1
0
mirror of https://github.com/google/comprehensive-rust.git synced 2025-04-03 01:56:12 +02:00

Update text to mention 2024 edition.

This commit is contained in:
Andrew Walbran 2025-02-25 18:29:17 +00:00
parent 4a07baf9dc
commit f5787fe90e
3 changed files with 26 additions and 16 deletions

View File

@ -32,8 +32,8 @@ Key points:
- Dependencies can also be resolved from alternative [registries], git, folders, - Dependencies can also be resolved from alternative [registries], git, folders,
and more. and more.
- Rust also has [editions]: the current edition is Rust 2021. Previous editions - Rust also has [editions]: the current edition is Rust 2024. Previous editions
were Rust 2015 and Rust 2018. were Rust 2015, Rust 2018 and Rust 2021.
- The editions are allowed to make backwards incompatible changes to the - The editions are allowed to make backwards incompatible changes to the
language. language.

View File

@ -22,6 +22,7 @@ static mut COUNTER: u32 = 0;
fn add_to_counter(inc: u32) { fn add_to_counter(inc: u32) {
// SAFETY: There are no other threads which could be accessing `COUNTER`. // SAFETY: There are no other threads which could be accessing `COUNTER`.
#[allow(static_mut_refs)]
unsafe { unsafe {
COUNTER += inc; COUNTER += inc;
} }
@ -31,6 +32,7 @@ fn main() {
add_to_counter(42); add_to_counter(42);
// SAFETY: There are no other threads which could be accessing `COUNTER`. // SAFETY: There are no other threads which could be accessing `COUNTER`.
#[allow(static_mut_refs)]
unsafe { unsafe {
println!("COUNTER: {COUNTER}"); println!("COUNTER: {COUNTER}");
} }
@ -40,12 +42,16 @@ fn main() {
<details> <details>
- The program here is safe because it is single-threaded. However, the Rust - The program here is safe because it is single-threaded. However, the Rust
compiler is conservative and will assume the worst. Try removing the `unsafe` compiler reasons about functions individually so can't assume that. Try
and see how the compiler explains that it is undefined behavior to mutate a removing the `unsafe` and see how the compiler explains that it is undefined
static from multiple threads. behavior to access a mutable static from multiple threads.
- Rust 2024 edition goes further and makes accessing a mutable static by
- Using a mutable static is generally a bad idea, but there are some cases where reference an error by default. We work around this in the example with
it might make sense in low-level `no_std` code, such as implementing a heap `#[allow(static_mut_refs)]`. Don't do this.
allocator or working with some C APIs. - Using a mutable static is almost always a bad idea, you should use interior
mutability instead.
- There are some cases where it might be necessary in low-level `no_std` code,
such as implementing a heap allocator or working with some C APIs. In this
case you should use pointers rather than references.
</details> </details>

View File

@ -11,9 +11,13 @@ preconditions to avoid undefined behaviour.
/// The pointers must be valid, properly aligned, and not otherwise accessed for /// The pointers must be valid, properly aligned, and not otherwise accessed for
/// the duration of the function call. /// the duration of the function call.
unsafe fn swap(a: *mut u8, b: *mut u8) { unsafe fn swap(a: *mut u8, b: *mut u8) {
let temp = *a; // SAFETY: Our caller promised that the pointers are valid, properly aligned
*a = *b; // and have no other access.
*b = temp; unsafe {
let temp = *a;
*a = *b;
*b = temp;
}
} }
fn main() { fn main() {
@ -35,9 +39,9 @@ fn main() {
We wouldn't actually use pointers for a `swap` function --- it can be done We wouldn't actually use pointers for a `swap` function --- it can be done
safely with references. safely with references.
Note that unsafe code is allowed within an unsafe function without an `unsafe` Note that Rust 2021 and earlier allow unsafe code within an unsafe function
block. We can prohibit this with `#[deny(unsafe_op_in_unsafe_fn)]`. Try adding without an `unsafe` block. This changed in the 2024 edition. We can prohibit it
it and see what happens. This will in older editions with `#[deny(unsafe_op_in_unsafe_fn)]`. Try adding it and see
[change in the 2024 Rust edition](https://github.com/rust-lang/rust/issues/120535). what happens.
</details> </details>