-
Notifications
You must be signed in to change notification settings - Fork 360
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adopt C#/Rust-style unsafe contexts #44
Comments
Do calls to |
Yes, they do count as unsafe. |
Yay! |
@densh Could you add an ability to use IR code in this task or maybe in separate? For example
Also, it would be perfect to add annotation which marks method us usable in IR and does not remove them in dead code elimination phase |
@gurinderu Including inline IR in the code is not something that we are going to support. IR is subject to change without further notice, it's not meant to be stable. We want to have freedom to innovate in this area without breaking end-users code. Regarding the second feature suggestion, I do not quite get exactly what you mean. Lets discuss on gitter. Also please try to refrain from suggesting new features in issues which are not strictly related to your suggestion (like this one.) |
Unsafe (pointers, stack allocation, extern calls and friends) features can only be used in unsafe context:
@unsafe
methodsunsafe { ... }
blocksThis clearly demarcates usage of unsafe features, making it impossible to use them by accident.
The text was updated successfully, but these errors were encountered: