-
Notifications
You must be signed in to change notification settings - Fork 12.7k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
collections: Make BinaryHeap panic safe in sift_up / sift_down
Use a struct called Hole that keeps track of an invalid location in the vector and fills the hole on drop. I include a run-pass test that the current BinaryHeap fails, and the new one passes. Fixes #25842
- Loading branch information
Ulrik Sverdrup
committed
May 28, 2015
1 parent
541fe5f
commit 5f44f5b
Showing
2 changed files
with
161 additions
and
27 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,71 @@ | ||
|
||
#![feature(std_misc, collections, catch_panic, rand)] | ||
|
||
use std::__rand::{thread_rng, Rng}; | ||
use std::thread; | ||
|
||
use std::collections::BinaryHeap; | ||
use std::cmp::Ordering; | ||
use std::sync::Arc; | ||
use std::sync::Mutex; | ||
|
||
// old binaryheap failed this test | ||
// | ||
// Integrity means that all elements are present after a comparison panics, | ||
// even if the order may not be correct. | ||
fn test_integrity() { | ||
#[derive(Eq, PartialEq, Ord, Clone, Debug)] | ||
struct PanicOrd<T>(T, bool); | ||
|
||
impl<T: PartialOrd> PartialOrd for PanicOrd<T> { | ||
fn partial_cmp(&self, other: &Self) -> Option<Ordering> { | ||
if self.1 || other.1 { | ||
panic!("Panicking comparison"); | ||
} | ||
self.0.partial_cmp(&other.0) | ||
} | ||
} | ||
let mut rng = thread_rng(); | ||
const DATASZ: usize = 32; | ||
const NTEST: usize = 10; | ||
|
||
// don't use 0 in the data -- we want to catch the zeroed-out case. | ||
let data = (1..DATASZ + 1).collect::<Vec<_>>(); | ||
|
||
// since it's a fuzzy test, run several tries. | ||
for _ in 0..NTEST { | ||
for i in 1..DATASZ + 1 { | ||
let mut panic_ords: Vec<_> = data.iter() | ||
.filter(|&&x| x != i) | ||
.map(|&x| PanicOrd(x, false)) | ||
.collect(); | ||
let panic_item = PanicOrd(i, true); | ||
|
||
// heapify the sane items | ||
rng.shuffle(&mut panic_ords); | ||
let heap = Arc::new(Mutex::new(BinaryHeap::from_vec(panic_ords))); | ||
let heap_ref = heap.clone(); | ||
|
||
// push the panicking item to the heap and catch the panic | ||
let thread_result = thread::catch_panic(move || { | ||
heap.lock().unwrap().push(panic_item); | ||
}); | ||
assert!(thread_result.is_err()); | ||
|
||
// now fetch the binary heap again | ||
let mutex_guard = match heap_ref.lock() { | ||
Ok(x) => x, | ||
Err(poison) => poison.into_inner(), | ||
}; | ||
let inner_data = mutex_guard.clone().into_vec(); | ||
let mut data_sorted = inner_data.into_iter().map(|p| p.0).collect::<Vec<_>>(); | ||
data_sorted.sort(); | ||
assert_eq!(data_sorted, data); | ||
} | ||
} | ||
} | ||
|
||
fn main() { | ||
test_integrity(); | ||
} | ||
|