2020-03-31 03:24:59 -05:00
|
|
|
// check-pass
|
|
|
|
// aux-build:external_extern_fn.rs
|
|
|
|
#![crate_type = "lib"]
|
2020-06-27 19:11:04 -05:00
|
|
|
#![warn(clashing_extern_declarations)]
|
2020-03-31 03:24:59 -05:00
|
|
|
|
2020-06-28 16:33:15 -05:00
|
|
|
mod redeclared_different_signature {
|
|
|
|
mod a {
|
|
|
|
extern "C" {
|
|
|
|
fn clash(x: u8);
|
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
}
|
2020-06-28 16:33:15 -05:00
|
|
|
mod b {
|
|
|
|
extern "C" {
|
|
|
|
fn clash(x: u64); //~ WARN `clash` redeclared with a different signature
|
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-28 16:33:15 -05:00
|
|
|
mod redeclared_same_signature {
|
|
|
|
mod a {
|
|
|
|
extern "C" {
|
|
|
|
fn no_clash(x: u8);
|
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
}
|
2020-06-28 16:33:15 -05:00
|
|
|
mod b {
|
|
|
|
extern "C" {
|
|
|
|
fn no_clash(x: u8);
|
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-28 16:33:15 -05:00
|
|
|
extern crate external_extern_fn;
|
|
|
|
mod extern_no_clash {
|
|
|
|
// Should not clash with external_extern_fn::extern_fn.
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
2020-06-28 16:33:15 -05:00
|
|
|
fn extern_fn(x: u8);
|
2020-03-31 03:24:59 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
2020-03-31 03:24:59 -05:00
|
|
|
fn some_other_new_name(x: i16);
|
|
|
|
|
|
|
|
#[link_name = "extern_link_name"]
|
|
|
|
fn some_new_name(x: i16);
|
|
|
|
|
|
|
|
#[link_name = "link_name_same"]
|
|
|
|
fn both_names_different(x: i16);
|
|
|
|
}
|
|
|
|
|
|
|
|
fn link_name_clash() {
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
2020-03-31 03:24:59 -05:00
|
|
|
fn extern_link_name(x: u32);
|
|
|
|
//~^ WARN `extern_link_name` redeclared with a different signature
|
|
|
|
|
|
|
|
#[link_name = "some_other_new_name"]
|
|
|
|
//~^ WARN `some_other_extern_link_name` redeclares `some_other_new_name` with a different
|
|
|
|
fn some_other_extern_link_name(x: u32);
|
|
|
|
|
|
|
|
#[link_name = "link_name_same"]
|
|
|
|
//~^ WARN `other_both_names_different` redeclares `link_name_same` with a different
|
|
|
|
fn other_both_names_different(x: u32);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod a {
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
2020-03-31 03:24:59 -05:00
|
|
|
fn different_mod(x: u8);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
mod b {
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
2020-03-31 03:24:59 -05:00
|
|
|
fn different_mod(x: u64); //~ WARN `different_mod` redeclared with a different signature
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
2020-03-31 03:24:59 -05:00
|
|
|
fn variadic_decl(x: u8, ...);
|
|
|
|
}
|
|
|
|
|
|
|
|
fn variadic_clash() {
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
2020-03-31 03:24:59 -05:00
|
|
|
fn variadic_decl(x: u8); //~ WARN `variadic_decl` redeclared with a different signature
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[no_mangle]
|
2020-06-27 19:11:04 -05:00
|
|
|
fn no_mangle_name(x: u8) {}
|
2020-03-31 03:24:59 -05:00
|
|
|
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
2020-03-31 03:24:59 -05:00
|
|
|
#[link_name = "unique_link_name"]
|
|
|
|
fn link_name_specified(x: u8);
|
|
|
|
}
|
|
|
|
|
|
|
|
fn tricky_no_clash() {
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
2020-03-31 03:24:59 -05:00
|
|
|
// Shouldn't warn, because the declaration above actually declares a different symbol (and
|
|
|
|
// Rust's name resolution rules around shadowing will handle this gracefully).
|
|
|
|
fn link_name_specified() -> u32;
|
|
|
|
|
|
|
|
// The case of a no_mangle name colliding with an extern decl (see #28179) is related but
|
2020-06-27 19:11:04 -05:00
|
|
|
// shouldn't be reported by ClashingExternDeclarations, because this is an example of
|
|
|
|
// unmangled name clash causing bad behaviour in functions with a defined body.
|
2020-03-31 03:24:59 -05:00
|
|
|
fn no_mangle_name() -> u32;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod banana {
|
|
|
|
mod one {
|
2020-06-27 19:11:04 -05:00
|
|
|
#[repr(C)]
|
|
|
|
struct Banana {
|
|
|
|
weight: u32,
|
|
|
|
length: u16,
|
|
|
|
}
|
|
|
|
extern "C" {
|
|
|
|
fn weigh_banana(count: *const Banana) -> u64;
|
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
mod two {
|
2020-06-27 19:11:04 -05:00
|
|
|
#[repr(C)]
|
|
|
|
struct Banana {
|
|
|
|
weight: u32,
|
|
|
|
length: u16,
|
|
|
|
} // note: distinct type
|
2023-03-19 18:50:03 -05:00
|
|
|
// This should not trigger the lint because two::Banana is structurally equivalent to
|
|
|
|
// one::Banana.
|
2020-06-28 16:33:15 -05:00
|
|
|
extern "C" {
|
2020-06-27 19:11:04 -05:00
|
|
|
fn weigh_banana(count: *const Banana) -> u64;
|
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
mod three {
|
|
|
|
// This _should_ trigger the lint, because repr(packed) should generate a struct that has a
|
|
|
|
// different layout.
|
2020-06-27 19:11:04 -05:00
|
|
|
#[repr(packed)]
|
|
|
|
struct Banana {
|
|
|
|
weight: u32,
|
|
|
|
length: u16,
|
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
#[allow(improper_ctypes)]
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
|
|
|
fn weigh_banana(count: *const Banana) -> u64;
|
|
|
|
//~^ WARN `weigh_banana` redeclared with a different signature
|
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod sameish_members {
|
|
|
|
mod a {
|
|
|
|
#[repr(C)]
|
2020-06-27 19:11:04 -05:00
|
|
|
struct Point {
|
|
|
|
x: i16,
|
|
|
|
y: i16,
|
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
|
|
|
fn draw_point(p: Point);
|
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
}
|
|
|
|
mod b {
|
|
|
|
#[repr(C)]
|
2020-06-27 19:11:04 -05:00
|
|
|
struct Point {
|
|
|
|
coordinates: [i16; 2],
|
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
|
|
|
|
// It's possible we are overconservative for this case, as accessing the elements of the
|
|
|
|
// coordinates array might end up correctly accessing `.x` and `.y`. However, this may not
|
|
|
|
// always be the case, for every architecture and situation. This is also a really odd
|
|
|
|
// thing to do anyway.
|
2020-06-27 19:11:04 -05:00
|
|
|
extern "C" {
|
2020-06-28 16:33:15 -05:00
|
|
|
fn draw_point(p: Point);
|
|
|
|
//~^ WARN `draw_point` redeclared with a different signature
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-07 06:08:14 -05:00
|
|
|
mod same_sized_members_clash {
|
|
|
|
mod a {
|
|
|
|
#[repr(C)]
|
|
|
|
struct Point3 {
|
|
|
|
x: f32,
|
|
|
|
y: f32,
|
|
|
|
z: f32,
|
|
|
|
}
|
2020-08-24 23:00:24 -05:00
|
|
|
extern "C" {
|
|
|
|
fn origin() -> Point3;
|
|
|
|
}
|
2020-07-07 06:08:14 -05:00
|
|
|
}
|
|
|
|
mod b {
|
|
|
|
#[repr(C)]
|
|
|
|
struct Point3 {
|
|
|
|
x: i32,
|
|
|
|
y: i32,
|
|
|
|
z: i32, // NOTE: Incorrectly redeclared as i32
|
|
|
|
}
|
2020-08-24 23:00:24 -05:00
|
|
|
extern "C" {
|
|
|
|
fn origin() -> Point3; //~ WARN `origin` redeclared with a different signature
|
|
|
|
}
|
2020-07-07 06:08:14 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-28 16:33:15 -05:00
|
|
|
mod transparent {
|
|
|
|
#[repr(transparent)]
|
|
|
|
struct T(usize);
|
|
|
|
mod a {
|
|
|
|
use super::T;
|
|
|
|
extern "C" {
|
|
|
|
fn transparent() -> T;
|
2020-07-13 08:06:35 -05:00
|
|
|
fn transparent_incorrect() -> T;
|
2020-06-28 16:33:15 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod b {
|
|
|
|
extern "C" {
|
|
|
|
// Shouldn't warn here, because repr(transparent) guarantees that T's layout is the
|
|
|
|
// same as just the usize.
|
|
|
|
fn transparent() -> usize;
|
2020-07-13 08:06:35 -05:00
|
|
|
|
|
|
|
// Should warn, because there's a signedness conversion here:
|
|
|
|
fn transparent_incorrect() -> isize;
|
|
|
|
//~^ WARN `transparent_incorrect` redeclared with a different signature
|
2020-06-28 16:33:15 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-19 18:50:03 -05:00
|
|
|
#[allow(improper_ctypes)]
|
|
|
|
mod zst {
|
|
|
|
mod transparent {
|
|
|
|
#[repr(transparent)]
|
|
|
|
struct TransparentZst(());
|
|
|
|
extern "C" {
|
|
|
|
fn zst() -> ();
|
|
|
|
fn transparent_zst() -> TransparentZst;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod not_transparent {
|
|
|
|
struct NotTransparentZst(());
|
|
|
|
extern "C" {
|
|
|
|
// These shouldn't warn since all return types are zero sized
|
|
|
|
fn zst() -> NotTransparentZst;
|
|
|
|
fn transparent_zst() -> NotTransparentZst;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-28 16:33:15 -05:00
|
|
|
mod missing_return_type {
|
|
|
|
mod a {
|
|
|
|
extern "C" {
|
|
|
|
fn missing_return_type() -> usize;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod b {
|
|
|
|
extern "C" {
|
2020-07-03 21:07:43 -05:00
|
|
|
// This should output a warning because we can't assume that the first declaration is
|
|
|
|
// the correct one -- if this one is the correct one, then calling the usize-returning
|
|
|
|
// version would allow reads into uninitialised memory.
|
2020-06-28 16:33:15 -05:00
|
|
|
fn missing_return_type();
|
|
|
|
//~^ WARN `missing_return_type` redeclared with a different signature
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod non_zero_and_non_null {
|
|
|
|
mod a {
|
|
|
|
extern "C" {
|
|
|
|
fn non_zero_usize() -> core::num::NonZeroUsize;
|
|
|
|
fn non_null_ptr() -> core::ptr::NonNull<usize>;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
mod b {
|
|
|
|
extern "C" {
|
2020-07-03 21:07:43 -05:00
|
|
|
// If there's a clash in either of these cases you're either gaining an incorrect
|
2020-06-28 16:33:15 -05:00
|
|
|
// invariant that the value is non-zero, or you're missing out on that invariant. Both
|
|
|
|
// cases are warning for, from both a caller-convenience and optimisation perspective.
|
|
|
|
fn non_zero_usize() -> usize;
|
|
|
|
//~^ WARN `non_zero_usize` redeclared with a different signature
|
|
|
|
fn non_null_ptr() -> *const usize;
|
|
|
|
//~^ WARN `non_null_ptr` redeclared with a different signature
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-24 11:24:05 -05:00
|
|
|
// See #75739
|
|
|
|
mod non_zero_transparent {
|
|
|
|
mod a1 {
|
|
|
|
use std::num::NonZeroUsize;
|
|
|
|
extern "C" {
|
|
|
|
fn f1() -> NonZeroUsize;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod b1 {
|
|
|
|
#[repr(transparent)]
|
|
|
|
struct X(NonZeroUsize);
|
|
|
|
use std::num::NonZeroUsize;
|
|
|
|
extern "C" {
|
|
|
|
fn f1() -> X;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod a2 {
|
|
|
|
use std::num::NonZeroUsize;
|
|
|
|
extern "C" {
|
|
|
|
fn f2() -> NonZeroUsize;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod b2 {
|
|
|
|
#[repr(transparent)]
|
|
|
|
struct X1(NonZeroUsize);
|
|
|
|
|
|
|
|
#[repr(transparent)]
|
|
|
|
struct X(X1);
|
|
|
|
|
|
|
|
use std::num::NonZeroUsize;
|
|
|
|
extern "C" {
|
|
|
|
// Same case as above, but with two layers of newtyping.
|
|
|
|
fn f2() -> X;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod a3 {
|
|
|
|
#[repr(transparent)]
|
|
|
|
struct X(core::ptr::NonNull<i32>);
|
|
|
|
|
|
|
|
use std::num::NonZeroUsize;
|
|
|
|
extern "C" {
|
|
|
|
fn f3() -> X;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod b3 {
|
|
|
|
extern "C" {
|
|
|
|
fn f3() -> core::ptr::NonNull<i32>;
|
|
|
|
}
|
|
|
|
}
|
2020-08-24 23:00:24 -05:00
|
|
|
|
|
|
|
mod a4 {
|
|
|
|
#[repr(transparent)]
|
|
|
|
enum E {
|
|
|
|
X(std::num::NonZeroUsize),
|
|
|
|
}
|
|
|
|
extern "C" {
|
|
|
|
fn f4() -> E;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod b4 {
|
|
|
|
extern "C" {
|
|
|
|
fn f4() -> std::num::NonZeroUsize;
|
|
|
|
}
|
|
|
|
}
|
2020-08-24 11:24:05 -05:00
|
|
|
}
|
|
|
|
|
2020-06-28 16:33:15 -05:00
|
|
|
mod null_optimised_enums {
|
|
|
|
mod a {
|
|
|
|
extern "C" {
|
|
|
|
fn option_non_zero_usize() -> usize;
|
|
|
|
fn option_non_zero_isize() -> isize;
|
|
|
|
fn option_non_null_ptr() -> *const usize;
|
|
|
|
|
|
|
|
fn option_non_zero_usize_incorrect() -> usize;
|
|
|
|
fn option_non_null_ptr_incorrect() -> *const usize;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
mod b {
|
|
|
|
extern "C" {
|
|
|
|
// This should be allowed, because these conversions are guaranteed to be FFI-safe (see
|
|
|
|
// #60300)
|
|
|
|
fn option_non_zero_usize() -> Option<core::num::NonZeroUsize>;
|
|
|
|
fn option_non_zero_isize() -> Option<core::num::NonZeroIsize>;
|
|
|
|
fn option_non_null_ptr() -> Option<core::ptr::NonNull<usize>>;
|
|
|
|
|
|
|
|
// However, these should be incorrect (note isize instead of usize)
|
|
|
|
fn option_non_zero_usize_incorrect() -> isize;
|
|
|
|
//~^ WARN `option_non_zero_usize_incorrect` redeclared with a different signature
|
|
|
|
fn option_non_null_ptr_incorrect() -> *const isize;
|
|
|
|
//~^ WARN `option_non_null_ptr_incorrect` redeclared with a different signature
|
2020-06-27 19:11:04 -05:00
|
|
|
}
|
2020-03-31 03:24:59 -05:00
|
|
|
}
|
|
|
|
}
|
2020-08-26 08:32:57 -05:00
|
|
|
|
|
|
|
#[allow(improper_ctypes)]
|
|
|
|
mod unknown_layout {
|
|
|
|
mod a {
|
|
|
|
extern "C" {
|
|
|
|
pub fn generic(l: Link<u32>);
|
|
|
|
}
|
|
|
|
pub struct Link<T> {
|
|
|
|
pub item: T,
|
|
|
|
pub next: *const Link<T>,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod b {
|
|
|
|
extern "C" {
|
|
|
|
pub fn generic(l: Link<u32>);
|
|
|
|
}
|
|
|
|
pub struct Link<T> {
|
|
|
|
pub item: T,
|
|
|
|
pub next: *const Link<T>,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-12-09 18:00:00 -06:00
|
|
|
|
|
|
|
mod hidden_niche {
|
|
|
|
mod a {
|
|
|
|
extern "C" {
|
|
|
|
fn hidden_niche_transparent() -> usize;
|
|
|
|
fn hidden_niche_transparent_no_niche() -> usize;
|
|
|
|
fn hidden_niche_unsafe_cell() -> usize;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
mod b {
|
|
|
|
use std::cell::UnsafeCell;
|
|
|
|
use std::num::NonZeroUsize;
|
|
|
|
|
|
|
|
#[repr(transparent)]
|
2023-03-19 18:50:03 -05:00
|
|
|
struct Transparent {
|
|
|
|
x: NonZeroUsize,
|
|
|
|
}
|
2020-12-09 18:00:00 -06:00
|
|
|
|
|
|
|
#[repr(transparent)]
|
2023-03-19 18:50:03 -05:00
|
|
|
struct TransparentNoNiche {
|
|
|
|
y: UnsafeCell<NonZeroUsize>,
|
|
|
|
}
|
2020-12-09 18:00:00 -06:00
|
|
|
|
|
|
|
extern "C" {
|
|
|
|
fn hidden_niche_transparent() -> Option<Transparent>;
|
|
|
|
|
|
|
|
fn hidden_niche_transparent_no_niche() -> Option<TransparentNoNiche>;
|
|
|
|
//~^ WARN redeclared with a different signature
|
|
|
|
//~| WARN block uses type `Option<TransparentNoNiche>`, which is not FFI-safe
|
|
|
|
|
|
|
|
fn hidden_niche_unsafe_cell() -> Option<UnsafeCell<NonZeroUsize>>;
|
|
|
|
//~^ WARN redeclared with a different signature
|
|
|
|
//~| WARN block uses type `Option<UnsafeCell<NonZeroUsize>>`, which is not FFI-safe
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|