Skip to content

Commit e61a8a9

Browse files
CentrilRalfJung
andauthored
Apply suggestions from code review
Co-Authored-By: RalfJung <post@ralfj.de>
1 parent 59bdb31 commit e61a8a9

File tree

2 files changed

+42
-39
lines changed

2 files changed

+42
-39
lines changed

src/libcore/marker.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -612,7 +612,7 @@ unsafe impl<T: ?Sized> Freeze for &mut T {}
612612
/// `Unpin` has no consequence at all for non-pinned data. In particular,
613613
/// [`mem::replace`] happily moves `!Unpin` data (it works for any `&mut T`, not
614614
/// just when `T: Unpin`). However, you cannot use
615-
/// [`mem::replace`] on data wrapped inside a [`Pin`] because you cannot get the
615+
/// [`mem::replace`] on data wrapped inside a [`Pin<P>`] because you cannot get the
616616
/// `&mut T` you need for that, and *that* is what makes this system work.
617617
///
618618
/// So this, for example, can only be done on types implementing `Unpin`:
@@ -633,7 +633,7 @@ unsafe impl<T: ?Sized> Freeze for &mut T {}
633633
/// This trait is automatically implemented for almost every type.
634634
///
635635
/// [`mem::replace`]: ../../std/mem/fn.replace.html
636-
/// [`Pin`]: ../pin/struct.Pin.html
636+
/// [`Pin<P>`]: ../pin/struct.Pin.html
637637
/// [`pin module`]: ../../std/pin/index.html
638638
#[stable(feature = "pin", since = "1.33.0")]
639639
#[cfg_attr(not(stage0), lang = "unpin")]

src/libcore/pin.rs

Lines changed: 40 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,16 @@
66
//! since moving an object with pointers to itself will invalidate them,
77
//! which could cause undefined behavior.
88
//!
9-
//! [`Pin`] ensures that the pointee of any pointer type has a stable location in memory,
9+
//! A [`Pin<P>`] ensures that the pointee of any pointer type `P` has a stable location in memory,
1010
//! meaning it cannot be moved elsewhere and its memory cannot be deallocated
1111
//! until it gets dropped. We say that the pointee is "pinned".
1212
//!
1313
//! By default, all types in Rust are movable. Rust allows passing all types by-value,
14-
//! and common smart-pointer types such as `Box` and `&mut` allow replacing and
15-
//! moving the values they contain: you can move out of a `Box`, or you can use [`mem::swap`].
16-
//! [`Pin`] wraps a pointer type, so `Pin<Box<T>>` functions much like a regular `Box<T>`
17-
//! (when a `Pin<Box<T>>` gets dropped, so do its contents, and the memory gets deallocated).
18-
//! Similarily, `Pin<&mut T>` is a lot like `&mut T`. However, [`Pin`] does not let clients actually
14+
//! and common smart-pointer types such as `Box<T>` and `&mut T` allow replacing and
15+
//! moving the values they contain: you can move out of a `Box<T>`, or you can use [`mem::swap`].
16+
//! [`Pin<P>`] wraps a pointer type `P`, so `Pin<Box<T>>` functions much like a regular `Box<T>`:
17+
//! when a `Pin<Box<T>>` gets dropped, so do its contents, and the memory gets deallocated.
18+
//! Similarily, `Pin<&mut T>` is a lot like `&mut T`. However, [`Pin<P>`] does not let clients actually
1919
//! obtain a `Box<T>` or `&mut T` to pinned data, which implies that you cannot use
2020
//! operations such as [`mem::swap`]:
2121
//! ```
@@ -28,18 +28,18 @@
2828
//! }
2929
//! ```
3030
//!
31-
//! It is worth reiterating that [`Pin`] does *not* change the fact that a Rust compiler
32-
//! considers all types movable. [`mem::swap`] remains callable for any `T`. Instead, `Pin`
33-
//! prevents certain *values* (pointed to by pointers wrapped in `Pin`) from being
31+
//! It is worth reiterating that [`Pin<P>`] does *not* change the fact that a Rust compiler
32+
//! considers all types movable. [`mem::swap`] remains callable for any `T`. Instead, `Pin<P>`
33+
//! prevents certain *values* (pointed to by pointers wrapped in `Pin<P>`) from being
3434
//! moved by making it impossible to call methods that require `&mut T` on them
3535
//! (like [`mem::swap`]).
3636
//!
37-
//! [`Pin`] can be used to wrap any pointer type, and as such it interacts with
37+
//! [`Pin<P>`] can be used to wrap any pointer type `P`, and as such it interacts with
3838
//! [`Deref`] and [`DerefMut`]. A `Pin<P>` where `P: Deref` should be considered
3939
//! as a "`P`-style pointer" to a pinned `P::Target` -- so, a `Pin<Box<T>>` is
4040
//! an owned pointer to a pinned `T`, and a `Pin<Rc<T>>` is a reference-counted
4141
//! pointer to a pinned `T`.
42-
//! For correctness, [`Pin`] relies on the [`Deref`] and [`DerefMut`] implementations
42+
//! For correctness, [`Pin<P>`] relies on the [`Deref`] and [`DerefMut`] implementations
4343
//! to not move out of their `self` parameter, and to only ever return a pointer
4444
//! to pinned data when they are called on a pinned pointer.
4545
//!
@@ -50,11 +50,11 @@
5050
//! This includes all the basic types (`bool`, `i32` and friends, references)
5151
//! as well as types consisting solely of these types.
5252
//! Types that do not care about pinning implement the [`Unpin`] auto-trait, which
53-
//! nullifies the effect of [`Pin`]. For `T: Unpin`, `Pin<Box<T>>` and `Box<T>` function
53+
//! cancels the effect of [`Pin<P>`]. For `T: Unpin`, `Pin<Box<T>>` and `Box<T>` function
5454
//! identically, as do `Pin<&mut T>` and `&mut T`.
5555
//!
5656
//! Note that pinning and `Unpin` only affect the pointed-to type, not the pointer
57-
//! type itself that got wrapped in `Pin`. For example, whether or not `Box<T>` is
57+
//! type `P` itself that got wrapped in `Pin<P>`. For example, whether or not `Box<T>` is
5858
//! `Unpin` has no effect on the behavior of `Pin<Box<T>>` (here, `T` is the
5959
//! pointed-to type).
6060
//!
@@ -120,7 +120,7 @@
120120
//! and elements can live on a stack frame that lives shorter than the collection does.
121121
//!
122122
//! To make this work, every element has pointers to its predecessor and successor in
123-
//! the list. Element can only be added when they are pinned, because moving the elements
123+
//! the list. Elements can only be added when they are pinned, because moving the elements
124124
//! around would invalidate the pointers. Moreover, the `Drop` implementation of a linked
125125
//! list element will patch the pointers of its predecessor and successor to remove itself
126126
//! from the list.
@@ -129,17 +129,17 @@
129129
//! could be deallocated or otherwise invalidated without calling `drop`, the pointers into it
130130
//! from its neighbouring elements would become invalid, which would break the data structure.
131131
//!
132-
//! This is why pinning also comes with a `drop`-related guarantee.
132+
//! Therefore, pinning also comes with a `drop`-related guarantee.
133133
//!
134134
//! # `Drop` guarantee
135135
//!
136136
//! The purpose of pinning is to be able to rely on the placement of some data in memory.
137-
//! To make this work, not just moving the data is restricted; deallocating, repurposing or
137+
//! To make this work, not just moving the data is restricted; deallocating, repurposing, or
138138
//! otherwise invalidating the memory used to store the data is restricted, too.
139139
//! Concretely, for pinned data you have to maintain the invariant
140140
//! that *its memory will not get invalidated from the moment it gets pinned until
141141
//! when `drop` is called*. Memory can be invalidated by deallocation, but also by
142-
//! replacing a `Some(v)` by `None`, or calling `Vec::set_len` to "kill" some elements
142+
//! replacing a [`Some(v)`] by [`None`], or calling [`Vec::set_len`] to "kill" some elements
143143
//! off of a vector.
144144
//!
145145
//! This is exactly the kind of guarantee that the intrusive linked list from the previous
@@ -174,7 +174,7 @@
174174
//! One interesting question arises when considering the interaction of pinning and
175175
//! the fields of a struct. When can a struct have a "pinning projection", i.e.,
176176
//! an operation with type `fn(Pin<&[mut] Struct>) -> Pin<&[mut] Field>`?
177-
//! In a similar vein, when can a generic wrapper type (such as `Vec`, `Box`, or `RefCell`)
177+
//! In a similar vein, when can a generic wrapper type (such as `Vec<T>`, `Box<T>`, or `RefCell<T>`)
178178
//! have an operation with type `fn(Pin<&[mut] Wrapper<T>>) -> Pin<&[mut] T>`?
179179
//!
180180
//! Having a pinning projection for some field means that pinning is "structural":
@@ -199,7 +199,7 @@
199199
//! 3. You must make sure that you uphold the [`Drop` guarantee][drop-guarantee]:
200200
//! once your wrapper is pinned, the memory that contains the
201201
//! content is not overwritten or deallocated without calling the content's destructors.
202-
//! This can be tricky, as witnessed by `VecDeque`: the destructor of `VecDeque` can fail
202+
//! This can be tricky, as witnessed by `VecDeque<T>`: the destructor of `VecDeque<T>` can fail
203203
//! to call `drop` on all elements if one of the destructors panics. This violates the
204204
//! `Drop` guarantee, because it can lead to elements being deallocated without
205205
//! their destructor being called. (`VecDeque` has no pinning projections, so this
@@ -208,31 +208,31 @@
208208
//! the fields when your type is pinned. For example, if the wrapper contains an
209209
//! `Option<T>` and there is a `take`-like operation with type
210210
//! `fn(Pin<&mut Wrapper<T>>) -> Option<T>`,
211-
//! that operation can be used to move a `T` out of a pinned `Wrapper` -- which means
211+
//! that operation can be used to move a `T` out of a pinned `Wrapper<T>` -- which means
212212
//! pinning cannot be structural.
213213
//!
214-
//! For a more complex example of moving data out of a pinnd type, imagine if `RefCell`
214+
//! For a more complex example of moving data out of a pinned type, imagine if `RefCell<T>`
215215
//! had a method `fn get_pin_mut(self: Pin<&mut Self>) -> Pin<&mut T>`.
216216
//! Then we could do the following:
217217
//! ```compile_fail
218218
//! fn exploit_ref_cell<T>(rc: Pin<&mut RefCell<T>) {
219-
//! { let p = rc.as_mut().get_pin_mut(); } // here we get pinned access to the `T`
219+
//! { let p = rc.as_mut().get_pin_mut(); } // Here we get pinned access to the `T`.
220220
//! let rc_shr: &RefCell<T> = rc.into_ref().get_ref();
221221
//! let b = rc_shr.borrow_mut();
222-
//! let content = &mut *b; // and here we have `&mut T` to the same data
222+
//! let content = &mut *b; // And here we have `&mut T` to the same data.
223223
//! }
224224
//! ```
225-
//! This is catastrophic, it means we can first pin the content of the `RefCell`
225+
//! This is catastrophic, it means we can first pin the content of the `RefCell<T>`
226226
//! (using `RefCell::get_pin_mut`) and then move that content using the mutable
227227
//! reference we got later.
228228
//!
229-
//! For a type like `Vec`, both possibilites (structural pinning or not) make sense,
230-
//! and the choice is up to the author. A `Vec` with structural pinning could
229+
//! For a type like `Vec<T>`, both possibilites (structural pinning or not) make sense,
230+
//! and the choice is up to the author. A `Vec<T>` with structural pinning could
231231
//! have `get_pin`/`get_pin_mut` projections. However, it could *not* allow calling
232-
//! `pop` on a pinned `Vec` because that would move the (structurally pinned) contents!
232+
//! `pop` on a pinned `Vec<T>` because that would move the (structurally pinned) contents!
233233
//! Nor could it allow `push`, which might reallocate and thus also move the contents.
234-
//! A `Vec` without structural pinning could `impl<T> Unpin for Vec<T>`, because the contents
235-
//! are never pinned and the `Vec` itself is fine with being moved as well.
234+
//! A `Vec<T>` without structural pinning could `impl<T> Unpin for Vec<T>`, because the contents
235+
//! are never pinned and the `Vec<T>` itself is fine with being moved as well.
236236
//!
237237
//! In the standard library, pointer types generally do not have structural pinning,
238238
//! and thus they do not offer pinning projections. This is why `Box<T>: Unpin` holds for all `T`.
@@ -244,13 +244,16 @@
244244
//! whether the content is pinned is entirely independent of whether the pointer is
245245
//! pinned, meaning pinning is *not* structural.
246246
//!
247-
//! [`Pin`]: struct.Pin.html
247+
//! [`Pin<P>`]: struct.Pin.html
248248
//! [`Unpin`]: ../../std/marker/trait.Unpin.html
249249
//! [`Deref`]: ../../std/ops/trait.Deref.html
250250
//! [`DerefMut`]: ../../std/ops/trait.DerefMut.html
251251
//! [`mem::swap`]: ../../std/mem/fn.swap.html
252252
//! [`mem::forget`]: ../../std/mem/fn.forget.html
253-
//! [`Box`]: ../../std/boxed/struct.Box.html
253+
//! [`Box<T>`]: ../../std/boxed/struct.Box.html
254+
//! [`Vec::set_len`]: ../../std/vec/struct.Vec.html#method.set_len
255+
//! [`None`]: ../../std/option/enum.Option.html#variant.None
256+
//! [`Some(v)`]: ../../std/option/enum.Option.html#variant.Some
254257
//! [drop-impl]: #drop-implementation
255258
//! [drop-guarantee]: #drop-guarantee
256259
@@ -328,11 +331,11 @@ impl<P: Deref> Pin<P>
328331
where
329332
P::Target: Unpin,
330333
{
331-
/// Construct a new `Pin` around a pointer to some data of a type that
334+
/// Construct a new `Pin<P>` around a pointer to some data of a type that
332335
/// implements [`Unpin`].
333336
///
334337
/// Unlike `Pin::new_unchecked`, this method is safe because the pointer
335-
/// `P` dereferences to an [`Unpin`] type, which nullifies the pinning guarantees.
338+
/// `P` dereferences to an [`Unpin`] type, which cancels the pinning guarantees.
336339
///
337340
/// [`Unpin`]: ../../std/marker/trait.Unpin.html
338341
#[stable(feature = "pin", since = "1.33.0")]
@@ -345,7 +348,7 @@ where
345348
}
346349

347350
impl<P: Deref> Pin<P> {
348-
/// Construct a new `Pin` around a reference to some data of a type that
351+
/// Construct a new `Pin<P>` around a reference to some data of a type that
349352
/// may or may not implement `Unpin`.
350353
///
351354
/// If `pointer` dereferences to an `Unpin` type, `Pin::new` should be used
@@ -379,13 +382,13 @@ impl<P: Deref> Pin<P> {
379382
/// fn move_pinned_ref<T>(mut a: T, mut b: T) {
380383
/// unsafe { let p = Pin::new_unchecked(&mut a); } // should mean `a` can never move again
381384
/// mem::swap(&mut a, &mut b);
382-
/// // the address of `a` changed to `b`'s stack slot, so `a` got moved even
385+
/// // The address of `a` changed to `b`'s stack slot, so `a` got moved even
383386
/// // though we have previously pinned it!
384387
/// }
385388
/// ```
386389
/// A value, once pinned, must remain pinned forever (unless its type implements `Unpin`).
387390
///
388-
/// Similarily, calling `Pin::new_unchecked` on a `Rc<T>` is unsafe because there could be
391+
/// Similarily, calling `Pin::new_unchecked` on an `Rc<T>` is unsafe because there could be
389392
/// aliases to the same data that are not subject to the pinning restrictions:
390393
/// ```
391394
/// use std::rc::Rc;
@@ -482,7 +485,7 @@ impl<'a, T: ?Sized> Pin<&'a T> {
482485
/// It may seem like there is an issue here with interior mutability: in fact,
483486
/// it *is* possible to move a `T` out of a `&RefCell<T>`. However, this is
484487
/// not a problem as long as there does not also exist a `Pin<&T>` pointing
485-
/// to the same data, and `RefCell` does not let you create a pinned reference
488+
/// to the same data, and `RefCell<T>` does not let you create a pinned reference
486489
/// to its contents. See the discussion on ["pinning projections"] for further
487490
/// details.
488491
///

0 commit comments

Comments
 (0)