2021-02-10 15:02:21 +00:00
|
|
|
mod crosspointer_transmute;
|
2021-02-10 16:08:48 +00:00
|
|
|
mod transmute_float_to_int;
|
2021-02-10 15:55:32 +00:00
|
|
|
mod transmute_int_to_bool;
|
2021-02-10 15:18:45 +00:00
|
|
|
mod transmute_int_to_char;
|
2021-02-10 16:03:08 +00:00
|
|
|
mod transmute_int_to_float;
|
2021-02-10 15:50:09 +00:00
|
|
|
mod transmute_ptr_to_ptr;
|
2021-02-10 15:10:19 +00:00
|
|
|
mod transmute_ptr_to_ref;
|
2021-02-10 15:40:57 +00:00
|
|
|
mod transmute_ref_to_ref;
|
2021-02-10 16:27:44 +00:00
|
|
|
mod transmutes_expressible_as_ptr_casts;
|
2021-02-10 16:21:38 +00:00
|
|
|
mod unsound_collection_transmute;
|
2021-02-10 14:54:11 +00:00
|
|
|
mod useless_transmute;
|
2021-02-10 14:15:06 +00:00
|
|
|
mod utils;
|
2021-02-10 14:57:56 +00:00
|
|
|
mod wrong_transmute;
|
2021-02-10 14:54:11 +00:00
|
|
|
|
2021-03-16 16:06:34 +00:00
|
|
|
use clippy_utils::{in_constant, match_def_path, paths};
|
2018-11-27 20:14:15 +00:00
|
|
|
use if_chain::if_chain;
|
2021-02-10 16:29:45 +00:00
|
|
|
use rustc_hir::{Expr, ExprKind};
|
2020-01-12 06:08:41 +00:00
|
|
|
use rustc_lint::{LateContext, LateLintPass};
|
2020-01-11 11:37:08 +00:00
|
|
|
use rustc_session::{declare_lint_pass, declare_tool_lint};
|
2015-11-11 14:28:31 +00:00
|
|
|
|
2018-03-28 13:24:26 +00:00
|
|
|
declare_clippy_lint! {
|
2019-03-05 16:50:33 +00:00
|
|
|
/// **What it does:** Checks for transmutes that can't ever be correct on any
|
|
|
|
/// architecture.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** It's basically guaranteed to be undefined behaviour.
|
|
|
|
///
|
|
|
|
/// **Known problems:** When accessing C, users might want to store pointer
|
|
|
|
/// sized objects in `extradata` arguments to save an allocation.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
2019-03-05 22:23:50 +00:00
|
|
|
/// ```ignore
|
2019-03-05 16:50:33 +00:00
|
|
|
/// let ptr: *const T = core::intrinsics::transmute('x')
|
|
|
|
/// ```
|
2016-06-28 12:08:08 +00:00
|
|
|
pub WRONG_TRANSMUTE,
|
2018-03-28 13:24:26 +00:00
|
|
|
correctness,
|
2016-06-28 12:08:08 +00:00
|
|
|
"transmutes that are confusing at best, undefined behaviour at worst and always useless"
|
|
|
|
}
|
|
|
|
|
2020-03-23 19:08:07 +00:00
|
|
|
// FIXME: Move this to `complexity` again, after #5343 is fixed
|
2018-03-28 13:24:26 +00:00
|
|
|
declare_clippy_lint! {
|
2019-03-05 16:50:33 +00:00
|
|
|
/// **What it does:** Checks for transmutes to the original type of the object
|
|
|
|
/// and transmutes that could be a cast.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** Readability. The code tricks people into thinking that
|
|
|
|
/// something complex is going on.
|
|
|
|
///
|
|
|
|
/// **Known problems:** None.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
2019-08-02 06:13:54 +00:00
|
|
|
/// ```rust,ignore
|
|
|
|
/// core::intrinsics::transmute(t); // where the result type is the same as `t`'s
|
2019-03-05 16:50:33 +00:00
|
|
|
/// ```
|
2015-11-11 14:28:31 +00:00
|
|
|
pub USELESS_TRANSMUTE,
|
2020-03-23 19:08:07 +00:00
|
|
|
nursery,
|
2016-06-28 12:08:08 +00:00
|
|
|
"transmutes that have the same to and from types or could be a cast/coercion"
|
2015-11-11 14:28:31 +00:00
|
|
|
}
|
|
|
|
|
2020-08-03 08:47:25 +00:00
|
|
|
// FIXME: Merge this lint with USELESS_TRANSMUTE once that is out of the nursery.
|
|
|
|
declare_clippy_lint! {
|
|
|
|
/// **What it does:**Checks for transmutes that could be a pointer cast.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** Readability. The code tricks people into thinking that
|
|
|
|
/// something complex is going on.
|
|
|
|
///
|
|
|
|
/// **Known problems:** None.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
///
|
2020-08-11 13:43:21 +00:00
|
|
|
/// ```rust
|
|
|
|
/// # let p: *const [i32] = &[];
|
|
|
|
/// unsafe { std::mem::transmute::<*const [i32], *const [u16]>(p) };
|
2020-08-03 08:47:25 +00:00
|
|
|
/// ```
|
|
|
|
/// Use instead:
|
|
|
|
/// ```rust
|
2020-08-11 13:43:21 +00:00
|
|
|
/// # let p: *const [i32] = &[];
|
|
|
|
/// p as *const [u16];
|
2020-08-03 08:47:25 +00:00
|
|
|
/// ```
|
|
|
|
pub TRANSMUTES_EXPRESSIBLE_AS_PTR_CASTS,
|
|
|
|
complexity,
|
|
|
|
"transmutes that could be a pointer cast"
|
|
|
|
}
|
|
|
|
|
2018-03-28 13:24:26 +00:00
|
|
|
declare_clippy_lint! {
|
2019-03-05 16:50:33 +00:00
|
|
|
/// **What it does:** Checks for transmutes between a type `T` and `*T`.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** It's easy to mistakenly transmute between a type and a
|
|
|
|
/// pointer to that type.
|
|
|
|
///
|
|
|
|
/// **Known problems:** None.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
2019-08-02 06:13:54 +00:00
|
|
|
/// ```rust,ignore
|
2019-03-05 16:50:33 +00:00
|
|
|
/// core::intrinsics::transmute(t) // where the result type is the same as
|
|
|
|
/// // `*t` or `&t`'s
|
|
|
|
/// ```
|
2016-03-24 22:48:38 +00:00
|
|
|
pub CROSSPOINTER_TRANSMUTE,
|
2018-03-28 13:24:26 +00:00
|
|
|
complexity,
|
2016-03-24 22:48:38 +00:00
|
|
|
"transmutes that have to or from types that are a pointer to the other"
|
|
|
|
}
|
|
|
|
|
2018-03-28 13:24:26 +00:00
|
|
|
declare_clippy_lint! {
|
2019-03-05 16:50:33 +00:00
|
|
|
/// **What it does:** Checks for transmutes from a pointer to a reference.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** This can always be rewritten with `&` and `*`.
|
|
|
|
///
|
2020-10-23 20:16:59 +00:00
|
|
|
/// **Known problems:**
|
|
|
|
/// - `mem::transmute` in statics and constants is stable from Rust 1.46.0,
|
|
|
|
/// while dereferencing raw pointer is not stable yet.
|
|
|
|
/// If you need to do this in those places,
|
|
|
|
/// you would have to use `transmute` instead.
|
2019-03-05 16:50:33 +00:00
|
|
|
///
|
|
|
|
/// **Example:**
|
2019-08-02 06:13:54 +00:00
|
|
|
/// ```rust,ignore
|
|
|
|
/// unsafe {
|
|
|
|
/// let _: &T = std::mem::transmute(p); // where p: *const T
|
|
|
|
/// }
|
2019-03-05 16:50:33 +00:00
|
|
|
///
|
|
|
|
/// // can be written:
|
|
|
|
/// let _: &T = &*p;
|
|
|
|
/// ```
|
2016-03-25 22:22:17 +00:00
|
|
|
pub TRANSMUTE_PTR_TO_REF,
|
2018-03-28 13:24:26 +00:00
|
|
|
complexity,
|
2016-03-25 22:22:17 +00:00
|
|
|
"transmutes from a pointer to a reference type"
|
|
|
|
}
|
|
|
|
|
2018-03-28 13:24:26 +00:00
|
|
|
declare_clippy_lint! {
|
2019-03-05 16:50:33 +00:00
|
|
|
/// **What it does:** Checks for transmutes from an integer to a `char`.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** Not every integer is a Unicode scalar value.
|
|
|
|
///
|
|
|
|
/// **Known problems:**
|
|
|
|
/// - [`from_u32`] which this lint suggests using is slower than `transmute`
|
|
|
|
/// as it needs to validate the input.
|
|
|
|
/// If you are certain that the input is always a valid Unicode scalar value,
|
|
|
|
/// use [`from_u32_unchecked`] which is as fast as `transmute`
|
|
|
|
/// but has a semantically meaningful name.
|
|
|
|
/// - You might want to handle `None` returned from [`from_u32`] instead of calling `unwrap`.
|
|
|
|
///
|
|
|
|
/// [`from_u32`]: https://doc.rust-lang.org/std/char/fn.from_u32.html
|
|
|
|
/// [`from_u32_unchecked`]: https://doc.rust-lang.org/std/char/fn.from_u32_unchecked.html
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust
|
2019-08-02 06:13:54 +00:00
|
|
|
/// let x = 1_u32;
|
|
|
|
/// unsafe {
|
|
|
|
/// let _: char = std::mem::transmute(x); // where x: u32
|
|
|
|
/// }
|
2019-03-05 16:50:33 +00:00
|
|
|
///
|
|
|
|
/// // should be:
|
|
|
|
/// let _ = std::char::from_u32(x).unwrap();
|
|
|
|
/// ```
|
2017-10-02 15:23:24 +00:00
|
|
|
pub TRANSMUTE_INT_TO_CHAR,
|
2018-03-28 13:24:26 +00:00
|
|
|
complexity,
|
2017-10-02 15:23:24 +00:00
|
|
|
"transmutes from an integer to a `char`"
|
|
|
|
}
|
|
|
|
|
2018-03-28 13:24:26 +00:00
|
|
|
declare_clippy_lint! {
|
2019-03-05 16:50:33 +00:00
|
|
|
/// **What it does:** Checks for transmutes from a `&[u8]` to a `&str`.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** Not every byte slice is a valid UTF-8 string.
|
|
|
|
///
|
|
|
|
/// **Known problems:**
|
|
|
|
/// - [`from_utf8`] which this lint suggests using is slower than `transmute`
|
|
|
|
/// as it needs to validate the input.
|
|
|
|
/// If you are certain that the input is always a valid UTF-8,
|
|
|
|
/// use [`from_utf8_unchecked`] which is as fast as `transmute`
|
|
|
|
/// but has a semantically meaningful name.
|
|
|
|
/// - You might want to handle errors returned from [`from_utf8`] instead of calling `unwrap`.
|
|
|
|
///
|
|
|
|
/// [`from_utf8`]: https://doc.rust-lang.org/std/str/fn.from_utf8.html
|
|
|
|
/// [`from_utf8_unchecked`]: https://doc.rust-lang.org/std/str/fn.from_utf8_unchecked.html
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust
|
2019-08-02 06:13:54 +00:00
|
|
|
/// let b: &[u8] = &[1_u8, 2_u8];
|
|
|
|
/// unsafe {
|
|
|
|
/// let _: &str = std::mem::transmute(b); // where b: &[u8]
|
|
|
|
/// }
|
2019-03-05 16:50:33 +00:00
|
|
|
///
|
|
|
|
/// // should be:
|
|
|
|
/// let _ = std::str::from_utf8(b).unwrap();
|
|
|
|
/// ```
|
2017-10-29 01:27:45 +00:00
|
|
|
pub TRANSMUTE_BYTES_TO_STR,
|
2018-03-28 13:24:26 +00:00
|
|
|
complexity,
|
2017-10-29 01:27:45 +00:00
|
|
|
"transmutes from a `&[u8]` to a `&str`"
|
|
|
|
}
|
|
|
|
|
2018-03-28 13:24:26 +00:00
|
|
|
declare_clippy_lint! {
|
2019-03-05 16:50:33 +00:00
|
|
|
/// **What it does:** Checks for transmutes from an integer to a `bool`.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** This might result in an invalid in-memory representation of a `bool`.
|
|
|
|
///
|
|
|
|
/// **Known problems:** None.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust
|
2019-08-02 06:13:54 +00:00
|
|
|
/// let x = 1_u8;
|
|
|
|
/// unsafe {
|
|
|
|
/// let _: bool = std::mem::transmute(x); // where x: u8
|
|
|
|
/// }
|
2019-03-05 16:50:33 +00:00
|
|
|
///
|
|
|
|
/// // should be:
|
|
|
|
/// let _: bool = x != 0;
|
|
|
|
/// ```
|
2017-10-02 15:23:24 +00:00
|
|
|
pub TRANSMUTE_INT_TO_BOOL,
|
2018-03-28 13:24:26 +00:00
|
|
|
complexity,
|
2017-10-02 15:23:24 +00:00
|
|
|
"transmutes from an integer to a `bool`"
|
|
|
|
}
|
|
|
|
|
2018-03-28 13:24:26 +00:00
|
|
|
declare_clippy_lint! {
|
2019-03-05 16:50:33 +00:00
|
|
|
/// **What it does:** Checks for transmutes from an integer to a float.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** Transmutes are dangerous and error-prone, whereas `from_bits` is intuitive
|
|
|
|
/// and safe.
|
|
|
|
///
|
|
|
|
/// **Known problems:** None.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust
|
2019-08-02 06:13:54 +00:00
|
|
|
/// unsafe {
|
|
|
|
/// let _: f32 = std::mem::transmute(1_u32); // where x: u32
|
|
|
|
/// }
|
2019-03-05 16:50:33 +00:00
|
|
|
///
|
|
|
|
/// // should be:
|
2019-08-02 06:13:54 +00:00
|
|
|
/// let _: f32 = f32::from_bits(1_u32);
|
2019-03-05 16:50:33 +00:00
|
|
|
/// ```
|
2017-10-02 15:23:24 +00:00
|
|
|
pub TRANSMUTE_INT_TO_FLOAT,
|
2018-03-28 13:24:26 +00:00
|
|
|
complexity,
|
2017-10-02 15:23:24 +00:00
|
|
|
"transmutes from an integer to a float"
|
|
|
|
}
|
|
|
|
|
2019-12-08 00:33:49 +00:00
|
|
|
declare_clippy_lint! {
|
|
|
|
/// **What it does:** Checks for transmutes from a float to an integer.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** Transmutes are dangerous and error-prone, whereas `to_bits` is intuitive
|
|
|
|
/// and safe.
|
|
|
|
///
|
|
|
|
/// **Known problems:** None.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust
|
|
|
|
/// unsafe {
|
|
|
|
/// let _: u32 = std::mem::transmute(1f32);
|
|
|
|
/// }
|
|
|
|
///
|
|
|
|
/// // should be:
|
|
|
|
/// let _: u32 = 1f32.to_bits();
|
|
|
|
/// ```
|
|
|
|
pub TRANSMUTE_FLOAT_TO_INT,
|
2020-01-07 23:53:19 +00:00
|
|
|
complexity,
|
2019-12-08 00:33:49 +00:00
|
|
|
"transmutes from a float to an integer"
|
|
|
|
}
|
|
|
|
|
2018-04-11 09:17:59 +00:00
|
|
|
declare_clippy_lint! {
|
2019-03-05 16:50:33 +00:00
|
|
|
/// **What it does:** Checks for transmutes from a pointer to a pointer, or
|
|
|
|
/// from a reference to a reference.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** Transmutes are dangerous, and these can instead be
|
|
|
|
/// written as casts.
|
|
|
|
///
|
|
|
|
/// **Known problems:** None.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust
|
|
|
|
/// let ptr = &1u32 as *const u32;
|
|
|
|
/// unsafe {
|
|
|
|
/// // pointer-to-pointer transmute
|
|
|
|
/// let _: *const f32 = std::mem::transmute(ptr);
|
|
|
|
/// // ref-ref transmute
|
|
|
|
/// let _: &f32 = std::mem::transmute(&1u32);
|
|
|
|
/// }
|
|
|
|
/// // These can be respectively written:
|
2019-08-02 06:13:54 +00:00
|
|
|
/// let _ = ptr as *const f32;
|
2019-03-05 16:50:33 +00:00
|
|
|
/// let _ = unsafe{ &*(&1u32 as *const u32 as *const f32) };
|
|
|
|
/// ```
|
2018-04-11 09:17:59 +00:00
|
|
|
pub TRANSMUTE_PTR_TO_PTR,
|
2021-04-16 21:29:23 +00:00
|
|
|
pedantic,
|
2018-05-14 17:24:31 +00:00
|
|
|
"transmutes from a pointer to a pointer / a reference to a reference"
|
2018-04-11 09:17:59 +00:00
|
|
|
}
|
|
|
|
|
2019-09-27 17:19:26 +00:00
|
|
|
declare_clippy_lint! {
|
|
|
|
/// **What it does:** Checks for transmutes between collections whose
|
|
|
|
/// types have different ABI, size or alignment.
|
|
|
|
///
|
|
|
|
/// **Why is this bad?** This is undefined behavior.
|
|
|
|
///
|
|
|
|
/// **Known problems:** Currently, we cannot know whether a type is a
|
|
|
|
/// collection, so we just lint the ones that come with `std`.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust
|
|
|
|
/// // different size, therefore likely out-of-bounds memory access
|
|
|
|
/// // You absolutely do not want this in your code!
|
|
|
|
/// unsafe {
|
|
|
|
/// std::mem::transmute::<_, Vec<u32>>(vec![2_u16])
|
|
|
|
/// };
|
|
|
|
/// ```
|
|
|
|
///
|
|
|
|
/// You must always iterate, map and collect the values:
|
|
|
|
///
|
|
|
|
/// ```rust
|
|
|
|
/// vec![2_u16].into_iter().map(u32::from).collect::<Vec<_>>();
|
|
|
|
/// ```
|
|
|
|
pub UNSOUND_COLLECTION_TRANSMUTE,
|
|
|
|
correctness,
|
|
|
|
"transmute between collections of layout-incompatible types"
|
|
|
|
}
|
2020-08-03 00:41:50 +00:00
|
|
|
|
2019-04-08 20:43:55 +00:00
|
|
|
declare_lint_pass!(Transmute => [
|
|
|
|
CROSSPOINTER_TRANSMUTE,
|
|
|
|
TRANSMUTE_PTR_TO_REF,
|
|
|
|
TRANSMUTE_PTR_TO_PTR,
|
|
|
|
USELESS_TRANSMUTE,
|
|
|
|
WRONG_TRANSMUTE,
|
|
|
|
TRANSMUTE_INT_TO_CHAR,
|
|
|
|
TRANSMUTE_BYTES_TO_STR,
|
|
|
|
TRANSMUTE_INT_TO_BOOL,
|
|
|
|
TRANSMUTE_INT_TO_FLOAT,
|
2019-12-08 00:33:49 +00:00
|
|
|
TRANSMUTE_FLOAT_TO_INT,
|
2019-09-27 17:19:26 +00:00
|
|
|
UNSOUND_COLLECTION_TRANSMUTE,
|
2020-08-03 00:41:50 +00:00
|
|
|
TRANSMUTES_EXPRESSIBLE_AS_PTR_CASTS,
|
2019-04-08 20:43:55 +00:00
|
|
|
]);
|
2015-11-11 14:28:31 +00:00
|
|
|
|
2020-06-25 20:41:36 +00:00
|
|
|
impl<'tcx> LateLintPass<'tcx> for Transmute {
|
2019-01-13 15:19:02 +00:00
|
|
|
#[allow(clippy::similar_names, clippy::too_many_lines)]
|
2020-06-25 20:41:36 +00:00
|
|
|
fn check_expr(&mut self, cx: &LateContext<'tcx>, e: &'tcx Expr<'_>) {
|
2019-09-27 17:19:26 +00:00
|
|
|
if_chain! {
|
2021-04-02 21:35:32 +00:00
|
|
|
if let ExprKind::Call(path_expr, args) = e.kind;
|
2019-09-27 17:19:26 +00:00
|
|
|
if let ExprKind::Path(ref qpath) = path_expr.kind;
|
2020-06-26 02:55:23 +00:00
|
|
|
if let Some(def_id) = cx.qpath_res(qpath, path_expr.hir_id).opt_def_id();
|
2019-09-27 17:19:26 +00:00
|
|
|
if match_def_path(cx, def_id, &paths::TRANSMUTE);
|
|
|
|
then {
|
2020-09-10 15:47:07 +00:00
|
|
|
// Avoid suggesting from/to bits and dereferencing raw pointers in const contexts.
|
2020-08-28 14:10:16 +00:00
|
|
|
// See https://github.com/rust-lang/rust/issues/73736 for progress on making them `const fn`.
|
2020-09-10 15:47:07 +00:00
|
|
|
// And see https://github.com/rust-lang/rust/issues/51911 for dereferencing raw pointers.
|
2020-08-28 14:10:16 +00:00
|
|
|
let const_context = in_constant(cx, e.hir_id);
|
|
|
|
|
2020-07-17 08:47:04 +00:00
|
|
|
let from_ty = cx.typeck_results().expr_ty(&args[0]);
|
|
|
|
let to_ty = cx.typeck_results().expr_ty(e);
|
2015-11-11 14:28:31 +00:00
|
|
|
|
2021-02-10 16:41:52 +00:00
|
|
|
// If useless_transmute is triggered, the other lints can be skipped.
|
|
|
|
if useless_transmute::check(cx, e, from_ty, to_ty, args) {
|
2021-02-10 14:54:11 +00:00
|
|
|
return;
|
|
|
|
}
|
2021-02-10 16:41:52 +00:00
|
|
|
|
|
|
|
let mut linted = wrong_transmute::check(cx, e, from_ty, to_ty);
|
|
|
|
linted |= crosspointer_transmute::check(cx, e, from_ty, to_ty);
|
|
|
|
linted |= transmute_ptr_to_ref::check(cx, e, from_ty, to_ty, args, qpath);
|
|
|
|
linted |= transmute_int_to_char::check(cx, e, from_ty, to_ty, args);
|
|
|
|
linted |= transmute_ref_to_ref::check(cx, e, from_ty, to_ty, args, const_context);
|
|
|
|
linted |= transmute_ptr_to_ptr::check(cx, e, from_ty, to_ty, args);
|
|
|
|
linted |= transmute_int_to_bool::check(cx, e, from_ty, to_ty, args);
|
|
|
|
linted |= transmute_int_to_float::check(cx, e, from_ty, to_ty, args, const_context);
|
|
|
|
linted |= transmute_float_to_int::check(cx, e, from_ty, to_ty, args, const_context);
|
|
|
|
linted |= unsound_collection_transmute::check(cx, e, from_ty, to_ty);
|
|
|
|
|
|
|
|
if !linted {
|
|
|
|
transmutes_expressible_as_ptr_casts::check(cx, e, from_ty, to_ty, args);
|
2016-03-24 22:48:38 +00:00
|
|
|
}
|
2016-06-27 11:46:21 +00:00
|
|
|
}
|
2016-03-24 22:48:38 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|