pre_exec: expand docs

This commit is contained in:
Ralf Jung 2019-02-02 11:05:43 +01:00
parent cbbf8a7ff9
commit 6c67a7625f
2 changed files with 8 additions and 6 deletions

View File

@ -48,7 +48,8 @@ pub trait CommandExt {
/// This also means that all resources such as file descriptors and
/// memory-mapped regions got duplicated. It is your responsibility to make
/// sure that the closure does not violate library invariants by making
/// invalid use of these duplicates.
/// invalid use of these duplicates. Moreover, POSIX demands that you only
/// perform operations that are explicitly documented as async-signal-safe.
///
/// When this closure is run, aspects such as the stdio file descriptors and
/// working directory have successfully been changed, so output to these
@ -60,8 +61,8 @@ unsafe fn pre_exec<F>(&mut self, f: F) -> &mut process::Command
/// Schedules a closure to be run just before the `exec` function is
/// invoked.
///
/// This method should be unsafe, so it got deprecated in favor of the
/// unsafe [`pre_exec`].
/// This method is stable and usable, but it should be unsafe. To fix
/// that, it got deprecated in favor of the unsafe [`pre_exec`].
///
/// [`pre_exec`]: #tymethod.pre_exec
#[stable(feature = "process_exec", since = "1.15.0")]

View File

@ -48,7 +48,8 @@ pub trait CommandExt {
/// This also means that all resources such as file descriptors and
/// memory-mapped regions got duplicated. It is your responsibility to make
/// sure that the closure does not violate library invariants by making
/// invalid use of these duplicates.
/// invalid use of these duplicates. Moreover, POSIX demands that you only
/// perform operations that are explicitly documented as async-signal-safe.
///
/// When this closure is run, aspects such as the stdio file descriptors and
/// working directory have successfully been changed, so output to these
@ -60,8 +61,8 @@ unsafe fn pre_exec<F>(&mut self, f: F) -> &mut process::Command
/// Schedules a closure to be run just before the `exec` function is
/// invoked.
///
/// This method should be unsafe, so it got deprecated in favor of the
/// unsafe [`pre_exec`].
/// This method is stable and usable, but it should be unsafe. To fix
/// that, it got deprecated in favor of the unsafe [`pre_exec`].
///
/// [`pre_exec`]: #tymethod.pre_exec
#[stable(feature = "process_exec", since = "1.15.0")]