@@ -55,7 +55,8 @@ fn common_exprs() -> [ast::expr] {
55
55
dse ( ast:: expr_put ( option:: none) ) ,
56
56
dse ( ast:: expr_lit ( @dsl ( ast:: lit_nil) ) ) ,
57
57
dse ( ast:: expr_lit ( @dsl ( ast:: lit_bool ( false ) ) ) ) ,
58
- dse ( ast:: expr_lit ( @dsl ( ast:: lit_bool ( true ) ) ) )
58
+ dse ( ast:: expr_lit ( @dsl ( ast:: lit_bool ( true ) ) ) ) ,
59
+ dse ( ast:: expr_unary ( ast:: box ( ast:: imm) , @dse ( ast:: expr_lit ( @dsl ( ast:: lit_bool ( true ) ) ) ) ) )
59
60
]
60
61
}
61
62
@@ -344,7 +345,7 @@ fn check_compiling(filename: str) -> happiness {
344
345
known_bug ( "https://github.com/graydon/rust/issues/943" )
345
346
} else if contains ( p. err , "(S->getType()->isPointerTy() && \" Invalid cast\" )" ) {
346
347
known_bug ( "https://github.com/graydon/rust/issues/895" )
347
- } else if contains ( p. out , "Ptr must be a pointer to Val type" ) {
348
+ } else if contains ( p. err , "Ptr must be a pointer to Val type" ) {
348
349
known_bug ( "https://github.com/graydon/rust/issues/897" )
349
350
} else if contains ( p. err , "(castIsValid(op, S, Ty) && \" Invalid cast!\" ), function Create" ) {
350
351
known_bug ( "https://github.com/graydon/rust/issues/901" )
@@ -425,7 +426,6 @@ fn content_is_dangerous_to_run(code: str) -> bool {
425
426
[ "import" , // espeically fs, run
426
427
"native" ,
427
428
"unsafe" ,
428
- "with" , // tstate hang: https://github.com/graydon/rust/issues/948
429
429
"log" ] ; // python --> rust pipe deadlock?
430
430
431
431
for p: str in dangerous_patterns { if contains ( code, p) { ret true ; } }
@@ -437,6 +437,7 @@ fn content_is_dangerous_to_modify(code: str) -> bool {
437
437
[ "#macro" , // not safe to steal things inside of it, because they have a special syntax
438
438
"#" , // strange representation of the arguments to #fmt, for example
439
439
"tag" , // typeck hang: https://github.com/graydon/rust/issues/742 (from dup #900)
440
+ "with" , // tstate hang: https://github.com/graydon/rust/issues/948
440
441
" be " ] ; // don't want to replace its child with a non-call: "Non-call expression in tail call"
441
442
442
443
for p: str in dangerous_patterns { if contains ( code, p) { ret true ; } }
0 commit comments