1
Fork 0

Remove sanitizer_runtime attribute

This commit is contained in:
Tomasz Miąsko 2019-10-07 00:00:00 +00:00
parent 78e7eeeaa1
commit 36d0812570
13 changed files with 2 additions and 43 deletions

View file

@ -1,5 +0,0 @@
# `sanitizer_runtime_lib`
This feature is internal to the Rust compiler and is not intended for general use.
------------------------

View file

@ -686,10 +686,6 @@ rustc_queries! {
fatal_cycle
desc { "checking if the crate has_panic_handler" }
}
query is_sanitizer_runtime(_: CrateNum) -> bool {
fatal_cycle
desc { "query a crate is `#![sanitizer_runtime]`" }
}
query is_profiler_runtime(_: CrateNum) -> bool {
fatal_cycle
desc { "query a crate is `#![profiler_runtime]`" }

View file

@ -723,7 +723,6 @@ impl CrateInfo {
panic_runtime: None,
compiler_builtins: None,
profiler_runtime: None,
sanitizer_runtime: None,
is_no_builtins: Default::default(),
native_libraries: Default::default(),
used_libraries: tcx.native_libraries(LOCAL_CRATE),
@ -759,9 +758,6 @@ impl CrateInfo {
if tcx.is_profiler_runtime(cnum) {
info.profiler_runtime = Some(cnum);
}
if tcx.is_sanitizer_runtime(cnum) {
info.sanitizer_runtime = Some(cnum);
}
if tcx.is_no_builtins(cnum) {
info.is_no_builtins.insert(cnum);
}

View file

@ -122,7 +122,6 @@ pub struct CrateInfo {
pub panic_runtime: Option<CrateNum>,
pub compiler_builtins: Option<CrateNum>,
pub profiler_runtime: Option<CrateNum>,
pub sanitizer_runtime: Option<CrateNum>,
pub is_no_builtins: FxHashSet<CrateNum>,
pub native_libraries: FxHashMap<CrateNum, Lrc<Vec<NativeLibrary>>>,
pub crate_name: FxHashMap<CrateNum, String>,

View file

@ -192,9 +192,6 @@ declare_features! (
/// Allows using the `unadjusted` ABI; perma-unstable.
(active, abi_unadjusted, "1.16.0", None, None),
/// Allows identifying crates that contain sanitizer runtimes.
(active, sanitizer_runtime, "1.17.0", None, None),
/// Used to identify crates that contain the profiler runtime.
(active, profiler_runtime, "1.18.0", None, None),

View file

@ -409,11 +409,6 @@ pub const BUILTIN_ATTRIBUTES: &[BuiltinAttribute] = &[
"the `#[compiler_builtins]` attribute is used to identify the `compiler_builtins` crate \
which contains compiler-rt intrinsics and will never be stable",
),
gated!(
sanitizer_runtime, Whitelisted, template!(Word),
"the `#[sanitizer_runtime]` attribute is used to identify crates that contain the runtime \
of a sanitizer and will never be stable",
),
gated!(
profiler_runtime, Whitelisted, template!(Word),
"the `#[profiler_runtime]` attribute is used to identify the `profiler_builtins` crate \

View file

@ -74,6 +74,8 @@ declare_features! (
(removed, pushpop_unsafe, "1.2.0", None, None, None),
(removed, needs_allocator, "1.4.0", Some(27389), None,
Some("subsumed by `#![feature(allocator_internals)]`")),
/// Allows identifying crates that contain sanitizer runtimes.
(removed, sanitizer_runtime, "1.17.0", None, None, None),
(removed, proc_macro_mod, "1.27.0", Some(54727), None,
Some("subsumed by `#![feature(proc_macro_hygiene)]`")),
(removed, proc_macro_expr, "1.27.0", Some(54727), None,

View file

@ -1587,10 +1587,6 @@ impl<'a, 'tcx> CrateMetadata {
self.root.panic_runtime
}
crate fn is_sanitizer_runtime(&self) -> bool {
self.root.sanitizer_runtime
}
crate fn is_profiler_runtime(&self) -> bool {
self.root.profiler_runtime
}

View file

@ -161,7 +161,6 @@ provide! { <'tcx> tcx, def_id, other, cdata,
is_compiler_builtins => { cdata.root.compiler_builtins }
has_global_allocator => { cdata.root.has_global_allocator }
has_panic_handler => { cdata.root.has_panic_handler }
is_sanitizer_runtime => { cdata.root.sanitizer_runtime }
is_profiler_runtime => { cdata.root.profiler_runtime }
panic_strategy => { cdata.root.panic_strategy }
extern_crate => {

View file

@ -514,7 +514,6 @@ impl<'tcx> EncodeContext<'tcx> {
no_builtins: attr::contains_name(&attrs, sym::no_builtins),
panic_runtime: attr::contains_name(&attrs, sym::panic_runtime),
profiler_runtime: attr::contains_name(&attrs, sym::profiler_runtime),
sanitizer_runtime: attr::contains_name(&attrs, sym::sanitizer_runtime),
symbol_mangling_version: tcx.sess.opts.debugging_opts.symbol_mangling_version,
crate_deps,

View file

@ -209,7 +209,6 @@ crate struct CrateRoot<'tcx> {
no_builtins: bool,
panic_runtime: bool,
profiler_runtime: bool,
sanitizer_runtime: bool,
symbol_mangling_version: SymbolManglingVersion,
}

View file

@ -1,3 +0,0 @@
#![sanitizer_runtime] //~ ERROR the `#[sanitizer_runtime]` attribute is
fn main() {}

View file

@ -1,11 +0,0 @@
error[E0658]: the `#[sanitizer_runtime]` attribute is used to identify crates that contain the runtime of a sanitizer and will never be stable
--> $DIR/feature-gate-sanitizer-runtime.rs:1:1
|
LL | #![sanitizer_runtime]
| ^^^^^^^^^^^^^^^^^^^^^
|
= help: add `#![feature(sanitizer_runtime)]` to the crate attributes to enable
error: aborting due to previous error
For more information about this error, try `rustc --explain E0658`.