| r[items.fn] |
| # Functions |
| |
| r[items.fn.syntax] |
| ```grammar,items |
| Function -> |
| FunctionQualifiers `fn` IDENTIFIER GenericParams? |
| `(` FunctionParameters? `)` |
| FunctionReturnType? WhereClause? |
| ( BlockExpression | `;` ) |
| |
| FunctionQualifiers -> `const`? `async`?[^async-edition] ItemSafety?[^extern-qualifiers] (`extern` Abi?)? |
| |
| ItemSafety -> `safe`[^extern-safe] | `unsafe` |
| |
| Abi -> STRING_LITERAL | RAW_STRING_LITERAL |
| |
| FunctionParameters -> |
| SelfParam `,`? |
| | (SelfParam `,`)? FunctionParam (`,` FunctionParam)* `,`? |
| |
| SelfParam -> OuterAttribute* ( ShorthandSelf | TypedSelf ) |
| |
| ShorthandSelf -> (`&` | `&` Lifetime)? `mut`? `self` |
| |
| TypedSelf -> `mut`? `self` `:` Type |
| |
| FunctionParam -> OuterAttribute* ( FunctionParamPattern | `...` | Type[^fn-param-2015] ) |
| |
| FunctionParamPattern -> PatternNoTopAlt `:` ( Type | `...` ) |
| |
| FunctionReturnType -> `->` Type |
| ``` |
| |
| [^async-edition]: The `async` qualifier is not allowed in the 2015 edition. |
| |
| [^extern-safe]: The `safe` function qualifier is only allowed semantically within |
| `extern` blocks. |
| |
| [^extern-qualifiers]: *Relevant to editions earlier than Rust 2024*: Within |
| `extern` blocks, the `safe` or `unsafe` function qualifier is only allowed |
| when the `extern` is qualified as `unsafe`. |
| |
| [^fn-param-2015]: Function parameters with only a type are only allowed |
| in an associated function of a [trait item] in the 2015 edition. |
| |
| r[items.fn.intro] |
| A _function_ consists of a [block] (that's the _body_ of the function), |
| along with a name, a set of parameters, and an output type. |
| Other than a name, all these are optional. |
| |
| r[items.fn.namespace] |
| Functions are declared with the keyword `fn` which defines the given name in the [value namespace] of the module or block where it is located. |
| |
| r[items.fn.signature] |
| Functions may declare a set of *input* [*variables*][variables] as parameters, through which the caller passes arguments into the function, and the *output* [*type*][type] of the value the function will return to its caller on completion. |
| |
| r[items.fn.implicit-return] |
| If the output type is not explicitly stated, it is the [unit type]. |
| |
| r[items.fn.fn-item-type] |
| When referred to, a _function_ yields a first-class *value* of the corresponding zero-sized [*function item type*], which when called evaluates to a direct call to the function. |
| |
| For example, this is a simple function: |
| ```rust |
| fn answer_to_life_the_universe_and_everything() -> i32 { |
| return 42; |
| } |
| ``` |
| |
| r[items.fn.safety-qualifiers] |
| The `safe` function is semantically only allowed when used in an [`extern` block]. |
| |
| r[items.fn.params] |
| ## Function parameters |
| |
| r[items.fn.params.intro] |
| Function parameters are irrefutable [patterns], so any pattern that is valid in |
| an else-less `let` binding is also valid as a parameter: |
| |
| ```rust |
| fn first((value, _): (i32, i32)) -> i32 { value } |
| ``` |
| |
| r[items.fn.params.self-pat] |
| If the first parameter is a _SelfParam_, this indicates that the function is a |
| [method]. |
| |
| r[items.fn.params.self-restriction] |
| Functions with a self parameter may only appear as an [associated |
| function] in a [trait] or [implementation]. |
| |
| r[items.fn.params.varargs] |
| A parameter with the `...` token indicates a [variadic function], and may only |
| be used as the last parameter of an [external block] function. The variadic |
| parameter may have an optional identifier, such as `args: ...`. |
| |
| r[items.fn.body] |
| ## Function body |
| |
| r[items.fn.body.intro] |
| The body block of a function is conceptually wrapped in another block that first binds the |
| argument patterns and then `return`s the value of the function's body. This |
| means that the tail expression of the block, if evaluated, ends up being |
| returned to the caller. As usual, an explicit return expression within |
| the body of the function will short-cut that implicit return, if reached. |
| |
| For example, the function above behaves as if it was written as: |
| |
| <!-- ignore: example expansion --> |
| ```rust,ignore |
| // argument_0 is the actual first argument passed from the caller |
| let (value, _) = argument_0; |
| return { |
| value |
| }; |
| ``` |
| |
| r[items.fn.body.bodyless] |
| Functions without a body block are terminated with a semicolon. This form |
| may only appear in a [trait] or [external block]. |
| |
| r[items.fn.generics] |
| ## Generic functions |
| |
| r[items.fn.generics.intro] |
| A _generic function_ allows one or more _parameterized types_ to appear in its |
| signature. Each type parameter must be explicitly declared in an |
| angle-bracket-enclosed and comma-separated list, following the function name. |
| |
| ```rust |
| // foo is generic over A and B |
| |
| fn foo<A, B>(x: A, y: B) { |
| # } |
| ``` |
| |
| r[items.fn.generics.param-names] |
| Inside the function signature and body, the name of the type parameter can be |
| used as a type name. |
| |
| r[items.fn.generics.param-bounds] |
| [Trait] bounds can be specified for type |
| parameters to allow methods with that trait to be called on values of that |
| type. This is specified using the `where` syntax: |
| |
| ```rust |
| # use std::fmt::Debug; |
| fn foo<T>(x: T) where T: Debug { |
| # } |
| ``` |
| |
| r[items.fn.generics.mono] |
| When a generic function is referenced, its type is instantiated based on the |
| context of the reference. For example, calling the `foo` function here: |
| |
| ```rust |
| use std::fmt::Debug; |
| |
| fn foo<T>(x: &[T]) where T: Debug { |
| // details elided |
| } |
| |
| foo(&[1, 2]); |
| ``` |
| |
| will instantiate type parameter `T` with `i32`. |
| |
| r[items.fn.generics.explicit-arguments] |
| The type parameters can also be explicitly supplied in a trailing [path] |
| component after the function name. This might be necessary if there is not |
| sufficient context to determine the type parameters. For example, |
| `mem::size_of::<u32>() == 4`. |
| |
| r[items.fn.extern] |
| ## Extern function qualifier |
| |
| r[items.fn.extern.intro] |
| The `extern` function qualifier allows providing function _definitions_ that can |
| be called with a particular ABI: |
| |
| <!-- ignore: fake ABI --> |
| ```rust,ignore |
| extern "ABI" fn foo() { /* ... */ } |
| ``` |
| |
| r[items.fn.extern.def] |
| These are often used in combination with [external block] items which provide |
| function _declarations_ that can be used to call functions without providing |
| their _definition_: |
| |
| <!-- ignore: fake ABI --> |
| ```rust,ignore |
| unsafe extern "ABI" { |
| unsafe fn foo(); /* no body */ |
| safe fn bar(); /* no body */ |
| } |
| unsafe { foo() }; |
| bar(); |
| ``` |
| |
| r[items.fn.extern.default-abi] |
| When `"extern" Abi?*` is omitted from `FunctionQualifiers` in function items, |
| the ABI `"Rust"` is assigned. For example: |
| |
| ```rust |
| fn foo() {} |
| ``` |
| |
| is equivalent to: |
| |
| ```rust |
| extern "Rust" fn foo() {} |
| ``` |
| |
| r[items.fn.extern.foreign-call] |
| Functions can be called by foreign code, and using an ABI that |
| differs from Rust allows, for example, to provide functions that can be |
| called from other programming languages like C: |
| |
| ```rust |
| // Declares a function with the "C" ABI |
| extern "C" fn new_i32() -> i32 { 0 } |
| |
| // Declares a function with the "stdcall" ABI |
| # #[cfg(any(windows, target_arch = "x86"))] |
| extern "stdcall" fn new_i32_stdcall() -> i32 { 0 } |
| ``` |
| |
| r[items.fn.extern.default-extern] |
| Just as with [external block], when the `extern` keyword is used and the `"ABI"` |
| is omitted, the ABI used defaults to `"C"`. That is, this: |
| |
| ```rust |
| extern fn new_i32() -> i32 { 0 } |
| let fptr: extern fn() -> i32 = new_i32; |
| ``` |
| |
| is equivalent to: |
| |
| ```rust |
| extern "C" fn new_i32() -> i32 { 0 } |
| let fptr: extern "C" fn() -> i32 = new_i32; |
| ``` |
| |
| r[items.fn.extern.unwind] |
| ### Unwinding |
| |
| r[items.fn.extern.unwind.intro] |
| Most ABI strings come in two variants, one with an `-unwind` suffix and one without. The `Rust` ABI always permits unwinding, so there is no `Rust-unwind` ABI. The choice of ABI, together with the runtime [panic handler], determines the behavior when unwinding out of a function. |
| |
| r[items.fn.extern.unwind.behavior] |
| The table below indicates the behavior of an unwinding operation reaching each type of ABI boundary (function declaration or definition using the corresponding ABI string). Note that the Rust runtime is not affected by, and cannot have an effect on, any unwinding that occurs entirely within another language's runtime, that is, unwinds that are thrown and caught without reaching a Rust ABI boundary. |
| |
| The `panic`-unwind column refers to [panicking] via the `panic!` macro and similar standard library mechanisms, as well as to any other Rust operations that cause a panic, such as out-of-bounds array indexing or integer overflow. |
| |
| The "unwinding" ABI category refers to `"Rust"` (the implicit ABI of Rust functions not marked `extern`), `"C-unwind"`, and any other ABI with `-unwind` in its name. The "non-unwinding" ABI category refers to all other ABI strings, including `"C"` and `"stdcall"`. |
| |
| Native unwinding is defined per-target. On targets that support throwing and catching C++ exceptions, it refers to the mechanism used to implement this feature. Some platforms implement a form of unwinding referred to as ["forced unwinding"][forced-unwinding]; `longjmp` on Windows and `pthread_exit` in `glibc` are implemented this way. Forced unwinding is explicitly excluded from the "Native unwind" column in the table. |
| |
| | panic runtime | ABI | `panic`-unwind | Native unwind (unforced) | |
| | -------------- | ------------ | ------------------------------------- | ----------------------- | |
| | `panic=unwind` | unwinding | unwind | unwind | |
| | `panic=unwind` | non-unwinding | abort (see notes below) | [undefined behavior] | |
| | `panic=abort` | unwinding | `panic` aborts without unwinding | abort | |
| | `panic=abort` | non-unwinding | `panic` aborts without unwinding | [undefined behavior] | |
| |
| r[items.fn.extern.abort] |
| With `panic=unwind`, when a `panic` is turned into an abort by a non-unwinding ABI boundary, either no destructors (`Drop` calls) will run, or all destructors up until the ABI boundary will run. It is unspecified which of those two behaviors will happen. |
| |
| For other considerations and limitations regarding unwinding across FFI boundaries, see the [relevant section in the Panic documentation][panic-ffi]. |
| |
| [forced-unwinding]: https://rust-lang.github.io/rfcs/2945-c-unwind-abi.html#forced-unwinding |
| [panic handler]: ../panic.md#the-panic_handler-attribute |
| [panic-ffi]: ../panic.md#unwinding-across-ffi-boundaries |
| [panicking]: ../panic.md |
| [undefined behavior]: ../behavior-considered-undefined.md |
| |
| r[items.fn.const] |
| ## Const functions |
| |
| r[items.fn.const.intro] |
| Functions qualified with the `const` keyword are [const functions], as are [tuple struct] and [tuple variant] constructors. _Const functions_ can be called from within [const contexts]. |
| |
| r[items.fn.const.extern] |
| Const functions may use the [`extern`] function qualifier. |
| |
| r[items.fn.const.exclusivity] |
| Const functions are not allowed to be [async](#async-functions). |
| |
| r[items.fn.async] |
| ## Async functions |
| |
| r[items.fn.async.intro] |
| Functions may be qualified as async, and this can also be combined with the |
| `unsafe` qualifier: |
| |
| ```rust |
| async fn regular_example() { } |
| async unsafe fn unsafe_example() { } |
| ``` |
| |
| r[items.fn.async.future] |
| Async functions do no work when called: instead, they |
| capture their arguments into a future. When polled, that future will |
| execute the function's body. |
| |
| r[items.fn.async.desugar-brief] |
| An async function is roughly equivalent to a function |
| that returns [`impl Future`] and with an [`async move` block][async-blocks] as |
| its body: |
| |
| ```rust |
| // Source |
| async fn example(x: &str) -> usize { |
| x.len() |
| } |
| ``` |
| |
| is roughly equivalent to: |
| |
| ```rust |
| # use std::future::Future; |
| // Desugared |
| fn example<'a>(x: &'a str) -> impl Future<Output = usize> + 'a { |
| async move { x.len() } |
| } |
| ``` |
| |
| r[items.fn.async.desugar] |
| The actual desugaring is more complex: |
| |
| r[items.fn.async.lifetime-capture] |
| - The return type in the desugaring is assumed to capture all lifetime |
| parameters from the `async fn` declaration. This can be seen in the |
| desugared example above, which explicitly outlives, and hence |
| captures, `'a`. |
| |
| r[items.fn.async.param-capture] |
| - The [`async move` block][async-blocks] in the body captures all function |
| parameters, including those that are unused or bound to a `_` |
| pattern. This ensures that function parameters are dropped in the |
| same order as they would be if the function were not async, except |
| that the drop occurs when the returned future has been fully |
| awaited. |
| |
| For more information on the effect of async, see [`async` blocks][async-blocks]. |
| |
| [async-blocks]: ../expressions/block-expr.md#async-blocks |
| [`impl Future`]: ../types/impl-trait.md |
| |
| r[items.fn.async.edition2018] |
| > [!EDITION-2018] |
| > Async functions are only available beginning with Rust 2018. |
| |
| r[items.fn.async.safety] |
| ### Combining `async` and `unsafe` |
| |
| r[items.fn.async.safety.intro] |
| It is legal to declare a function that is both async and unsafe. The |
| resulting function is unsafe to call and (like any async function) |
| returns a future. This future is just an ordinary future and thus an |
| `unsafe` context is not required to "await" it: |
| |
| ```rust |
| // Returns a future that, when awaited, dereferences `x`. |
| // |
| // Soundness condition: `x` must be safe to dereference until |
| // the resulting future is complete. |
| async unsafe fn unsafe_example(x: *const i32) -> i32 { |
| *x |
| } |
| |
| async fn safe_example() { |
| // An `unsafe` block is required to invoke the function initially: |
| let p = 22; |
| let future = unsafe { unsafe_example(&p) }; |
| |
| // But no `unsafe` block required here. This will |
| // read the value of `p`: |
| let q = future.await; |
| } |
| ``` |
| |
| Note that this behavior is a consequence of the desugaring to a |
| function that returns an `impl Future` -- in this case, the function |
| we desugar to is an `unsafe` function, but the return value remains |
| the same. |
| |
| Unsafe is used on an async function in precisely the same way that it |
| is used on other functions: it indicates that the function imposes |
| some additional obligations on its caller to ensure soundness. As in any |
| other unsafe function, these conditions may extend beyond the initial |
| call itself -- in the snippet above, for example, the `unsafe_example` |
| function took a pointer `x` as argument, and then (when awaited) |
| dereferenced that pointer. This implies that `x` would have to be |
| valid until the future is finished executing, and it is the caller's |
| responsibility to ensure that. |
| |
| r[items.fn.attributes] |
| ## Attributes on functions |
| |
| r[items.fn.attributes.intro] |
| [Outer attributes][attributes] are allowed on functions. [Inner |
| attributes][attributes] are allowed directly after the `{` inside its body [block]. |
| |
| This example shows an inner attribute on a function. The function is documented |
| with just the word "Example". |
| |
| ```rust |
| fn documented() { |
| #![doc = "Example"] |
| } |
| ``` |
| |
| > [!NOTE] |
| > Except for lints, it is idiomatic to only use outer attributes on function items. |
| |
| r[items.fn.attributes.builtin-attributes] |
| The attributes that have meaning on a function are [`cfg`], [`cfg_attr`], [`deprecated`], |
| [`doc`], [`export_name`], [`link_section`], [`no_mangle`], [the lint check |
| attributes], [`must_use`], [the procedural macro attributes], [the testing |
| attributes], and [the optimization hint attributes]. Functions also accept |
| attributes macros. |
| |
| r[items.fn.param-attributes] |
| ## Attributes on function parameters |
| |
| r[items.fn.param-attributes.intro] |
| [Outer attributes][attributes] are allowed on function parameters and the |
| permitted [built-in attributes] are restricted to `cfg`, `cfg_attr`, `allow`, |
| `warn`, `deny`, and `forbid`. |
| |
| ```rust |
| fn len( |
| #[cfg(windows)] slice: &[u16], |
| #[cfg(not(windows))] slice: &[u8], |
| ) -> usize { |
| slice.len() |
| } |
| ``` |
| |
| r[items.fn.param-attributes.parsed-attributes] |
| Inert helper attributes used by procedural macro attributes applied to items are also |
| allowed but be careful to not include these inert attributes in your final `TokenStream`. |
| |
| For example, the following code defines an inert `some_inert_attribute` attribute that |
| is not formally defined anywhere and the `some_proc_macro_attribute` procedural macro is |
| responsible for detecting its presence and removing it from the output token stream. |
| |
| <!-- ignore: requires proc macro --> |
| ```rust,ignore |
| #[some_proc_macro_attribute] |
| fn foo_oof(#[some_inert_attribute] arg: u8) { |
| } |
| ``` |
| |
| [const contexts]: ../const_eval.md#const-context |
| [const functions]: ../const_eval.md#const-functions |
| [tuple struct]: structs.md |
| [tuple variant]: enumerations.md |
| [`extern`]: #extern-function-qualifier |
| [external block]: external-blocks.md |
| [path]: ../paths.md |
| [block]: ../expressions/block-expr.md |
| [variables]: ../variables.md |
| [type]: ../types.md#type-expressions |
| [unit type]: ../types/tuple.md |
| [*function item type*]: ../types/function-item.md |
| [Trait]: traits.md |
| [attributes]: ../attributes.md |
| [`cfg`]: ../conditional-compilation.md#the-cfg-attribute |
| [`cfg_attr`]: ../conditional-compilation.md#the-cfg_attr-attribute |
| [the lint check attributes]: ../attributes/diagnostics.md#lint-check-attributes |
| [the procedural macro attributes]: ../procedural-macros.md |
| [the testing attributes]: ../attributes/testing.md |
| [the optimization hint attributes]: ../attributes/codegen.md#optimization-hints |
| [`deprecated`]: ../attributes/diagnostics.md#the-deprecated-attribute |
| [`doc`]: ../../rustdoc/the-doc-attribute.html |
| [`must_use`]: ../attributes/diagnostics.md#the-must_use-attribute |
| [patterns]: ../patterns.md |
| [`export_name`]: ../abi.md#the-export_name-attribute |
| [`link_section`]: ../abi.md#the-link_section-attribute |
| [`no_mangle`]: ../abi.md#the-no_mangle-attribute |
| [built-in attributes]: ../attributes.md#built-in-attributes-index |
| [trait item]: traits.md |
| [method]: associated-items.md#methods |
| [associated function]: associated-items.md#associated-functions-and-methods |
| [implementation]: implementations.md |
| [value namespace]: ../names/namespaces.md |
| [variadic function]: external-blocks.md#variadic-functions |
| [`extern` block]: external-blocks.md |