Auto merge of #95169 - Smittyvb:union-test-ub, r=bjorn3
Don't run UB in test suite This splits `ui/unsafe/union.rs` to make it so only the non-UB parts are run. It also means we can do more testing of the location of error messages (which are a bit different with the THIR unsafety checker). `union-modification.rs` has no UB (according to Miri), and `union.rs` has errors (but would have UB if not for those errors). Closes #95075. r? `@bjorn3`
This commit is contained in:
commit
44628f7273
39
src/test/ui/unsafe/union-modification.rs
Normal file
39
src/test/ui/unsafe/union-modification.rs
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
// run-pass
|
||||||
|
// revisions: mir thir
|
||||||
|
// [thir]compile-flags: -Z thir-unsafeck
|
||||||
|
|
||||||
|
#![feature(untagged_unions)]
|
||||||
|
|
||||||
|
union Foo {
|
||||||
|
bar: i8,
|
||||||
|
_blah: isize,
|
||||||
|
_zst: (),
|
||||||
|
}
|
||||||
|
|
||||||
|
struct FooHolder {
|
||||||
|
inner_foo: Foo
|
||||||
|
}
|
||||||
|
|
||||||
|
fn do_nothing(_x: &mut Foo) {}
|
||||||
|
|
||||||
|
pub fn main() {
|
||||||
|
let mut foo = Foo { bar: 5 };
|
||||||
|
do_nothing(&mut foo);
|
||||||
|
foo.bar = 6;
|
||||||
|
unsafe { foo.bar += 1; }
|
||||||
|
assert_eq!(unsafe { foo.bar }, 7);
|
||||||
|
unsafe {
|
||||||
|
let Foo { bar: inner } = foo;
|
||||||
|
assert_eq!(inner, 7);
|
||||||
|
}
|
||||||
|
|
||||||
|
let foo = Foo { bar: 5 };
|
||||||
|
let foo = if let 3 = if let true = true { 3 } else { 4 } { foo } else { foo };
|
||||||
|
|
||||||
|
let (_foo2, _random) = (foo, 42);
|
||||||
|
|
||||||
|
let mut foo_holder = FooHolder { inner_foo: Foo { bar: 5 } };
|
||||||
|
foo_holder.inner_foo.bar = 4;
|
||||||
|
assert_eq!(unsafe { foo_holder.inner_foo.bar }, 4);
|
||||||
|
drop(foo_holder);
|
||||||
|
}
|
@ -1,16 +1,19 @@
|
|||||||
warning: unnecessary `unsafe` block
|
error[E0133]: access to union field is unsafe and requires unsafe function or block
|
||||||
--> $DIR/union.rs:61:5
|
--> $DIR/union.rs:30:20
|
||||||
|
|
|
|
||||||
LL | unsafe {
|
LL | Foo { bar: _a } => {},
|
||||||
| ^^^^^^ unnecessary `unsafe` block
|
| ^^ access to union field
|
||||||
|
|
|
|
||||||
= note: `#[warn(unused_unsafe)]` on by default
|
= note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
|
||||||
|
|
||||||
warning: unnecessary `unsafe` block
|
error[E0133]: access to union field is unsafe and requires unsafe function or block
|
||||||
--> $DIR/union.rs:66:5
|
--> $DIR/union.rs:32:11
|
||||||
|
|
|
|
||||||
LL | unsafe {
|
LL | match foo {
|
||||||
| ^^^^^^ unnecessary `unsafe` block
|
| ^^^ access to union field
|
||||||
|
|
|
||||||
|
= note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
|
||||||
|
|
||||||
warning: 2 warnings emitted
|
error: aborting due to 2 previous errors
|
||||||
|
|
||||||
|
For more information about this error, try `rustc --explain E0133`.
|
||||||
|
@ -1,4 +1,3 @@
|
|||||||
// run-pass
|
|
||||||
// revisions: mir thir
|
// revisions: mir thir
|
||||||
// [thir]compile-flags: -Z thir-unsafeck
|
// [thir]compile-flags: -Z thir-unsafeck
|
||||||
|
|
||||||
@ -20,61 +19,35 @@ enum PizzaTopping {
|
|||||||
Pineapple,
|
Pineapple,
|
||||||
}
|
}
|
||||||
|
|
||||||
struct FooHolder {
|
|
||||||
inner_foo: Foo
|
|
||||||
}
|
|
||||||
|
|
||||||
fn do_nothing(_x: &mut Foo) {}
|
fn do_nothing(_x: &mut Foo) {}
|
||||||
|
|
||||||
pub fn main() {
|
pub fn main() {
|
||||||
let mut foo = Foo { bar: 5 };
|
let mut foo = Foo { bar: 5 };
|
||||||
do_nothing(&mut foo);
|
do_nothing(&mut foo);
|
||||||
foo.bar = 6;
|
|
||||||
unsafe { foo.bar += 1; }
|
|
||||||
assert_eq!(unsafe { foo.bar }, 7);
|
|
||||||
unsafe {
|
|
||||||
let Foo { bar: inner } = foo;
|
|
||||||
assert_eq!(inner, 7);
|
|
||||||
}
|
|
||||||
let foo = if let true = true { foo } else { foo };
|
|
||||||
|
|
||||||
unsafe {
|
// This is UB, so this test isn't run
|
||||||
match foo {
|
match foo {
|
||||||
Foo { bar: _a } => {},
|
Foo { bar: _a } => {}, //~ ERROR access to union field is unsafe
|
||||||
}
|
|
||||||
}
|
}
|
||||||
unsafe {
|
match foo { //[mir]~ ERROR access to union field is unsafe
|
||||||
match foo {
|
Foo {
|
||||||
Foo {
|
pizza: Pizza { //[thir]~ ERROR access to union field is unsafe
|
||||||
pizza: Pizza {
|
topping: Some(PizzaTopping::Cheese) | Some(PizzaTopping::Pineapple) | None
|
||||||
topping: Some(PizzaTopping::Cheese) | Some(PizzaTopping::Pineapple) | None
|
}
|
||||||
}
|
} => {},
|
||||||
} => {},
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// MIR unsafeck incorrectly thinks that no unsafe block is needed to do these
|
||||||
|
match foo {
|
||||||
|
Foo { zst: () } => {}, //[thir]~ ERROR access to union field is unsafe
|
||||||
|
}
|
||||||
|
match foo {
|
||||||
|
Foo { pizza: Pizza { .. } } => {}, //[thir]~ ERROR access to union field is unsafe
|
||||||
|
}
|
||||||
|
|
||||||
// binding to wildcard is okay
|
// binding to wildcard is okay
|
||||||
match foo {
|
match foo {
|
||||||
Foo { bar: _ } => {},
|
Foo { bar: _ } => {},
|
||||||
}
|
}
|
||||||
let Foo { bar: _ } = foo;
|
let Foo { bar: _ } = foo;
|
||||||
// MIR unsafeck incorrectly thinks that it is safe to do these
|
|
||||||
unsafe { //[mir]~ WARNING
|
|
||||||
match foo {
|
|
||||||
Foo { zst: () } => {},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
unsafe { //[mir]~ WARNING
|
|
||||||
match foo {
|
|
||||||
Foo { pizza: Pizza { .. } } => {},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
let foo = Foo { bar: 5 };
|
|
||||||
let foo = if let 3 = if let true = true { 3 } else { 4 } { foo } else { foo };
|
|
||||||
|
|
||||||
let (_foo2, _random) = (foo, 42);
|
|
||||||
|
|
||||||
let mut foo_holder = FooHolder { inner_foo: Foo { bar: 5 } };
|
|
||||||
foo_holder.inner_foo.bar = 4;
|
|
||||||
assert_eq!(unsafe { foo_holder.inner_foo.bar }, 4);
|
|
||||||
drop(foo_holder);
|
|
||||||
}
|
}
|
||||||
|
38
src/test/ui/unsafe/union.thir.stderr
Normal file
38
src/test/ui/unsafe/union.thir.stderr
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
error[E0133]: access to union field is unsafe and requires unsafe function or block
|
||||||
|
--> $DIR/union.rs:30:20
|
||||||
|
|
|
||||||
|
LL | Foo { bar: _a } => {},
|
||||||
|
| ^^ access to union field
|
||||||
|
|
|
||||||
|
= note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
|
||||||
|
|
||||||
|
error[E0133]: access to union field is unsafe and requires unsafe function or block
|
||||||
|
--> $DIR/union.rs:34:20
|
||||||
|
|
|
||||||
|
LL | pizza: Pizza {
|
||||||
|
| ____________________^
|
||||||
|
LL | | topping: Some(PizzaTopping::Cheese) | Some(PizzaTopping::Pineapple) | None
|
||||||
|
LL | | }
|
||||||
|
| |_____________^ access to union field
|
||||||
|
|
|
||||||
|
= note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
|
||||||
|
|
||||||
|
error[E0133]: access to union field is unsafe and requires unsafe function or block
|
||||||
|
--> $DIR/union.rs:42:20
|
||||||
|
|
|
||||||
|
LL | Foo { zst: () } => {},
|
||||||
|
| ^^ access to union field
|
||||||
|
|
|
||||||
|
= note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
|
||||||
|
|
||||||
|
error[E0133]: access to union field is unsafe and requires unsafe function or block
|
||||||
|
--> $DIR/union.rs:45:22
|
||||||
|
|
|
||||||
|
LL | Foo { pizza: Pizza { .. } } => {},
|
||||||
|
| ^^^^^^^^^^^^ access to union field
|
||||||
|
|
|
||||||
|
= note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
|
||||||
|
|
||||||
|
error: aborting due to 4 previous errors
|
||||||
|
|
||||||
|
For more information about this error, try `rustc --explain E0133`.
|
Loading…
Reference in New Issue
Block a user