-
Notifications
You must be signed in to change notification settings - Fork 12.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tracking Issue for mutex_unpoison #96469
Comments
Hi, I read https://internals.rust-lang.org/t/unpoisoning-a-mutex/16521/3 (wich got automatically closed by the way) and the PR #96422. What is the next step to make it in the stable API ? Can I help somehow ? |
Hi, sorry if flooding but are there any updates regarding this issue? |
I think the next step is one of the rust developers needs to start the final comment period. IDK what the criteria for doing so are. |
Team member @dtolnay has proposed to merge this. The next step is review by the rest of the tagged team members: No concerns currently listed. Once a majority of reviewers approve (and at most 2 approvals are outstanding), this will enter its final comment period. If you spot a major issue that hasn't been raised at any point in this process, please speak up! See this document for info about what commands tagged team members can give me. |
I was wondering whether the idea of putting this method on the guard had been considered and found that @m-ou-se's commentary (and the ensuring comments) addressed it. SGTM! |
🔔 This is now entering its final comment period, as per the review above. 🔔 |
Given the state change this method causes, I am curious about rationale behind using |
If it took |
I just want to add that probably before stabilizing this method we should implement a lint which catches invalid patterns of using these methods since it is very easy to misuse. Or, at the very least, include information about potential footgun in documentation for these methods. |
What kind of lint do you exactly want? What are the patterns in question that you are worried about? |
The final comment period, with a disposition to merge, as per the review above, is now complete. As the automated representative of the governance process, I would like to thank the author for their work and everyone else who contributed. This will be merged soon. |
@bjorn3 exactly the possible error outlined by Mara Bos: calling |
If unpoison was a method of PoisonError or of MutexGuard instead of mutex, would it prevent such problems? |
That was discussed here: |
…iper Stabilize mutex_unpoison feature Closes rust-lang#96469 `@rustbot` +T-libs-api
Rollup merge of rust-lang#119804 - tmccombs:stabilize-unpoison, r=cuviper Stabilize mutex_unpoison feature Closes rust-lang#96469 `@rustbot` +T-libs-api
Feature gate:
#![feature(mutex_unpoison)]
This is a tracking issue for functions to clear the poisoned flag on
Mutex
andRwLock
.Public API
Steps / History
Unresolved Questions
The text was updated successfully, but these errors were encountered: