Rollup merge of #26603 - Gankro:ref, r=steveklabnik
Quick poll of basically the entire core team says this is ok.
This commit is contained in:
commit
6dd33b459b
2 changed files with 2 additions and 8 deletions
|
@ -1047,11 +1047,8 @@ This is a list of behavior not considered *unsafe* in Rust terms, but that may
|
|||
be undesired.
|
||||
|
||||
* Deadlocks
|
||||
* Reading data from private fields (`std::repr`)
|
||||
* Leaks of memory and other resources
|
||||
* Exiting without calling destructors
|
||||
* Sending signals
|
||||
* Accessing/modifying the file system
|
||||
* Integer overflow
|
||||
- Overflow is considered "unexpected" behavior and is always user-error,
|
||||
unless the `wrapping` primitives are used. In non-optimized builds, the compiler
|
||||
|
|
|
@ -12,7 +12,7 @@ two contexts. The first one is to mark a function as unsafe:
|
|||
|
||||
```rust
|
||||
unsafe fn danger_will_robinson() {
|
||||
// scary stuff
|
||||
// scary stuff
|
||||
}
|
||||
```
|
||||
|
||||
|
@ -68,11 +68,8 @@ Whew! That’s a bunch of stuff. It’s also important to notice all kinds of
|
|||
behaviors that are certainly bad, but are expressly _not_ unsafe:
|
||||
|
||||
* Deadlocks
|
||||
* Reading data from private fields
|
||||
* Leaks due to reference count cycles
|
||||
* Leaks of memory or other resources
|
||||
* Exiting without calling destructors
|
||||
* Sending signals
|
||||
* Accessing/modifying the file system
|
||||
* Integer overflow
|
||||
|
||||
Rust cannot prevent all kinds of software problems. Buggy code can and will be
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue