SAFETY: | 457 | | // | 458 | | // The following safety arguments rely on the fact that the caller | 459 | | // promises that `cast` returns a `PtrInner` which addresses a | 460 | | // prefix of the bytes of `*self`, and so properties that hold of | 461 | | // `*self` also hold of `*ptr`. | 462 | | // | 463 | | // 0. `ptr` conforms to the aliasing invariant of `I::Aliasing`: | 464 | | // - `Exclusive`: `self` is the only `Ptr` or reference which is | 465 | | // permitted to read or modify the referent for the lifetime | 466 | | // `'a`. Since we consume `self` by value, the returned pointer | 467 | | // remains the only `Ptr` or reference which is permitted to | 468 | | // read or modify the referent for the lifetime `'a`. | 469 | | // - `Shared`: Since `self` has aliasing `Shared`, we know that | 470 | | // no other code may mutate the referent during the lifetime | 471 | | // `'a`, except via `UnsafeCell`s, and except as permitted by | 472 | | // `T`'s library safety invariants. The caller promises that | 473 | | // any safe operations which can be permitted on a `&T` and a | 474 | | // `&U` simultaneously must be sound. Thus, no operations on a | 475 | | // `&U` could violate `&T`'s library safety invariants, and | 476 | | // vice-versa. Since any mutation via shared references outside | 477 | | // of `UnsafeCell`s is unsound, this must be impossible using | 478 | | // `&T` and `&U`. | 479 | | // - `Inaccessible`: There are no restrictions we need to uphold. | 480 | | // 1. `ptr` trivially satisfies the alignment invariant `Unaligned`. | 481 | | // 2. The caller promises that `ptr` conforms to the validity | 482 | | // invariant `V` with respect to its referent type, `U`. | 483 | 124k | unsafe { Ptr::from_inner(ptr) } | 484 | 124k | } |
Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<_, _>>::transmute_unchecked::<_, _, _> |
485 | | } |
486 | | |
487 | | /// `Ptr<'a, T, (_, _, _)>` → `Ptr<'a, Unalign<T>, (_, Aligned, _)>` |
488 | | impl<'a, T, I> Ptr<'a, T, I> |
489 | | where |
490 | | I: Invariants, |
491 | | { |
492 | | /// Converts a `Ptr` an unaligned `T` into a `Ptr` to an aligned |
493 | | /// `Unalign<T>`. |
494 | 0 | pub(crate) fn into_unalign( |
495 | 0 | self, |
496 | 0 | ) -> Ptr<'a, crate::Unalign<T>, (I::Aliasing, Aligned, I::Validity)> { |
497 | | // SAFETY: |
498 | | // - This cast preserves provenance. |
499 | | // - This cast preserves address. `Unalign<T>` promises to have the |
500 | | // same size as `T`, and so the cast returns a pointer addressing |
501 | | // the same byte range as `p`. |
502 | | // - By the same argument, the returned pointer refers to |
503 | | // `UnsafeCell`s at the same locations as `p`. |
504 | | // - `Unalign<T>` promises to have the same bit validity as `T`. By |
505 | | // invariant on `Validity`, the set of bit patterns allowed in the |
506 | | // referent of a `Ptr<X, (_, _, V)>` is only a function of the |
507 | | // validity of `X` and of `V`. Thus, the set of bit patterns |
508 | | // allowed in the referent of a `Ptr<T, (_, _, I::Validity)>` is |
509 | | // the same as the set of bit patterns allowed in the referent of |
510 | | // a `Ptr<Unalign<T>, (_, _, I::Validity)>`. As a result, `self` |
511 | | // and the returned `Ptr` permit the same set of bit patterns in |
512 | | // their referents, and so neither can be used to violate the |
513 | | // validity of the other. |
514 | 0 | let ptr = unsafe { self.transmute_unchecked(PtrInner::cast_sized) }; |
515 | 0 | ptr.bikeshed_recall_aligned() |
516 | 0 | } |
517 | | } |
518 | | |
519 | | impl<'a, T, I> Ptr<'a, T, I> |
520 | | where |
521 | | T: ?Sized, |
522 | | I: Invariants<Validity = Valid>, |
523 | | I::Aliasing: Reference, |
524 | | { |
525 | | /// Reads the referent. |
526 | | #[must_use] |
527 | | #[inline] |
528 | 0 | pub fn read_unaligned<R>(self) -> T |
529 | 0 | where |
530 | 0 | T: Copy, |
531 | 0 | T: Read<I::Aliasing, R>, |
532 | | { |
533 | 0 | (*self.into_unalign().as_ref()).into_inner() |
534 | 0 | } |
535 | | |
536 | | /// Views the value as an aligned reference. |
537 | | /// |
538 | | /// This is only available if `T` is [`Unaligned`]. |
539 | | #[must_use] |
540 | | #[inline] |
541 | 0 | pub fn unaligned_as_ref(self) -> &'a T |
542 | 0 | where |
543 | 0 | T: crate::Unaligned, |
544 | | { |
545 | 0 | self.bikeshed_recall_aligned().as_ref() |
546 | 0 | } |
547 | | } |
548 | | } |
549 | | |
550 | | /// State transitions between invariants. |
551 | | mod _transitions { |
552 | | use super::*; |
553 | | use crate::pointer::transmute::TryTransmuteFromPtr; |
554 | | |
555 | | impl<'a, T, I> Ptr<'a, T, I> |
556 | | where |
557 | | T: 'a + ?Sized, |
558 | | I: Invariants, |
559 | | { |
560 | | /// Returns a `Ptr` with [`Exclusive`] aliasing if `self` already has |
561 | | /// `Exclusive` aliasing, or generates a compile-time assertion failure. |
562 | | /// |
563 | | /// This allows code which is generic over aliasing to down-cast to a |
564 | | /// concrete aliasing. |
565 | | /// |
566 | | /// [`Exclusive`]: crate::pointer::invariant::Exclusive |
567 | | #[inline] |
568 | 0 | pub(crate) fn into_exclusive_or_pme( |
569 | 0 | self, |
570 | 0 | ) -> Ptr<'a, T, (Exclusive, I::Alignment, I::Validity)> { |
571 | | // NOTE(https://github.com/rust-lang/rust/issues/131625): We do this |
572 | | // rather than just having `Aliasing::IS_EXCLUSIVE` have the panic |
573 | | // behavior because doing it that way causes rustdoc to fail while |
574 | | // attempting to document hidden items (since it evaluates the |
575 | | // constant - and thus panics). |
576 | | trait AliasingExt: Aliasing { |
577 | | const IS_EXCL: bool; |
578 | | } |
579 | | |
580 | | impl<A: Aliasing> AliasingExt for A { |
581 | | const IS_EXCL: bool = { |
582 | | const_assert!(Self::IS_EXCLUSIVE); |
583 | | true |
584 | | }; |
585 | | } |
586 | | |
587 | 0 | assert!(I::Aliasing::IS_EXCL); |
588 | | |
589 | | // SAFETY: We've confirmed that `self` already has the aliasing |
590 | | // `Exclusive`. If it didn't, either the preceding assert would fail |
591 | | // or evaluating `I::Aliasing::IS_EXCL` would fail. We're *pretty* |
592 | | // sure that it's guaranteed to fail const eval, but the `assert!` |
593 | | // provides a backstop in case that doesn't work. |
594 | 0 | unsafe { self.assume_exclusive() } |
595 | 0 | } |
596 | | |
597 | | /// Assumes that `self` satisfies the invariants `H`. |
598 | | /// |
599 | | /// # Safety |
600 | | /// |
601 | | /// The caller promises that `self` satisfies the invariants `H`. |
602 | 746k | unsafe fn assume_invariants<H: Invariants>(self) -> Ptr<'a, T, H> { |
603 | | // SAFETY: The caller has promised to satisfy all parameterized |
604 | | // invariants of `Ptr`. `Ptr`'s other invariants are satisfied |
605 | | // by-contract by the source `Ptr`. |
606 | 746k | unsafe { Ptr::from_inner(self.as_inner()) } |
607 | 746k | } <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::assume_invariants::<(zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)> Line | Count | Source | 602 | 124k | unsafe fn assume_invariants<H: Invariants>(self) -> Ptr<'a, T, H> { | 603 | | // SAFETY: The caller has promised to satisfy all parameterized | 604 | | // invariants of `Ptr`. `Ptr`'s other invariants are satisfied | 605 | | // by-contract by the source `Ptr`. | 606 | 124k | unsafe { Ptr::from_inner(self.as_inner()) } | 607 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::assume_invariants::<(zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)> Line | Count | Source | 602 | 124k | unsafe fn assume_invariants<H: Invariants>(self) -> Ptr<'a, T, H> { | 603 | | // SAFETY: The caller has promised to satisfy all parameterized | 604 | | // invariants of `Ptr`. `Ptr`'s other invariants are satisfied | 605 | | // by-contract by the source `Ptr`. | 606 | 124k | unsafe { Ptr::from_inner(self.as_inner()) } | 607 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::assume_invariants::<(zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)> Line | Count | Source | 602 | 124k | unsafe fn assume_invariants<H: Invariants>(self) -> Ptr<'a, T, H> { | 603 | | // SAFETY: The caller has promised to satisfy all parameterized | 604 | | // invariants of `Ptr`. `Ptr`'s other invariants are satisfied | 605 | | // by-contract by the source `Ptr`. | 606 | 124k | unsafe { Ptr::from_inner(self.as_inner()) } | 607 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::assume_invariants::<(zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)> Line | Count | Source | 602 | 124k | unsafe fn assume_invariants<H: Invariants>(self) -> Ptr<'a, T, H> { | 603 | | // SAFETY: The caller has promised to satisfy all parameterized | 604 | | // invariants of `Ptr`. `Ptr`'s other invariants are satisfied | 605 | | // by-contract by the source `Ptr`. | 606 | 124k | unsafe { Ptr::from_inner(self.as_inner()) } | 607 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::assume_invariants::<(zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Aligned, zerocopy::pointer::invariant::Valid)> Line | Count | Source | 602 | 124k | unsafe fn assume_invariants<H: Invariants>(self) -> Ptr<'a, T, H> { | 603 | | // SAFETY: The caller has promised to satisfy all parameterized | 604 | | // invariants of `Ptr`. `Ptr`'s other invariants are satisfied | 605 | | // by-contract by the source `Ptr`. | 606 | 124k | unsafe { Ptr::from_inner(self.as_inner()) } | 607 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::assume_invariants::<(zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)> Line | Count | Source | 602 | 124k | unsafe fn assume_invariants<H: Invariants>(self) -> Ptr<'a, T, H> { | 603 | | // SAFETY: The caller has promised to satisfy all parameterized | 604 | | // invariants of `Ptr`. `Ptr`'s other invariants are satisfied | 605 | | // by-contract by the source `Ptr`. | 606 | 124k | unsafe { Ptr::from_inner(self.as_inner()) } | 607 | 124k | } |
Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<_, _>>::assume_invariants::<_> |
608 | | |
609 | | /// Helps the type system unify two distinct invariant types which are |
610 | | /// actually the same. |
611 | 0 | pub(crate) fn unify_invariants< |
612 | 0 | H: Invariants<Aliasing = I::Aliasing, Alignment = I::Alignment, Validity = I::Validity>, |
613 | 0 | >( |
614 | 0 | self, |
615 | 0 | ) -> Ptr<'a, T, H> { |
616 | | // SAFETY: The associated type bounds on `H` ensure that the |
617 | | // invariants are unchanged. |
618 | 0 | unsafe { self.assume_invariants::<H>() } |
619 | 0 | } |
620 | | |
621 | | /// Assumes that `self` satisfies the aliasing requirement of `A`. |
622 | | /// |
623 | | /// # Safety |
624 | | /// |
625 | | /// The caller promises that `self` satisfies the aliasing requirement |
626 | | /// of `A`. |
627 | | #[inline] |
628 | 0 | pub(crate) unsafe fn assume_aliasing<A: Aliasing>( |
629 | 0 | self, |
630 | 0 | ) -> Ptr<'a, T, (A, I::Alignment, I::Validity)> { |
631 | | // SAFETY: The caller promises that `self` satisfies the aliasing |
632 | | // requirements of `A`. |
633 | 0 | unsafe { self.assume_invariants() } |
634 | 0 | } |
635 | | |
636 | | /// Assumes `self` satisfies the aliasing requirement of [`Exclusive`]. |
637 | | /// |
638 | | /// # Safety |
639 | | /// |
640 | | /// The caller promises that `self` satisfies the aliasing requirement |
641 | | /// of `Exclusive`. |
642 | | /// |
643 | | /// [`Exclusive`]: crate::pointer::invariant::Exclusive |
644 | | #[inline] |
645 | 0 | pub(crate) unsafe fn assume_exclusive( |
646 | 0 | self, |
647 | 0 | ) -> Ptr<'a, T, (Exclusive, I::Alignment, I::Validity)> { |
648 | | // SAFETY: The caller promises that `self` satisfies the aliasing |
649 | | // requirements of `Exclusive`. |
650 | 0 | unsafe { self.assume_aliasing::<Exclusive>() } |
651 | 0 | } |
652 | | |
653 | | /// Assumes that `self`'s referent is validly-aligned for `T` if |
654 | | /// required by `A`. |
655 | | /// |
656 | | /// # Safety |
657 | | /// |
658 | | /// The caller promises that `self`'s referent conforms to the alignment |
659 | | /// invariant of `T` if required by `A`. |
660 | | #[inline] |
661 | 746k | pub(crate) unsafe fn assume_alignment<A: Alignment>( |
662 | 746k | self, |
663 | 746k | ) -> Ptr<'a, T, (I::Aliasing, A, I::Validity)> { |
664 | | // SAFETY: The caller promises that `self`'s referent is |
665 | | // well-aligned for `T` if required by `A` . |
666 | 746k | unsafe { self.assume_invariants() } |
667 | 746k | } <zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::assume_alignment::<zerocopy::pointer::invariant::Unaligned> Line | Count | Source | 661 | 124k | pub(crate) unsafe fn assume_alignment<A: Alignment>( | 662 | 124k | self, | 663 | 124k | ) -> Ptr<'a, T, (I::Aliasing, A, I::Validity)> { | 664 | | // SAFETY: The caller promises that `self`'s referent is | 665 | | // well-aligned for `T` if required by `A` . | 666 | 124k | unsafe { self.assume_invariants() } | 667 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::D<[u16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::assume_alignment::<zerocopy::pointer::invariant::Aligned> Line | Count | Source | 661 | 124k | pub(crate) unsafe fn assume_alignment<A: Alignment>( | 662 | 124k | self, | 663 | 124k | ) -> Ptr<'a, T, (I::Aliasing, A, I::Validity)> { | 664 | | // SAFETY: The caller promises that `self`'s referent is | 665 | | // well-aligned for `T` if required by `A` . | 666 | 124k | unsafe { self.assume_invariants() } | 667 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&_, &_> as zerocopy::util::macro_util::TransmuteRefDst>::transmute_ref::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Shared, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::assume_alignment::<zerocopy::pointer::invariant::Unaligned> Line | Count | Source | 661 | 124k | pub(crate) unsafe fn assume_alignment<A: Alignment>( | 662 | 124k | self, | 663 | 124k | ) -> Ptr<'a, T, (I::Aliasing, A, I::Validity)> { | 664 | | // SAFETY: The caller promises that `self`'s referent is | 665 | | // well-aligned for `T` if required by `A` . | 666 | 124k | unsafe { self.assume_invariants() } | 667 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::assume_alignment::<zerocopy::pointer::invariant::Unaligned> Line | Count | Source | 661 | 124k | pub(crate) unsafe fn assume_alignment<A: Alignment>( | 662 | 124k | self, | 663 | 124k | ) -> Ptr<'a, T, (I::Aliasing, A, I::Validity)> { | 664 | | // SAFETY: The caller promises that `self`'s referent is | 665 | | // well-aligned for `T` if required by `A` . | 666 | 124k | unsafe { self.assume_invariants() } | 667 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::D<[u16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Valid)>>::assume_alignment::<zerocopy::pointer::invariant::Aligned> Line | Count | Source | 661 | 124k | pub(crate) unsafe fn assume_alignment<A: Alignment>( | 662 | 124k | self, | 663 | 124k | ) -> Ptr<'a, T, (I::Aliasing, A, I::Validity)> { | 664 | | // SAFETY: The caller promises that `self`'s referent is | 665 | | // well-aligned for `T` if required by `A` . | 666 | 124k | unsafe { self.assume_invariants() } | 667 | 124k | } |
<zerocopy::pointer::ptr::def::Ptr<<zerocopy::util::macro_util::Wrap<&mut _, &mut _> as zerocopy::util::macro_util::TransmuteMutDst>::transmute_mut::S<[half::binary16::f16]>, (zerocopy::pointer::invariant::Exclusive, zerocopy::pointer::invariant::Unaligned, zerocopy::pointer::invariant::Initialized)>>::assume_alignment::<zerocopy::pointer::invariant::Unaligned> Line | Count | Source | 661 | 124k | pub(crate) unsafe fn assume_alignment<A: Alignment>( | 662 | 124k | self, | 663 | 124k | ) -> Ptr<'a, T, (I::Aliasing, A, I::Validity)> { | 664 | | // SAFETY: The caller promises that `self`'s referent is | 665 | | // well-aligned for `T` if required by `A` . | 666 | 124k | unsafe { self.assume_invariants() } | 667 | 124k | } |
Unexecuted instantiation: <zerocopy::pointer::ptr::def::Ptr<_, _>>::assume_alignment::<_> |
668 | | |
669 | | /// Checks the `self`'s alignment at runtime, returning an aligned `Ptr` |
670 | | /// on success. |
671 | 0 | pub(crate) fn try_into_aligned( |
672 | 0 | self, |
673 | 0 | ) -> Result<Ptr<'a, T, (I::Aliasing, Aligned, I::Validity)>, AlignmentError<Self, T>> |
674 | 0 | where |
675 | 0 | T: Sized, |
676 | | { |
677 | 0 | if let Err(err) = |
678 | 0 | crate::util::validate_aligned_to::<_, T>(self.as_inner().as_non_null()) |
679 | | { |
680 | 0 | return Err(err.with_src(self)); |
681 | 0 | } |
682 | | |
683 | | // SAFETY: We just checked the alignment. |
684 | 0 | Ok(unsafe { self.assume_alignment::<Aligned>() }) |
685 | 0 | } |
686 | | |
687 | | /// Recalls that `self`'s referent is validly-aligned for `T`. |
688 | | #[inline] |
689 | | // FIXME(#859): Reconsider the name of this method before making it |
690 | | // public. |
691 | 0 | pub(crate) fn bikeshed_recall_aligned( |
692 | 0 | self, |
693 | 0 | ) -> Ptr<'a, T, (I::Aliasing, Aligned, I::Validity)> |
694 | 0 | where |
695 | 0 | T: crate::Unaligned, |
696 | | { |
697 | | // SAFETY: The bound `T: Unaligned` ensures that `T` has no |
698 | | // non-trivial alignment requirement. |
699 | 0 | unsafe { self.assume_alignment::<Aligned>() } |
700 | 0 | } |
701 | | |
702 | | /// Assumes that `self`'s referent conforms to the validity requirement |
703 | | /// of `V`. |
704 | | /// |
705 | | /// # Safety |
706 | | /// |
707 | | /// The caller promises that `self`'s referent conforms to the validity |
708 | | /// requirement of `V`. |
709 | | #[doc(hidden)] |
710 | | #[must_use] |
711 | | #[inline] |
712 | 0 | pub unsafe fn assume_validity<V: Validity>( |
713 | 0 | self, |
714 | 0 | ) -> Ptr<'a, T, (I::Aliasing, I::Alignment, V)> { |
715 | | // SAFETY: The caller promises that `self`'s referent conforms to |
716 | | // the validity requirement of `V`. |
717 | 0 | unsafe { self.assume_invariants() } |
718 | 0 | } |
719 | | |
720 | | /// A shorthand for `self.assume_validity<invariant::Initialized>()`. |
721 | | /// |
722 | | /// # Safety |
723 | | /// |
724 | | /// The caller promises to uphold the safety preconditions of |
725 | | /// `self.assume_validity<invariant::Initialized>()`. |
726 | | #[doc(hidden)] |
727 | | #[must_use] |
728 | | #[inline] |
729 | 0 | pub unsafe fn assume_initialized( |
730 | 0 | self, |
731 | 0 | ) -> Ptr<'a, T, (I::Aliasing, I::Alignment, Initialized)> { |
732 | | // SAFETY: The caller has promised to uphold the safety |
733 | | // preconditions. |
734 | 0 | unsafe { self.assume_validity::<Initialized>() } |
735 | 0 | } |
736 | | |
737 | | /// A shorthand for `self.assume_validity<Valid>()`. |
738 | | /// |
739 | | /// # Safety |
740 | | /// |
741 | | /// The caller promises to uphold the safety preconditions of |
742 | | /// `self.assume_validity<Valid>()`. |
743 | | #[doc(hidden)] |
744 | | #[must_use] |
745 | | #[inline] |
746 | 0 | pub unsafe fn assume_valid(self) -> Ptr<'a, T, (I::Aliasing, I::Alignment, Valid)> { |
747 | | // SAFETY: The caller has promised to uphold the safety |
748 | | // preconditions. |
749 | 0 | unsafe { self.assume_validity::<Valid>() } |
750 | 0 | } |
751 | | |
752 | | /// Recalls that `self`'s referent is initialized. |
753 | | #[doc(hidden)] |
754 | | #[must_use] |
755 | | #[inline] |
756 | | // FIXME(#859): Reconsider the name of this method before making it |
757 | | // public. |
758 | 0 | pub fn bikeshed_recall_initialized_from_bytes( |
759 | 0 | self, |
760 | 0 | ) -> Ptr<'a, T, (I::Aliasing, I::Alignment, Initialized)> |
761 | 0 | where |
762 | 0 | T: crate::IntoBytes + crate::FromBytes, |
763 | 0 | I: Invariants<Validity = Valid>, |
764 | | { |
765 | | // SAFETY: The `T: IntoBytes + FromBytes` bound ensures that `T`'s |
766 | | // bit validity is equivalent to `[u8]`. In other words, the set of |
767 | | // allowed referents for a `Ptr<T, (_, _, Valid)>` is the set of |
768 | | // initialized bit patterns. The same is true of the set of allowed |
769 | | // referents for any `Ptr<_, (_, _, Initialized)>`. Thus, this call |
770 | | // does not change the set of allowed values in the referent. |
771 | 0 | unsafe { self.assume_initialized() } |
772 | 0 | } |
773 | | |
774 | | /// Recalls that `self`'s referent is initialized. |
775 | | #[doc(hidden)] |
776 | | #[must_use] |
777 | | #[inline] |
778 | | // FIXME(#859): Reconsider the name of this method before making it |
779 | | // public. |
780 | 0 | pub fn bikeshed_recall_initialized_immutable( |
781 | 0 | self, |
782 | 0 | ) -> Ptr<'a, T, (Shared, I::Alignment, Initialized)> |
783 | 0 | where |
784 | 0 | T: crate::IntoBytes + crate::Immutable, |
785 | 0 | I: Invariants<Aliasing = Shared, Validity = Valid>, |
786 | | { |
787 | | // SAFETY: Let `O` (for "old") be the set of allowed bit patterns in |
788 | | // `self`'s referent, and let `N` (for "new") be the set of allowed |
789 | | // bit patterns in the referent of the returned `Ptr`. `T: |
790 | | // IntoBytes` and `I: Invariants<Validity = Valid>` ensures that `O` |
791 | | // cannot contain any uninitialized bit patterns. Since the returned |
792 | | // `Ptr` has validity `Initialized`, `N` is equal to the set of all |
793 | | // initialized bit patterns. Thus, `O` is a subset of `N`, and so |
794 | | // the returned `Ptr`'s validity invariant is upheld. |
795 | | // |
796 | | // Since `T: Immutable` and aliasing is `Shared`, the returned `Ptr` |
797 | | // cannot be used to modify the referent. Before this call, `self`'s |
798 | | // referent is guaranteed by invariant on `Ptr` to satisfy `self`'s |
799 | | // validity invariant. Since the returned `Ptr` cannot be used to |
800 | | // modify the referent, this guarantee cannot be violated by the |
801 | | // returned `Ptr` (even if `O` is a strict subset of `N`). |
802 | 0 | unsafe { self.assume_initialized() } |
803 | 0 | } |
804 | | |
805 | | /// Checks that `self`'s referent is validly initialized for `T`, |
806 | | /// returning a `Ptr` with `Valid` on success. |
807 | | /// |
808 | | /// # Panics |
809 | | /// |
810 | | /// This method will panic if |
811 | | /// [`T::is_bit_valid`][TryFromBytes::is_bit_valid] panics. |
812 | | /// |
813 | | /// # Safety |
814 | | /// |
815 | | /// On error, unsafe code may rely on this method's returned |
816 | | /// `ValidityError` containing `self`. |
817 | | #[inline] |
818 | 0 | pub(crate) fn try_into_valid<R, S>( |
819 | 0 | mut self, |
820 | 0 | ) -> Result<Ptr<'a, T, (I::Aliasing, I::Alignment, Valid)>, ValidityError<Self, T>> |
821 | 0 | where |
822 | 0 | T: TryFromBytes |
823 | 0 | + Read<I::Aliasing, R> |
824 | 0 | + TryTransmuteFromPtr<T, I::Aliasing, I::Validity, Valid, S>, |
825 | 0 | I::Aliasing: Reference, |
826 | 0 | I: Invariants<Validity = Initialized>, |
827 | | { |
828 | | // This call may panic. If that happens, it doesn't cause any |
829 | | // soundness issues, as we have not generated any invalid state |
830 | | // which we need to fix before returning. |
831 | 0 | if T::is_bit_valid(self.reborrow().forget_aligned()) { |
832 | | // SAFETY: If `T::is_bit_valid`, code may assume that `self` |
833 | | // contains a bit-valid instance of `T`. By `T: |
834 | | // TryTransmuteFromPtr<T, I::Aliasing, I::Validity, Valid>`, so |
835 | | // long as `self`'s referent conforms to the `Valid` validity |
836 | | // for `T` (which we just confirmed), then this transmute is |
837 | | // sound. |
838 | 0 | Ok(unsafe { self.assume_valid() }) |
839 | | } else { |
840 | 0 | Err(ValidityError::new(self)) |
841 | | } |
842 | 0 | } |
843 | | |
844 | | /// Forgets that `self`'s referent is validly-aligned for `T`. |
845 | | #[doc(hidden)] |
846 | | #[must_use] |
847 | | #[inline] |
848 | 0 | pub fn forget_aligned(self) -> Ptr<'a, T, (I::Aliasing, Unaligned, I::Validity)> { |
849 | | // SAFETY: `Unaligned` is less restrictive than `Aligned`. |
850 | 0 | unsafe { self.assume_invariants() } |
851 | 0 | } |
852 | | } |
853 | | } |
854 | | |
855 | | /// Casts of the referent type. |
856 | | mod _casts { |
857 | | use super::*; |
858 | | |
859 | | impl<'a, T, I> Ptr<'a, T, I> |
860 | | where |
861 | | T: 'a + ?Sized, |
862 | | I: Invariants, |
863 | | { |
864 | | /// Casts to a different (unsized) target type without checking interior |
865 | | /// mutability. |
866 | | /// |
867 | | /// Callers should prefer [`cast_unsized`] where possible. |
868 | | /// |
869 | | /// [`cast_unsized`]: Ptr::cast_unsized |
870 | | /// |
871 | | /// # Safety |
872 | | /// |
873 | | /// The caller promises that `u = cast(p)` is a pointer cast with the |
874 | | /// following properties: |
875 | | /// - `u` addresses a subset of the bytes addressed by `p` |
876 | | /// - `u` has the same provenance as `p` |
877 | | /// - If `I::Aliasing` is [`Shared`], it must not be possible for safe |
878 | | /// code, operating on a `&T` and `&U` with the same referent |
879 | | /// simultaneously, to cause undefined behavior |
880 | | /// |
881 | | /// `cast_unsized_unchecked` guarantees that the pointer passed to |
882 | | /// `cast` will reference a byte sequence which is either contained |
883 | | /// inside a single allocated object or is zero sized. In either case, |
884 | | /// this means that its size will fit in an `isize` and it will not wrap |
885 | | /// around the address space. |
886 | | #[doc(hidden)] |
887 | | #[inline] |
888 | 0 | pub unsafe fn cast_unsized_unchecked<U, F: FnOnce(PtrInner<'a, T>) -> PtrInner<'a, U>>( |
889 | 0 | self, |
890 | 0 | cast: F, |
891 | 0 | ) -> Ptr<'a, U, (I::Aliasing, Unaligned, I::Validity)> |
892 | 0 | where |
893 | 0 | U: 'a + CastableFrom<T, I::Validity, I::Validity> + ?Sized, |
894 | | { |
895 | | // SAFETY: |
896 | | // - The caller promises that `u = cast(p)` is a pointer which |
897 | | // satisfies: |
898 | | // - `u` addresses a subset of the bytes addressed by `p` |
899 | | // - `u` has the same provenance as `p` |
900 | | // - If `I::Aliasing` is [`Shared`], it must not be possible for |
901 | | // safe code, operating on a `&T` and `&U` with the same |
902 | | // referent simultaneously, to cause undefined behavior |
903 | | // - By `U: CastableFrom<T, I::Validity, I::Validity>`, |
904 | | // `I::Validity` is either `Uninit` or `Initialized`. In both |
905 | | // cases, the bit validity `I::Validity` has the same semantics |
906 | | // regardless of referent type. In other words, the set of allowed |
907 | | // referent values for `Ptr<T, (_, _, I::Validity)>` and `Ptr<U, |
908 | | // (_, _, I::Validity)>` are identical. As a consequence, neither |
909 | | // `self` nor the returned `Ptr` can be used to write values which |
910 | | // are invalid for the other. |
911 | | // |
912 | | // `transmute_unchecked` guarantees that it will only pass pointers |
913 | | // to `cast` which either reference a zero-sized byte range or |
914 | | // reference a byte range which is entirely contained inside of an |
915 | | // allocated object. |
916 | | #[allow(clippy::multiple_unsafe_ops_per_block)] |
917 | | unsafe { |
918 | 0 | self.transmute_unchecked(cast) |
919 | | } |
920 | 0 | } |
921 | | |
922 | | /// Casts to a different (unsized) target type. |
923 | | /// |
924 | | /// # Safety |
925 | | /// |
926 | | /// The caller promises that `u = cast(p)` is a pointer cast with the |
927 | | /// following properties: |
928 | | /// - `u` addresses a subset of the bytes addressed by `p` |
929 | | /// - `u` has the same provenance as `p` |
930 | | #[doc(hidden)] |
931 | | #[inline] |
932 | 0 | pub unsafe fn cast_unsized<U, F, R>( |
933 | 0 | self, |
934 | 0 | cast: F, |
935 | 0 | ) -> Ptr<'a, U, (I::Aliasing, Unaligned, I::Validity)> |
936 | 0 | where |
937 | 0 | T: MutationCompatible<U, I::Aliasing, I::Validity, I::Validity, R>, |
938 | 0 | U: 'a + ?Sized + CastableFrom<T, I::Validity, I::Validity>, |
939 | 0 | F: FnOnce(PtrInner<'a, T>) -> PtrInner<'a, U>, |
940 | | { |
941 | | // SAFETY: Because `T: MutationCompatible<U, I::Aliasing, R>`, one |
942 | | // of the following holds: |
943 | | // - `T: Read<I::Aliasing>` and `U: Read<I::Aliasing>`, in which |
944 | | // case one of the following holds: |
945 | | // - `I::Aliasing` is `Exclusive` |
946 | | // - `T` and `U` are both `Immutable` |
947 | | // - It is sound for safe code to operate on `&T` and `&U` with the |
948 | | // same referent simultaneously |
949 | | // |
950 | | // The caller promises all other safety preconditions. |
951 | 0 | unsafe { self.cast_unsized_unchecked(cast) } |
952 | 0 | } |
953 | | } |
954 | | |
955 | | impl<'a, T, I> Ptr<'a, T, I> |
956 | | where |
957 | | T: 'a + KnownLayout + ?Sized, |
958 | | I: Invariants<Validity = Initialized>, |
959 | | { |
960 | | /// Casts this pointer-to-initialized into a pointer-to-bytes. |
961 | | #[allow(clippy::wrong_self_convention)] |
962 | | #[must_use] |
963 | | #[inline] |
964 | 0 | pub fn as_bytes<R>(self) -> Ptr<'a, [u8], (I::Aliasing, Aligned, Valid)> |
965 | 0 | where |
966 | 0 | T: Read<I::Aliasing, R>, |
967 | 0 | I::Aliasing: Reference, |
968 | | { |
969 | | // SAFETY: `PtrInner::as_bytes` returns a pointer which addresses |
970 | | // the same byte range as its argument, and which has the same |
971 | | // provenance. |
972 | 0 | let ptr = unsafe { self.cast_unsized(PtrInner::as_bytes) }; |
973 | 0 | ptr.bikeshed_recall_aligned().recall_validity::<Valid, (_, (_, _))>() |
974 | 0 | } |
975 | | } |
976 | | |
977 | | impl<'a, T, I, const N: usize> Ptr<'a, [T; N], I> |
978 | | where |
979 | | T: 'a, |
980 | | I: Invariants, |
981 | | { |
982 | | /// Casts this pointer-to-array into a slice. |
983 | | #[allow(clippy::wrong_self_convention)] |
984 | 0 | pub(crate) fn as_slice(self) -> Ptr<'a, [T], I> { |
985 | 0 | let slice = self.as_inner().as_slice(); |
986 | | // SAFETY: Note that, by post-condition on `PtrInner::as_slice`, |
987 | | // `slice` refers to the same byte range as `self.as_inner()`. |
988 | | // |
989 | | // 0. Thus, `slice` conforms to the aliasing invariant of |
990 | | // `I::Aliasing` because `self` does. |
991 | | // 1. By the above lemma, `slice` conforms to the alignment |
992 | | // invariant of `I::Alignment` because `self` does. |
993 | | // 2. Since `[T; N]` and `[T]` have the same bit validity [1][2], |
994 | | // and since `self` and the returned `Ptr` have the same validity |
995 | | // invariant, neither `self` nor the returned `Ptr` can be used |
996 | | // to write a value to the referent which violates the other's |
997 | | // validity invariant. |
998 | | // |
999 | | // [1] Per https://doc.rust-lang.org/1.81.0/reference/type-layout.html#array-layout: |
1000 | | // |
1001 | | // An array of `[T; N]` has a size of `size_of::<T>() * N` and the |
1002 | | // same alignment of `T`. Arrays are laid out so that the |
1003 | | // zero-based `nth` element of the array is offset from the start |
1004 | | // of the array by `n * size_of::<T>()` bytes. |
1005 | | // |
1006 | | // ... |
1007 | | // |
1008 | | // Slices have the same layout as the section of the array they |
1009 | | // slice. |
1010 | | // |
1011 | | // [2] Per https://doc.rust-lang.org/1.81.0/reference/types/array.html#array-types: |
1012 | | // |
1013 | | // All elements of arrays are always initialized |
1014 | 0 | unsafe { Ptr::from_inner(slice) } |
1015 | 0 | } |
1016 | | } |
1017 | | |
1018 | | /// For caller convenience, these methods are generic over alignment |
1019 | | /// invariant. In practice, the referent is always well-aligned, because the |
1020 | | /// alignment of `[u8]` is 1. |
1021 | | impl<'a, I> Ptr<'a, [u8], I> |
1022 | | where |
1023 | | I: Invariants<Validity = Valid>, |
1024 | | { |
1025 | | /// Attempts to cast `self` to a `U` using the given cast type. |
1026 | | /// |
1027 | | /// If `U` is a slice DST and pointer metadata (`meta`) is provided, |
1028 | | /// then the cast will only succeed if it would produce an object with |
1029 | | /// the given metadata. |
1030 | | /// |
1031 | | /// Returns `None` if the resulting `U` would be invalidly-aligned, if |
1032 | | /// no `U` can fit in `self`, or if the provided pointer metadata |
1033 | | /// describes an invalid instance of `U`. On success, returns a pointer |
1034 | | /// to the largest-possible `U` which fits in `self`. |
1035 | | /// |
1036 | | /// # Safety |
1037 | | /// |
1038 | | /// The caller may assume that this implementation is correct, and may |
1039 | | /// rely on that assumption for the soundness of their code. In |
1040 | | /// particular, the caller may assume that, if `try_cast_into` returns |
1041 | | /// `Some((ptr, remainder))`, then `ptr` and `remainder` refer to |
1042 | | /// non-overlapping byte ranges within `self`, and that `ptr` and |
1043 | | /// `remainder` entirely cover `self`. Finally: |
1044 | | /// - If this is a prefix cast, `ptr` has the same address as `self`. |
1045 | | /// - If this is a suffix cast, `remainder` has the same address as |
1046 | | /// `self`. |
1047 | | #[inline(always)] |
1048 | 0 | pub(crate) fn try_cast_into<U, R>( |
1049 | 0 | self, |
1050 | 0 | cast_type: CastType, |
1051 | 0 | meta: Option<U::PointerMetadata>, |
1052 | 0 | ) -> Result< |
1053 | 0 | (Ptr<'a, U, (I::Aliasing, Aligned, Initialized)>, Ptr<'a, [u8], I>), |
1054 | 0 | CastError<Self, U>, |
1055 | 0 | > |
1056 | 0 | where |
1057 | 0 | I::Aliasing: Reference, |
1058 | 0 | U: 'a + ?Sized + KnownLayout + Read<I::Aliasing, R>, |
1059 | | { |
1060 | 0 | let (inner, remainder) = |
1061 | 0 | self.as_inner().try_cast_into(cast_type, meta).map_err(|err| { |
1062 | 0 | err.map_src(|inner| |
1063 | | // SAFETY: `PtrInner::try_cast_into` promises to return its |
1064 | | // original argument on error, which was originally produced |
1065 | | // by `self.as_inner()`, which is guaranteed to satisfy |
1066 | | // `Ptr`'s invariants. |
1067 | 0 | unsafe { Ptr::from_inner(inner) }) |
1068 | 0 | })?; |
1069 | | |
1070 | | // SAFETY: |
1071 | | // 0. Since `U: Read<I::Aliasing, _>`, either: |
1072 | | // - `I::Aliasing` is `Exclusive`, in which case both `src` and |
1073 | | // `ptr` conform to `Exclusive` |
1074 | | // - `I::Aliasing` is `Shared` and `U` is `Immutable` (we already |
1075 | | // know that `[u8]: Immutable`). In this case, neither `U` nor |
1076 | | // `[u8]` permit mutation, and so `Shared` aliasing is |
1077 | | // satisfied. |
1078 | | // 1. `ptr` conforms to the alignment invariant of `Aligned` because |
1079 | | // it is derived from `try_cast_into`, which promises that the |
1080 | | // object described by `target` is validly aligned for `U`. |
1081 | | // 2. By trait bound, `self` - and thus `target` - is a bit-valid |
1082 | | // `[u8]`. `Ptr<[u8], (_, _, Valid)>` and `Ptr<_, (_, _, |
1083 | | // Initialized)>` have the same bit validity, and so neither |
1084 | | // `self` nor `res` can be used to write a value to the referent |
1085 | | // which violates the other's validity invariant. |
1086 | 0 | let res = unsafe { Ptr::from_inner(inner) }; |
1087 | | |
1088 | | // SAFETY: |
1089 | | // 0. `self` and `remainder` both have the type `[u8]`. Thus, they |
1090 | | // have `UnsafeCell`s at the same locations. Type casting does |
1091 | | // not affect aliasing. |
1092 | | // 1. `[u8]` has no alignment requirement. |
1093 | | // 2. `self` has validity `Valid` and has type `[u8]`. Since |
1094 | | // `remainder` references a subset of `self`'s referent, it is |
1095 | | // also a bit-valid `[u8]`. Thus, neither `self` nor `remainder` |
1096 | | // can be used to write a value to the referent which violates |
1097 | | // the other's validity invariant. |
1098 | 0 | let remainder = unsafe { Ptr::from_inner(remainder) }; |
1099 | | |
1100 | 0 | Ok((res, remainder)) |
1101 | 0 | } |
1102 | | |
1103 | | /// Attempts to cast `self` into a `U`, failing if all of the bytes of |
1104 | | /// `self` cannot be treated as a `U`. |
1105 | | /// |
1106 | | /// In particular, this method fails if `self` is not validly-aligned |
1107 | | /// for `U` or if `self`'s size is not a valid size for `U`. |
1108 | | /// |
1109 | | /// # Safety |
1110 | | /// |
1111 | | /// On success, the caller may assume that the returned pointer |
1112 | | /// references the same byte range as `self`. |
1113 | | #[allow(unused)] |
1114 | | #[inline(always)] |
1115 | 0 | pub(crate) fn try_cast_into_no_leftover<U, R>( |
1116 | 0 | self, |
1117 | 0 | meta: Option<U::PointerMetadata>, |
1118 | 0 | ) -> Result<Ptr<'a, U, (I::Aliasing, Aligned, Initialized)>, CastError<Self, U>> |
1119 | 0 | where |
1120 | 0 | I::Aliasing: Reference, |
1121 | 0 | U: 'a + ?Sized + KnownLayout + Read<I::Aliasing, R>, |
1122 | | { |
1123 | | // FIXME(#67): Remove this allow. See NonNulSlicelExt for more |
1124 | | // details. |
1125 | | #[allow(unstable_name_collisions)] |
1126 | 0 | match self.try_cast_into(CastType::Prefix, meta) { |
1127 | 0 | Ok((slf, remainder)) => { |
1128 | 0 | if remainder.len() == 0 { |
1129 | 0 | Ok(slf) |
1130 | | } else { |
1131 | | // Undo the cast so we can return the original bytes. |
1132 | 0 | let slf = slf.as_bytes(); |
1133 | | // Restore the initial alignment invariant of `self`. |
1134 | | // |
1135 | | // SAFETY: The referent type of `slf` is now equal to |
1136 | | // that of `self`, but the alignment invariants |
1137 | | // nominally differ. Since `slf` and `self` refer to the |
1138 | | // same memory and no actions have been taken that would |
1139 | | // violate the original invariants on `self`, it is |
1140 | | // sound to apply the alignment invariant of `self` onto |
1141 | | // `slf`. |
1142 | 0 | let slf = unsafe { slf.assume_alignment::<I::Alignment>() }; |
1143 | 0 | let slf = slf.unify_invariants(); |
1144 | 0 | Err(CastError::Size(SizeError::<_, U>::new(slf))) |
1145 | | } |
1146 | | } |
1147 | 0 | Err(err) => Err(err), |
1148 | | } |
1149 | 0 | } |
1150 | | } |
1151 | | |
1152 | | impl<'a, T, I> Ptr<'a, core::cell::UnsafeCell<T>, I> |
1153 | | where |
1154 | | T: 'a + ?Sized, |
1155 | | I: Invariants<Aliasing = Exclusive>, |
1156 | | { |
1157 | | /// Converts this `Ptr` into a pointer to the underlying data. |
1158 | | /// |
1159 | | /// This call borrows the `UnsafeCell` mutably (at compile-time) which |
1160 | | /// guarantees that we possess the only reference. |
1161 | | /// |
1162 | | /// This is like [`UnsafeCell::get_mut`], but for `Ptr`. |
1163 | | /// |
1164 | | /// [`UnsafeCell::get_mut`]: core::cell::UnsafeCell::get_mut |
1165 | | #[must_use] |
1166 | | #[inline(always)] |
1167 | 0 | pub fn get_mut(self) -> Ptr<'a, T, I> { |
1168 | | // SAFETY: |
1169 | | // - The closure uses an `as` cast, which preserves address range |
1170 | | // and provenance. |
1171 | | // - Aliasing is `Exclusive`, and so we are not required to promise |
1172 | | // anything about the locations of `UnsafeCell`s. |
1173 | | // - `UnsafeCell<T>` has the same bit validity as `T` [1]. |
1174 | | // Technically the term "representation" doesn't guarantee this, |
1175 | | // but the subsequent sentence in the documentation makes it clear |
1176 | | // that this is the intention. |
1177 | | // |
1178 | | // By invariant on `Validity`, since `T` and `UnsafeCell<T>` have |
1179 | | // the same bit validity, then the set of values which may appear |
1180 | | // in the referent of a `Ptr<T, (_, _, V)>` is the same as the set |
1181 | | // which may appear in the referent of a `Ptr<UnsafeCell<T>, (_, |
1182 | | // _, V)>`. Thus, neither `self` nor `ptr` may be used to write a |
1183 | | // value to the referent which would violate the other's validity |
1184 | | // invariant. |
1185 | | // |
1186 | | // [1] Per https://doc.rust-lang.org/1.81.0/core/cell/struct.UnsafeCell.html#memory-layout: |
1187 | | // |
1188 | | // `UnsafeCell<T>` has the same in-memory representation as its |
1189 | | // inner type `T`. A consequence of this guarantee is that it is |
1190 | | // possible to convert between `T` and `UnsafeCell<T>`. |
1191 | | #[allow(clippy::as_conversions)] |
1192 | | #[allow(clippy::multiple_unsafe_ops_per_block)] |
1193 | 0 | let ptr = unsafe { self.transmute_unchecked(|ptr| cast!(ptr)) }; |
1194 | | |
1195 | | // SAFETY: `UnsafeCell<T>` has the same alignment as `T` [1], |
1196 | | // and so if `self` is guaranteed to be aligned, then so is the |
1197 | | // returned `Ptr`. |
1198 | | // |
1199 | | // [1] Per https://doc.rust-lang.org/1.81.0/core/cell/struct.UnsafeCell.html#memory-layout: |
1200 | | // |
1201 | | // `UnsafeCell<T>` has the same in-memory representation as |
1202 | | // its inner type `T`. A consequence of this guarantee is that |
1203 | | // it is possible to convert between `T` and `UnsafeCell<T>`. |
1204 | 0 | let ptr = unsafe { ptr.assume_alignment::<I::Alignment>() }; |
1205 | 0 | ptr.unify_invariants() |
1206 | 0 | } |
1207 | | } |
1208 | | } |
1209 | | |
1210 | | /// Projections through the referent. |
1211 | | mod _project { |
1212 | | use super::*; |
1213 | | |
1214 | | impl<'a, T, I> Ptr<'a, [T], I> |
1215 | | where |
1216 | | T: 'a, |
1217 | | I: Invariants, |
1218 | | I::Aliasing: Reference, |
1219 | | { |
1220 | | /// Iteratively projects the elements `Ptr<T>` from `Ptr<[T]>`. |
1221 | 0 | pub(crate) fn iter(&self) -> impl Iterator<Item = Ptr<'a, T, I>> { |
1222 | | // SAFETY: |
1223 | | // 0. `elem` conforms to the aliasing invariant of `I::Aliasing` |
1224 | | // because projection does not impact the aliasing invariant. |
1225 | | // 1. `elem`, conditionally, conforms to the validity invariant of |
1226 | | // `I::Alignment`. If `elem` is projected from data well-aligned |
1227 | | // for `[T]`, `elem` will be valid for `T`. |
1228 | | // 2. `elem` conforms to the validity invariant of `I::Validity`. |
1229 | | // Per https://doc.rust-lang.org/1.81.0/reference/type-layout.html#array-layout: |
1230 | | // |
1231 | | // Slices have the same layout as the section of the array they |
1232 | | // slice. |
1233 | | // |
1234 | | // Arrays are laid out so that the zero-based `nth` element of |
1235 | | // the array is offset from the start of the array by `n * |
1236 | | // size_of::<T>()` bytes. Thus, `elem` addresses a valid `T` |
1237 | | // within the slice. Since `self` satisfies `I::Validity`, `elem` |
1238 | | // also satisfies `I::Validity`. |
1239 | 0 | self.as_inner().iter().map(|elem| unsafe { Ptr::from_inner(elem) }) |
1240 | 0 | } |
1241 | | } |
1242 | | |
1243 | | #[allow(clippy::needless_lifetimes)] |
1244 | | impl<'a, T, I> Ptr<'a, T, I> |
1245 | | where |
1246 | | T: 'a + ?Sized + KnownLayout<PointerMetadata = usize>, |
1247 | | I: Invariants, |
1248 | | { |
1249 | | /// The number of slice elements in the object referenced by `self`. |
1250 | 0 | pub(crate) fn len(&self) -> usize { |
1251 | 0 | self.as_inner().meta().get() |
1252 | 0 | } |
1253 | | } |
1254 | | } |
1255 | | |
1256 | | #[cfg(test)] |
1257 | | mod tests { |
1258 | | use core::mem::{self, MaybeUninit}; |
1259 | | |
1260 | | use super::*; |
1261 | | #[allow(unused)] // Needed on our MSRV, but considered unused on later toolchains. |
1262 | | use crate::util::AsAddress; |
1263 | | use crate::{pointer::BecauseImmutable, util::testutil::AU64, FromBytes, Immutable}; |
1264 | | |
1265 | | mod test_ptr_try_cast_into_soundness { |
1266 | | use super::*; |
1267 | | |
1268 | | // This test is designed so that if `Ptr::try_cast_into_xxx` are |
1269 | | // buggy, it will manifest as unsoundness that Miri can detect. |
1270 | | |
1271 | | // - If `size_of::<T>() == 0`, `N == 4` |
1272 | | // - Else, `N == 4 * size_of::<T>()` |
1273 | | // |
1274 | | // Each test will be run for each metadata in `metas`. |
1275 | | fn test<T, I, const N: usize>(metas: I) |
1276 | | where |
1277 | | T: ?Sized + KnownLayout + Immutable + FromBytes, |
1278 | | I: IntoIterator<Item = Option<T::PointerMetadata>> + Clone, |
1279 | | { |
1280 | | let mut bytes = [MaybeUninit::<u8>::uninit(); N]; |
1281 | | let initialized = [MaybeUninit::new(0u8); N]; |
1282 | | for start in 0..=bytes.len() { |
1283 | | for end in start..=bytes.len() { |
1284 | | // Set all bytes to uninitialized other than those in |
1285 | | // the range we're going to pass to `try_cast_from`. |
1286 | | // This allows Miri to detect out-of-bounds reads |
1287 | | // because they read uninitialized memory. Without this, |
1288 | | // some out-of-bounds reads would still be in-bounds of |
1289 | | // `bytes`, and so might spuriously be accepted. |
1290 | | bytes = [MaybeUninit::<u8>::uninit(); N]; |
1291 | | let bytes = &mut bytes[start..end]; |
1292 | | // Initialize only the byte range we're going to pass to |
1293 | | // `try_cast_from`. |
1294 | | bytes.copy_from_slice(&initialized[start..end]); |
1295 | | |
1296 | | let bytes = { |
1297 | | let bytes: *const [MaybeUninit<u8>] = bytes; |
1298 | | #[allow(clippy::as_conversions)] |
1299 | | let bytes = bytes as *const [u8]; |
1300 | | // SAFETY: We just initialized these bytes to valid |
1301 | | // `u8`s. |
1302 | | unsafe { &*bytes } |
1303 | | }; |
1304 | | |
1305 | | // SAFETY: The bytes in `slf` must be initialized. |
1306 | | unsafe fn validate_and_get_len< |
1307 | | T: ?Sized + KnownLayout + FromBytes + Immutable, |
1308 | | >( |
1309 | | slf: Ptr<'_, T, (Shared, Aligned, Initialized)>, |
1310 | | ) -> usize { |
1311 | | let t = slf.recall_validity().as_ref(); |
1312 | | |
1313 | | let bytes = { |
1314 | | let len = mem::size_of_val(t); |
1315 | | let t: *const T = t; |
1316 | | // SAFETY: |
1317 | | // - We know `t`'s bytes are all initialized |
1318 | | // because we just read it from `slf`, which |
1319 | | // points to an initialized range of bytes. If |
1320 | | // there's a bug and this doesn't hold, then |
1321 | | // that's exactly what we're hoping Miri will |
1322 | | // catch! |
1323 | | // - Since `T: FromBytes`, `T` doesn't contain |
1324 | | // any `UnsafeCell`s, so it's okay for `t: T` |
1325 | | // and a `&[u8]` to the same memory to be |
1326 | | // alive concurrently. |
1327 | | unsafe { core::slice::from_raw_parts(t.cast::<u8>(), len) } |
1328 | | }; |
1329 | | |
1330 | | // This assertion ensures that `t`'s bytes are read |
1331 | | // and compared to another value, which in turn |
1332 | | // ensures that Miri gets a chance to notice if any |
1333 | | // of `t`'s bytes are uninitialized, which they |
1334 | | // shouldn't be (see the comment above). |
1335 | | assert_eq!(bytes, vec![0u8; bytes.len()]); |
1336 | | |
1337 | | mem::size_of_val(t) |
1338 | | } |
1339 | | |
1340 | | for meta in metas.clone().into_iter() { |
1341 | | for cast_type in [CastType::Prefix, CastType::Suffix] { |
1342 | | if let Ok((slf, remaining)) = Ptr::from_ref(bytes) |
1343 | | .try_cast_into::<T, BecauseImmutable>(cast_type, meta) |
1344 | | { |
1345 | | // SAFETY: All bytes in `bytes` have been |
1346 | | // initialized. |
1347 | | let len = unsafe { validate_and_get_len(slf) }; |
1348 | | assert_eq!(remaining.len(), bytes.len() - len); |
1349 | | #[allow(unstable_name_collisions)] |
1350 | | let bytes_addr = bytes.as_ptr().addr(); |
1351 | | #[allow(unstable_name_collisions)] |
1352 | | let remaining_addr = |
1353 | | remaining.as_inner().as_non_null().as_ptr().addr(); |
1354 | | match cast_type { |
1355 | | CastType::Prefix => { |
1356 | | assert_eq!(remaining_addr, bytes_addr + len) |
1357 | | } |
1358 | | CastType::Suffix => assert_eq!(remaining_addr, bytes_addr), |
1359 | | } |
1360 | | |
1361 | | if let Some(want) = meta { |
1362 | | let got = KnownLayout::pointer_to_metadata( |
1363 | | slf.as_inner().as_non_null().as_ptr(), |
1364 | | ); |
1365 | | assert_eq!(got, want); |
1366 | | } |
1367 | | } |
1368 | | } |
1369 | | |
1370 | | if let Ok(slf) = Ptr::from_ref(bytes) |
1371 | | .try_cast_into_no_leftover::<T, BecauseImmutable>(meta) |
1372 | | { |
1373 | | // SAFETY: All bytes in `bytes` have been |
1374 | | // initialized. |
1375 | | let len = unsafe { validate_and_get_len(slf) }; |
1376 | | assert_eq!(len, bytes.len()); |
1377 | | |
1378 | | if let Some(want) = meta { |
1379 | | let got = KnownLayout::pointer_to_metadata( |
1380 | | slf.as_inner().as_non_null().as_ptr(), |
1381 | | ); |
1382 | | assert_eq!(got, want); |
1383 | | } |
1384 | | } |
1385 | | } |
1386 | | } |
1387 | | } |
1388 | | } |
1389 | | |
1390 | | #[derive(FromBytes, KnownLayout, Immutable)] |
1391 | | #[repr(C)] |
1392 | | struct SliceDst<T> { |
1393 | | a: u8, |
1394 | | trailing: [T], |
1395 | | } |
1396 | | |
1397 | | // Each test case becomes its own `#[test]` function. We do this because |
1398 | | // this test in particular takes far, far longer to execute under Miri |
1399 | | // than all of our other tests combined. Previously, we had these |
1400 | | // execute sequentially in a single test function. We run Miri tests in |
1401 | | // parallel in CI, but this test being sequential meant that most of |
1402 | | // that parallelism was wasted, as all other tests would finish in a |
1403 | | // fraction of the total execution time, leaving this test to execute on |
1404 | | // a single thread for the remainder of the test. By putting each test |
1405 | | // case in its own function, we permit better use of available |
1406 | | // parallelism. |
1407 | | macro_rules! test { |
1408 | | ($test_name:ident: $ty:ty) => { |
1409 | | #[test] |
1410 | | #[allow(non_snake_case)] |
1411 | | fn $test_name() { |
1412 | | const S: usize = core::mem::size_of::<$ty>(); |
1413 | | const N: usize = if S == 0 { 4 } else { S * 4 }; |
1414 | | test::<$ty, _, N>([None]); |
1415 | | |
1416 | | // If `$ty` is a ZST, then we can't pass `None` as the |
1417 | | // pointer metadata, or else computing the correct trailing |
1418 | | // slice length will panic. |
1419 | | if S == 0 { |
1420 | | test::<[$ty], _, N>([Some(0), Some(1), Some(2), Some(3)]); |
1421 | | test::<SliceDst<$ty>, _, N>([Some(0), Some(1), Some(2), Some(3)]); |
1422 | | } else { |
1423 | | test::<[$ty], _, N>([None, Some(0), Some(1), Some(2), Some(3)]); |
1424 | | test::<SliceDst<$ty>, _, N>([None, Some(0), Some(1), Some(2), Some(3)]); |
1425 | | } |
1426 | | } |
1427 | | }; |
1428 | | ($ty:ident) => { |
1429 | | test!($ty: $ty); |
1430 | | }; |
1431 | | ($($ty:ident),*) => { $(test!($ty);)* } |
1432 | | } |
1433 | | |
1434 | | test!(empty_tuple: ()); |
1435 | | test!(u8, u16, u32, u64, u128, usize, AU64); |
1436 | | test!(i8, i16, i32, i64, i128, isize); |
1437 | | test!(f32, f64); |
1438 | | } |
1439 | | |
1440 | | #[test] |
1441 | | fn test_try_cast_into_explicit_count() { |
1442 | | macro_rules! test { |
1443 | | ($ty:ty, $bytes:expr, $elems:expr, $expect:expr) => {{ |
1444 | | let bytes = [0u8; $bytes]; |
1445 | | let ptr = Ptr::from_ref(&bytes[..]); |
1446 | | let res = |
1447 | | ptr.try_cast_into::<$ty, BecauseImmutable>(CastType::Prefix, Some($elems)); |
1448 | | if let Some(expect) = $expect { |
1449 | | let (ptr, _) = res.unwrap(); |
1450 | | assert_eq!( |
1451 | | KnownLayout::pointer_to_metadata(ptr.as_inner().as_non_null().as_ptr()), |
1452 | | expect |
1453 | | ); |
1454 | | } else { |
1455 | | let _ = res.unwrap_err(); |
1456 | | } |
1457 | | }}; |
1458 | | } |
1459 | | |
1460 | | #[derive(KnownLayout, Immutable)] |
1461 | | #[repr(C)] |
1462 | | struct ZstDst { |
1463 | | u: [u8; 8], |
1464 | | slc: [()], |
1465 | | } |
1466 | | |
1467 | | test!(ZstDst, 8, 0, Some(0)); |
1468 | | test!(ZstDst, 7, 0, None); |
1469 | | |
1470 | | test!(ZstDst, 8, usize::MAX, Some(usize::MAX)); |
1471 | | test!(ZstDst, 7, usize::MAX, None); |
1472 | | |
1473 | | #[derive(KnownLayout, Immutable)] |
1474 | | #[repr(C)] |
1475 | | struct Dst { |
1476 | | u: [u8; 8], |
1477 | | slc: [u8], |
1478 | | } |
1479 | | |
1480 | | test!(Dst, 8, 0, Some(0)); |
1481 | | test!(Dst, 7, 0, None); |
1482 | | |
1483 | | test!(Dst, 9, 1, Some(1)); |
1484 | | test!(Dst, 8, 1, None); |
1485 | | |
1486 | | // If we didn't properly check for overflow, this would cause the |
1487 | | // metadata to overflow to 0, and thus the cast would spuriously |
1488 | | // succeed. |
1489 | | test!(Dst, 8, usize::MAX - 8 + 1, None); |
1490 | | } |
1491 | | } |