Skip to content

Commit 3e5c662

Browse files
committed
Auto merge of rust-lang#124895 - obeis:static-mut-hidden-ref, r=compiler-errors
Disallow hidden references to mutable static Closes rust-lang#123060 Tracking: - rust-lang#123758
2 parents 7ae6827 + 84da2fc commit 3e5c662

File tree

10 files changed

+29
-0
lines changed

10 files changed

+29
-0
lines changed

alloc/src/collections/linked_list/tests.rs

+3
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
// FIXME(static_mut_refs): Do not allow `static_mut_refs` lint
2+
#![allow(static_mut_refs)]
3+
14
use std::panic::{catch_unwind, AssertUnwindSafe};
25
use std::thread;
36

alloc/src/collections/vec_deque/tests.rs

+3
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
// FIXME(static_mut_refs): Do not allow `static_mut_refs` lint
2+
#![allow(static_mut_refs)]
3+
14
use core::iter::TrustedLen;
25

36
use super::*;

alloc/tests/fmt.rs

+2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
#![deny(warnings)]
2+
// FIXME(static_mut_refs): Do not allow `static_mut_refs` lint
3+
#![allow(static_mut_refs)]
24

35
use std::cell::RefCell;
46
use std::fmt::{self, Write};

alloc/tests/vec.rs

+5
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
// FIXME(static_mut_refs): Do not allow `static_mut_refs` lint
2+
#![allow(static_mut_refs)]
3+
14
use core::alloc::{Allocator, Layout};
25
use core::num::NonZero;
36
use core::ptr::NonNull;
@@ -1284,6 +1287,8 @@ fn test_from_iter_specialization_panic_during_iteration_drops() {
12841287

12851288
#[test]
12861289
#[cfg_attr(not(panic = "unwind"), ignore = "test requires unwinding support")]
1290+
// FIXME(static_mut_refs): Do not allow `static_mut_refs` lint
1291+
#[cfg_attr(not(bootstrap), allow(static_mut_refs))]
12871292
fn test_from_iter_specialization_panic_during_drop_doesnt_leak() {
12881293
static mut DROP_COUNTER_OLD: [usize; 5] = [0; 5];
12891294
static mut DROP_COUNTER_NEW: [usize; 2] = [0; 2];

alloc/tests/vec_deque.rs

+3
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
// FIXME(static_mut_refs): Do not allow `static_mut_refs` lint
2+
#![allow(static_mut_refs)]
3+
14
use core::num::NonZero;
25
use std::assert_matches::assert_matches;
36
use std::collections::vec_deque::Drain;

core/tests/atomic.rs

+2
Original file line numberDiff line numberDiff line change
@@ -228,6 +228,8 @@ fn static_init() {
228228
}
229229

230230
#[test]
231+
// FIXME(static_mut_refs): Do not allow `static_mut_refs` lint
232+
#[cfg_attr(not(bootstrap), allow(static_mut_refs))]
231233
fn atomic_access_bool() {
232234
static mut ATOMIC: AtomicBool = AtomicBool::new(false);
233235

panic_unwind/src/seh.rs

+2
Original file line numberDiff line numberDiff line change
@@ -291,6 +291,8 @@ cfg_if::cfg_if! {
291291
}
292292
}
293293

294+
// FIXME(static_mut_refs): Do not allow `static_mut_refs` lint
295+
#[allow(static_mut_refs)]
294296
pub unsafe fn panic(data: Box<dyn Any + Send>) -> u32 {
295297
use core::intrinsics::atomic_store_seqcst;
296298

std/src/sync/mod.rs

+3
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,9 @@
99
//! Consider the following code, operating on some global static variables:
1010
//!
1111
//! ```rust
12+
//! // FIXME(static_mut_refs): Do not allow `static_mut_refs` lint
13+
//! #![allow(static_mut_refs)]
14+
//!
1215
//! static mut A: u32 = 0;
1316
//! static mut B: u32 = 0;
1417
//! static mut C: u32 = 0;

std/src/sys/alloc/wasm.rs

+3
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,9 @@
1616
//! The crate itself provides a global allocator which on wasm has no
1717
//! synchronization as there are no threads!
1818
19+
// FIXME(static_mut_refs): Do not allow `static_mut_refs` lint
20+
#![allow(static_mut_refs)]
21+
1922
use crate::alloc::{GlobalAlloc, Layout, System};
2023

2124
static mut DLMALLOC: dlmalloc::Dlmalloc = dlmalloc::Dlmalloc::new();

std/src/thread/local/tests.rs

+3
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,9 @@ fn smoke_dtor() {
103103

104104
#[test]
105105
fn circular() {
106+
// FIXME(static_mut_refs): Do not allow `static_mut_refs` lint
107+
#![allow(static_mut_refs)]
108+
106109
struct S1(&'static LocalKey<UnsafeCell<Option<S1>>>, &'static LocalKey<UnsafeCell<Option<S2>>>);
107110
struct S2(&'static LocalKey<UnsafeCell<Option<S1>>>, &'static LocalKey<UnsafeCell<Option<S2>>>);
108111
thread_local!(static K1: UnsafeCell<Option<S1>> = UnsafeCell::new(None));

0 commit comments

Comments
 (0)