From f5787fe90e6c856fafcee5977b572723502f88d2 Mon Sep 17 00:00:00 2001 From: Andrew Walbran <qwandor@google.com> Date: Tue, 25 Feb 2025 18:29:17 +0000 Subject: [PATCH] Update text to mention 2024 edition. --- src/cargo/rust-ecosystem.md | 4 ++-- src/unsafe-rust/mutable-static.md | 20 +++++++++++++------- src/unsafe-rust/unsafe-functions/rust.md | 18 +++++++++++------- 3 files changed, 26 insertions(+), 16 deletions(-) diff --git a/src/cargo/rust-ecosystem.md b/src/cargo/rust-ecosystem.md index c193a5a6..e4de7658 100644 --- a/src/cargo/rust-ecosystem.md +++ b/src/cargo/rust-ecosystem.md @@ -32,8 +32,8 @@ Key points: - Dependencies can also be resolved from alternative [registries], git, folders, and more. -- Rust also has [editions]: the current edition is Rust 2021. Previous editions - were Rust 2015 and Rust 2018. +- Rust also has [editions]: the current edition is Rust 2024. Previous editions + were Rust 2015, Rust 2018 and Rust 2021. - The editions are allowed to make backwards incompatible changes to the language. diff --git a/src/unsafe-rust/mutable-static.md b/src/unsafe-rust/mutable-static.md index 1d3e7baa..b94fa4c3 100644 --- a/src/unsafe-rust/mutable-static.md +++ b/src/unsafe-rust/mutable-static.md @@ -22,6 +22,7 @@ static mut COUNTER: u32 = 0; fn add_to_counter(inc: u32) { // SAFETY: There are no other threads which could be accessing `COUNTER`. + #[allow(static_mut_refs)] unsafe { COUNTER += inc; } @@ -31,6 +32,7 @@ fn main() { add_to_counter(42); // SAFETY: There are no other threads which could be accessing `COUNTER`. + #[allow(static_mut_refs)] unsafe { println!("COUNTER: {COUNTER}"); } @@ -40,12 +42,16 @@ fn main() { <details> - The program here is safe because it is single-threaded. However, the Rust - compiler is conservative and will assume the worst. Try removing the `unsafe` - and see how the compiler explains that it is undefined behavior to mutate a - static from multiple threads. - -- Using a mutable static is generally a bad idea, but there are some cases where - it might make sense in low-level `no_std` code, such as implementing a heap - allocator or working with some C APIs. + compiler reasons about functions individually so can't assume that. Try + removing the `unsafe` and see how the compiler explains that it is undefined + behavior to access a mutable static from multiple threads. +- Rust 2024 edition goes further and makes accessing a mutable static by + reference an error by default. We work around this in the example with + `#[allow(static_mut_refs)]`. Don't do this. +- Using a mutable static is almost always a bad idea, you should use interior + mutability instead. +- There are some cases where it might be necessary in low-level `no_std` code, + such as implementing a heap allocator or working with some C APIs. In this + case you should use pointers rather than references. </details> diff --git a/src/unsafe-rust/unsafe-functions/rust.md b/src/unsafe-rust/unsafe-functions/rust.md index 7d6bb01b..2473fc7e 100644 --- a/src/unsafe-rust/unsafe-functions/rust.md +++ b/src/unsafe-rust/unsafe-functions/rust.md @@ -11,9 +11,13 @@ preconditions to avoid undefined behaviour. /// The pointers must be valid, properly aligned, and not otherwise accessed for /// the duration of the function call. unsafe fn swap(a: *mut u8, b: *mut u8) { - let temp = *a; - *a = *b; - *b = temp; + // SAFETY: Our caller promised that the pointers are valid, properly aligned + // and have no other access. + unsafe { + let temp = *a; + *a = *b; + *b = temp; + } } fn main() { @@ -35,9 +39,9 @@ fn main() { We wouldn't actually use pointers for a `swap` function --- it can be done safely with references. -Note that unsafe code is allowed within an unsafe function without an `unsafe` -block. We can prohibit this with `#[deny(unsafe_op_in_unsafe_fn)]`. Try adding -it and see what happens. This will -[change in the 2024 Rust edition](https://github.com/rust-lang/rust/issues/120535). +Note that Rust 2021 and earlier allow unsafe code within an unsafe function +without an `unsafe` block. This changed in the 2024 edition. We can prohibit it +in older editions with `#[deny(unsafe_op_in_unsafe_fn)]`. Try adding it and see +what happens. </details>