[INFO] fetching crate ringbuffer 0.15.0... [INFO] checking ringbuffer-0.15.0 against master#af4a5a13a15fa0c60e06321077ef452f769b42fd for pr-122960-2 [INFO] extracting crate ringbuffer 0.15.0 into /workspace/builds/worker-5-tc1/source [INFO] validating manifest of crates.io crate ringbuffer 0.15.0 on toolchain af4a5a13a15fa0c60e06321077ef452f769b42fd [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+af4a5a13a15fa0c60e06321077ef452f769b42fd" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate ringbuffer 0.15.0 [INFO] finished tweaking crates.io crate ringbuffer 0.15.0 [INFO] tweaked toml for crates.io crate ringbuffer 0.15.0 written to /workspace/builds/worker-5-tc1/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+af4a5a13a15fa0c60e06321077ef452f769b42fd" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 98 packages [INFO] [stderr] Adding anes v0.1.6 (latest: v0.2.0) [INFO] [stderr] Adding bitflags v1.3.2 (latest: v2.5.0) [INFO] [stderr] Adding clap v3.2.25 (latest: v4.5.4) [INFO] [stderr] Adding clap_lex v0.2.4 (latest: v0.7.0) [INFO] [stderr] Adding criterion v0.4.0 (latest: v0.5.1) [INFO] [stderr] Adding hashbrown v0.12.3 (latest: v0.14.3) [INFO] [stderr] Adding hermit-abi v0.1.19 (latest: v0.3.9) [INFO] [stderr] Adding indexmap v1.9.3 (latest: v2.2.6) [INFO] [stderr] Adding itertools v0.10.5 (latest: v0.12.1) [INFO] [stderr] Adding libredox v0.0.1 (latest: v0.1.3) [INFO] [stderr] Adding miow v0.3.7 (latest: v0.6.0) [INFO] [stderr] Adding os_str_bytes v6.6.1 (latest: v7.0.0) [INFO] [stderr] Adding redox_syscall v0.4.1 (latest: v0.5.1) [INFO] [stderr] Adding rustfix v0.6.1 (latest: v0.8.1) [INFO] [stderr] Adding wasi v0.11.0+wasi-snapshot-preview1 (latest: v0.13.0+wasi-0.2.0) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+af4a5a13a15fa0c60e06321077ef452f769b42fd" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded tester v0.9.1 [INFO] [stderr] Downloaded rustfix v0.6.1 [INFO] [stderr] Downloaded compiletest_rs v0.10.2 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+af4a5a13a15fa0c60e06321077ef452f769b42fd" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 48a7dc9a076b96640429011138dbd9b38594a3e292a9a133c28c15f18456594f [INFO] running `Command { std: "docker" "start" "-a" "48a7dc9a076b96640429011138dbd9b38594a3e292a9a133c28c15f18456594f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "48a7dc9a076b96640429011138dbd9b38594a3e292a9a133c28c15f18456594f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "48a7dc9a076b96640429011138dbd9b38594a3e292a9a133c28c15f18456594f", kill_on_drop: false }` [INFO] [stdout] 48a7dc9a076b96640429011138dbd9b38594a3e292a9a133c28c15f18456594f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+af4a5a13a15fa0c60e06321077ef452f769b42fd" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] af3f31c0c9db6af5c78ed6479e8de7b7a5ec0e9ab91a2adf8dc253894333a0b9 [INFO] running `Command { std: "docker" "start" "-a" "af3f31c0c9db6af5c78ed6479e8de7b7a5ec0e9ab91a2adf8dc253894333a0b9", kill_on_drop: false }` [INFO] [stderr] Compiling proc-macro2 v1.0.79 [INFO] [stderr] Compiling libc v0.2.153 [INFO] [stderr] Compiling crossbeam-utils v0.8.19 [INFO] [stderr] Checking memchr v2.7.2 [INFO] [stderr] Compiling rayon-core v1.12.1 [INFO] [stderr] Checking either v1.10.0 [INFO] [stderr] Checking regex-syntax v0.8.3 [INFO] [stderr] Checking plotters-backend v0.3.5 [INFO] [stderr] Compiling indexmap v1.9.3 [INFO] [stderr] Compiling num-traits v0.2.18 [INFO] [stderr] Compiling anyhow v1.0.81 [INFO] [stderr] Checking half v2.4.0 [INFO] [stderr] Checking unicode-width v0.1.11 [INFO] [stderr] Checking hashbrown v0.12.3 [INFO] [stderr] Checking ciborium-io v0.2.2 [INFO] [stderr] Checking os_str_bytes v6.6.1 [INFO] [stderr] Checking textwrap v0.16.1 [INFO] [stderr] Checking getopts v0.2.21 [INFO] [stderr] Compiling compiletest_rs v0.10.2 [INFO] [stderr] Checking itertools v0.10.5 [INFO] [stderr] Checking plotters-svg v0.3.5 [INFO] [stderr] Checking clap_lex v0.2.4 [INFO] [stderr] Checking same-file v1.0.6 [INFO] [stderr] Checking bitflags v1.3.2 [INFO] [stderr] Checking log v0.4.21 [INFO] [stderr] Checking cast v0.3.0 [INFO] [stderr] Checking lazy_static v1.4.0 [INFO] [stderr] Checking walkdir v2.5.0 [INFO] [stderr] Checking oorandom v11.1.3 [INFO] [stderr] Checking diff v0.1.13 [INFO] [stderr] Checking anes v0.1.6 [INFO] [stderr] Checking ringbuffer v0.15.0 (/opt/rustwide/workdir) [INFO] [stderr] Checking ciborium-ll v0.2.2 [INFO] [stderr] Compiling quote v1.0.35 [INFO] [stdout] error: the item `FromIterator` is imported redundantly [INFO] [stdout] --> src/with_const_generics.rs:3:5 [INFO] [stdout] | [INFO] [stdout] 3 | use core::iter::FromIterator; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] --> /rustc/af4a5a13a15fa0c60e06321077ef452f769b42fd/library/core/src/prelude/mod.rs:61:13 [INFO] [stdout] | [INFO] [stdout] = note: the item `FromIterator` is already defined here [INFO] [stdout] | [INFO] [stdout] note: the lint level is defined here [INFO] [stdout] --> src/lib.rs:3:9 [INFO] [stdout] | [INFO] [stdout] 3 | #![deny(warnings)] [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] = note: `#[deny(unused_imports)]` implied by `#[deny(warnings)]` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking crossbeam-epoch v0.9.18 [INFO] [stderr] Compiling syn v2.0.57 [INFO] [stdout] error: aborting due to 1 previous error [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `ringbuffer` (lib) due to 2 previous errors [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] running `Command { std: "docker" "inspect" "af3f31c0c9db6af5c78ed6479e8de7b7a5ec0e9ab91a2adf8dc253894333a0b9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "af3f31c0c9db6af5c78ed6479e8de7b7a5ec0e9ab91a2adf8dc253894333a0b9", kill_on_drop: false }` [INFO] [stdout] af3f31c0c9db6af5c78ed6479e8de7b7a5ec0e9ab91a2adf8dc253894333a0b9 [INFO] checking ringbuffer-0.15.0 against try#36dbcaee1a55543dfc181be52a69d99ff46ff62f for pr-122960-2 [INFO] extracting crate ringbuffer 0.15.0 into /workspace/builds/worker-5-tc2/source [INFO] validating manifest of crates.io crate ringbuffer 0.15.0 on toolchain 36dbcaee1a55543dfc181be52a69d99ff46ff62f [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+36dbcaee1a55543dfc181be52a69d99ff46ff62f" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate ringbuffer 0.15.0 [INFO] finished tweaking crates.io crate ringbuffer 0.15.0 [INFO] tweaked toml for crates.io crate ringbuffer 0.15.0 written to /workspace/builds/worker-5-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+36dbcaee1a55543dfc181be52a69d99ff46ff62f" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+36dbcaee1a55543dfc181be52a69d99ff46ff62f" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+36dbcaee1a55543dfc181be52a69d99ff46ff62f" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 1820101c3713cf13d24fc078364120e8acb4f61bcf605f587babe043272ec11f [INFO] running `Command { std: "docker" "start" "-a" "1820101c3713cf13d24fc078364120e8acb4f61bcf605f587babe043272ec11f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "1820101c3713cf13d24fc078364120e8acb4f61bcf605f587babe043272ec11f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "1820101c3713cf13d24fc078364120e8acb4f61bcf605f587babe043272ec11f", kill_on_drop: false }` [INFO] [stdout] 1820101c3713cf13d24fc078364120e8acb4f61bcf605f587babe043272ec11f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+36dbcaee1a55543dfc181be52a69d99ff46ff62f" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] a6ce0b759b7303d952365bfc9d03fd49c48d939b927a210ff7e93e2f0e820995 [INFO] running `Command { std: "docker" "start" "-a" "a6ce0b759b7303d952365bfc9d03fd49c48d939b927a210ff7e93e2f0e820995", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Compiling proc-macro2 v1.0.79 [INFO] [stderr] Compiling libc v0.2.153 [INFO] [stderr] Compiling crossbeam-utils v0.8.19 [INFO] [stderr] Checking memchr v2.7.2 [INFO] [stderr] Checking either v1.10.0 [INFO] [stderr] Compiling rayon-core v1.12.1 [INFO] [stderr] Checking regex-syntax v0.8.3 [INFO] [stderr] Checking hashbrown v0.12.3 [INFO] [stderr] Compiling indexmap v1.9.3 [INFO] [stderr] Compiling num-traits v0.2.18 [INFO] [stderr] Checking half v2.4.0 [INFO] [stderr] Compiling anyhow v1.0.81 [INFO] [stderr] Checking ciborium-io v0.2.2 [INFO] [stderr] Checking os_str_bytes v6.6.1 [INFO] [stderr] Checking plotters-backend v0.3.5 [INFO] [stderr] Checking unicode-width v0.1.11 [INFO] [stderr] Checking textwrap v0.16.1 [INFO] [stderr] Checking getopts v0.2.21 [INFO] [stderr] Checking plotters-svg v0.3.5 [INFO] [stderr] Checking clap_lex v0.2.4 [INFO] [stderr] Checking itertools v0.10.5 [INFO] [stderr] Checking log v0.4.21 [INFO] [stderr] Checking cast v0.3.0 [INFO] [stderr] Checking same-file v1.0.6 [INFO] [stderr] Checking ciborium-ll v0.2.2 [INFO] [stderr] Compiling compiletest_rs v0.10.2 [INFO] [stderr] Checking lazy_static v1.4.0 [INFO] [stderr] Checking bitflags v1.3.2 [INFO] [stderr] Checking diff v0.1.13 [INFO] [stderr] Checking oorandom v11.1.3 [INFO] [stderr] Checking aho-corasick v1.1.3 [INFO] [stderr] Checking anes v0.1.6 [INFO] [stderr] Checking ringbuffer v0.15.0 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] Checking walkdir v2.5.0 [INFO] [stdout] error: the item `FromIterator` is imported redundantly [INFO] [stdout] --> src/with_const_generics.rs:3:5 [INFO] [stdout] | [INFO] [stdout] 3 | use core::iter::FromIterator; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] --> /rustc/36dbcaee1a55543dfc181be52a69d99ff46ff62f/library/core/src/prelude/mod.rs:61:13 [INFO] [stdout] | [INFO] [stdout] = note: the item `FromIterator` is already defined here [INFO] [stdout] | [INFO] [stdout] note: the lint level is defined here [INFO] [stdout] --> src/lib.rs:3:9 [INFO] [stdout] | [INFO] [stdout] 3 | #![deny(warnings)] [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] = note: `#[deny(unused_imports)]` implied by `#[deny(warnings)]` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:221:9 [INFO] [stdout] | [INFO] [stdout] 221 | (*rb).capacity [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:220:5 [INFO] [stdout] | [INFO] [stdout] 220 | unsafe fn ptr_capacity(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] = help: to override `--force-warn rust-2024-compatibility` add `#[allow(unsafe_op_in_unsafe_fn)]` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:226:9 [INFO] [stdout] | [INFO] [stdout] 226 | (*rb).size [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:225:5 [INFO] [stdout] | [INFO] [stdout] 225 | unsafe fn ptr_buffer_size(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:443:13 [INFO] [stdout] | [INFO] [stdout] 443 | (*rb).$writeptr - (*rb).$readptr [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:442:9 [INFO] [stdout] | [INFO] [stdout] 442 | unsafe fn ptr_len(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:443:31 [INFO] [stdout] | [INFO] [stdout] 443 | (*rb).$writeptr - (*rb).$readptr [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:489:14 [INFO] [stdout] | [INFO] [stdout] 489 | (Self::ptr_len(rb) != 0).then(move || { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:488:9 [INFO] [stdout] | [INFO] [stdout] 488 | unsafe fn ptr_get_mut_signed(rb: *mut Self, index: isize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:493:21 [INFO] [stdout] | [INFO] [stdout] 493 | Self::ptr_len(rb) as isize + index [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:496:40 [INFO] [stdout] | [INFO] [stdout] 496 | let normalized_index = (*rb).$readptr as isize [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:497:53 [INFO] [stdout] | [INFO] [stdout] 497 | + index_from_readptr.rem_euclid(Self::ptr_len(rb) as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:513:14 [INFO] [stdout] | [INFO] [stdout] 513 | (Self::ptr_len(rb) != 0).then(move || { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:512:9 [INFO] [stdout] | [INFO] [stdout] 512 | unsafe fn ptr_get_mut(rb: *mut Self, index: usize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:514:40 [INFO] [stdout] | [INFO] [stdout] 514 | let normalized_index = (*rb).$readptr + index.rem_euclid(Self::ptr_len(rb)); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:514:74 [INFO] [stdout] | [INFO] [stdout] 514 | let normalized_index = (*rb).$readptr + index.rem_euclid(Self::ptr_len(rb)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_alloc/alloc_ringbuffer.rs:275:5 [INFO] [stdout] | [INFO] [stdout] 275 | / impl_ringbuffer_ext!( [INFO] [stdout] 276 | | get_unchecked, [INFO] [stdout] 277 | | get_unchecked_mut, [INFO] [stdout] 278 | | readptr, [INFO] [stdout] 279 | | writeptr, [INFO] [stdout] 280 | | mask_and [INFO] [stdout] 281 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `core::ptr::mut_ptr::::add` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:339:13 [INFO] [stdout] | [INFO] [stdout] 339 | let p = (*rb).buf.add(index); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:338:1 [INFO] [stdout] | [INFO] [stdout] 338 | unsafe fn get_unchecked<'a, T>(rb: *const AllocRingBuffer, index: usize) -> &'a T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:339:13 [INFO] [stdout] | [INFO] [stdout] 339 | let p = (*rb).buf.add(index); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:342:6 [INFO] [stdout] | [INFO] [stdout] 342 | &*p [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `core::ptr::mut_ptr::::add` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:350:13 [INFO] [stdout] | [INFO] [stdout] 350 | let p = (*rb).buf.add(index); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:349:1 [INFO] [stdout] | [INFO] [stdout] 349 | unsafe fn get_unchecked_mut(rb: *mut AllocRingBuffer, index: usize) -> *mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/alloc_ringbuffer.rs:350:13 [INFO] [stdout] | [INFO] [stdout] 350 | let p = (*rb).buf.add(index); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:173:9 [INFO] [stdout] | [INFO] [stdout] 173 | (*rb).0.len() [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/vecdeque.rs:172:5 [INFO] [stdout] | [INFO] [stdout] 172 | unsafe fn ptr_len(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:178:9 [INFO] [stdout] | [INFO] [stdout] 178 | (*rb).0.capacity() [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/vecdeque.rs:177:5 [INFO] [stdout] | [INFO] [stdout] 177 | unsafe fn ptr_capacity(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:182:9 [INFO] [stdout] | [INFO] [stdout] 182 | (*rb).0.capacity() [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/vecdeque.rs:181:5 [INFO] [stdout] | [INFO] [stdout] 181 | unsafe fn ptr_buffer_size(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:231:12 [INFO] [stdout] | [INFO] [stdout] 231 | if RingBuffer::ptr_len(rb) == 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/vecdeque.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | unsafe fn ptr_get_mut_signed(rb: *mut Self, index: isize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:234:13 [INFO] [stdout] | [INFO] [stdout] 234 | (*rb).0.get_mut(index as usize) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:236:23 [INFO] [stdout] | [INFO] [stdout] 236 | let len = Self::ptr_len(rb); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:242:13 [INFO] [stdout] | [INFO] [stdout] 242 | (*rb).0.get_mut(index) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:249:12 [INFO] [stdout] | [INFO] [stdout] 249 | if RingBuffer::ptr_len(rb) == 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_alloc/vecdeque.rs:247:5 [INFO] [stdout] | [INFO] [stdout] 247 | unsafe fn ptr_get_mut(rb: *mut Self, index: usize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_alloc/vecdeque.rs:252:13 [INFO] [stdout] | [INFO] [stdout] 252 | (*rb).0.get_mut(index) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `core::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_const_generics.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | / (*rb).buf[index] [INFO] [stdout] 200 | | .as_ptr() [INFO] [stdout] 201 | | .as_ref() [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_const_generics.rs:195:1 [INFO] [stdout] | [INFO] [stdout] 195 | / unsafe fn get_unchecked<'a, T, const N: usize>( [INFO] [stdout] 196 | | rb: *const ConstGenericRingBuffer, [INFO] [stdout] 197 | | index: usize, [INFO] [stdout] 198 | | ) -> &'a T { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_const_generics.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | (*rb).buf[index] [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `core::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_const_generics.rs:211:5 [INFO] [stdout] | [INFO] [stdout] 211 | / (*rb).buf[index] [INFO] [stdout] 212 | | .as_mut_ptr() [INFO] [stdout] 213 | | .as_mut() [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/with_const_generics.rs:207:1 [INFO] [stdout] | [INFO] [stdout] 207 | / unsafe fn get_unchecked_mut( [INFO] [stdout] 208 | | rb: *mut ConstGenericRingBuffer, [INFO] [stdout] 209 | | index: usize, [INFO] [stdout] 210 | | ) -> *mut T { [INFO] [stdout] | |___________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/with_const_generics.rs:211:5 [INFO] [stdout] | [INFO] [stdout] 211 | (*rb).buf[index] [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:443:13 [INFO] [stdout] | [INFO] [stdout] 443 | (*rb).$writeptr - (*rb).$readptr [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:265:5 [INFO] [stdout] | [INFO] [stdout] 265 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:442:9 [INFO] [stdout] | [INFO] [stdout] 442 | unsafe fn ptr_len(rb: *const Self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:265:5 [INFO] [stdout] | [INFO] [stdout] 265 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:443:31 [INFO] [stdout] | [INFO] [stdout] 443 | (*rb).$writeptr - (*rb).$readptr [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:265:5 [INFO] [stdout] | [INFO] [stdout] 265 | impl_ringbuffer!(readptr, writeptr); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `ringbuffer` (lib) due to 2 previous errors; 38 warnings emitted [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:489:14 [INFO] [stdout] | [INFO] [stdout] 489 | (Self::ptr_len(rb) != 0).then(move || { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:488:9 [INFO] [stdout] | [INFO] [stdout] 488 | unsafe fn ptr_get_mut_signed(rb: *mut Self, index: isize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:493:21 [INFO] [stdout] | [INFO] [stdout] 493 | Self::ptr_len(rb) as isize + index [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:496:40 [INFO] [stdout] | [INFO] [stdout] 496 | let normalized_index = (*rb).$readptr as isize [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:497:53 [INFO] [stdout] | [INFO] [stdout] 497 | + index_from_readptr.rem_euclid(Self::ptr_len(rb) as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:513:14 [INFO] [stdout] | [INFO] [stdout] 513 | (Self::ptr_len(rb) != 0).then(move || { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ringbuffer_trait.rs:512:9 [INFO] [stdout] | [INFO] [stdout] 512 | unsafe fn ptr_get_mut(rb: *mut Self, index: usize) -> Option<*mut T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:514:40 [INFO] [stdout] | [INFO] [stdout] 514 | let normalized_index = (*rb).$readptr + index.rem_euclid(Self::ptr_len(rb)); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `ringbuffer_trait::RingBuffer::ptr_len` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> src/ringbuffer_trait.rs:514:74 [INFO] [stdout] | [INFO] [stdout] 514 | let normalized_index = (*rb).$readptr + index.rem_euclid(Self::ptr_len(rb)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/with_const_generics.rs:303:5 [INFO] [stdout] | [INFO] [stdout] 303 | / impl_ringbuffer_ext!( [INFO] [stdout] 304 | | get_unchecked, [INFO] [stdout] 305 | | get_unchecked_mut, [INFO] [stdout] 306 | | readptr, [INFO] [stdout] 307 | | writeptr, [INFO] [stdout] 308 | | crate::mask_modulo [INFO] [stdout] 309 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `impl_ringbuffer_ext` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 1 previous error; 38 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: failed to migrate to next edition [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo fix --edition --allow-no-vcs --allow-dirty --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "a6ce0b759b7303d952365bfc9d03fd49c48d939b927a210ff7e93e2f0e820995", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "a6ce0b759b7303d952365bfc9d03fd49c48d939b927a210ff7e93e2f0e820995", kill_on_drop: false }` [INFO] [stdout] a6ce0b759b7303d952365bfc9d03fd49c48d939b927a210ff7e93e2f0e820995