File tree 1 file changed +5
-5
lines changed
1 file changed +5
-5
lines changed Original file line number Diff line number Diff line change 379
379
//!
380
380
//! Exposing access to the inner field which you want to remain pinned must then be carefully
381
381
//! considered as well! Remember, exposing a method that gives access to a
382
- //! <code>[Pin]<[&mut] InnerT>></code> where ` InnerT: [Unpin]` would allow safe code to trivially
383
- //! move the inner value out of that pinning pointer, which is precisely what you're seeking to
384
- //! prevent! Exposing a field of a pinned value through a pinning pointer is called "projecting"
385
- //! a pin, and the more general case of deciding in which cases a pin should be able to be
386
- //! projected or not is called "structural pinning." We will go into more detail about this
382
+ //! <code>[Pin]<[&mut] InnerT>></code> where <code> InnerT: [Unpin]</code> would allow safe code to
383
+ //! trivially move the inner value out of that pinning pointer, which is precisely what you're
384
+ //! seeking to prevent! Exposing a field of a pinned value through a pinning pointer is called
385
+ //! "projecting" a pin, and the more general case of deciding in which cases a pin should be able
386
+ //! to be projected or not is called "structural pinning." We will go into more detail about this
387
387
//! [below][structural-pinning].
388
388
//!
389
389
//! # Examples of address-sensitive types
You can’t perform that action at this time.
0 commit comments