diff options
| author | bors <bors@rust-lang.org> | 2025-04-26 05:18:22 +0000 |
|---|---|---|
| committer | bors <bors@rust-lang.org> | 2025-04-26 05:18:22 +0000 |
| commit | 5ae50d3b2182f81eea4e4d90e8da3653547215b5 (patch) | |
| tree | b7dd25708b89658c91cde6ae2b44582a867f370a /library/std/src/keyword_docs.rs | |
| parent | d3508a8ad0163fab0c9b2188b3adf43c87200788 (diff) | |
| parent | c781c9ae94ef94a5b144b2ac6f5fd2075f16f854 (diff) | |
| download | rust-5ae50d3b2182f81eea4e4d90e8da3653547215b5.tar.gz rust-5ae50d3b2182f81eea4e4d90e8da3653547215b5.zip | |
Auto merge of #140324 - matthiaskrgr:rollup-jlzvdre, r=matthiaskrgr
Rollup of 8 pull requests
Successful merges:
- #139865 (Stabilize proc_macro::Span::{start,end,line,column}.)
- #140086 (If creating a temporary directory fails with permission denied then retry with backoff)
- #140216 (Document that "extern blocks must be unsafe" in Rust 2024)
- #140253 (Add XtensaAsmPrinter)
- #140272 (Improve error message for `||` (or) in let chains)
- #140305 (Track per-obligation recursion depth only if there is inference in the new solver)
- #140306 (handle specialization in the new trait solver)
- #140308 (stall generator witness obligations: add regression test)
r? `@ghost`
`@rustbot` modify labels: rollup
Diffstat (limited to 'library/std/src/keyword_docs.rs')
| -rw-r--r-- | library/std/src/keyword_docs.rs | 8 |
1 files changed, 6 insertions, 2 deletions
diff --git a/library/std/src/keyword_docs.rs b/library/std/src/keyword_docs.rs index 91701576130..c9595b051e2 100644 --- a/library/std/src/keyword_docs.rs +++ b/library/std/src/keyword_docs.rs @@ -388,11 +388,15 @@ mod enum_keyword {} /// lazy_static;`. The other use is in foreign function interfaces (FFI). /// /// `extern` is used in two different contexts within FFI. The first is in the form of external -/// blocks, for declaring function interfaces that Rust code can call foreign code by. +/// blocks, for declaring function interfaces that Rust code can call foreign code by. This use +/// of `extern` is unsafe, since we are asserting to the compiler that all function declarations +/// are correct. If they are not, using these items may lead to undefined behavior. /// /// ```rust ignore +/// // SAFETY: The function declarations given below are in +/// // line with the header files of `my_c_library`. /// #[link(name = "my_c_library")] -/// extern "C" { +/// unsafe extern "C" { /// fn my_c_function(x: i32) -> bool; /// } /// ``` |
