[INFO] fetching crate ringbuffer 0.15.0... [INFO] checking ringbuffer-0.15.0 against master#35936c4839dd272646394779d151e060d0f6b3ac for pr-122960-1 [INFO] extracting crate ringbuffer 0.15.0 into /workspace/builds/worker-6-tc1/source [INFO] validating manifest of crates.io crate ringbuffer 0.15.0 on toolchain 35936c4839dd272646394779d151e060d0f6b3ac [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+35936c4839dd272646394779d151e060d0f6b3ac" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate ringbuffer 0.15.0 [INFO] finished tweaking crates.io crate ringbuffer 0.15.0 [INFO] tweaked toml for crates.io crate ringbuffer 0.15.0 written to /workspace/builds/worker-6-tc1/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+35936c4839dd272646394779d151e060d0f6b3ac" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+35936c4839dd272646394779d151e060d0f6b3ac" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded filetime v0.2.23 [INFO] [stderr] Downloaded criterion v0.4.0 [INFO] [stderr] Downloaded miow v0.3.7 [INFO] [stderr] Downloaded term v0.7.0 [INFO] [stderr] Downloaded tester v0.9.1 [INFO] [stderr] Downloaded compiletest_rs v0.10.2 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+35936c4839dd272646394779d151e060d0f6b3ac" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 1f9de9d7fea34f79b9401f96f8f578dd0d3ea132988b27d25dbad2c648a71d96 [INFO] running `Command { std: "docker" "start" "-a" "1f9de9d7fea34f79b9401f96f8f578dd0d3ea132988b27d25dbad2c648a71d96", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "1f9de9d7fea34f79b9401f96f8f578dd0d3ea132988b27d25dbad2c648a71d96", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "1f9de9d7fea34f79b9401f96f8f578dd0d3ea132988b27d25dbad2c648a71d96", kill_on_drop: false }` [INFO] [stdout] 1f9de9d7fea34f79b9401f96f8f578dd0d3ea132988b27d25dbad2c648a71d96 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+35936c4839dd272646394779d151e060d0f6b3ac" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] da6c3b99c0d3b29a042853c653d9aff46b3ad95e4a27bdb0986b26593e6c4711 [INFO] running `Command { std: "docker" "start" "-a" "da6c3b99c0d3b29a042853c653d9aff46b3ad95e4a27bdb0986b26593e6c4711", kill_on_drop: false }` [INFO] [stderr] Compiling serde v1.0.197 [INFO] [stderr] Compiling crossbeam-utils v0.8.19 [INFO] [stderr] Compiling serde_json v1.0.115 [INFO] [stderr] Checking itoa v1.0.11 [INFO] [stderr] Checking memchr v2.7.2 [INFO] [stderr] Checking ryu v1.0.17 [INFO] [stderr] Checking dirs-sys-next v0.1.2 [INFO] [stderr] Checking either v1.10.0 [INFO] [stderr] Compiling rayon-core v1.12.1 [INFO] [stderr] Checking dirs-next v2.0.0 [INFO] [stderr] Checking half v2.4.0 [INFO] [stderr] Checking os_str_bytes v6.6.1 [INFO] [stderr] Checking ciborium-io v0.2.2 [INFO] [stderr] Checking plotters-backend v0.3.5 [INFO] [stderr] Checking itertools v0.10.5 [INFO] [stderr] Checking getopts v0.2.21 [INFO] [stderr] Checking ciborium-ll v0.2.2 [INFO] [stderr] Checking clap_lex v0.2.4 [INFO] [stderr] Checking aho-corasick v1.1.3 [INFO] [stderr] Checking plotters-svg v0.3.5 [INFO] [stderr] Checking term v0.7.0 [INFO] [stderr] Checking num_cpus v1.16.0 [INFO] [stderr] Checking log v0.4.21 [INFO] [stderr] Compiling compiletest_rs v0.10.2 [INFO] [stderr] Checking cast v0.3.0 [INFO] [stderr] Checking textwrap v0.16.1 [INFO] [stderr] Checking same-file v1.0.6 [INFO] [stderr] Checking tester v0.9.1 [INFO] [stderr] Checking walkdir v2.5.0 [INFO] [stderr] Checking plotters v0.3.5 [INFO] [stderr] Checking crossbeam-epoch v0.9.18 [INFO] [stderr] Checking clap v3.2.25 [INFO] [stderr] Checking filetime v0.2.23 [INFO] [stderr] Checking atty v0.2.14 [INFO] [stderr] Checking anes v0.1.6 [INFO] [stderr] Checking diff v0.1.13 [INFO] [stderr] Checking oorandom v11.1.3 [INFO] [stderr] Checking crossbeam-deque v0.8.5 [INFO] [stderr] Checking ringbuffer v0.15.0 (/opt/rustwide/workdir) [INFO] [stdout] error: the item `FromIterator` is imported redundantly [INFO] [stdout] --> src/with_const_generics.rs:3:5 [INFO] [stdout] | [INFO] [stdout] 3 | use core::iter::FromIterator; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] --> /rustc/35936c4839dd272646394779d151e060d0f6b3ac/library/core/src/prelude/mod.rs:42:13 [INFO] [stdout] | [INFO] [stdout] = note: the item `FromIterator` is already defined here [INFO] [stdout] | [INFO] [stdout] note: the lint level is defined here [INFO] [stdout] --> src/lib.rs:3:9 [INFO] [stdout] | [INFO] [stdout] 3 | #![deny(warnings)] [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] = note: `#[deny(unused_imports)]` implied by `#[deny(warnings)]` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking regex-automata v0.4.6 [INFO] [stdout] error: aborting due to 1 previous error [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `ringbuffer` (lib) due to 2 previous errors [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] running `Command { std: "docker" "inspect" "da6c3b99c0d3b29a042853c653d9aff46b3ad95e4a27bdb0986b26593e6c4711", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "da6c3b99c0d3b29a042853c653d9aff46b3ad95e4a27bdb0986b26593e6c4711", kill_on_drop: false }` [INFO] [stdout] da6c3b99c0d3b29a042853c653d9aff46b3ad95e4a27bdb0986b26593e6c4711 [INFO] checking ringbuffer-0.15.0 against try#9ae1860851f3fbc1435a1698e572252c0076f413 for pr-122960-1 [INFO] extracting crate ringbuffer 0.15.0 into /workspace/builds/worker-6-tc2/source [INFO] validating manifest of crates.io crate ringbuffer 0.15.0 on toolchain 9ae1860851f3fbc1435a1698e572252c0076f413 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+9ae1860851f3fbc1435a1698e572252c0076f413" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate ringbuffer 0.15.0 [INFO] finished tweaking crates.io crate ringbuffer 0.15.0 [INFO] tweaked toml for crates.io crate ringbuffer 0.15.0 written to /workspace/builds/worker-6-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+9ae1860851f3fbc1435a1698e572252c0076f413" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+9ae1860851f3fbc1435a1698e572252c0076f413" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+9ae1860851f3fbc1435a1698e572252c0076f413" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 018b95616912ca6920a83b9fc8fdb0f977b53c2f7564b76ff86b2e0bbb9473b9 [INFO] running `Command { std: "docker" "start" "-a" "018b95616912ca6920a83b9fc8fdb0f977b53c2f7564b76ff86b2e0bbb9473b9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "018b95616912ca6920a83b9fc8fdb0f977b53c2f7564b76ff86b2e0bbb9473b9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "018b95616912ca6920a83b9fc8fdb0f977b53c2f7564b76ff86b2e0bbb9473b9", kill_on_drop: false }` [INFO] [stdout] 018b95616912ca6920a83b9fc8fdb0f977b53c2f7564b76ff86b2e0bbb9473b9 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+9ae1860851f3fbc1435a1698e572252c0076f413" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 400e9edf4dca2ef7669b2f4308630c3fd06ec703a3ab275f5520f8443b604185 [INFO] running `Command { std: "docker" "start" "-a" "400e9edf4dca2ef7669b2f4308630c3fd06ec703a3ab275f5520f8443b604185", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Compiling serde v1.0.197 [INFO] [stderr] Compiling crossbeam-utils v0.8.19 [INFO] [stderr] Compiling serde_json v1.0.115 [INFO] [stderr] Checking memchr v2.7.2 [INFO] [stderr] Checking ryu v1.0.17 [INFO] [stderr] Checking itoa v1.0.11 [INFO] [stderr] Checking dirs-sys-next v0.1.2 [INFO] [stderr] Compiling rayon-core v1.12.1 [INFO] [stderr] Checking either v1.10.0 [INFO] [stderr] Checking dirs-next v2.0.0 [INFO] [stderr] Checking half v2.4.0 [INFO] [stderr] Checking plotters-backend v0.3.5 [INFO] [stderr] Checking os_str_bytes v6.6.1 [INFO] [stderr] Checking ciborium-io v0.2.2 [INFO] [stderr] Checking getopts v0.2.21 [INFO] [stderr] Checking itertools v0.10.5 [INFO] [stderr] Checking plotters-svg v0.3.5 [INFO] [stderr] Checking ciborium-ll v0.2.2 [INFO] [stderr] Checking clap_lex v0.2.4 [INFO] [stderr] Checking term v0.7.0 [INFO] [stderr] Checking num_cpus v1.16.0 [INFO] [stderr] Checking aho-corasick v1.1.3 [INFO] [stderr] Checking log v0.4.21 [INFO] [stderr] Checking cast v0.3.0 [INFO] [stderr] Checking same-file v1.0.6 [INFO] [stderr] Compiling compiletest_rs v0.10.2 [INFO] [stderr] Checking textwrap v0.16.1 [INFO] [stderr] Checking walkdir v2.5.0 [INFO] [stderr] Checking tester v0.9.1 [INFO] [stderr] Checking plotters v0.3.5 [INFO] [stderr] Checking crossbeam-epoch v0.9.18 [INFO] [stderr] Checking clap v3.2.25 [INFO] [stderr] Checking atty v0.2.14 [INFO] [stderr] Checking filetime v0.2.23 [INFO] [stderr] Checking anes v0.1.6 [INFO] [stderr] Checking crossbeam-deque v0.8.5 [INFO] [stderr] Checking oorandom v11.1.3 [INFO] [stderr] Checking diff v0.1.13 [INFO] [stderr] Checking ringbuffer v0.15.0 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stdout] error: the item `FromIterator` is imported redundantly [INFO] [stdout] --> src/with_const_generics.rs:3:5 [INFO] [stdout] | [INFO] [stdout] 3 | use core::iter::FromIterator; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] --> /rustc/9ae1860851f3fbc1435a1698e572252c0076f413/library/core/src/prelude/mod.rs:42:13 [INFO] [stdout] | [INFO] [stdout] = note: the item `FromIterator` is already defined here [INFO] [stdout] | [INFO] [stdout] note: the lint level is defined here [INFO] [stdout] --> src/lib.rs:3:9 [INFO] [stdout] | [INFO] [stdout] 3 | #![deny(warnings)] [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] = note: `#[deny(unused_imports)]` implied by `#[deny(warnings)]` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:221:9 [INFO] [stdout] | [INFO] [stdout] 221 | (*rb).capacity [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:220:5 [INFO] [stdout] | [INFO] [stdout] 220 | unsafe fn ptr_capacity(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] = help: to override `--force-warn rust-2024-compatibility` add `#[allow(unsafe_op_in_unsafe_fn)]` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:226:9 [INFO] [stdout] | [INFO] [stdout] 226 | (*rb).size [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:225:5 [INFO] [stdout] | [INFO] [stdout] 225 | unsafe fn ptr_buffer_size(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:443:13 [INFO] [stdout] | [INFO] [stdout] 443 | (*rb).$writeptr - (*rb).$readptr [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:442:9 [INFO] [stdout] | [INFO] [stdout] 442 | unsafe fn ptr_len(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:443:31 [INFO] [stdout] | [INFO] [stdout] 443 | (*rb).$writeptr - (*rb).$readptr [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:489:14 [INFO] [stdout] | [INFO] [stdout] 489 | (Self::ptr_len(rb) != 0).then(move || { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:488:9 [INFO] [stdout] | [INFO] [stdout] 488 | unsafe fn ptr_get_mut_signed(rb: *mut Self, index: isize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:493:21 [INFO] [stdout] | [INFO] [stdout] 493 | Self::ptr_len(rb) as isize + index [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:496:40 [INFO] [stdout] | [INFO] [stdout] 496 | let normalized_index = (*rb).$readptr as isize [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:497:53 [INFO] [stdout] | [INFO] [stdout] 497 | + index_from_readptr.rem_euclid(Self::ptr_len(rb) as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:513:14 [INFO] [stdout] | [INFO] [stdout] 513 | (Self::ptr_len(rb) != 0).then(move || { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:512:9 [INFO] [stdout] | [INFO] [stdout] 512 | unsafe fn ptr_get_mut(rb: *mut Self, index: usize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:514:40 [INFO] [stdout] | [INFO] [stdout] 514 | let normalized_index = (*rb).$readptr + index.rem_euclid(Self::ptr_len(rb)); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:514:74 [INFO] [stdout] | [INFO] [stdout] 514 | let normalized_index = (*rb).$readptr + index.rem_euclid(Self::ptr_len(rb)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `core::ptr::mut_ptr::::add` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:339:13 [INFO] [stdout] | [INFO] [stdout] 339 | let p = (*rb).buf.add(index); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:338:1 [INFO] [stdout] | [INFO] [stdout] 338 | unsafe fn get_unchecked<'a, T>(rb: *const AllocRingBuffer, index: usize) -> &'a T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:339:13 [INFO] [stdout] | [INFO] [stdout] 339 | let p = (*rb).buf.add(index); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:342:6 [INFO] [stdout] | [INFO] [stdout] 342 | &*p [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `core::ptr::mut_ptr::::add` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:350:13 [INFO] [stdout] | [INFO] [stdout] 350 | let p = (*rb).buf.add(index); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:349:1 [INFO] [stdout] | [INFO] [stdout] 349 | unsafe fn get_unchecked_mut(rb: *mut AllocRingBuffer, index: usize) -> *mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:350:13 [INFO] [stdout] | [INFO] [stdout] 350 | let p = (*rb).buf.add(index); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:173:9 [INFO] [stdout] | [INFO] [stdout] 173 | (*rb).0.len() [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/vecdeque.rs:172:5 [INFO] [stdout] | [INFO] [stdout] 172 | unsafe fn ptr_len(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:178:9 [INFO] [stdout] | [INFO] [stdout] 178 | (*rb).0.capacity() [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/vecdeque.rs:177:5 [INFO] [stdout] | [INFO] [stdout] 177 | unsafe fn ptr_capacity(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:182:9 [INFO] [stdout] | [INFO] [stdout] 182 | (*rb).0.capacity() [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/vecdeque.rs:181:5 [INFO] [stdout] | [INFO] [stdout] 181 | unsafe fn ptr_buffer_size(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:231:12 [INFO] [stdout] | [INFO] [stdout] 231 | if RingBuffer::ptr_len(rb) == 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/vecdeque.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | unsafe fn ptr_get_mut_signed(rb: *mut Self, index: isize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:234:13 [INFO] [stdout] | [INFO] [stdout] 234 | (*rb).0.get_mut(index as usize) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:236:23 [INFO] [stdout] | [INFO] [stdout] 236 | let len = Self::ptr_len(rb); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:242:13 [INFO] [stdout] | [INFO] [stdout] 242 | (*rb).0.get_mut(index) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:249:12 [INFO] [stdout] | [INFO] [stdout] 249 | if RingBuffer::ptr_len(rb) == 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/vecdeque.rs:247:5 [INFO] [stdout] | [INFO] [stdout] 247 | unsafe fn ptr_get_mut(rb: *mut Self, index: usize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:252:13 [INFO] [stdout] | [INFO] [stdout] 252 | (*rb).0.get_mut(index) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `core::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_const_generics.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | / (*rb).buf[index] [INFO] [stdout] 200 | | .as_ptr() [INFO] [stdout] 201 | | .as_ref() [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_const_generics.rs:195:1 [INFO] [stdout] | [INFO] [stdout] 195 | / unsafe fn get_unchecked<'a, T, const N: usize>( [INFO] [stdout] 196 | | rb: *const ConstGenericRingBuffer, [INFO] [stdout] 197 | | index: usize, [INFO] [stdout] 198 | | ) -> &'a T { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_const_generics.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | (*rb).buf[index] [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `core::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_const_generics.rs:211:5 [INFO] [stdout] | [INFO] [stdout] 211 | / (*rb).buf[index] [INFO] [stdout] 212 | | .as_mut_ptr() [INFO] [stdout] 213 | | .as_mut() [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_const_generics.rs:207:1 [INFO] [stdout] | [INFO] [stdout] 207 | / unsafe fn get_unchecked_mut( [INFO] [stdout] 208 | | rb: *mut ConstGenericRingBuffer, [INFO] [stdout] 209 | | index: usize, [INFO] [stdout] 210 | | ) -> *mut T { [INFO] [stdout] | |___________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_const_generics.rs:211:5 [INFO] [stdout] | [INFO] [stdout] 211 | (*rb).buf[index] [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:443:13 [INFO] [stdout] | [INFO] [stdout] 443 | (*rb).$writeptr - (*rb).$readptr [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:265:5 [INFO] [stdout] | [INFO] [stdout] 265 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:442:9 [INFO] [stdout] | [INFO] [stdout] 442 | unsafe fn ptr_len(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:265:5 [INFO] [stdout] | [INFO] [stdout] 265 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:443:31 [INFO] [stdout] | [INFO] [stdout] 443 | (*rb).$writeptr - (*rb).$readptr [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:265:5 [INFO] [stdout] | [INFO] [stdout] 265 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:489:14 [INFO] [stdout] | [INFO] [stdout] 489 | (Self::ptr_len(rb) != 0).then(move || { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:488:9 [INFO] [stdout] | [INFO] [stdout] 488 | unsafe fn ptr_get_mut_signed(rb: *mut Self, index: isize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:493:21 [INFO] [stdout] | [INFO] [stdout] 493 | Self::ptr_len(rb) as isize + index [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:496:40 [INFO] [stdout] | [INFO] [stdout] 496 | let normalized_index = (*rb).$readptr as isize [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:497:53 [INFO] [stdout] | [INFO] [stdout] 497 | + index_from_readptr.rem_euclid(Self::ptr_len(rb) as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:513:14 [INFO] [stdout] | [INFO] [stdout] 513 | (Self::ptr_len(rb) != 0).then(move || { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:512:9 [INFO] [stdout] | [INFO] [stdout] 512 | unsafe fn ptr_get_mut(rb: *mut Self, index: usize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:514:40 [INFO] [stdout] | [INFO] [stdout] 514 | let normalized_index = (*rb).$readptr + index.rem_euclid(Self::ptr_len(rb)); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:514:74 [INFO] [stdout] | [INFO] [stdout] 514 | let normalized_index = (*rb).$readptr + index.rem_euclid(Self::ptr_len(rb)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 1 previous error; 38 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `ringbuffer` (lib) due to 2 previous errors; 38 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stderr] error: failed to migrate to next edition [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo fix --edition --allow-no-vcs --allow-dirty --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "400e9edf4dca2ef7669b2f4308630c3fd06ec703a3ab275f5520f8443b604185", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "400e9edf4dca2ef7669b2f4308630c3fd06ec703a3ab275f5520f8443b604185", kill_on_drop: false }` [INFO] [stdout] 400e9edf4dca2ef7669b2f4308630c3fd06ec703a3ab275f5520f8443b604185