diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.rs b/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.rs index a9efe17fddfa..a8494eaf0aa4 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.rs +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.rs @@ -2,7 +2,7 @@ //@[tree]compile-flags: -Zmiri-tree-borrows use std::mem; -pub fn safe(x: &mut i32, y: &mut i32) { +fn safe(x: &mut i32, y: &mut i32) { //~[stack]^ ERROR: protect *x = 1; //~[tree] ERROR: /write access through .* is forbidden/ *y = 2; diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.stack.stderr b/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.stack.stderr index b7fdc7bc414e..196eaeb3fb6c 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.stack.stderr +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.stack.stderr @@ -1,8 +1,8 @@ error: Undefined Behavior: not granting access to tag because that would remove [Unique for ] which is strongly protected --> tests/fail/both_borrows/aliasing_mut1.rs:LL:CC | -LL | pub fn safe(x: &mut i32, y: &mut i32) { - | ^ Undefined Behavior occurred here +LL | fn safe(x: &mut i32, y: &mut i32) { + | ^ Undefined Behavior occurred here | = help: this indicates a potential bug in the program: it performed an invalid operation, but the Stacked Borrows rules it violated are still experimental = help: see https://github.com/rust-lang/unsafe-code-guidelines/blob/master/wip/stacked-borrows.md for further information @@ -14,8 +14,8 @@ LL | let xraw: *mut i32 = unsafe { mem::transmute(&mut x) }; help: is this argument --> tests/fail/both_borrows/aliasing_mut1.rs:LL:CC | -LL | pub fn safe(x: &mut i32, y: &mut i32) { - | ^ +LL | fn safe(x: &mut i32, y: &mut i32) { + | ^ = note: BACKTRACE (of the first span): = note: inside `safe` at tests/fail/both_borrows/aliasing_mut1.rs:LL:CC note: inside `main` diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.tree.stderr b/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.tree.stderr index 207ed3131af3..b9e6e2547806 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.tree.stderr +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut1.tree.stderr @@ -10,13 +10,13 @@ LL | *x = 1; help: the accessed tag was created here, in the initial state Reserved --> tests/fail/both_borrows/aliasing_mut1.rs:LL:CC | -LL | pub fn safe(x: &mut i32, y: &mut i32) { - | ^ +LL | fn safe(x: &mut i32, y: &mut i32) { + | ^ help: the accessed tag later transitioned to Reserved (conflicted) due to a reborrow (acting as a foreign read access) at offsets [0x0..0x4] --> tests/fail/both_borrows/aliasing_mut1.rs:LL:CC | -LL | pub fn safe(x: &mut i32, y: &mut i32) { - | ^ +LL | fn safe(x: &mut i32, y: &mut i32) { + | ^ = help: this transition corresponds to a temporary loss of write permissions until function exit = note: BACKTRACE (of the first span): = note: inside `safe` at tests/fail/both_borrows/aliasing_mut1.rs:LL:CC diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.rs b/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.rs index 74ea2b28627c..c1320a25cafa 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.rs +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.rs @@ -2,7 +2,7 @@ //@[tree]compile-flags: -Zmiri-tree-borrows use std::mem; -pub fn safe(x: &i32, y: &mut i32) { +fn safe(x: &i32, y: &mut i32) { //~[stack]^ ERROR: protect let _v = *x; *y = 2; //~[tree] ERROR: /write access through .* is forbidden/ diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.stack.stderr b/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.stack.stderr index a13cbec66552..e70e5b10793c 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.stack.stderr +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.stack.stderr @@ -1,8 +1,8 @@ error: Undefined Behavior: not granting access to tag because that would remove [SharedReadOnly for ] which is strongly protected --> tests/fail/both_borrows/aliasing_mut2.rs:LL:CC | -LL | pub fn safe(x: &i32, y: &mut i32) { - | ^ Undefined Behavior occurred here +LL | fn safe(x: &i32, y: &mut i32) { + | ^ Undefined Behavior occurred here | = help: this indicates a potential bug in the program: it performed an invalid operation, but the Stacked Borrows rules it violated are still experimental = help: see https://github.com/rust-lang/unsafe-code-guidelines/blob/master/wip/stacked-borrows.md for further information @@ -14,8 +14,8 @@ LL | let xref = &mut x; help: is this argument --> tests/fail/both_borrows/aliasing_mut2.rs:LL:CC | -LL | pub fn safe(x: &i32, y: &mut i32) { - | ^ +LL | fn safe(x: &i32, y: &mut i32) { + | ^ = note: BACKTRACE (of the first span): = note: inside `safe` at tests/fail/both_borrows/aliasing_mut2.rs:LL:CC note: inside `main` diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.tree.stderr b/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.tree.stderr index 90b1b1294c7f..aed59b21f137 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.tree.stderr +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut2.tree.stderr @@ -10,8 +10,8 @@ LL | *y = 2; help: the accessed tag was created here, in the initial state Reserved --> tests/fail/both_borrows/aliasing_mut2.rs:LL:CC | -LL | pub fn safe(x: &i32, y: &mut i32) { - | ^ +LL | fn safe(x: &i32, y: &mut i32) { + | ^ help: the accessed tag later transitioned to Reserved (conflicted) due to a foreign read access at offsets [0x0..0x4] --> tests/fail/both_borrows/aliasing_mut2.rs:LL:CC | diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.rs b/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.rs index 8cb60faf2d07..555e4478224c 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.rs +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.rs @@ -2,7 +2,7 @@ //@[tree]compile-flags: -Zmiri-tree-borrows use std::mem; -pub fn safe(x: &mut i32, y: &i32) { +fn safe(x: &mut i32, y: &i32) { //~[stack]^ ERROR: borrow stack *x = 1; //~[tree] ERROR: /write access through .* is forbidden/ let _v = *y; diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.stack.stderr b/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.stack.stderr index 0e9382be2e8f..9980d14e1054 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.stack.stderr +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.stack.stderr @@ -1,8 +1,8 @@ error: Undefined Behavior: trying to retag from for SharedReadOnly permission at ALLOC[0x0], but that tag does not exist in the borrow stack for this location --> tests/fail/both_borrows/aliasing_mut3.rs:LL:CC | -LL | pub fn safe(x: &mut i32, y: &i32) { - | ^ this error occurs as part of function-entry retag at ALLOC[0x0..0x4] +LL | fn safe(x: &mut i32, y: &i32) { + | ^ this error occurs as part of function-entry retag at ALLOC[0x0..0x4] | = help: this indicates a potential bug in the program: it performed an invalid operation, but the Stacked Borrows rules it violated are still experimental = help: see https://github.com/rust-lang/unsafe-code-guidelines/blob/master/wip/stacked-borrows.md for further information diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.tree.stderr b/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.tree.stderr index 73a502764638..357d7d220192 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.tree.stderr +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut3.tree.stderr @@ -10,13 +10,13 @@ LL | *x = 1; help: the accessed tag was created here, in the initial state Reserved --> tests/fail/both_borrows/aliasing_mut3.rs:LL:CC | -LL | pub fn safe(x: &mut i32, y: &i32) { - | ^ +LL | fn safe(x: &mut i32, y: &i32) { + | ^ help: the accessed tag later transitioned to Reserved (conflicted) due to a reborrow (acting as a foreign read access) at offsets [0x0..0x4] --> tests/fail/both_borrows/aliasing_mut3.rs:LL:CC | -LL | pub fn safe(x: &mut i32, y: &i32) { - | ^ +LL | fn safe(x: &mut i32, y: &i32) { + | ^ = help: this transition corresponds to a temporary loss of write permissions until function exit = note: BACKTRACE (of the first span): = note: inside `safe` at tests/fail/both_borrows/aliasing_mut3.rs:LL:CC diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.rs b/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.rs index c656a5096445..22484972f4d1 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.rs +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.rs @@ -5,7 +5,7 @@ use std::cell::Cell; use std::mem; // Make sure &mut UnsafeCell also is exclusive -pub fn safe(x: &i32, y: &mut Cell) { +fn safe(x: &i32, y: &mut Cell) { //~[stack]^ ERROR: protect y.set(1); let _load = *x; diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.stack.stderr b/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.stack.stderr index c5ad269b39ac..eb2514df588a 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.stack.stderr +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.stack.stderr @@ -1,8 +1,8 @@ error: Undefined Behavior: not granting access to tag because that would remove [SharedReadOnly for ] which is strongly protected --> tests/fail/both_borrows/aliasing_mut4.rs:LL:CC | -LL | pub fn safe(x: &i32, y: &mut Cell) { - | ^ Undefined Behavior occurred here +LL | fn safe(x: &i32, y: &mut Cell) { + | ^ Undefined Behavior occurred here | = help: this indicates a potential bug in the program: it performed an invalid operation, but the Stacked Borrows rules it violated are still experimental = help: see https://github.com/rust-lang/unsafe-code-guidelines/blob/master/wip/stacked-borrows.md for further information @@ -14,8 +14,8 @@ LL | let xref = &mut x; help: is this argument --> tests/fail/both_borrows/aliasing_mut4.rs:LL:CC | -LL | pub fn safe(x: &i32, y: &mut Cell) { - | ^ +LL | fn safe(x: &i32, y: &mut Cell) { + | ^ = note: BACKTRACE (of the first span): = note: inside `safe` at tests/fail/both_borrows/aliasing_mut4.rs:LL:CC note: inside `main` diff --git a/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.tree.stderr b/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.tree.stderr index a6a6da3fa2ae..c06ae0e92138 100644 --- a/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.tree.stderr +++ b/src/tools/miri/tests/fail/both_borrows/aliasing_mut4.tree.stderr @@ -17,8 +17,8 @@ LL | y.set(1); help: the protected tag was created here, in the initial state Frozen --> tests/fail/both_borrows/aliasing_mut4.rs:LL:CC | -LL | pub fn safe(x: &i32, y: &mut Cell) { - | ^ +LL | fn safe(x: &i32, y: &mut Cell) { + | ^ = note: BACKTRACE (of the first span): = note: inside `std::mem::replace::` at RUSTLIB/core/src/mem/mod.rs:LL:CC = note: inside `std::cell::Cell::::replace` at RUSTLIB/core/src/cell.rs:LL:CC diff --git a/src/tools/miri/tests/fail/data_race/alloc_read_race.rs b/src/tools/miri/tests/fail/data_race/alloc_read_race.rs index 7c5116989943..65622b7f7783 100644 --- a/src/tools/miri/tests/fail/data_race/alloc_read_race.rs +++ b/src/tools/miri/tests/fail/data_race/alloc_read_race.rs @@ -12,7 +12,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { // Shared atomic pointer let pointer = AtomicPtr::new(null_mut::>()); let ptr = EvilSend(&pointer as *const AtomicPtr>); diff --git a/src/tools/miri/tests/fail/data_race/alloc_write_race.rs b/src/tools/miri/tests/fail/data_race/alloc_write_race.rs index ba8a888de9ea..a07d284c6c8c 100644 --- a/src/tools/miri/tests/fail/data_race/alloc_write_race.rs +++ b/src/tools/miri/tests/fail/data_race/alloc_write_race.rs @@ -11,7 +11,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { // Shared atomic pointer let pointer = AtomicPtr::new(null_mut::()); let ptr = EvilSend(&pointer as *const AtomicPtr); diff --git a/src/tools/miri/tests/fail/data_race/atomic_read_na_write_race1.rs b/src/tools/miri/tests/fail/data_race/atomic_read_na_write_race1.rs index 8cce54603ce5..90fd535f1cb6 100644 --- a/src/tools/miri/tests/fail/data_race/atomic_read_na_write_race1.rs +++ b/src/tools/miri/tests/fail/data_race/atomic_read_na_write_race1.rs @@ -10,7 +10,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { let mut a = AtomicUsize::new(0); let b = &mut a as *mut AtomicUsize; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/atomic_read_na_write_race2.rs b/src/tools/miri/tests/fail/data_race/atomic_read_na_write_race2.rs index b6c0ef37cb92..8c59713010af 100644 --- a/src/tools/miri/tests/fail/data_race/atomic_read_na_write_race2.rs +++ b/src/tools/miri/tests/fail/data_race/atomic_read_na_write_race2.rs @@ -10,7 +10,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { let mut a = AtomicUsize::new(0); let b = &mut a as *mut AtomicUsize; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/atomic_write_na_read_race1.rs b/src/tools/miri/tests/fail/data_race/atomic_write_na_read_race1.rs index 03ae6895c574..95b216a6fe64 100644 --- a/src/tools/miri/tests/fail/data_race/atomic_write_na_read_race1.rs +++ b/src/tools/miri/tests/fail/data_race/atomic_write_na_read_race1.rs @@ -10,7 +10,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { let mut a = AtomicUsize::new(0); let b = &mut a as *mut AtomicUsize; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/atomic_write_na_read_race2.rs b/src/tools/miri/tests/fail/data_race/atomic_write_na_read_race2.rs index 4a5edf5cc14d..c4714e632c3b 100644 --- a/src/tools/miri/tests/fail/data_race/atomic_write_na_read_race2.rs +++ b/src/tools/miri/tests/fail/data_race/atomic_write_na_read_race2.rs @@ -10,7 +10,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { let mut a = AtomicUsize::new(0); let b = &mut a as *mut AtomicUsize; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/atomic_write_na_write_race1.rs b/src/tools/miri/tests/fail/data_race/atomic_write_na_write_race1.rs index e8d930a51dee..3ef60074fd43 100644 --- a/src/tools/miri/tests/fail/data_race/atomic_write_na_write_race1.rs +++ b/src/tools/miri/tests/fail/data_race/atomic_write_na_write_race1.rs @@ -10,7 +10,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { let mut a = AtomicUsize::new(0); let b = &mut a as *mut AtomicUsize; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/atomic_write_na_write_race2.rs b/src/tools/miri/tests/fail/data_race/atomic_write_na_write_race2.rs index 4c67d2d76541..b704468165a4 100644 --- a/src/tools/miri/tests/fail/data_race/atomic_write_na_write_race2.rs +++ b/src/tools/miri/tests/fail/data_race/atomic_write_na_write_race2.rs @@ -10,7 +10,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { let mut a = AtomicUsize::new(0); let b = &mut a as *mut AtomicUsize; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/dealloc_read_race1.rs b/src/tools/miri/tests/fail/data_race/dealloc_read_race1.rs index 999cc2392f5a..64bababe0c85 100644 --- a/src/tools/miri/tests/fail/data_race/dealloc_read_race1.rs +++ b/src/tools/miri/tests/fail/data_race/dealloc_read_race1.rs @@ -16,7 +16,7 @@ extern "Rust" { fn __rust_dealloc(ptr: *mut u8, size: usize, align: usize); } -pub fn main() { +fn main() { // Shared atomic pointer let pointer: *mut usize = Box::into_raw(Box::new(0usize)); let ptr = EvilSend(pointer); diff --git a/src/tools/miri/tests/fail/data_race/dealloc_read_race2.rs b/src/tools/miri/tests/fail/data_race/dealloc_read_race2.rs index bd3b037e5838..6e85bcf03aa5 100644 --- a/src/tools/miri/tests/fail/data_race/dealloc_read_race2.rs +++ b/src/tools/miri/tests/fail/data_race/dealloc_read_race2.rs @@ -16,7 +16,7 @@ extern "Rust" { fn __rust_dealloc(ptr: *mut u8, size: usize, align: usize); } -pub fn main() { +fn main() { // Shared atomic pointer let pointer: *mut usize = Box::into_raw(Box::new(0usize)); let ptr = EvilSend(pointer); diff --git a/src/tools/miri/tests/fail/data_race/dealloc_read_race_stack.rs b/src/tools/miri/tests/fail/data_race/dealloc_read_race_stack.rs index e3d06660aab3..76c26da05782 100644 --- a/src/tools/miri/tests/fail/data_race/dealloc_read_race_stack.rs +++ b/src/tools/miri/tests/fail/data_race/dealloc_read_race_stack.rs @@ -12,7 +12,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { // Shared atomic pointer let pointer = AtomicPtr::new(null_mut::()); let ptr = EvilSend(&pointer as *const AtomicPtr); diff --git a/src/tools/miri/tests/fail/data_race/dealloc_write_race1.rs b/src/tools/miri/tests/fail/data_race/dealloc_write_race1.rs index 90e87f8c4956..fd71ef09b125 100644 --- a/src/tools/miri/tests/fail/data_race/dealloc_write_race1.rs +++ b/src/tools/miri/tests/fail/data_race/dealloc_write_race1.rs @@ -15,7 +15,7 @@ extern "Rust" { #[rustc_std_internal_symbol] fn __rust_dealloc(ptr: *mut u8, size: usize, align: usize); } -pub fn main() { +fn main() { // Shared atomic pointer let pointer: *mut usize = Box::into_raw(Box::new(0usize)); let ptr = EvilSend(pointer); diff --git a/src/tools/miri/tests/fail/data_race/dealloc_write_race2.rs b/src/tools/miri/tests/fail/data_race/dealloc_write_race2.rs index d9b1af80af49..5c8bbc14a492 100644 --- a/src/tools/miri/tests/fail/data_race/dealloc_write_race2.rs +++ b/src/tools/miri/tests/fail/data_race/dealloc_write_race2.rs @@ -15,7 +15,7 @@ extern "Rust" { #[rustc_std_internal_symbol] fn __rust_dealloc(ptr: *mut u8, size: usize, align: usize); } -pub fn main() { +fn main() { // Shared atomic pointer let pointer: *mut usize = Box::into_raw(Box::new(0usize)); let ptr = EvilSend(pointer); diff --git a/src/tools/miri/tests/fail/data_race/dealloc_write_race_stack.rs b/src/tools/miri/tests/fail/data_race/dealloc_write_race_stack.rs index c1ab1942c688..bdc25100abaf 100644 --- a/src/tools/miri/tests/fail/data_race/dealloc_write_race_stack.rs +++ b/src/tools/miri/tests/fail/data_race/dealloc_write_race_stack.rs @@ -12,7 +12,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { // Shared atomic pointer let pointer = AtomicPtr::new(null_mut::()); let ptr = EvilSend(&pointer as *const AtomicPtr); diff --git a/src/tools/miri/tests/fail/data_race/enable_after_join_to_main.rs b/src/tools/miri/tests/fail/data_race/enable_after_join_to_main.rs index 67af6862737d..4d716f7db6fd 100644 --- a/src/tools/miri/tests/fail/data_race/enable_after_join_to_main.rs +++ b/src/tools/miri/tests/fail/data_race/enable_after_join_to_main.rs @@ -9,7 +9,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { // Enable and then join with multiple threads. let t1 = spawn(|| ()); let t2 = spawn(|| ()); diff --git a/src/tools/miri/tests/fail/data_race/read_write_race.rs b/src/tools/miri/tests/fail/data_race/read_write_race.rs index 2aadef36c5b9..e7961a4d849c 100644 --- a/src/tools/miri/tests/fail/data_race/read_write_race.rs +++ b/src/tools/miri/tests/fail/data_race/read_write_race.rs @@ -9,7 +9,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { let mut a = 0u32; let b = &mut a as *mut u32; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/read_write_race_stack.rs b/src/tools/miri/tests/fail/data_race/read_write_race_stack.rs index cca39bb002c1..4555a82df6c9 100644 --- a/src/tools/miri/tests/fail/data_race/read_write_race_stack.rs +++ b/src/tools/miri/tests/fail/data_race/read_write_race_stack.rs @@ -12,7 +12,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { // Shared atomic pointer let pointer = AtomicPtr::new(null_mut::()); let ptr = EvilSend(&pointer as *const AtomicPtr); diff --git a/src/tools/miri/tests/fail/data_race/relax_acquire_race.rs b/src/tools/miri/tests/fail/data_race/relax_acquire_race.rs index 262c039e4ae1..67e1d65126fa 100644 --- a/src/tools/miri/tests/fail/data_race/relax_acquire_race.rs +++ b/src/tools/miri/tests/fail/data_race/relax_acquire_race.rs @@ -12,7 +12,7 @@ unsafe impl Sync for EvilSend {} static SYNC: AtomicUsize = AtomicUsize::new(0); -pub fn main() { +fn main() { let mut a = 0u32; let b = &mut a as *mut u32; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/release_seq_race.rs b/src/tools/miri/tests/fail/data_race/release_seq_race.rs index 8aeb6ee6ef1d..5016617e5d7f 100644 --- a/src/tools/miri/tests/fail/data_race/release_seq_race.rs +++ b/src/tools/miri/tests/fail/data_race/release_seq_race.rs @@ -13,7 +13,7 @@ unsafe impl Sync for EvilSend {} static SYNC: AtomicUsize = AtomicUsize::new(0); -pub fn main() { +fn main() { let mut a = 0u32; let b = &mut a as *mut u32; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/release_seq_race_same_thread.rs b/src/tools/miri/tests/fail/data_race/release_seq_race_same_thread.rs index f465160718f4..ae6a6154e3c6 100644 --- a/src/tools/miri/tests/fail/data_race/release_seq_race_same_thread.rs +++ b/src/tools/miri/tests/fail/data_race/release_seq_race_same_thread.rs @@ -12,7 +12,7 @@ unsafe impl Sync for EvilSend {} static SYNC: AtomicUsize = AtomicUsize::new(0); -pub fn main() { +fn main() { let mut a = 0u32; let b = &mut a as *mut u32; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/rmw_race.rs b/src/tools/miri/tests/fail/data_race/rmw_race.rs index 39588c15ec7e..51fddbd68472 100644 --- a/src/tools/miri/tests/fail/data_race/rmw_race.rs +++ b/src/tools/miri/tests/fail/data_race/rmw_race.rs @@ -12,7 +12,7 @@ unsafe impl Sync for EvilSend {} static SYNC: AtomicUsize = AtomicUsize::new(0); -pub fn main() { +fn main() { let mut a = 0u32; let b = &mut a as *mut u32; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/write_write_race.rs b/src/tools/miri/tests/fail/data_race/write_write_race.rs index b1a6b08b4c88..2070c43b7cff 100644 --- a/src/tools/miri/tests/fail/data_race/write_write_race.rs +++ b/src/tools/miri/tests/fail/data_race/write_write_race.rs @@ -9,7 +9,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { let mut a = 0u32; let b = &mut a as *mut u32; let c = EvilSend(b); diff --git a/src/tools/miri/tests/fail/data_race/write_write_race_stack.rs b/src/tools/miri/tests/fail/data_race/write_write_race_stack.rs index cd21b0a8fa6c..b92d17bf8bcd 100644 --- a/src/tools/miri/tests/fail/data_race/write_write_race_stack.rs +++ b/src/tools/miri/tests/fail/data_race/write_write_race_stack.rs @@ -12,7 +12,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { // Shared atomic pointer let pointer = AtomicPtr::new(null_mut::()); let ptr = EvilSend(&pointer as *const AtomicPtr); diff --git a/src/tools/miri/tests/fail/enum-set-discriminant-niche-variant-wrong.rs b/src/tools/miri/tests/fail/enum-set-discriminant-niche-variant-wrong.rs index eca6d908b448..221ea106538e 100644 --- a/src/tools/miri/tests/fail/enum-set-discriminant-niche-variant-wrong.rs +++ b/src/tools/miri/tests/fail/enum-set-discriminant-niche-variant-wrong.rs @@ -25,7 +25,7 @@ fn set_discriminant(ptr: &mut Option>) { } } -pub fn main() { +fn main() { let mut v = None; set_discriminant(&mut v); } diff --git a/src/tools/miri/tests/fail/function_calls/arg_inplace_locals_alias.rs b/src/tools/miri/tests/fail/function_calls/arg_inplace_locals_alias.rs index 744d64b9b1e8..8858658eddbf 100644 --- a/src/tools/miri/tests/fail/function_calls/arg_inplace_locals_alias.rs +++ b/src/tools/miri/tests/fail/function_calls/arg_inplace_locals_alias.rs @@ -28,7 +28,7 @@ fn main() { } } -pub fn callee(x: S, mut y: S) { +fn callee(x: S, mut y: S) { // With the setup above, if `x` and `y` are both moved, // then writing to `y` will change the value stored in `x`! y.0 = 0; diff --git a/src/tools/miri/tests/fail/function_calls/arg_inplace_locals_alias_ret.rs b/src/tools/miri/tests/fail/function_calls/arg_inplace_locals_alias_ret.rs index dff724f8d965..3cb8ee2b407c 100644 --- a/src/tools/miri/tests/fail/function_calls/arg_inplace_locals_alias_ret.rs +++ b/src/tools/miri/tests/fail/function_calls/arg_inplace_locals_alias_ret.rs @@ -29,6 +29,6 @@ fn main() { } } -pub fn callee(x: S) -> S { +fn callee(x: S) -> S { x } diff --git a/src/tools/miri/tests/fail/function_calls/arg_inplace_mutate.rs b/src/tools/miri/tests/fail/function_calls/arg_inplace_mutate.rs index 4f7a12ebd2e8..c61083c17a6b 100644 --- a/src/tools/miri/tests/fail/function_calls/arg_inplace_mutate.rs +++ b/src/tools/miri/tests/fail/function_calls/arg_inplace_mutate.rs @@ -22,7 +22,7 @@ fn main() { } } -pub fn callee(x: S, ptr: *mut S) { +fn callee(x: S, ptr: *mut S) { // With the setup above, if `x` is indeed moved in // (i.e. we actually just get a pointer to the underlying storage), // then writing to `ptr` will change the value stored in `x`! diff --git a/src/tools/miri/tests/fail/function_calls/arg_inplace_observe_after.rs b/src/tools/miri/tests/fail/function_calls/arg_inplace_observe_after.rs index 18daf9497a15..d1b8f3eed059 100644 --- a/src/tools/miri/tests/fail/function_calls/arg_inplace_observe_after.rs +++ b/src/tools/miri/tests/fail/function_calls/arg_inplace_observe_after.rs @@ -22,6 +22,6 @@ fn main() { } } -pub fn change_arg(mut x: S) { +fn change_arg(mut x: S) { x.0 = 0; } diff --git a/src/tools/miri/tests/fail/function_calls/arg_inplace_observe_during.rs b/src/tools/miri/tests/fail/function_calls/arg_inplace_observe_during.rs index 2201bf17bfc7..97c5cb75893e 100644 --- a/src/tools/miri/tests/fail/function_calls/arg_inplace_observe_during.rs +++ b/src/tools/miri/tests/fail/function_calls/arg_inplace_observe_during.rs @@ -23,7 +23,7 @@ fn main() { } } -pub fn change_arg(mut x: S, ptr: *mut S) { +fn change_arg(mut x: S, ptr: *mut S) { x.0 = 0; // If `x` got passed in-place, we'd see the write through `ptr`! // Make sure we are not allowed to do that read. diff --git a/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_read.rs b/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_read.rs index dc22e129e18a..d981286a141a 100644 --- a/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_read.rs +++ b/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_read.rs @@ -7,7 +7,7 @@ use std::intrinsics::mir::*; #[custom_mir(dialect = "runtime", phase = "optimized")] -pub fn main() { +fn main() { mir! { { let _x = 0; diff --git a/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_write.rs b/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_write.rs index 2fddaf37235b..a4e48b0aac6f 100644 --- a/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_write.rs +++ b/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_write.rs @@ -7,7 +7,7 @@ use std::intrinsics::mir::*; #[custom_mir(dialect = "runtime", phase = "optimized")] -pub fn main() { +fn main() { mir! { { let _x = 0; diff --git a/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_write_tail_call.rs b/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_write_tail_call.rs index 5f3ecb650227..3390ddad9b85 100644 --- a/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_write_tail_call.rs +++ b/src/tools/miri/tests/fail/function_calls/return_pointer_aliasing_write_tail_call.rs @@ -9,7 +9,7 @@ use std::intrinsics::mir::*; #[custom_mir(dialect = "runtime", phase = "optimized")] -pub fn main() { +fn main() { mir! { { let _x = 0; diff --git a/src/tools/miri/tests/fail/function_calls/simd_feature_flag_difference.rs b/src/tools/miri/tests/fail/function_calls/simd_feature_flag_difference.rs index 200f1062a3e8..0dd5d09abdea 100644 --- a/src/tools/miri/tests/fail/function_calls/simd_feature_flag_difference.rs +++ b/src/tools/miri/tests/fail/function_calls/simd_feature_flag_difference.rs @@ -9,7 +9,7 @@ pub unsafe extern "C" fn foo(_y: f32, x: __m256) -> __m256 { x } -pub fn bar(x: __m256) -> __m256 { +fn bar(x: __m256) -> __m256 { // The first and second argument get mixed up here since caller // and callee do not have the same feature flags. // In Miri, we don't have a concept of "dynamically available feature flags", diff --git a/src/tools/miri/tests/fail/intrinsics/ctlz_nonzero.rs b/src/tools/miri/tests/fail/intrinsics/ctlz_nonzero.rs index 3da54b918826..8ea029190276 100644 --- a/src/tools/miri/tests/fail/intrinsics/ctlz_nonzero.rs +++ b/src/tools/miri/tests/fail/intrinsics/ctlz_nonzero.rs @@ -1,6 +1,6 @@ #![feature(core_intrinsics)] -pub fn main() { +fn main() { unsafe { use std::intrinsics::*; diff --git a/src/tools/miri/tests/fail/intrinsics/cttz_nonzero.rs b/src/tools/miri/tests/fail/intrinsics/cttz_nonzero.rs index 2b68f6713d80..471347a752d2 100644 --- a/src/tools/miri/tests/fail/intrinsics/cttz_nonzero.rs +++ b/src/tools/miri/tests/fail/intrinsics/cttz_nonzero.rs @@ -1,6 +1,6 @@ #![feature(core_intrinsics)] -pub fn main() { +fn main() { unsafe { use std::intrinsics::*; diff --git a/src/tools/miri/tests/fail/issue-miri-1112.rs b/src/tools/miri/tests/fail/issue-miri-1112.rs index 387253a3f987..fc21fff9a9f9 100644 --- a/src/tools/miri/tests/fail/issue-miri-1112.rs +++ b/src/tools/miri/tests/fail/issue-miri-1112.rs @@ -11,7 +11,7 @@ pub struct Meta { } impl Meta { - pub fn new() -> Self { + fn new() -> Self { Meta { drop_fn: |_| {}, size: 0, align: 1 } } } diff --git a/src/tools/miri/tests/fail/overlapping_assignment.rs b/src/tools/miri/tests/fail/overlapping_assignment.rs index 84994c179f9e..237d674513f0 100644 --- a/src/tools/miri/tests/fail/overlapping_assignment.rs +++ b/src/tools/miri/tests/fail/overlapping_assignment.rs @@ -7,7 +7,7 @@ use std::intrinsics::mir::*; // which wants to prevent overlapping assignments... // So we use two separate pointer arguments, and then arrange for them to alias. #[custom_mir(dialect = "runtime", phase = "optimized")] -pub fn self_copy(ptr1: *mut [i32; 4], ptr2: *mut [i32; 4]) { +fn self_copy(ptr1: *mut [i32; 4], ptr2: *mut [i32; 4]) { mir! { { *ptr1 = *ptr2; //~ERROR: overlapping ranges @@ -16,7 +16,7 @@ pub fn self_copy(ptr1: *mut [i32; 4], ptr2: *mut [i32; 4]) { } } -pub fn main() { +fn main() { let mut x = [0; 4]; let ptr = std::ptr::addr_of_mut!(x); self_copy(ptr, ptr); diff --git a/src/tools/miri/tests/fail/stacked_borrows/retag_data_race_read.tree.stderr b/src/tools/miri/tests/fail/stacked_borrows/retag_data_race_read.tree.stderr index 675bb01b5e75..e6c1745d321c 100644 --- a/src/tools/miri/tests/fail/stacked_borrows/retag_data_race_read.tree.stderr +++ b/src/tools/miri/tests/fail/stacked_borrows/retag_data_race_read.tree.stderr @@ -16,7 +16,7 @@ LL | panic::catch_unwind(move || unsafe { init(argc, argv, sigpipe) }).map_e help: the protected tag was created here, in the initial state Active --> RUSTLIB/std/src/panic.rs:LL:CC | -LL | pub fn catch_unwind R + UnwindSafe, R>(f: F) -> Result { +LL | fn catch_unwind R + UnwindSafe, R>(f: F) -> Result { | ^ = note: BACKTRACE (of the first span): = note: inside `std::rt::lang_start_internal` at RUSTLIB/std/src/rt.rs:LL:CC diff --git a/src/tools/miri/tests/fail/tls_macro_leak.rs b/src/tools/miri/tests/fail/tls_macro_leak.rs index b8a4b81911ac..1aa161061c02 100644 --- a/src/tools/miri/tests/fail/tls_macro_leak.rs +++ b/src/tools/miri/tests/fail/tls_macro_leak.rs @@ -2,7 +2,7 @@ use std::cell::Cell; -pub fn main() { +fn main() { thread_local! { static TLS: Cell> = Cell::new(None); } diff --git a/src/tools/miri/tests/fail/tls_static_leak.rs b/src/tools/miri/tests/fail/tls_static_leak.rs index 4d5280336377..4e29b3afe3b1 100644 --- a/src/tools/miri/tests/fail/tls_static_leak.rs +++ b/src/tools/miri/tests/fail/tls_static_leak.rs @@ -6,7 +6,7 @@ use std::cell::Cell; /// Ensure that leaks through `thread_local` statics *not in the main thread* /// are detected. -pub fn main() { +fn main() { #[thread_local] static TLS: Cell> = Cell::new(None); diff --git a/src/tools/miri/tests/fail/tree_borrows/alternate-read-write.rs b/src/tools/miri/tests/fail/tree_borrows/alternate-read-write.rs index fee88cf3486a..8d49a3cdbf5f 100644 --- a/src/tools/miri/tests/fail/tree_borrows/alternate-read-write.rs +++ b/src/tools/miri/tests/fail/tree_borrows/alternate-read-write.rs @@ -2,7 +2,7 @@ // Check that TB properly rejects alternating Reads and Writes, but tolerates // alternating only Reads to Reserved mutable references. -pub fn main() { +fn main() { let x = &mut 0u8; let y = unsafe { &mut *(x as *mut u8) }; // Foreign Read, but this is a no-op from the point of view of y (still Reserved) diff --git a/src/tools/miri/tests/fail/tree_borrows/cell-inside-struct.rs b/src/tools/miri/tests/fail/tree_borrows/cell-inside-struct.rs index ff7978776822..1aefa217e2d4 100644 --- a/src/tools/miri/tests/fail/tree_borrows/cell-inside-struct.rs +++ b/src/tools/miri/tests/fail/tree_borrows/cell-inside-struct.rs @@ -11,7 +11,7 @@ struct Foo { field2: Cell, } -pub fn main() { +fn main() { let root = Foo { field1: 42, field2: Cell::new(88) }; unsafe { let a = &root; diff --git a/src/tools/miri/tests/fail/tree_borrows/repeated_foreign_read_lazy_conflicted.rs b/src/tools/miri/tests/fail/tree_borrows/repeated_foreign_read_lazy_conflicted.rs index 36b47a33b181..4f0d97b4a109 100644 --- a/src/tools/miri/tests/fail/tree_borrows/repeated_foreign_read_lazy_conflicted.rs +++ b/src/tools/miri/tests/fail/tree_borrows/repeated_foreign_read_lazy_conflicted.rs @@ -11,7 +11,7 @@ unsafe fn access_after_sub_1(x: &mut u8, orig_ptr: *mut u8) { *(x as *mut u8).byte_sub(1) = 42; //~ ERROR: /write access through .* is forbidden/ } -pub fn main() { +fn main() { unsafe { let mut alloc = [0u8, 0u8]; let orig_ptr = addr_of_mut!(alloc) as *mut u8; diff --git a/src/tools/miri/tests/fail/tree_borrows/write-during-2phase.rs b/src/tools/miri/tests/fail/tree_borrows/write-during-2phase.rs index a2e8a533c43a..ac9b7d7e528e 100644 --- a/src/tools/miri/tests/fail/tree_borrows/write-during-2phase.rs +++ b/src/tools/miri/tests/fail/tree_borrows/write-during-2phase.rs @@ -14,7 +14,7 @@ impl Foo { } } -pub fn main() { +fn main() { let mut f = Foo(0); let alias = &mut f.0 as *mut u64; let res = f.add(unsafe { diff --git a/src/tools/miri/tests/fail/uninit/padding-struct-in-union.rs b/src/tools/miri/tests/fail/uninit/padding-struct-in-union.rs index 132b85828362..8343952a2046 100644 --- a/src/tools/miri/tests/fail/uninit/padding-struct-in-union.rs +++ b/src/tools/miri/tests/fail/uninit/padding-struct-in-union.rs @@ -18,7 +18,7 @@ union FooBar { bar: Bar, } -pub fn main() { +fn main() { // Initialize as u8 to ensure padding bytes are zeroed. let mut foobar = FooBar { bar: Bar { bytes: [0u8; 8] } }; // Reading either field is ok. diff --git a/src/tools/miri/tests/fail/validity/invalid_char_cast.rs b/src/tools/miri/tests/fail/validity/invalid_char_cast.rs index 6a590dc7ba10..94e1a87fba75 100644 --- a/src/tools/miri/tests/fail/validity/invalid_char_cast.rs +++ b/src/tools/miri/tests/fail/validity/invalid_char_cast.rs @@ -15,7 +15,7 @@ fn cast(ptr: *const char) -> u32 { } } -pub fn main() { +fn main() { let v = u32::MAX; cast(&v as *const u32 as *const char); } diff --git a/src/tools/miri/tests/fail/validity/invalid_char_match.rs b/src/tools/miri/tests/fail/validity/invalid_char_match.rs index 6c2e65b2bb74..6ec5768162be 100644 --- a/src/tools/miri/tests/fail/validity/invalid_char_match.rs +++ b/src/tools/miri/tests/fail/validity/invalid_char_match.rs @@ -20,7 +20,7 @@ fn switch_int(ptr: *const char) { } } -pub fn main() { +fn main() { let v = u32::MAX; switch_int(&v as *const u32 as *const char); } diff --git a/src/tools/miri/tests/fail/validity/invalid_enum_cast.rs b/src/tools/miri/tests/fail/validity/invalid_enum_cast.rs index ed451a435b95..ba110ca96d69 100644 --- a/src/tools/miri/tests/fail/validity/invalid_enum_cast.rs +++ b/src/tools/miri/tests/fail/validity/invalid_enum_cast.rs @@ -15,7 +15,7 @@ fn cast(ptr: *const E) { } } -pub fn main() { +fn main() { let v = u32::MAX; cast(&v as *const u32 as *const E); } diff --git a/src/tools/miri/tests/fail/weak_memory/weak_uninit.rs b/src/tools/miri/tests/fail/weak_memory/weak_uninit.rs index b4b4b0849877..7a4e038fabf7 100644 --- a/src/tools/miri/tests/fail/weak_memory/weak_uninit.rs +++ b/src/tools/miri/tests/fail/weak_memory/weak_uninit.rs @@ -34,7 +34,7 @@ fn relaxed() { j2.join().unwrap(); } -pub fn main() { +fn main() { // If we try often enough, we should hit UB. for _ in 0..100 { relaxed(); diff --git a/src/tools/miri/tests/panic/mir-validation.rs b/src/tools/miri/tests/panic/mir-validation.rs index 2d0d530754d8..11c4e395920c 100644 --- a/src/tools/miri/tests/panic/mir-validation.rs +++ b/src/tools/miri/tests/panic/mir-validation.rs @@ -13,7 +13,7 @@ use core::intrinsics::mir::*; #[custom_mir(dialect = "runtime", phase = "optimized")] -pub fn main() { +fn main() { mir! { let x: i32; let tuple: (*mut i32,); diff --git a/src/tools/miri/tests/pass-dep/concurrency/tls_pthread_drop_order.rs b/src/tools/miri/tests/pass-dep/concurrency/tls_pthread_drop_order.rs index b57386000404..df4278002161 100644 --- a/src/tools/miri/tests/pass-dep/concurrency/tls_pthread_drop_order.rs +++ b/src/tools/miri/tests/pass-dep/concurrency/tls_pthread_drop_order.rs @@ -29,7 +29,7 @@ pub unsafe fn set(key: Key, value: *mut u8) { assert_eq!(r, 0); } -pub fn record(r: usize) { +fn record(r: usize) { assert!(r < 10); unsafe { RECORD = RECORD * 10 + r }; } diff --git a/src/tools/miri/tests/pass-dep/foreign-fn-linkname.rs b/src/tools/miri/tests/pass-dep/foreign-fn-linkname.rs index 9f090a4eff5d..afd5bc0d3b56 100644 --- a/src/tools/miri/tests/pass-dep/foreign-fn-linkname.rs +++ b/src/tools/miri/tests/pass-dep/foreign-fn-linkname.rs @@ -14,7 +14,7 @@ fn strlen(str: String) -> usize { unsafe { mlibc::my_strlen(s.as_ptr()) as usize } } -pub fn main() { +fn main() { let len = strlen("Rust".to_string()); assert_eq!(len, 4); } diff --git a/src/tools/miri/tests/pass-dep/regions-mock-trans.rs b/src/tools/miri/tests/pass-dep/regions-mock-trans.rs index 57f1b75f4d52..7defea3c4876 100644 --- a/src/tools/miri/tests/pass-dep/regions-mock-trans.rs +++ b/src/tools/miri/tests/pass-dep/regions-mock-trans.rs @@ -39,7 +39,7 @@ fn f(ccx: &Ccx) { return g(&fcx); } -pub fn main() { +fn main() { let ccx = Ccx { x: 0 }; f(&ccx); } diff --git a/src/tools/miri/tests/pass-dep/wcslen.rs b/src/tools/miri/tests/pass-dep/wcslen.rs index c5c9d9924796..2ec4da79d727 100644 --- a/src/tools/miri/tests/pass-dep/wcslen.rs +++ b/src/tools/miri/tests/pass-dep/wcslen.rs @@ -13,7 +13,7 @@ fn to_c_wchar_t_str(s: &str) -> Vec { r } -pub fn main() { +fn main() { let s = to_c_wchar_t_str("Rust"); let len = unsafe { libc::wcslen(s.as_ptr()) }; assert_eq!(len, 4); diff --git a/src/tools/miri/tests/pass/0weak_memory/consistency.rs b/src/tools/miri/tests/pass/0weak_memory/consistency.rs index 16a38ebd9d4d..83674cca1bde 100644 --- a/src/tools/miri/tests/pass/0weak_memory/consistency.rs +++ b/src/tools/miri/tests/pass/0weak_memory/consistency.rs @@ -212,7 +212,7 @@ fn test_single_thread() { fn test_sync_through_rmw_and_fences() { // Example from https://github.com/llvm/llvm-project/issues/56450#issuecomment-1183695905 #[no_mangle] - pub fn rdmw(storing: &AtomicI32, sync: &AtomicI32, loading: &AtomicI32) -> i32 { + fn rdmw(storing: &AtomicI32, sync: &AtomicI32, loading: &AtomicI32) -> i32 { storing.store(1, Relaxed); fence(Release); sync.fetch_add(0, Relaxed); @@ -245,7 +245,7 @@ fn test_sync_through_rmw_and_fences() { assert_ne!((a, b), (0, 0)); } -pub fn main() { +fn main() { for _ in 0..50 { test_single_thread(); test_mixed_access(); diff --git a/src/tools/miri/tests/pass/0weak_memory/consistency_sc.rs b/src/tools/miri/tests/pass/0weak_memory/consistency_sc.rs index cb8535b8ad74..d92c0d177997 100644 --- a/src/tools/miri/tests/pass/0weak_memory/consistency_sc.rs +++ b/src/tools/miri/tests/pass/0weak_memory/consistency_sc.rs @@ -348,7 +348,7 @@ fn test_sc_relaxed() { assert!(!bad); } -pub fn main() { +fn main() { for _ in 0..32 { test_sc_store_buffering(); test_iriw_sc_rlx(); diff --git a/src/tools/miri/tests/pass/0weak_memory/extra_cpp.rs b/src/tools/miri/tests/pass/0weak_memory/extra_cpp.rs index 94df73080806..6791382f8e0f 100644 --- a/src/tools/miri/tests/pass/0weak_memory/extra_cpp.rs +++ b/src/tools/miri/tests/pass/0weak_memory/extra_cpp.rs @@ -72,7 +72,7 @@ fn from_mut_split() { assert_eq!(x_lo_atomic.load(Relaxed), u16::from_be(0xfafa)); } -pub fn main() { +fn main() { get_mut_write(); from_mut_split(); assign_to_mut(); diff --git a/src/tools/miri/tests/pass/0weak_memory/weak.rs b/src/tools/miri/tests/pass/0weak_memory/weak.rs index 611733d0dac5..e329bbff1aae 100644 --- a/src/tools/miri/tests/pass/0weak_memory/weak.rs +++ b/src/tools/miri/tests/pass/0weak_memory/weak.rs @@ -115,7 +115,7 @@ fn initialization_write(add_fence: bool) { fn faa_replaced_by_load() { check_all_outcomes([true, false], || { // Example from https://github.com/llvm/llvm-project/issues/56450#issuecomment-1183695905 - pub fn rdmw(storing: &AtomicUsize, sync: &AtomicUsize, loading: &AtomicUsize) -> usize { + fn rdmw(storing: &AtomicUsize, sync: &AtomicUsize, loading: &AtomicUsize) -> usize { storing.store(1, Relaxed); fence(Release); // sync.fetch_add(0, Relaxed); @@ -226,7 +226,7 @@ fn old_release_store() { }); } -pub fn main() { +fn main() { relaxed(); seq_cst(); initialization_write(false); diff --git a/src/tools/miri/tests/pass/align_repeat_into_well_aligned_array.rs b/src/tools/miri/tests/pass/align_repeat_into_well_aligned_array.rs index 735251039f77..6f1f28c46da2 100644 --- a/src/tools/miri/tests/pass/align_repeat_into_well_aligned_array.rs +++ b/src/tools/miri/tests/pass/align_repeat_into_well_aligned_array.rs @@ -24,7 +24,7 @@ pub const KEYBYTES: usize = 8 * size_of::(); pub const BLOCKBYTES: usize = 16 * size_of::(); impl Params { - pub fn new() -> Self { + fn new() -> Self { Self { hash_length: OUTBYTES as u8, key_length: 0, diff --git a/src/tools/miri/tests/pass/async-closure-captures.rs b/src/tools/miri/tests/pass/async-closure-captures.rs index ed6b7b205b54..785ff2bc0212 100644 --- a/src/tools/miri/tests/pass/async-closure-captures.rs +++ b/src/tools/miri/tests/pass/async-closure-captures.rs @@ -6,7 +6,7 @@ use std::future::Future; use std::pin::pin; use std::task::*; -pub fn block_on(fut: impl Future) -> T { +fn block_on(fut: impl Future) -> T { let mut fut = pin!(fut); let ctx = &mut Context::from_waker(Waker::noop()); diff --git a/src/tools/miri/tests/pass/async-closure-drop.rs b/src/tools/miri/tests/pass/async-closure-drop.rs index 105aa434b0ad..d1fd92814d95 100644 --- a/src/tools/miri/tests/pass/async-closure-drop.rs +++ b/src/tools/miri/tests/pass/async-closure-drop.rs @@ -4,7 +4,7 @@ use std::future::Future; use std::pin::pin; use std::task::*; -pub fn block_on(fut: impl Future) -> T { +fn block_on(fut: impl Future) -> T { let mut fut = pin!(fut); let ctx = &mut Context::from_waker(Waker::noop()); @@ -29,7 +29,7 @@ impl Drop for DropMe { } } -pub fn main() { +fn main() { block_on(async { let b = DropMe("hello"); let async_closure = async move |a: DropMe| { diff --git a/src/tools/miri/tests/pass/async-closure.rs b/src/tools/miri/tests/pass/async-closure.rs index 4c0fb356f9db..1b38f06eb7cd 100644 --- a/src/tools/miri/tests/pass/async-closure.rs +++ b/src/tools/miri/tests/pass/async-closure.rs @@ -6,7 +6,7 @@ use std::ops::{AsyncFn, AsyncFnMut, AsyncFnOnce}; use std::pin::pin; use std::task::*; -pub fn block_on(fut: impl Future) -> T { +fn block_on(fut: impl Future) -> T { let mut fut = pin!(fut); let ctx = &mut Context::from_waker(Waker::noop()); @@ -38,7 +38,7 @@ async fn call_normal_mut>(f: &mut impl FnMut(i32) -> F) { f(1).await; } -pub fn main() { +fn main() { block_on(async { let b = 2i32; let mut async_closure = async move |a: i32| { diff --git a/src/tools/miri/tests/pass/binops.rs b/src/tools/miri/tests/pass/binops.rs index fcbe6c85b7b8..fa8993c34219 100644 --- a/src/tools/miri/tests/pass/binops.rs +++ b/src/tools/miri/tests/pass/binops.rs @@ -71,7 +71,7 @@ fn test_class() { assert!(q != r); } -pub fn main() { +fn main() { test_nil(); test_bool(); test_ptr(); diff --git a/src/tools/miri/tests/pass/btreemap.rs b/src/tools/miri/tests/pass/btreemap.rs index 7af6d7b5551c..cfd01ce28719 100644 --- a/src/tools/miri/tests/pass/btreemap.rs +++ b/src/tools/miri/tests/pass/btreemap.rs @@ -25,7 +25,7 @@ fn test_all_refs<'a, T: 'a>(dummy: &mut T, iter: impl Iterator } } -pub fn main() { +fn main() { let mut b = BTreeSet::new(); b.insert(Foo::A("\'")); b.insert(Foo::A("/=")); diff --git a/src/tools/miri/tests/pass/calls.rs b/src/tools/miri/tests/pass/calls.rs index 8db3d3590cc1..4f7b27c41c5c 100644 --- a/src/tools/miri/tests/pass/calls.rs +++ b/src/tools/miri/tests/pass/calls.rs @@ -35,7 +35,7 @@ fn const_fn_call() -> i64 { } fn call_return_into_passed_reference() { - pub fn func(v: &mut T, f: fn(&T) -> T) { + fn func(v: &mut T, f: fn(&T) -> T) { // MIR building will introduce a temporary, so this becomes // `let temp = f(v); *v = temp;`. // If this got optimized to `*v = f(v)` on the MIR level we'd have UB diff --git a/src/tools/miri/tests/pass/concurrency/data_race.rs b/src/tools/miri/tests/pass/concurrency/data_race.rs index d5dd1deb2d9d..9c434e433d80 100644 --- a/src/tools/miri/tests/pass/concurrency/data_race.rs +++ b/src/tools/miri/tests/pass/concurrency/data_race.rs @@ -57,7 +57,7 @@ fn test_multiple_reads() { assert_eq!(var, 10); } -pub fn test_rmw_no_block() { +fn test_rmw_no_block() { static SYNC: AtomicUsize = AtomicUsize::new(0); let mut a = 0u32; @@ -89,7 +89,7 @@ pub fn test_rmw_no_block() { } } -pub fn test_simple_release() { +fn test_simple_release() { static SYNC: AtomicUsize = AtomicUsize::new(0); let mut a = 0u32; @@ -214,7 +214,7 @@ fn failing_rmw_is_read() { }); } -pub fn main() { +fn main() { test_fence_sync(); test_multiple_reads(); test_rmw_no_block(); diff --git a/src/tools/miri/tests/pass/concurrency/disable_data_race_detector.rs b/src/tools/miri/tests/pass/concurrency/disable_data_race_detector.rs index ecc4ca59bd18..26c63161b55b 100644 --- a/src/tools/miri/tests/pass/concurrency/disable_data_race_detector.rs +++ b/src/tools/miri/tests/pass/concurrency/disable_data_race_detector.rs @@ -10,7 +10,7 @@ struct EvilSend(pub T); unsafe impl Send for EvilSend {} unsafe impl Sync for EvilSend {} -pub fn main() { +fn main() { let mut a = 0u32; let b = &mut a as *mut u32; let c = EvilSend(b); diff --git a/src/tools/miri/tests/pass/const-vec-of-fns.rs b/src/tools/miri/tests/pass/const-vec-of-fns.rs index 7f0782fe3224..4bed4bb849e2 100644 --- a/src/tools/miri/tests/pass/const-vec-of-fns.rs +++ b/src/tools/miri/tests/pass/const-vec-of-fns.rs @@ -8,7 +8,7 @@ fn f() {} static mut CLOSURES: &'static mut [fn()] = &mut [f as fn(), f as fn()]; -pub fn main() { +fn main() { unsafe { for closure in &mut *CLOSURES { (*closure)() diff --git a/src/tools/miri/tests/pass/drop_type_without_drop_glue.rs b/src/tools/miri/tests/pass/drop_type_without_drop_glue.rs index 2f8665e8d62c..9c4121baa637 100644 --- a/src/tools/miri/tests/pass/drop_type_without_drop_glue.rs +++ b/src/tools/miri/tests/pass/drop_type_without_drop_glue.rs @@ -15,7 +15,7 @@ fn drop_in_place_with_terminator(ptr: *mut i32) { } } -pub fn main() { +fn main() { drop_in_place_with_terminator(std::ptr::without_provenance_mut(0)); drop_in_place_with_terminator(std::ptr::without_provenance_mut(1)); } diff --git a/src/tools/miri/tests/pass/dst-raw.rs b/src/tools/miri/tests/pass/dst-raw.rs index 3d0b843b3da2..7ffef3320e02 100644 --- a/src/tools/miri/tests/pass/dst-raw.rs +++ b/src/tools/miri/tests/pass/dst-raw.rs @@ -19,7 +19,7 @@ struct Foo { f: T, } -pub fn main() { +fn main() { // raw trait object let x = A { f: 42 }; let z: *const dyn Trait = &x; diff --git a/src/tools/miri/tests/pass/dst-struct-sole.rs b/src/tools/miri/tests/pass/dst-struct-sole.rs index 4b25fbb06300..931601bcd954 100644 --- a/src/tools/miri/tests/pass/dst-struct-sole.rs +++ b/src/tools/miri/tests/pass/dst-struct-sole.rs @@ -33,7 +33,7 @@ impl ToBar for Bar { } } -pub fn main() { +fn main() { // With a vec of ints. let f1 = Fat { ptr: [1, 2, 3] }; foo(&f1); diff --git a/src/tools/miri/tests/pass/dst-struct.rs b/src/tools/miri/tests/pass/dst-struct.rs index 59763bbbfdd3..cf92ebfa0445 100644 --- a/src/tools/miri/tests/pass/dst-struct.rs +++ b/src/tools/miri/tests/pass/dst-struct.rs @@ -48,7 +48,7 @@ impl ToBar for Bar { } } -pub fn main() { +fn main() { // With a vec of ints. let f1: Fat<[isize; 3]> = Fat { f1: 5, f2: "some str", ptr: [1, 2, 3] }; foo(&f1); diff --git a/src/tools/miri/tests/pass/enum-nullable-const-null-with-fields.rs b/src/tools/miri/tests/pass/enum-nullable-const-null-with-fields.rs index 86f30f42b629..8a320fcdb4d4 100644 --- a/src/tools/miri/tests/pass/enum-nullable-const-null-with-fields.rs +++ b/src/tools/miri/tests/pass/enum-nullable-const-null-with-fields.rs @@ -3,6 +3,6 @@ static C: Result<(), Box> = Ok(()); // This is because of yet another bad assertion (ICE) about the null side of a nullable enum. // So we won't actually compile if the bug is present, but we check the value in main anyway. -pub fn main() { +fn main() { assert!(C.is_ok()); } diff --git a/src/tools/miri/tests/pass/float.rs b/src/tools/miri/tests/pass/float.rs index 67a14c2b3895..7b23518d73da 100644 --- a/src/tools/miri/tests/pass/float.rs +++ b/src/tools/miri/tests/pass/float.rs @@ -1037,7 +1037,7 @@ fn mul_add() { assert_eq!(f.to_bits(), f32::to_bits(-0.0)); } -pub fn libm() { +fn libm() { fn ldexp(a: f64, b: i32) -> f64 { extern "C" { fn ldexp(x: f64, n: i32) -> f64; @@ -1300,7 +1300,7 @@ fn test_fast() { use std::intrinsics::{fadd_fast, fdiv_fast, fmul_fast, frem_fast, fsub_fast}; #[inline(never)] - pub fn test_operations_f16(a: f16, b: f16) { + fn test_operations_f16(a: f16, b: f16) { // make sure they all map to the correct operation unsafe { assert_approx_eq!(fadd_fast(a, b), a + b); @@ -1312,7 +1312,7 @@ fn test_fast() { } #[inline(never)] - pub fn test_operations_f32(a: f32, b: f32) { + fn test_operations_f32(a: f32, b: f32) { // make sure they all map to the correct operation unsafe { assert_approx_eq!(fadd_fast(a, b), a + b); @@ -1324,7 +1324,7 @@ fn test_fast() { } #[inline(never)] - pub fn test_operations_f64(a: f64, b: f64) { + fn test_operations_f64(a: f64, b: f64) { // make sure they all map to the correct operation unsafe { assert_approx_eq!(fadd_fast(a, b), a + b); @@ -1336,7 +1336,7 @@ fn test_fast() { } #[inline(never)] - pub fn test_operations_f128(a: f128, b: f128) { + fn test_operations_f128(a: f128, b: f128) { // make sure they all map to the correct operation unsafe { assert_approx_eq!(fadd_fast(a, b), a + b); @@ -1363,7 +1363,7 @@ fn test_algebraic() { }; #[inline(never)] - pub fn test_operations_f16(a: f16, b: f16) { + fn test_operations_f16(a: f16, b: f16) { // make sure they all map to the correct operation assert_approx_eq!(fadd_algebraic(a, b), a + b); assert_approx_eq!(fsub_algebraic(a, b), a - b); @@ -1373,7 +1373,7 @@ fn test_algebraic() { } #[inline(never)] - pub fn test_operations_f32(a: f32, b: f32) { + fn test_operations_f32(a: f32, b: f32) { // make sure they all map to the correct operation assert_approx_eq!(fadd_algebraic(a, b), a + b); assert_approx_eq!(fsub_algebraic(a, b), a - b); @@ -1383,7 +1383,7 @@ fn test_algebraic() { } #[inline(never)] - pub fn test_operations_f64(a: f64, b: f64) { + fn test_operations_f64(a: f64, b: f64) { // make sure they all map to the correct operation assert_approx_eq!(fadd_algebraic(a, b), a + b); assert_approx_eq!(fsub_algebraic(a, b), a - b); @@ -1393,7 +1393,7 @@ fn test_algebraic() { } #[inline(never)] - pub fn test_operations_f128(a: f128, b: f128) { + fn test_operations_f128(a: f128, b: f128) { // make sure they all map to the correct operation assert_approx_eq!(fadd_algebraic(a, b), a + b); assert_approx_eq!(fsub_algebraic(a, b), a - b); @@ -1418,12 +1418,12 @@ fn test_fmuladd() { // FIXME(f16_f128): add when supported #[inline(never)] - pub fn test_operations_f32(a: f32, b: f32, c: f32) { + fn test_operations_f32(a: f32, b: f32, c: f32) { assert_approx_eq!(fmuladdf32(a, b, c), a * b + c); } #[inline(never)] - pub fn test_operations_f64(a: f64, b: f64, c: f64) { + fn test_operations_f64(a: f64, b: f64, c: f64) { assert_approx_eq!(fmuladdf64(a, b, c), a * b + c); } @@ -1468,10 +1468,10 @@ fn test_non_determinism() { }; } - pub fn test_operations_f16(a: f16, b: f16) { + fn test_operations_f16(a: f16, b: f16) { test_operations_f!(a, b); } - pub fn test_operations_f32(a: f32, b: f32) { + fn test_operations_f32(a: f32, b: f32) { test_operations_f!(a, b); check_nondet(|| a.powf(b)); check_nondet(|| a.powi(2)); @@ -1507,7 +1507,7 @@ fn test_non_determinism() { check_nondet(|| 5.0f32.erf()); check_nondet(|| 5.0f32.erfc()); } - pub fn test_operations_f64(a: f64, b: f64) { + fn test_operations_f64(a: f64, b: f64) { test_operations_f!(a, b); check_nondet(|| a.powf(b)); check_nondet(|| a.powi(2)); @@ -1538,7 +1538,7 @@ fn test_non_determinism() { check_nondet(|| 5.0f64.erf()); check_nondet(|| 5.0f64.erfc()); } - pub fn test_operations_f128(a: f128, b: f128) { + fn test_operations_f128(a: f128, b: f128) { test_operations_f!(a, b); } diff --git a/src/tools/miri/tests/pass/function_calls/return_place_on_heap.rs b/src/tools/miri/tests/pass/function_calls/return_place_on_heap.rs index 04a55d7007ce..6eee5f21e1bb 100644 --- a/src/tools/miri/tests/pass/function_calls/return_place_on_heap.rs +++ b/src/tools/miri/tests/pass/function_calls/return_place_on_heap.rs @@ -5,7 +5,7 @@ use std::intrinsics::mir::*; // Make sure calls with the return place "on the heap" work. #[custom_mir(dialect = "runtime", phase = "optimized")] -pub fn main() { +fn main() { mir! { { let x = 0; diff --git a/src/tools/miri/tests/pass/integer-ops.rs b/src/tools/miri/tests/pass/integer-ops.rs index 3f8ac34e7d10..1792d16734fd 100644 --- a/src/tools/miri/tests/pass/integer-ops.rs +++ b/src/tools/miri/tests/pass/integer-ops.rs @@ -56,7 +56,7 @@ fn basic() { assert_eq!(match_int_range(), 4); } -pub fn main() { +fn main() { basic(); // This tests that we do (not) do sign extension properly when loading integers diff --git a/src/tools/miri/tests/pass/intrinsics/integer.rs b/src/tools/miri/tests/pass/intrinsics/integer.rs index 8727b6d3c87e..a67c52f7b420 100644 --- a/src/tools/miri/tests/pass/intrinsics/integer.rs +++ b/src/tools/miri/tests/pass/intrinsics/integer.rs @@ -4,7 +4,7 @@ #![feature(core_intrinsics, funnel_shifts)] use std::intrinsics::*; -pub fn main() { +fn main() { unsafe { [assert_eq!(ctpop(0u8), 0), assert_eq!(ctpop(0i8), 0)]; [assert_eq!(ctpop(0u16), 0), assert_eq!(ctpop(0i16), 0)]; diff --git a/src/tools/miri/tests/pass/intrinsics/volatile.rs b/src/tools/miri/tests/pass/intrinsics/volatile.rs index c9799801455c..b72020cb83d2 100644 --- a/src/tools/miri/tests/pass/intrinsics/volatile.rs +++ b/src/tools/miri/tests/pass/intrinsics/volatile.rs @@ -2,7 +2,7 @@ #![feature(core_intrinsics)] use std::intrinsics::{volatile_load, volatile_store}; -pub fn main() { +fn main() { unsafe { let i: &mut (isize, isize) = &mut (0, 0); volatile_store(i, (1, 2)); diff --git a/src/tools/miri/tests/pass/issues/issue-30530.rs b/src/tools/miri/tests/pass/issues/issue-30530.rs index b50a43ffd83b..af338e8032d1 100644 --- a/src/tools/miri/tests/pass/issues/issue-30530.rs +++ b/src/tools/miri/tests/pass/issues/issue-30530.rs @@ -21,7 +21,7 @@ fn main() { } #[inline(never)] -pub fn take(h: Handler, f: Box) -> Box { +fn take(h: Handler, f: Box) -> Box { unsafe { match h { Handler::Custom(ptr) => *Box::from_raw(ptr), diff --git a/src/tools/miri/tests/pass/issues/issue-3794.rs b/src/tools/miri/tests/pass/issues/issue-3794.rs index 860d72bb586f..3cc78b5f99d7 100644 --- a/src/tools/miri/tests/pass/issues/issue-3794.rs +++ b/src/tools/miri/tests/pass/issues/issue-3794.rs @@ -22,7 +22,7 @@ fn print_s(s: &S) { s.print(); } -pub fn main() { +fn main() { let s: Box = Box::new(S { s: 5 }); print_s(&*s); let t: Box = s as Box; diff --git a/src/tools/miri/tests/pass/issues/issue-5917.rs b/src/tools/miri/tests/pass/issues/issue-5917.rs index f7bbb4350e2b..9155c859b050 100644 --- a/src/tools/miri/tests/pass/issues/issue-5917.rs +++ b/src/tools/miri/tests/pass/issues/issue-5917.rs @@ -1,6 +1,6 @@ struct T(&'static [isize]); static STATIC: T = T(&[5, 4, 3]); -pub fn main() { +fn main() { let T(ref v) = STATIC; assert_eq!(v[0], 5); } diff --git a/src/tools/miri/tests/pass/issues/issue-miri-184.rs b/src/tools/miri/tests/pass/issues/issue-miri-184.rs index 964d850298fb..5233b441b990 100644 --- a/src/tools/miri/tests/pass/issues/issue-miri-184.rs +++ b/src/tools/miri/tests/pass/issues/issue-miri-184.rs @@ -1,5 +1,5 @@ #![allow(unnecessary_transmutes)] -pub fn main() { +fn main() { let bytes: [u8; 8] = unsafe { ::std::mem::transmute(0u64) }; let _val: &[u8] = &bytes; } diff --git a/src/tools/miri/tests/pass/issues/issue-miri-2068.rs b/src/tools/miri/tests/pass/issues/issue-miri-2068.rs index 1931b6c9d79f..471031e59ac3 100644 --- a/src/tools/miri/tests/pass/issues/issue-miri-2068.rs +++ b/src/tools/miri/tests/pass/issues/issue-miri-2068.rs @@ -2,7 +2,7 @@ use std::future::Future; use std::pin::Pin; use std::task::{Context, Poll, Waker}; -pub fn fuzzing_block_on>(fut: F) -> O { +fn fuzzing_block_on>(fut: F) -> O { let mut fut = std::pin::pin!(fut); let mut context = Context::from_waker(Waker::noop()); loop { diff --git a/src/tools/miri/tests/pass/issues/issue-miri-3541-dyn-vtable-trait-normalization.rs b/src/tools/miri/tests/pass/issues/issue-miri-3541-dyn-vtable-trait-normalization.rs index 123fe6ed6425..d88df18295ab 100644 --- a/src/tools/miri/tests/pass/issues/issue-miri-3541-dyn-vtable-trait-normalization.rs +++ b/src/tools/miri/tests/pass/issues/issue-miri-3541-dyn-vtable-trait-normalization.rs @@ -25,7 +25,7 @@ where } } -pub fn box_new_with() +fn box_new_with() where T: ?Sized, { diff --git a/src/tools/miri/tests/pass/last-use-in-cap-clause.rs b/src/tools/miri/tests/pass/last-use-in-cap-clause.rs index 2160aea16346..d71593bfcbdf 100644 --- a/src/tools/miri/tests/pass/last-use-in-cap-clause.rs +++ b/src/tools/miri/tests/pass/last-use-in-cap-clause.rs @@ -12,6 +12,6 @@ fn foo() -> Box isize + 'static> { Box::new(result) } -pub fn main() { +fn main() { assert_eq!(foo()(), 22); } diff --git a/src/tools/miri/tests/pass/loop-break-value.rs b/src/tools/miri/tests/pass/loop-break-value.rs index bc4c967d26a5..74ab487b342a 100644 --- a/src/tools/miri/tests/pass/loop-break-value.rs +++ b/src/tools/miri/tests/pass/loop-break-value.rs @@ -8,7 +8,7 @@ fn never_returns() { } } -pub fn main() { +fn main() { let value = 'outer: loop { if 1 == 1 { break 13; diff --git a/src/tools/miri/tests/pass/move-arg-2-unique.rs b/src/tools/miri/tests/pass/move-arg-2-unique.rs index de21d67eb4f6..7792b8bb1162 100644 --- a/src/tools/miri/tests/pass/move-arg-2-unique.rs +++ b/src/tools/miri/tests/pass/move-arg-2-unique.rs @@ -2,7 +2,7 @@ fn test(foo: Box>) { assert_eq!((*foo)[0], 10); } -pub fn main() { +fn main() { let x = Box::new(vec![10]); // Test forgetting a local by move-in test(x); diff --git a/src/tools/miri/tests/pass/move-arg-3-unique.rs b/src/tools/miri/tests/pass/move-arg-3-unique.rs index 6025481c32e2..1b6e7ba7cf32 100644 --- a/src/tools/miri/tests/pass/move-arg-3-unique.rs +++ b/src/tools/miri/tests/pass/move-arg-3-unique.rs @@ -1,4 +1,4 @@ -pub fn main() { +fn main() { let x = Box::new(10); let y = x; assert_eq!(*y, 10); diff --git a/src/tools/miri/tests/pass/mpsc.rs b/src/tools/miri/tests/pass/mpsc.rs index 3824a0de907c..b60d32002db2 100644 --- a/src/tools/miri/tests/pass/mpsc.rs +++ b/src/tools/miri/tests/pass/mpsc.rs @@ -1,6 +1,6 @@ use std::sync::mpsc::channel; -pub fn main() { +fn main() { let (tx, rx) = channel::>(); tx.send(Box::new(100)).unwrap(); let v = rx.recv().unwrap(); diff --git a/src/tools/miri/tests/pass/panic/unwind_dwarf.rs b/src/tools/miri/tests/pass/panic/unwind_dwarf.rs index ca90e4f4d94f..1e0cd3a43a2f 100644 --- a/src/tools/miri/tests/pass/panic/unwind_dwarf.rs +++ b/src/tools/miri/tests/pass/panic/unwind_dwarf.rs @@ -15,7 +15,7 @@ struct Exception { cause: Box, } -pub fn panic(data: Box) -> u32 { +fn panic(data: Box) -> u32 { extern "C" fn exception_cleanup( _unwind_code: uw::_Unwind_Reason_Code, _exception: *mut uw::_Unwind_Exception, @@ -53,7 +53,7 @@ fn miri_exception_class() -> uw::_Unwind_Exception_Class { 0x4d4f5a_00_4d495249 } -pub fn catch_unwind R>(f: F) -> Result> { +fn catch_unwind R>(f: F) -> Result> { struct Data { f: Option, r: Option, diff --git a/src/tools/miri/tests/pass/regions-lifetime-nonfree-late-bound.rs b/src/tools/miri/tests/pass/regions-lifetime-nonfree-late-bound.rs index 445dd43febb1..8645fde77f01 100644 --- a/src/tools/miri/tests/pass/regions-lifetime-nonfree-late-bound.rs +++ b/src/tools/miri/tests/pass/regions-lifetime-nonfree-late-bound.rs @@ -12,7 +12,7 @@ // doing region-folding, when really all clients of the region-folding // case only want to see *free* lifetime variables, not bound ones. -pub fn main() { +fn main() { fn explicit() { fn test(_x: Option>) where diff --git a/src/tools/miri/tests/pass/sendable-class.rs b/src/tools/miri/tests/pass/sendable-class.rs index a05278f1855a..5784bc3a3931 100644 --- a/src/tools/miri/tests/pass/sendable-class.rs +++ b/src/tools/miri/tests/pass/sendable-class.rs @@ -12,7 +12,7 @@ fn foo(i: isize, j: char) -> Foo { Foo { i: i, j: j } } -pub fn main() { +fn main() { let (tx, rx) = channel(); tx.send(foo(42, 'c')).unwrap(); let _val = rx; diff --git a/src/tools/miri/tests/pass/tag-align-dyn-u64.rs b/src/tools/miri/tests/pass/tag-align-dyn-u64.rs index 81a43cc8bcc6..e4abc3895008 100644 --- a/src/tools/miri/tests/pass/tag-align-dyn-u64.rs +++ b/src/tools/miri/tests/pass/tag-align-dyn-u64.rs @@ -24,7 +24,7 @@ fn is_u64_aligned(u: &Tag) -> bool { return (p & (u64_align - 1)) == 0; } -pub fn main() { +fn main() { let x = mk_rec(); assert!(is_u64_aligned(&x.t)); } diff --git a/src/tools/miri/tests/pass/tls/tls_leak_main_thread_allowed.rs b/src/tools/miri/tests/pass/tls/tls_leak_main_thread_allowed.rs index abc0968f7c4c..634b8af02aa9 100644 --- a/src/tools/miri/tests/pass/tls/tls_leak_main_thread_allowed.rs +++ b/src/tools/miri/tests/pass/tls/tls_leak_main_thread_allowed.rs @@ -6,7 +6,7 @@ use std::cell::Cell; // as long as the program does), so make sure we treat them the same for leak purposes. // // The test covers both TLS statics and the TLS macro. -pub fn main() { +fn main() { #[thread_local] static TLS: Cell> = Cell::new(None); diff --git a/src/tools/miri/tests/pass/tree_borrows/cell-inside-box.rs b/src/tools/miri/tests/pass/tree_borrows/cell-inside-box.rs index 4a868455c849..ed8cbbf0e273 100644 --- a/src/tools/miri/tests/pass/tree_borrows/cell-inside-box.rs +++ b/src/tools/miri/tests/pass/tree_borrows/cell-inside-box.rs @@ -6,7 +6,7 @@ mod utils; use std::cell::UnsafeCell; -pub fn main() { +fn main() { let cell = UnsafeCell::new(42); let box1 = Box::new(cell); diff --git a/src/tools/miri/tests/pass/tree_borrows/cell-inside-struct.rs b/src/tools/miri/tests/pass/tree_borrows/cell-inside-struct.rs index fd68685a2f44..adeedc653b99 100644 --- a/src/tools/miri/tests/pass/tree_borrows/cell-inside-struct.rs +++ b/src/tools/miri/tests/pass/tree_borrows/cell-inside-struct.rs @@ -12,7 +12,7 @@ struct Foo { field2: Cell, } -pub fn main() { +fn main() { let root = Foo { field1: 42, field2: Cell::new(88) }; unsafe { let a = &root; diff --git a/src/tools/miri/tests/pass/tree_borrows/copy-nonoverlapping.rs b/src/tools/miri/tests/pass/tree_borrows/copy-nonoverlapping.rs index 23250d6e6dfc..4edf80e9561e 100644 --- a/src/tools/miri/tests/pass/tree_borrows/copy-nonoverlapping.rs +++ b/src/tools/miri/tests/pass/tree_borrows/copy-nonoverlapping.rs @@ -2,7 +2,7 @@ // copy_nonoverlapping works regardless of the order in which we construct // the arguments. -pub fn main() { +fn main() { test_to_from(); test_from_to(); } diff --git a/src/tools/miri/tests/pass/tree_borrows/tree-borrows.rs b/src/tools/miri/tests/pass/tree_borrows/tree-borrows.rs index 87eb447049d6..0ed1dbacc707 100644 --- a/src/tools/miri/tests/pass/tree_borrows/tree-borrows.rs +++ b/src/tools/miri/tests/pass/tree_borrows/tree-borrows.rs @@ -28,7 +28,7 @@ fn local_addr_of_mut() { // Tree Borrows has no issue with several mutable references existing // at the same time, as long as they are used only immutably. // I.e. multiple Reserved can coexist. -pub fn aliasing_read_only_mutable_refs() { +fn aliasing_read_only_mutable_refs() { unsafe { let base = &mut 42u64; let r1 = &mut *(base as *mut u64); @@ -38,7 +38,7 @@ pub fn aliasing_read_only_mutable_refs() { } } -pub fn string_as_mut_ptr() { +fn string_as_mut_ptr() { // This errors in Stacked Borrows since as_mut_ptr restricts the provenance, // but with Tree Borrows it should work. unsafe { diff --git a/src/tools/miri/tests/pass/unsized.rs b/src/tools/miri/tests/pass/unsized.rs index 6ad063543029..1e62cd7f3239 100644 --- a/src/tools/miri/tests/pass/unsized.rs +++ b/src/tools/miri/tests/pass/unsized.rs @@ -4,10 +4,10 @@ #![feature(custom_mir, core_intrinsics)] fn unsized_params() { - pub fn f0(_f: dyn FnOnce()) {} - pub fn f1(_s: str) {} - pub fn f2(_x: i32, _y: [i32]) {} - pub fn f3(_p: dyn Send) {} + fn f0(_f: dyn FnOnce()) {} + fn f1(_s: str) {} + fn f2(_x: i32, _y: [i32]) {} + fn f3(_p: dyn Send) {} let c: Box = Box::new(|| {}); f0(*c); diff --git a/src/tools/miri/tests/pass/vec-matching-fold.rs b/src/tools/miri/tests/pass/vec-matching-fold.rs index 3a869703bf96..48e750a3102a 100644 --- a/src/tools/miri/tests/pass/vec-matching-fold.rs +++ b/src/tools/miri/tests/pass/vec-matching-fold.rs @@ -29,7 +29,7 @@ where } } -pub fn main() { +fn main() { let x = &[1, 2, 3, 4, 5]; let product = foldl(x, 1, |a, b| a * *b); diff --git a/src/tools/miri/tests/ui.rs b/src/tools/miri/tests/ui.rs index efaaf9fc8417..1f8d98a4d339 100644 --- a/src/tools/miri/tests/ui.rs +++ b/src/tools/miri/tests/ui.rs @@ -30,11 +30,6 @@ fn miri_path() -> PathBuf { PathBuf::from(env::var("MIRI").unwrap_or_else(|_| env!("CARGO_BIN_EXE_miri").into())) } -pub fn flagsplit(flags: &str) -> Vec { - // This code is taken from `RUSTFLAGS` handling in cargo. - flags.split(' ').map(str::trim).filter(|s| !s.is_empty()).map(str::to_string).collect() -} - // Build the shared object file for testing native function calls. fn build_native_lib(target: &str) -> PathBuf { // Loosely follow the logic of the `cc` crate for finding the compiler.