Remove sanitizer_runtime attribute
This commit is contained in:
parent
78e7eeeaa1
commit
36d0812570
13 changed files with 2 additions and 43 deletions
|
@ -1,5 +0,0 @@
|
|||
# `sanitizer_runtime_lib`
|
||||
|
||||
This feature is internal to the Rust compiler and is not intended for general use.
|
||||
|
||||
------------------------
|
|
@ -686,10 +686,6 @@ rustc_queries! {
|
|||
fatal_cycle
|
||||
desc { "checking if the crate has_panic_handler" }
|
||||
}
|
||||
query is_sanitizer_runtime(_: CrateNum) -> bool {
|
||||
fatal_cycle
|
||||
desc { "query a crate is `#![sanitizer_runtime]`" }
|
||||
}
|
||||
query is_profiler_runtime(_: CrateNum) -> bool {
|
||||
fatal_cycle
|
||||
desc { "query a crate is `#![profiler_runtime]`" }
|
||||
|
|
|
@ -723,7 +723,6 @@ impl CrateInfo {
|
|||
panic_runtime: None,
|
||||
compiler_builtins: None,
|
||||
profiler_runtime: None,
|
||||
sanitizer_runtime: None,
|
||||
is_no_builtins: Default::default(),
|
||||
native_libraries: Default::default(),
|
||||
used_libraries: tcx.native_libraries(LOCAL_CRATE),
|
||||
|
@ -759,9 +758,6 @@ impl CrateInfo {
|
|||
if tcx.is_profiler_runtime(cnum) {
|
||||
info.profiler_runtime = Some(cnum);
|
||||
}
|
||||
if tcx.is_sanitizer_runtime(cnum) {
|
||||
info.sanitizer_runtime = Some(cnum);
|
||||
}
|
||||
if tcx.is_no_builtins(cnum) {
|
||||
info.is_no_builtins.insert(cnum);
|
||||
}
|
||||
|
|
|
@ -122,7 +122,6 @@ pub struct CrateInfo {
|
|||
pub panic_runtime: Option<CrateNum>,
|
||||
pub compiler_builtins: Option<CrateNum>,
|
||||
pub profiler_runtime: Option<CrateNum>,
|
||||
pub sanitizer_runtime: Option<CrateNum>,
|
||||
pub is_no_builtins: FxHashSet<CrateNum>,
|
||||
pub native_libraries: FxHashMap<CrateNum, Lrc<Vec<NativeLibrary>>>,
|
||||
pub crate_name: FxHashMap<CrateNum, String>,
|
||||
|
|
|
@ -192,9 +192,6 @@ declare_features! (
|
|||
/// Allows using the `unadjusted` ABI; perma-unstable.
|
||||
(active, abi_unadjusted, "1.16.0", None, None),
|
||||
|
||||
/// Allows identifying crates that contain sanitizer runtimes.
|
||||
(active, sanitizer_runtime, "1.17.0", None, None),
|
||||
|
||||
/// Used to identify crates that contain the profiler runtime.
|
||||
(active, profiler_runtime, "1.18.0", None, None),
|
||||
|
||||
|
|
|
@ -409,11 +409,6 @@ pub const BUILTIN_ATTRIBUTES: &[BuiltinAttribute] = &[
|
|||
"the `#[compiler_builtins]` attribute is used to identify the `compiler_builtins` crate \
|
||||
which contains compiler-rt intrinsics and will never be stable",
|
||||
),
|
||||
gated!(
|
||||
sanitizer_runtime, Whitelisted, template!(Word),
|
||||
"the `#[sanitizer_runtime]` attribute is used to identify crates that contain the runtime \
|
||||
of a sanitizer and will never be stable",
|
||||
),
|
||||
gated!(
|
||||
profiler_runtime, Whitelisted, template!(Word),
|
||||
"the `#[profiler_runtime]` attribute is used to identify the `profiler_builtins` crate \
|
||||
|
|
|
@ -74,6 +74,8 @@ declare_features! (
|
|||
(removed, pushpop_unsafe, "1.2.0", None, None, None),
|
||||
(removed, needs_allocator, "1.4.0", Some(27389), None,
|
||||
Some("subsumed by `#![feature(allocator_internals)]`")),
|
||||
/// Allows identifying crates that contain sanitizer runtimes.
|
||||
(removed, sanitizer_runtime, "1.17.0", None, None, None),
|
||||
(removed, proc_macro_mod, "1.27.0", Some(54727), None,
|
||||
Some("subsumed by `#![feature(proc_macro_hygiene)]`")),
|
||||
(removed, proc_macro_expr, "1.27.0", Some(54727), None,
|
||||
|
|
|
@ -1587,10 +1587,6 @@ impl<'a, 'tcx> CrateMetadata {
|
|||
self.root.panic_runtime
|
||||
}
|
||||
|
||||
crate fn is_sanitizer_runtime(&self) -> bool {
|
||||
self.root.sanitizer_runtime
|
||||
}
|
||||
|
||||
crate fn is_profiler_runtime(&self) -> bool {
|
||||
self.root.profiler_runtime
|
||||
}
|
||||
|
|
|
@ -161,7 +161,6 @@ provide! { <'tcx> tcx, def_id, other, cdata,
|
|||
is_compiler_builtins => { cdata.root.compiler_builtins }
|
||||
has_global_allocator => { cdata.root.has_global_allocator }
|
||||
has_panic_handler => { cdata.root.has_panic_handler }
|
||||
is_sanitizer_runtime => { cdata.root.sanitizer_runtime }
|
||||
is_profiler_runtime => { cdata.root.profiler_runtime }
|
||||
panic_strategy => { cdata.root.panic_strategy }
|
||||
extern_crate => {
|
||||
|
|
|
@ -514,7 +514,6 @@ impl<'tcx> EncodeContext<'tcx> {
|
|||
no_builtins: attr::contains_name(&attrs, sym::no_builtins),
|
||||
panic_runtime: attr::contains_name(&attrs, sym::panic_runtime),
|
||||
profiler_runtime: attr::contains_name(&attrs, sym::profiler_runtime),
|
||||
sanitizer_runtime: attr::contains_name(&attrs, sym::sanitizer_runtime),
|
||||
symbol_mangling_version: tcx.sess.opts.debugging_opts.symbol_mangling_version,
|
||||
|
||||
crate_deps,
|
||||
|
|
|
@ -209,7 +209,6 @@ crate struct CrateRoot<'tcx> {
|
|||
no_builtins: bool,
|
||||
panic_runtime: bool,
|
||||
profiler_runtime: bool,
|
||||
sanitizer_runtime: bool,
|
||||
symbol_mangling_version: SymbolManglingVersion,
|
||||
}
|
||||
|
||||
|
|
|
@ -1,3 +0,0 @@
|
|||
#![sanitizer_runtime] //~ ERROR the `#[sanitizer_runtime]` attribute is
|
||||
|
||||
fn main() {}
|
|
@ -1,11 +0,0 @@
|
|||
error[E0658]: the `#[sanitizer_runtime]` attribute is used to identify crates that contain the runtime of a sanitizer and will never be stable
|
||||
--> $DIR/feature-gate-sanitizer-runtime.rs:1:1
|
||||
|
|
||||
LL | #![sanitizer_runtime]
|
||||
| ^^^^^^^^^^^^^^^^^^^^^
|
||||
|
|
||||
= help: add `#![feature(sanitizer_runtime)]` to the crate attributes to enable
|
||||
|
||||
error: aborting due to previous error
|
||||
|
||||
For more information about this error, try `rustc --explain E0658`.
|
Loading…
Add table
Add a link
Reference in a new issue