[INFO] fetching crate rdma-mummy-sys 0.1.0... [INFO] checking rdma-mummy-sys-0.1.0 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate rdma-mummy-sys 0.1.0 into /workspace/builds/worker-6-tc2/source [INFO] validating manifest of crates.io crate rdma-mummy-sys 0.1.0 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate rdma-mummy-sys 0.1.0 [INFO] removed 0 missing examples [INFO] finished tweaking crates.io crate rdma-mummy-sys 0.1.0 [INFO] tweaked toml for crates.io crate rdma-mummy-sys 0.1.0 written to /workspace/builds/worker-6-tc2/source/Cargo.toml [INFO] crate crates.io crate rdma-mummy-sys 0.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 4cd8bda08c3793ba8edff9612dd50bc8ee66846bfd9fd7a2a9686b3121bb3ef9 [INFO] running `Command { std: "docker" "start" "-a" "4cd8bda08c3793ba8edff9612dd50bc8ee66846bfd9fd7a2a9686b3121bb3ef9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "4cd8bda08c3793ba8edff9612dd50bc8ee66846bfd9fd7a2a9686b3121bb3ef9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "4cd8bda08c3793ba8edff9612dd50bc8ee66846bfd9fd7a2a9686b3121bb3ef9", kill_on_drop: false }` [INFO] [stdout] 4cd8bda08c3793ba8edff9612dd50bc8ee66846bfd9fd7a2a9686b3121bb3ef9 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 8a8e79006168a75400856077796f202446af1b210299603179d8bb62e304b6a8 [INFO] running `Command { std: "docker" "start" "-a" "8a8e79006168a75400856077796f202446af1b210299603179d8bb62e304b6a8", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Compiling glob v0.3.1 [INFO] [stderr] Compiling prettyplease v0.2.22 [INFO] [stderr] Compiling libc v0.2.158 [INFO] [stderr] Compiling rustix v0.38.35 [INFO] [stderr] Compiling regex-syntax v0.8.4 [INFO] [stderr] Compiling memchr v2.7.4 [INFO] [stderr] Compiling either v1.13.0 [INFO] [stderr] Compiling bindgen v0.66.1 [INFO] [stderr] Compiling proc-macro2 v1.0.86 [INFO] [stderr] Compiling libloading v0.8.5 [INFO] [stderr] Compiling rustc-hash v1.1.0 [INFO] [stderr] Compiling peeking_take_while v0.1.2 [INFO] [stderr] Compiling lazycell v1.3.0 [INFO] [stderr] Compiling cmake v0.1.51 [INFO] [stderr] Compiling clang-sys v1.8.1 [INFO] [stderr] Compiling quote v1.0.37 [INFO] [stderr] Compiling nom v7.1.3 [INFO] [stderr] Compiling syn v2.0.77 [INFO] [stderr] Compiling which v4.4.2 [INFO] [stderr] Compiling regex-automata v0.4.7 [INFO] [stderr] Compiling cexpr v0.6.0 [INFO] [stderr] Compiling regex v1.10.6 [INFO] [stderr] Compiling rdma-mummy-sys v0.1.0 (/tmp/fixit) [INFO] [stderr] Migrating build.rs from 2021 edition to 2024 [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `rdma_mummy_sys` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/opcode.rs [INFO] [stderr] * src/verbs.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/opcode.rs:5:10 [INFO] [stderr] | [INFO] [stderr] 5 | ($transport: expr_2021, $op : expr_2021 ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/opcode.rs:5:33 [INFO] [stderr] | [INFO] [stderr] 5 | ($transport: expr_2021, $op : expr_2021 ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/verbs.rs:254:6 [INFO] [stderr] | [INFO] [stderr] 254 | ($ptr:expr_2021, $container:path, $field:ident) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/verbs.rs:272:6 [INFO] [stderr] | [INFO] [stderr] 272 | ($vcr:expr_2021, $field:ident) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: aborting due to 4 previous errors [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:2042:1 [INFO] [stdout] | [INFO] [stdout] 2042 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 2043 | | pub fn ibv_wc_status_str( [INFO] [stdout] 2044 | | status: ibv_wc_status::Type, [INFO] [stdout] 2045 | | ) -> *const ::std::os::raw::c_char; [INFO] [stdout] 2046 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:2680:1 [INFO] [stdout] | [INFO] [stdout] 2680 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 2681 | | pub fn ibv_rate_to_mult(rate: ibv_rate::Type) -> ::std::os::raw::c_int; [INFO] [stdout] 2682 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:2683:1 [INFO] [stdout] | [INFO] [stdout] 2683 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 2684 | | pub fn ibv_rate_to_mbps(rate: ibv_rate::Type) -> ::std::os::raw::c_int; [INFO] [stdout] 2685 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:4191:1 [INFO] [stdout] | [INFO] [stdout] 4191 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 4192 | | pub fn ibv_wr_opcode_str( [INFO] [stdout] 4193 | | opcode: ibv_wr_opcode::Type, [INFO] [stdout] 4194 | | ) -> *const ::std::os::raw::c_char; [INFO] [stdout] 4195 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:5311:1 [INFO] [stdout] | [INFO] [stdout] 5311 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 5312 | | pub fn ibv_qp_to_qp_ex(qp: *mut ibv_qp) -> *mut ibv_qp_ex; [INFO] [stdout] 5313 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8392:1 [INFO] [stdout] | [INFO] [stdout] 8392 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8393 | | pub fn ibv_get_device_list( [INFO] [stdout] 8394 | | num_devices: *mut ::std::os::raw::c_int, [INFO] [stdout] 8395 | | ) -> *mut *mut ibv_device; [INFO] [stdout] 8396 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8397:1 [INFO] [stdout] | [INFO] [stdout] 8397 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8398 | | pub fn ibv_free_device_list(list: *mut *mut ibv_device); [INFO] [stdout] 8399 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8400:1 [INFO] [stdout] | [INFO] [stdout] 8400 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8401 | | pub fn ibv_get_device_name(device: *mut ibv_device) -> *const ::std::os::raw::c_char; [INFO] [stdout] 8402 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8403:1 [INFO] [stdout] | [INFO] [stdout] 8403 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8404 | | pub fn ibv_get_device_index(device: *mut ibv_device) -> ::std::os::raw::c_int; [INFO] [stdout] 8405 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8406:1 [INFO] [stdout] | [INFO] [stdout] 8406 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8407 | | pub fn ibv_get_device_guid(device: *mut ibv_device) -> __be64; [INFO] [stdout] 8408 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8409:1 [INFO] [stdout] | [INFO] [stdout] 8409 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8410 | | pub fn ibv_open_device(device: *mut ibv_device) -> *mut ibv_context; [INFO] [stdout] 8411 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8412:1 [INFO] [stdout] | [INFO] [stdout] 8412 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8413 | | pub fn ibv_close_device(context: *mut ibv_context) -> ::std::os::raw::c_int; [INFO] [stdout] 8414 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8415:1 [INFO] [stdout] | [INFO] [stdout] 8415 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8416 | | pub fn ibv_import_device(cmd_fd: ::std::os::raw::c_int) -> *mut ibv_context; [INFO] [stdout] 8417 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8418:1 [INFO] [stdout] | [INFO] [stdout] 8418 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8419 | | pub fn ibv_import_pd(context: *mut ibv_context, pd_handle: u32) -> *mut ibv_pd; [INFO] [stdout] 8420 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8421:1 [INFO] [stdout] | [INFO] [stdout] 8421 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8422 | | pub fn ibv_unimport_pd(pd: *mut ibv_pd); [INFO] [stdout] 8423 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8424:1 [INFO] [stdout] | [INFO] [stdout] 8424 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8425 | | pub fn ibv_import_mr(pd: *mut ibv_pd, mr_handle: u32) -> *mut ibv_mr; [INFO] [stdout] 8426 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8427:1 [INFO] [stdout] | [INFO] [stdout] 8427 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8428 | | pub fn ibv_unimport_mr(mr: *mut ibv_mr); [INFO] [stdout] 8429 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8430:1 [INFO] [stdout] | [INFO] [stdout] 8430 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8431 | | pub fn ibv_import_dm(context: *mut ibv_context, dm_handle: u32) -> *mut ibv_dm; [INFO] [stdout] 8432 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8433:1 [INFO] [stdout] | [INFO] [stdout] 8433 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8434 | | pub fn ibv_unimport_dm(dm: *mut ibv_dm); [INFO] [stdout] 8435 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8436:1 [INFO] [stdout] | [INFO] [stdout] 8436 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8437 | | pub fn ibv_get_async_event( [INFO] [stdout] 8438 | | context: *mut ibv_context, [INFO] [stdout] 8439 | | event: *mut ibv_async_event, [INFO] [stdout] 8440 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8441 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8442:1 [INFO] [stdout] | [INFO] [stdout] 8442 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8443 | | pub fn ibv_ack_async_event(event: *mut ibv_async_event); [INFO] [stdout] 8444 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8445:1 [INFO] [stdout] | [INFO] [stdout] 8445 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8446 | | pub fn ibv_query_device( [INFO] [stdout] 8447 | | context: *mut ibv_context, [INFO] [stdout] 8448 | | device_attr: *mut ibv_device_attr, [INFO] [stdout] 8449 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8450 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8451:1 [INFO] [stdout] | [INFO] [stdout] 8451 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8452 | | pub fn ibv_query_port( [INFO] [stdout] 8453 | | context: *mut ibv_context, [INFO] [stdout] 8454 | | port_num: u8, [INFO] [stdout] 8455 | | port_attr: *mut _compat_ibv_port_attr, [INFO] [stdout] 8456 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8457 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8458:1 [INFO] [stdout] | [INFO] [stdout] 8458 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8459 | | pub fn ibv_query_gid( [INFO] [stdout] 8460 | | context: *mut ibv_context, [INFO] [stdout] 8461 | | port_num: u8, [INFO] [stdout] ... | [INFO] [stdout] 8464 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8465 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8466:1 [INFO] [stdout] | [INFO] [stdout] 8466 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8467 | | pub fn _ibv_query_gid_ex( [INFO] [stdout] 8468 | | context: *mut ibv_context, [INFO] [stdout] 8469 | | port_num: u32, [INFO] [stdout] ... | [INFO] [stdout] 8474 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8475 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8476:1 [INFO] [stdout] | [INFO] [stdout] 8476 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8477 | | pub fn _ibv_query_gid_table( [INFO] [stdout] 8478 | | context: *mut ibv_context, [INFO] [stdout] 8479 | | entries: *mut ibv_gid_entry, [INFO] [stdout] ... | [INFO] [stdout] 8483 | | ) -> isize; [INFO] [stdout] 8484 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8485:1 [INFO] [stdout] | [INFO] [stdout] 8485 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8486 | | pub fn ibv_query_pkey( [INFO] [stdout] 8487 | | context: *mut ibv_context, [INFO] [stdout] 8488 | | port_num: u8, [INFO] [stdout] ... | [INFO] [stdout] 8491 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8492 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8493:1 [INFO] [stdout] | [INFO] [stdout] 8493 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8494 | | pub fn ibv_get_pkey_index( [INFO] [stdout] 8495 | | context: *mut ibv_context, [INFO] [stdout] 8496 | | port_num: u8, [INFO] [stdout] 8497 | | pkey: __be16, [INFO] [stdout] 8498 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8499 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8500:1 [INFO] [stdout] | [INFO] [stdout] 8500 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8501 | | pub fn ibv_alloc_pd(context: *mut ibv_context) -> *mut ibv_pd; [INFO] [stdout] 8502 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8503:1 [INFO] [stdout] | [INFO] [stdout] 8503 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8504 | | pub fn ibv_dealloc_pd(pd: *mut ibv_pd) -> ::std::os::raw::c_int; [INFO] [stdout] 8505 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8506:1 [INFO] [stdout] | [INFO] [stdout] 8506 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8507 | | pub fn ibv_reg_mr_iova2( [INFO] [stdout] 8508 | | pd: *mut ibv_pd, [INFO] [stdout] 8509 | | addr: *mut ::std::os::raw::c_void, [INFO] [stdout] ... | [INFO] [stdout] 8513 | | ) -> *mut ibv_mr; [INFO] [stdout] 8514 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8515:1 [INFO] [stdout] | [INFO] [stdout] 8515 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8516 | | pub fn ibv_reg_mr( [INFO] [stdout] 8517 | | pd: *mut ibv_pd, [INFO] [stdout] 8518 | | addr: *mut ::std::os::raw::c_void, [INFO] [stdout] ... | [INFO] [stdout] 8521 | | ) -> *mut ibv_mr; [INFO] [stdout] 8522 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8523:1 [INFO] [stdout] | [INFO] [stdout] 8523 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8524 | | pub fn ibv_reg_mr_iova( [INFO] [stdout] 8525 | | pd: *mut ibv_pd, [INFO] [stdout] 8526 | | addr: *mut ::std::os::raw::c_void, [INFO] [stdout] ... | [INFO] [stdout] 8530 | | ) -> *mut ibv_mr; [INFO] [stdout] 8531 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8532:1 [INFO] [stdout] | [INFO] [stdout] 8532 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8533 | | pub fn ibv_reg_dmabuf_mr( [INFO] [stdout] 8534 | | pd: *mut ibv_pd, [INFO] [stdout] 8535 | | offset: u64, [INFO] [stdout] ... | [INFO] [stdout] 8540 | | ) -> *mut ibv_mr; [INFO] [stdout] 8541 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8550:1 [INFO] [stdout] | [INFO] [stdout] 8550 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8551 | | pub fn ibv_rereg_mr( [INFO] [stdout] 8552 | | mr: *mut ibv_mr, [INFO] [stdout] 8553 | | flags: ::std::os::raw::c_int, [INFO] [stdout] ... | [INFO] [stdout] 8558 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8559 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8560:1 [INFO] [stdout] | [INFO] [stdout] 8560 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8561 | | pub fn ibv_dereg_mr(mr: *mut ibv_mr) -> ::std::os::raw::c_int; [INFO] [stdout] 8562 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8563:1 [INFO] [stdout] | [INFO] [stdout] 8563 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8564 | | pub fn ibv_create_comp_channel(context: *mut ibv_context) -> *mut ibv_comp_channel; [INFO] [stdout] 8565 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8566:1 [INFO] [stdout] | [INFO] [stdout] 8566 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8567 | | pub fn ibv_destroy_comp_channel( [INFO] [stdout] 8568 | | channel: *mut ibv_comp_channel, [INFO] [stdout] 8569 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8570 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8571:1 [INFO] [stdout] | [INFO] [stdout] 8571 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8572 | | pub fn ibv_create_cq( [INFO] [stdout] 8573 | | context: *mut ibv_context, [INFO] [stdout] 8574 | | cqe: ::std::os::raw::c_int, [INFO] [stdout] ... | [INFO] [stdout] 8578 | | ) -> *mut ibv_cq; [INFO] [stdout] 8579 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8580:1 [INFO] [stdout] | [INFO] [stdout] 8580 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8581 | | pub fn ibv_resize_cq( [INFO] [stdout] 8582 | | cq: *mut ibv_cq, [INFO] [stdout] 8583 | | cqe: ::std::os::raw::c_int, [INFO] [stdout] 8584 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8585 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8586:1 [INFO] [stdout] | [INFO] [stdout] 8586 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8587 | | pub fn ibv_destroy_cq(cq: *mut ibv_cq) -> ::std::os::raw::c_int; [INFO] [stdout] 8588 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8589:1 [INFO] [stdout] | [INFO] [stdout] 8589 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8590 | | pub fn ibv_get_cq_event( [INFO] [stdout] 8591 | | channel: *mut ibv_comp_channel, [INFO] [stdout] 8592 | | cq: *mut *mut ibv_cq, [INFO] [stdout] 8593 | | cq_context: *mut *mut ::std::os::raw::c_void, [INFO] [stdout] 8594 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8595 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8596:1 [INFO] [stdout] | [INFO] [stdout] 8596 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8597 | | pub fn ibv_ack_cq_events(cq: *mut ibv_cq, nevents: ::std::os::raw::c_uint); [INFO] [stdout] 8598 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8599:1 [INFO] [stdout] | [INFO] [stdout] 8599 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8600 | | pub fn ibv_create_srq( [INFO] [stdout] 8601 | | pd: *mut ibv_pd, [INFO] [stdout] 8602 | | srq_init_attr: *mut ibv_srq_init_attr, [INFO] [stdout] 8603 | | ) -> *mut ibv_srq; [INFO] [stdout] 8604 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8605:1 [INFO] [stdout] | [INFO] [stdout] 8605 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8606 | | pub fn ibv_modify_srq( [INFO] [stdout] 8607 | | srq: *mut ibv_srq, [INFO] [stdout] 8608 | | srq_attr: *mut ibv_srq_attr, [INFO] [stdout] 8609 | | srq_attr_mask: ::std::os::raw::c_int, [INFO] [stdout] 8610 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8611 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8612:1 [INFO] [stdout] | [INFO] [stdout] 8612 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8613 | | pub fn ibv_query_srq( [INFO] [stdout] 8614 | | srq: *mut ibv_srq, [INFO] [stdout] 8615 | | srq_attr: *mut ibv_srq_attr, [INFO] [stdout] 8616 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8617 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8618:1 [INFO] [stdout] | [INFO] [stdout] 8618 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8619 | | pub fn ibv_destroy_srq(srq: *mut ibv_srq) -> ::std::os::raw::c_int; [INFO] [stdout] 8620 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8621:1 [INFO] [stdout] | [INFO] [stdout] 8621 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8622 | | pub fn ibv_create_qp( [INFO] [stdout] 8623 | | pd: *mut ibv_pd, [INFO] [stdout] 8624 | | qp_init_attr: *mut ibv_qp_init_attr, [INFO] [stdout] 8625 | | ) -> *mut ibv_qp; [INFO] [stdout] 8626 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8627:1 [INFO] [stdout] | [INFO] [stdout] 8627 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8628 | | pub fn ibv_modify_qp( [INFO] [stdout] 8629 | | qp: *mut ibv_qp, [INFO] [stdout] 8630 | | attr: *mut ibv_qp_attr, [INFO] [stdout] 8631 | | attr_mask: ::std::os::raw::c_int, [INFO] [stdout] 8632 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8633 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8634:1 [INFO] [stdout] | [INFO] [stdout] 8634 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8635 | | pub fn ibv_query_qp_data_in_order( [INFO] [stdout] 8636 | | qp: *mut ibv_qp, [INFO] [stdout] 8637 | | op: ibv_wr_opcode::Type, [INFO] [stdout] 8638 | | flags: u32, [INFO] [stdout] 8639 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8640 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8641:1 [INFO] [stdout] | [INFO] [stdout] 8641 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8642 | | pub fn ibv_query_qp( [INFO] [stdout] 8643 | | qp: *mut ibv_qp, [INFO] [stdout] 8644 | | attr: *mut ibv_qp_attr, [INFO] [stdout] ... | [INFO] [stdout] 8647 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8648 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8649:1 [INFO] [stdout] | [INFO] [stdout] 8649 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8650 | | pub fn ibv_destroy_qp(qp: *mut ibv_qp) -> ::std::os::raw::c_int; [INFO] [stdout] 8651 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8652:1 [INFO] [stdout] | [INFO] [stdout] 8652 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8653 | | pub fn ibv_create_ah(pd: *mut ibv_pd, attr: *mut ibv_ah_attr) -> *mut ibv_ah; [INFO] [stdout] 8654 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8655:1 [INFO] [stdout] | [INFO] [stdout] 8655 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8656 | | pub fn ibv_init_ah_from_wc( [INFO] [stdout] 8657 | | context: *mut ibv_context, [INFO] [stdout] 8658 | | port_num: u8, [INFO] [stdout] ... | [INFO] [stdout] 8662 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8663 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8664:1 [INFO] [stdout] | [INFO] [stdout] 8664 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8665 | | pub fn ibv_create_ah_from_wc( [INFO] [stdout] 8666 | | pd: *mut ibv_pd, [INFO] [stdout] 8667 | | wc: *mut ibv_wc, [INFO] [stdout] ... | [INFO] [stdout] 8670 | | ) -> *mut ibv_ah; [INFO] [stdout] 8671 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8672:1 [INFO] [stdout] | [INFO] [stdout] 8672 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8673 | | pub fn ibv_destroy_ah(ah: *mut ibv_ah) -> ::std::os::raw::c_int; [INFO] [stdout] 8674 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8675:1 [INFO] [stdout] | [INFO] [stdout] 8675 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8676 | | pub fn ibv_attach_mcast( [INFO] [stdout] 8677 | | qp: *mut ibv_qp, [INFO] [stdout] 8678 | | gid: *const ibv_gid, [INFO] [stdout] 8679 | | lid: u16, [INFO] [stdout] 8680 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8681 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8682:1 [INFO] [stdout] | [INFO] [stdout] 8682 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8683 | | pub fn ibv_detach_mcast( [INFO] [stdout] 8684 | | qp: *mut ibv_qp, [INFO] [stdout] 8685 | | gid: *const ibv_gid, [INFO] [stdout] 8686 | | lid: u16, [INFO] [stdout] 8687 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8688 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8689:1 [INFO] [stdout] | [INFO] [stdout] 8689 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8690 | | pub fn ibv_fork_init() -> ::std::os::raw::c_int; [INFO] [stdout] 8691 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8692:1 [INFO] [stdout] | [INFO] [stdout] 8692 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8693 | | pub fn ibv_is_fork_initialized() -> ibv_fork_status; [INFO] [stdout] 8694 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8695:1 [INFO] [stdout] | [INFO] [stdout] 8695 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8696 | | pub fn ibv_node_type_str( [INFO] [stdout] 8697 | | node_type: ibv_node_type::Type, [INFO] [stdout] 8698 | | ) -> *const ::std::os::raw::c_char; [INFO] [stdout] 8699 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8700:1 [INFO] [stdout] | [INFO] [stdout] 8700 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8701 | | pub fn ibv_port_state_str( [INFO] [stdout] 8702 | | port_state: ibv_port_state::Type, [INFO] [stdout] 8703 | | ) -> *const ::std::os::raw::c_char; [INFO] [stdout] 8704 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8705:1 [INFO] [stdout] | [INFO] [stdout] 8705 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8706 | | pub fn ibv_event_type_str(event: ibv_event_type) -> *const ::std::os::raw::c_char; [INFO] [stdout] 8707 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8708:1 [INFO] [stdout] | [INFO] [stdout] 8708 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8709 | | pub fn ibv_resolve_eth_l2_from_gid( [INFO] [stdout] 8710 | | context: *mut ibv_context, [INFO] [stdout] 8711 | | attr: *mut ibv_ah_attr, [INFO] [stdout] ... | [INFO] [stdout] 8714 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8715 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8716:1 [INFO] [stdout] | [INFO] [stdout] 8716 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8717 | | pub fn ibv_set_ece(qp: *mut ibv_qp, ece: *mut ibv_ece) -> ::std::os::raw::c_int; [INFO] [stdout] 8718 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8719:1 [INFO] [stdout] | [INFO] [stdout] 8719 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8720 | | pub fn ibv_query_ece(qp: *mut ibv_qp, ece: *mut ibv_ece) -> ::std::os::raw::c_int; [INFO] [stdout] 8721 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8725:1 [INFO] [stdout] | [INFO] [stdout] 8725 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8726 | | pub fn ibv_get_sysfs_path() -> *const ::std::os::raw::c_char; [INFO] [stdout] 8727 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8728:1 [INFO] [stdout] | [INFO] [stdout] 8728 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8729 | | pub fn ibv_read_sysfs_file( [INFO] [stdout] 8730 | | dir: *const ::std::os::raw::c_char, [INFO] [stdout] 8731 | | file: *const ::std::os::raw::c_char, [INFO] [stdout] ... | [INFO] [stdout] 8734 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8735 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8736:1 [INFO] [stdout] | [INFO] [stdout] 8736 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8737 | | pub fn ibv_query_gid_type( [INFO] [stdout] 8738 | | context: *mut ibv_context, [INFO] [stdout] 8739 | | port_num: u8, [INFO] [stdout] ... | [INFO] [stdout] 8742 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8743 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9873:1 [INFO] [stdout] | [INFO] [stdout] 9873 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9874 | | pub fn rdma_create_event_channel() -> *mut rdma_event_channel; [INFO] [stdout] 9875 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9876:1 [INFO] [stdout] | [INFO] [stdout] 9876 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9877 | | pub fn rdma_destroy_event_channel(channel: *mut rdma_event_channel); [INFO] [stdout] 9878 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9879:1 [INFO] [stdout] | [INFO] [stdout] 9879 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9880 | | pub fn rdma_create_id( [INFO] [stdout] 9881 | | channel: *mut rdma_event_channel, [INFO] [stdout] 9882 | | id: *mut *mut rdma_cm_id, [INFO] [stdout] ... | [INFO] [stdout] 9885 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9886 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9887:1 [INFO] [stdout] | [INFO] [stdout] 9887 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9888 | | pub fn rdma_create_ep( [INFO] [stdout] 9889 | | id: *mut *mut rdma_cm_id, [INFO] [stdout] 9890 | | res: *mut rdma_addrinfo, [INFO] [stdout] ... | [INFO] [stdout] 9893 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9894 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9895:1 [INFO] [stdout] | [INFO] [stdout] 9895 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9896 | | pub fn rdma_destroy_ep(id: *mut rdma_cm_id); [INFO] [stdout] 9897 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9898:1 [INFO] [stdout] | [INFO] [stdout] 9898 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9899 | | pub fn rdma_destroy_id(id: *mut rdma_cm_id) -> ::std::os::raw::c_int; [INFO] [stdout] 9900 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9901:1 [INFO] [stdout] | [INFO] [stdout] 9901 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9902 | | pub fn rdma_bind_addr( [INFO] [stdout] 9903 | | id: *mut rdma_cm_id, [INFO] [stdout] 9904 | | addr: *mut sockaddr, [INFO] [stdout] 9905 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9906 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9907:1 [INFO] [stdout] | [INFO] [stdout] 9907 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9908 | | pub fn rdma_resolve_addr( [INFO] [stdout] 9909 | | id: *mut rdma_cm_id, [INFO] [stdout] 9910 | | src_addr: *mut sockaddr, [INFO] [stdout] ... | [INFO] [stdout] 9913 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9914 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9915:1 [INFO] [stdout] | [INFO] [stdout] 9915 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9916 | | pub fn rdma_resolve_route( [INFO] [stdout] 9917 | | id: *mut rdma_cm_id, [INFO] [stdout] 9918 | | timeout_ms: ::std::os::raw::c_int, [INFO] [stdout] 9919 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9920 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9921:1 [INFO] [stdout] | [INFO] [stdout] 9921 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9922 | | pub fn rdma_create_qp( [INFO] [stdout] 9923 | | id: *mut rdma_cm_id, [INFO] [stdout] 9924 | | pd: *mut ibv_pd, [INFO] [stdout] 9925 | | qp_init_attr: *mut ibv_qp_init_attr, [INFO] [stdout] 9926 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9927 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9928:1 [INFO] [stdout] | [INFO] [stdout] 9928 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9929 | | pub fn rdma_create_qp_ex( [INFO] [stdout] 9930 | | id: *mut rdma_cm_id, [INFO] [stdout] 9931 | | qp_init_attr: *mut ibv_qp_init_attr_ex, [INFO] [stdout] 9932 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9933 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9934:1 [INFO] [stdout] | [INFO] [stdout] 9934 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9935 | | pub fn rdma_destroy_qp(id: *mut rdma_cm_id); [INFO] [stdout] 9936 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9937:1 [INFO] [stdout] | [INFO] [stdout] 9937 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9938 | | pub fn rdma_connect( [INFO] [stdout] 9939 | | id: *mut rdma_cm_id, [INFO] [stdout] 9940 | | conn_param: *mut rdma_conn_param, [INFO] [stdout] 9941 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9942 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9943:1 [INFO] [stdout] | [INFO] [stdout] 9943 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9944 | | pub fn rdma_establish(id: *mut rdma_cm_id) -> ::std::os::raw::c_int; [INFO] [stdout] 9945 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9946:1 [INFO] [stdout] | [INFO] [stdout] 9946 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9947 | | pub fn rdma_listen( [INFO] [stdout] 9948 | | id: *mut rdma_cm_id, [INFO] [stdout] 9949 | | backlog: ::std::os::raw::c_int, [INFO] [stdout] 9950 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9951 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9952:1 [INFO] [stdout] | [INFO] [stdout] 9952 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9953 | | pub fn rdma_get_request( [INFO] [stdout] 9954 | | listen: *mut rdma_cm_id, [INFO] [stdout] 9955 | | id: *mut *mut rdma_cm_id, [INFO] [stdout] 9956 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9957 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9958:1 [INFO] [stdout] | [INFO] [stdout] 9958 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9959 | | pub fn rdma_accept( [INFO] [stdout] 9960 | | id: *mut rdma_cm_id, [INFO] [stdout] 9961 | | conn_param: *mut rdma_conn_param, [INFO] [stdout] 9962 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9963 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9964:1 [INFO] [stdout] | [INFO] [stdout] 9964 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9965 | | pub fn rdma_reject( [INFO] [stdout] 9966 | | id: *mut rdma_cm_id, [INFO] [stdout] 9967 | | private_data: *const ::std::os::raw::c_void, [INFO] [stdout] 9968 | | private_data_len: u8, [INFO] [stdout] 9969 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9970 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9971:1 [INFO] [stdout] | [INFO] [stdout] 9971 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9972 | | pub fn rdma_reject_ece( [INFO] [stdout] 9973 | | id: *mut rdma_cm_id, [INFO] [stdout] 9974 | | private_data: *const ::std::os::raw::c_void, [INFO] [stdout] 9975 | | private_data_len: u8, [INFO] [stdout] 9976 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9977 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9978:1 [INFO] [stdout] | [INFO] [stdout] 9978 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9979 | | pub fn rdma_notify( [INFO] [stdout] 9980 | | id: *mut rdma_cm_id, [INFO] [stdout] 9981 | | event: ibv_event_type, [INFO] [stdout] 9982 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9983 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9984:1 [INFO] [stdout] | [INFO] [stdout] 9984 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9985 | | pub fn rdma_disconnect(id: *mut rdma_cm_id) -> ::std::os::raw::c_int; [INFO] [stdout] 9986 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9987:1 [INFO] [stdout] | [INFO] [stdout] 9987 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9988 | | pub fn rdma_join_multicast( [INFO] [stdout] 9989 | | id: *mut rdma_cm_id, [INFO] [stdout] 9990 | | addr: *mut sockaddr, [INFO] [stdout] 9991 | | context: *mut ::std::os::raw::c_void, [INFO] [stdout] 9992 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9993 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9994:1 [INFO] [stdout] | [INFO] [stdout] 9994 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9995 | | pub fn rdma_leave_multicast( [INFO] [stdout] 9996 | | id: *mut rdma_cm_id, [INFO] [stdout] 9997 | | addr: *mut sockaddr, [INFO] [stdout] 9998 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9999 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10000:1 [INFO] [stdout] | [INFO] [stdout] 10000 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10001 | | pub fn rdma_join_multicast_ex( [INFO] [stdout] 10002 | | id: *mut rdma_cm_id, [INFO] [stdout] 10003 | | mc_join_attr: *mut rdma_cm_join_mc_attr_ex, [INFO] [stdout] 10004 | | context: *mut ::std::os::raw::c_void, [INFO] [stdout] 10005 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 10006 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10007:1 [INFO] [stdout] | [INFO] [stdout] 10007 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10008 | | pub fn rdma_get_cm_event( [INFO] [stdout] 10009 | | channel: *mut rdma_event_channel, [INFO] [stdout] 10010 | | event: *mut *mut rdma_cm_event, [INFO] [stdout] 10011 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 10012 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10013:1 [INFO] [stdout] | [INFO] [stdout] 10013 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10014 | | pub fn rdma_ack_cm_event(event: *mut rdma_cm_event) -> ::std::os::raw::c_int; [INFO] [stdout] 10015 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10016:1 [INFO] [stdout] | [INFO] [stdout] 10016 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10017 | | pub fn rdma_get_src_port(id: *mut rdma_cm_id) -> __be16; [INFO] [stdout] 10018 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10019:1 [INFO] [stdout] | [INFO] [stdout] 10019 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10020 | | pub fn rdma_get_dst_port(id: *mut rdma_cm_id) -> __be16; [INFO] [stdout] 10021 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10022:1 [INFO] [stdout] | [INFO] [stdout] 10022 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10023 | | pub fn rdma_get_devices( [INFO] [stdout] 10024 | | num_devices: *mut ::std::os::raw::c_int, [INFO] [stdout] 10025 | | ) -> *mut *mut ibv_context; [INFO] [stdout] 10026 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10027:1 [INFO] [stdout] | [INFO] [stdout] 10027 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10028 | | pub fn rdma_free_devices(list: *mut *mut ibv_context); [INFO] [stdout] 10029 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10030:1 [INFO] [stdout] | [INFO] [stdout] 10030 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10031 | | pub fn rdma_event_str( [INFO] [stdout] 10032 | | event: rdma_cm_event_type::Type, [INFO] [stdout] 10033 | | ) -> *const ::std::os::raw::c_char; [INFO] [stdout] 10034 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10035:1 [INFO] [stdout] | [INFO] [stdout] 10035 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10036 | | pub fn rdma_set_option( [INFO] [stdout] 10037 | | id: *mut rdma_cm_id, [INFO] [stdout] 10038 | | level: ::std::os::raw::c_int, [INFO] [stdout] ... | [INFO] [stdout] 10042 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 10043 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10044:1 [INFO] [stdout] | [INFO] [stdout] 10044 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10045 | | pub fn rdma_migrate_id( [INFO] [stdout] 10046 | | id: *mut rdma_cm_id, [INFO] [stdout] 10047 | | channel: *mut rdma_event_channel, [INFO] [stdout] 10048 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 10049 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10050:1 [INFO] [stdout] | [INFO] [stdout] 10050 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10051 | | pub fn rdma_getaddrinfo( [INFO] [stdout] 10052 | | node: *const ::std::os::raw::c_char, [INFO] [stdout] 10053 | | service: *const ::std::os::raw::c_char, [INFO] [stdout] ... | [INFO] [stdout] 10056 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 10057 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10058:1 [INFO] [stdout] | [INFO] [stdout] 10058 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10059 | | pub fn rdma_freeaddrinfo(res: *mut rdma_addrinfo); [INFO] [stdout] 10060 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10061:1 [INFO] [stdout] | [INFO] [stdout] 10061 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10062 | | pub fn rdma_init_qp_attr( [INFO] [stdout] 10063 | | id: *mut rdma_cm_id, [INFO] [stdout] 10064 | | qp_attr: *mut ibv_qp_attr, [INFO] [stdout] 10065 | | qp_attr_mask: *mut ::std::os::raw::c_int, [INFO] [stdout] 10066 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 10067 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10068:1 [INFO] [stdout] | [INFO] [stdout] 10068 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10069 | | pub fn rdma_set_local_ece( [INFO] [stdout] 10070 | | id: *mut rdma_cm_id, [INFO] [stdout] 10071 | | ece: *mut ibv_ece, [INFO] [stdout] 10072 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 10073 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10074:1 [INFO] [stdout] | [INFO] [stdout] 10074 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10075 | | pub fn rdma_get_remote_ece( [INFO] [stdout] 10076 | | id: *mut rdma_cm_id, [INFO] [stdout] 10077 | | ece: *mut ibv_ece, [INFO] [stdout] 10078 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 10079 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/opcode.rs:5:22 [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr, $op : expr ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr_2021, $op : expr ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/opcode.rs:5:34 [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr, $op : expr ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr, $op : expr_2021 ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/verbs.rs:254:11 [INFO] [stdout] | [INFO] [stdout] 254 | ($ptr:expr, $container:path, $field:ident) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 254 | ($ptr:expr_2021, $container:path, $field:ident) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/verbs.rs:272:11 [INFO] [stdout] | [INFO] [stdout] 272 | ($vcr:expr, $field:ident) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 272 | ($vcr:expr_2021, $field:ident) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | ::std::mem::transmute(self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:11:5 [INFO] [stdout] | [INFO] [stdout] 11 | pub unsafe fn as_ref(&self) -> &T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:16:9 [INFO] [stdout] | [INFO] [stdout] 16 | ::std::mem::transmute(self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:15:5 [INFO] [stdout] | [INFO] [stdout] 15 | pub unsafe fn as_mut(&mut self) -> &mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:19:5 [INFO] [stdout] | [INFO] [stdout] 19 | (*qp).wr_atomic_cmp_swp.unwrap()(qp, rkey, remote_addr, compare, swap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / pub unsafe fn ibv_wr_atomic_cmp_swp( [INFO] [stdout] 13 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 14 | | rkey: u32, [INFO] [stdout] 15 | | remote_addr: u64, [INFO] [stdout] 16 | | compare: u64, [INFO] [stdout] 17 | | swap: u64, [INFO] [stdout] 18 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:19:5 [INFO] [stdout] | [INFO] [stdout] 19 | (*qp).wr_atomic_cmp_swp.unwrap()(qp, rkey, remote_addr, compare, swap); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | (*qp).wr_atomic_fetch_add.unwrap()(qp, rkey, remote_addr, add); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | pub unsafe fn ibv_wr_atomic_fetch_add(qp: *mut ibv_qp_ex, rkey: u32, remote_addr: u64, add: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | (*qp).wr_atomic_fetch_add.unwrap()(qp, rkey, remote_addr, add); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:34:5 [INFO] [stdout] | [INFO] [stdout] 34 | (*qp).wr_bind_mw.unwrap()(qp, mw, rkey, bind_info); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:28:1 [INFO] [stdout] | [INFO] [stdout] 28 | / pub unsafe fn ibv_wr_bind_mw( [INFO] [stdout] 29 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 30 | | mw: *mut ibv_mw, [INFO] [stdout] 31 | | rkey: u32, [INFO] [stdout] 32 | | bind_info: *const ibv_mw_bind_info, [INFO] [stdout] 33 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:34:5 [INFO] [stdout] | [INFO] [stdout] 34 | (*qp).wr_bind_mw.unwrap()(qp, mw, rkey, bind_info); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:39:5 [INFO] [stdout] | [INFO] [stdout] 39 | (*qp).wr_local_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:38:1 [INFO] [stdout] | [INFO] [stdout] 38 | pub unsafe fn ibv_wr_local_inv(qp: *mut ibv_qp_ex, invalidate_rkey: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:39:5 [INFO] [stdout] | [INFO] [stdout] 39 | (*qp).wr_local_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | (*qp).wr_rdma_read.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:43:1 [INFO] [stdout] | [INFO] [stdout] 43 | pub unsafe fn ibv_wr_rdma_read(qp: *mut ibv_qp_ex, rkey: u32, remote_addr: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | (*qp).wr_rdma_read.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | (*qp).wr_rdma_write.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | pub unsafe fn ibv_wr_rdma_write(qp: *mut ibv_qp_ex, rkey: u32, remote_addr: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | (*qp).wr_rdma_write.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | (*qp).wr_rdma_write_imm.unwrap()(qp, rkey, remote_addr, imm_data); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:53:1 [INFO] [stdout] | [INFO] [stdout] 53 | / pub unsafe fn ibv_wr_rdma_write_imm( [INFO] [stdout] 54 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 55 | | rkey: u32, [INFO] [stdout] 56 | | remote_addr: u64, [INFO] [stdout] 57 | | imm_data: __be32, [INFO] [stdout] 58 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | (*qp).wr_rdma_write_imm.unwrap()(qp, rkey, remote_addr, imm_data); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:64:5 [INFO] [stdout] | [INFO] [stdout] 64 | (*qp).wr_send.unwrap()(qp); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:63:1 [INFO] [stdout] | [INFO] [stdout] 63 | pub unsafe fn ibv_wr_send(qp: *mut ibv_qp_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:64:5 [INFO] [stdout] | [INFO] [stdout] 64 | (*qp).wr_send.unwrap()(qp); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:69:5 [INFO] [stdout] | [INFO] [stdout] 69 | (*qp).wr_send_imm.unwrap()(qp, imm_data); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:68:1 [INFO] [stdout] | [INFO] [stdout] 68 | pub unsafe fn ibv_wr_send_imm(qp: *mut ibv_qp_ex, imm_data: __be32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:69:5 [INFO] [stdout] | [INFO] [stdout] 69 | (*qp).wr_send_imm.unwrap()(qp, imm_data); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | (*qp).wr_send_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:73:1 [INFO] [stdout] | [INFO] [stdout] 73 | pub unsafe fn ibv_wr_send_inv(qp: *mut ibv_qp_ex, invalidate_rkey: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | (*qp).wr_send_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | (*qp).wr_send_tso.unwrap()(qp, hdr, hdr_sz, mss); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:78:1 [INFO] [stdout] | [INFO] [stdout] 78 | pub unsafe fn ibv_wr_send_tso(qp: *mut ibv_qp_ex, hdr: *mut c_void, hdr_sz: u16, mss: u16) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | (*qp).wr_send_tso.unwrap()(qp, hdr, hdr_sz, mss); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:89:5 [INFO] [stdout] | [INFO] [stdout] 89 | (*qp).wr_set_ud_addr.unwrap()(qp, ah, remote_qpn, remote_qkey); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:83:1 [INFO] [stdout] | [INFO] [stdout] 83 | / pub unsafe fn ibv_wr_set_ud_addr( [INFO] [stdout] 84 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 85 | | ah: *mut ibv_ah, [INFO] [stdout] 86 | | remote_qpn: u32, [INFO] [stdout] 87 | | remote_qkey: u32, [INFO] [stdout] 88 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:89:5 [INFO] [stdout] | [INFO] [stdout] 89 | (*qp).wr_set_ud_addr.unwrap()(qp, ah, remote_qpn, remote_qkey); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:94:5 [INFO] [stdout] | [INFO] [stdout] 94 | (*qp).wr_set_xrc_srqn.unwrap()(qp, remote_srqn); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:93:1 [INFO] [stdout] | [INFO] [stdout] 93 | pub unsafe fn ibv_wr_set_xrc_srqn(qp: *mut ibv_qp_ex, remote_srqn: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:94:5 [INFO] [stdout] | [INFO] [stdout] 94 | (*qp).wr_set_xrc_srqn.unwrap()(qp, remote_srqn); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:99:5 [INFO] [stdout] | [INFO] [stdout] 99 | (*qp).wr_set_inline_data.unwrap()(qp, addr, length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:98:1 [INFO] [stdout] | [INFO] [stdout] 98 | pub unsafe fn ibv_wr_set_inline_data(qp: *mut ibv_qp_ex, addr: *mut c_void, length: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:99:5 [INFO] [stdout] | [INFO] [stdout] 99 | (*qp).wr_set_inline_data.unwrap()(qp, addr, length); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | (*qp).wr_set_inline_data_list.unwrap()(qp, num_buf, buf_list); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:103:1 [INFO] [stdout] | [INFO] [stdout] 103 | / pub unsafe fn ibv_wr_set_inline_data_list( [INFO] [stdout] 104 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 105 | | num_buf: usize, [INFO] [stdout] 106 | | buf_list: *const ibv_data_buf, [INFO] [stdout] 107 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | (*qp).wr_set_inline_data_list.unwrap()(qp, num_buf, buf_list); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:113:5 [INFO] [stdout] | [INFO] [stdout] 113 | (*qp).wr_set_sge.unwrap()(qp, lkey, addr, length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:112:1 [INFO] [stdout] | [INFO] [stdout] 112 | pub unsafe fn ibv_wr_set_sge(qp: *mut ibv_qp_ex, lkey: u32, addr: u64, length: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:113:5 [INFO] [stdout] | [INFO] [stdout] 113 | (*qp).wr_set_sge.unwrap()(qp, lkey, addr, length); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | (*qp).wr_set_sge_list.unwrap()(qp, num_sge, sg_list); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:117:1 [INFO] [stdout] | [INFO] [stdout] 117 | pub unsafe fn ibv_wr_set_sge_list(qp: *mut ibv_qp_ex, num_sge: usize, sg_list: *const ibv_sge) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | (*qp).wr_set_sge_list.unwrap()(qp, num_sge, sg_list); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | (*qp).wr_start.unwrap()(qp); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:122:1 [INFO] [stdout] | [INFO] [stdout] 122 | pub unsafe fn ibv_wr_start(qp: *mut ibv_qp_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | (*qp).wr_start.unwrap()(qp); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:128:5 [INFO] [stdout] | [INFO] [stdout] 128 | (*qp).wr_complete.unwrap()(qp) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:127:1 [INFO] [stdout] | [INFO] [stdout] 127 | pub unsafe fn ibv_wr_complete(qp: *mut ibv_qp_ex) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:128:5 [INFO] [stdout] | [INFO] [stdout] 128 | (*qp).wr_complete.unwrap()(qp) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:133:5 [INFO] [stdout] | [INFO] [stdout] 133 | (*qp).wr_abort.unwrap()(qp) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:132:1 [INFO] [stdout] | [INFO] [stdout] 132 | pub unsafe fn ibv_wr_abort(qp: *mut ibv_qp_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:133:5 [INFO] [stdout] | [INFO] [stdout] 133 | (*qp).wr_abort.unwrap()(qp) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:144:5 [INFO] [stdout] | [INFO] [stdout] 144 | (*cq).start_poll.unwrap()(cq, attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:143:1 [INFO] [stdout] | [INFO] [stdout] 143 | pub unsafe fn ibv_start_poll(cq: *mut ibv_cq_ex, attr: *mut ibv_poll_cq_attr) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:144:5 [INFO] [stdout] | [INFO] [stdout] 144 | (*cq).start_poll.unwrap()(cq, attr) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:149:5 [INFO] [stdout] | [INFO] [stdout] 149 | (*cq).next_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:148:1 [INFO] [stdout] | [INFO] [stdout] 148 | pub unsafe fn ibv_next_poll(cq: *mut ibv_cq_ex) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:149:5 [INFO] [stdout] | [INFO] [stdout] 149 | (*cq).next_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:154:5 [INFO] [stdout] | [INFO] [stdout] 154 | (*cq).end_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:153:1 [INFO] [stdout] | [INFO] [stdout] 153 | pub unsafe fn ibv_end_poll(cq: *mut ibv_cq_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:154:5 [INFO] [stdout] | [INFO] [stdout] 154 | (*cq).end_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:159:5 [INFO] [stdout] | [INFO] [stdout] 159 | (*cq).read_opcode.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:158:1 [INFO] [stdout] | [INFO] [stdout] 158 | pub unsafe fn ibv_wc_read_opcode(cq: *mut ibv_cq_ex) -> ibv_wc_opcode::Type { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:159:5 [INFO] [stdout] | [INFO] [stdout] 159 | (*cq).read_opcode.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:164:5 [INFO] [stdout] | [INFO] [stdout] 164 | (*cq).read_vendor_err.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:163:1 [INFO] [stdout] | [INFO] [stdout] 163 | pub unsafe fn ibv_wc_read_vendor_err(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:164:5 [INFO] [stdout] | [INFO] [stdout] 164 | (*cq).read_vendor_err.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:169:5 [INFO] [stdout] | [INFO] [stdout] 169 | (*cq).read_byte_len.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:168:1 [INFO] [stdout] | [INFO] [stdout] 168 | pub unsafe fn ibv_wc_read_byte_len(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:169:5 [INFO] [stdout] | [INFO] [stdout] 169 | (*cq).read_byte_len.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:174:5 [INFO] [stdout] | [INFO] [stdout] 174 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:173:1 [INFO] [stdout] | [INFO] [stdout] 173 | pub unsafe fn ibv_wc_read_imm_data(cq: *mut ibv_cq_ex) -> __be32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:174:5 [INFO] [stdout] | [INFO] [stdout] 174 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:184:5 [INFO] [stdout] | [INFO] [stdout] 184 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:178:1 [INFO] [stdout] | [INFO] [stdout] 178 | pub unsafe fn ibv_wc_read_invalidated_rkey(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:184:5 [INFO] [stdout] | [INFO] [stdout] 184 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:189:5 [INFO] [stdout] | [INFO] [stdout] 189 | (*cq).read_qp_num.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:188:1 [INFO] [stdout] | [INFO] [stdout] 188 | pub unsafe fn ibv_wc_read_qp_num(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:189:5 [INFO] [stdout] | [INFO] [stdout] 189 | (*cq).read_qp_num.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:194:5 [INFO] [stdout] | [INFO] [stdout] 194 | (*cq).read_src_qp.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:193:1 [INFO] [stdout] | [INFO] [stdout] 193 | pub unsafe fn ibv_wc_read_src_qp(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:194:5 [INFO] [stdout] | [INFO] [stdout] 194 | (*cq).read_src_qp.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | (*cq).read_wc_flags.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:198:1 [INFO] [stdout] | [INFO] [stdout] 198 | pub unsafe fn ibv_wc_read_wc_flags(cq: *mut ibv_cq_ex) -> c_uint { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | (*cq).read_wc_flags.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | (*cq).read_slid.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:203:1 [INFO] [stdout] | [INFO] [stdout] 203 | pub unsafe fn ibv_wc_read_slid(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | (*cq).read_slid.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:209:5 [INFO] [stdout] | [INFO] [stdout] 209 | (*cq).read_sl.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:208:1 [INFO] [stdout] | [INFO] [stdout] 208 | pub unsafe fn ibv_wc_read_sl(cq: *mut ibv_cq_ex) -> u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:209:5 [INFO] [stdout] | [INFO] [stdout] 209 | (*cq).read_sl.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:214:5 [INFO] [stdout] | [INFO] [stdout] 214 | (*cq).read_dlid_path_bits.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:213:1 [INFO] [stdout] | [INFO] [stdout] 213 | pub unsafe fn ibv_wc_read_dlid_path_bits(cq: *mut ibv_cq_ex) -> u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:214:5 [INFO] [stdout] | [INFO] [stdout] 214 | (*cq).read_dlid_path_bits.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:219:5 [INFO] [stdout] | [INFO] [stdout] 219 | (*cq).read_completion_ts.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:218:1 [INFO] [stdout] | [INFO] [stdout] 218 | pub unsafe fn ibv_wc_read_completion_ts(cq: *mut ibv_cq_ex) -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:219:5 [INFO] [stdout] | [INFO] [stdout] 219 | (*cq).read_completion_ts.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:224:5 [INFO] [stdout] | [INFO] [stdout] 224 | (*cq).read_completion_wallclock_ns.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:223:1 [INFO] [stdout] | [INFO] [stdout] 223 | pub unsafe fn ibv_wc_read_completion_wallclock_ns(cq: *mut ibv_cq_ex) -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:224:5 [INFO] [stdout] | [INFO] [stdout] 224 | (*cq).read_completion_wallclock_ns.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | (*cq).read_cvlan.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:228:1 [INFO] [stdout] | [INFO] [stdout] 228 | pub unsafe fn ibv_wc_read_cvlan(cq: *mut ibv_cq_ex) -> u16 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | (*cq).read_cvlan.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:234:5 [INFO] [stdout] | [INFO] [stdout] 234 | (*cq).read_flow_tag.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:233:1 [INFO] [stdout] | [INFO] [stdout] 233 | pub unsafe fn ibv_wc_read_flow_tag(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:234:5 [INFO] [stdout] | [INFO] [stdout] 234 | (*cq).read_flow_tag.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:239:5 [INFO] [stdout] | [INFO] [stdout] 239 | (*cq).read_tm_info.unwrap()(cq, tm_info) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:238:1 [INFO] [stdout] | [INFO] [stdout] 238 | pub unsafe fn ibv_wc_read_tm_info(cq: *mut ibv_cq_ex, tm_info: *mut ibv_wc_tm_info) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:239:5 [INFO] [stdout] | [INFO] [stdout] 239 | (*cq).read_tm_info.unwrap()(cq, tm_info) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:249:5 [INFO] [stdout] | [INFO] [stdout] 249 | (*wq).post_recv.unwrap()(wq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:244:1 [INFO] [stdout] | [INFO] [stdout] 244 | / pub unsafe fn ibv_post_wq_recv( [INFO] [stdout] 245 | | wq: *mut ibv_wq, [INFO] [stdout] 246 | | recv_wr: *mut ibv_recv_wr, [INFO] [stdout] 247 | | bad_recv_wr: *mut *mut ibv_recv_wr, [INFO] [stdout] 248 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:249:5 [INFO] [stdout] | [INFO] [stdout] 249 | (*wq).post_recv.unwrap()(wq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:263:8 [INFO] [stdout] | [INFO] [stdout] 263 | if (*ctx).abi_compat as usize != usize::MAX { [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:262:1 [INFO] [stdout] | [INFO] [stdout] 262 | unsafe fn verbs_get_ctx(ctx: *const ibv_context) -> Option<*mut verbs_context> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:255:9 [INFO] [stdout] | [INFO] [stdout] 255 | ($ptr as *const _ as *const u8).sub(memoffset::offset_of!($container, $field)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 266 | let vcp = container_of!(ctx, verbs_context, context) as *mut _; [INFO] [stdout] | ------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `container_of` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_get_device_list` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:320:5 [INFO] [stdout] | [INFO] [stdout] 320 | ibv_get_device_list(num_devices) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:317:1 [INFO] [stdout] | [INFO] [stdout] 317 | pub unsafe fn __ibv_get_device_list(num_devices: *mut c_int) -> *mut *mut ibv_device { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:328:1 [INFO] [stdout] | [INFO] [stdout] 328 | / pub unsafe fn ___ibv_query_port( [INFO] [stdout] 329 | | context: *mut ibv_context, [INFO] [stdout] 330 | | port_num: u8, [INFO] [stdout] 331 | | port_attr: *mut ibv_port_attr, [INFO] [stdout] 332 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:336:9 [INFO] [stdout] | [INFO] [stdout] 336 | (*vctx).query_port.unwrap()(context, port_num, port_attr, mem::size_of_val(&*port_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:336:9 [INFO] [stdout] | [INFO] [stdout] 336 | (*vctx).query_port.unwrap()(context, port_num, port_attr, mem::size_of_val(&*port_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:336:85 [INFO] [stdout] | [INFO] [stdout] 336 | (*vctx).query_port.unwrap()(context, port_num, port_attr, mem::size_of_val(&*port_attr)) [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_query_port` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:340:9 [INFO] [stdout] | [INFO] [stdout] 340 | ibv_query_port(context, port_num, compat_attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 347 | let vcr = verbs_get_ctx_op!((*qp).context, ibv_create_flow); [INFO] [stdout] | ------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:346:1 [INFO] [stdout] | [INFO] [stdout] 346 | pub unsafe fn ibv_create_flow(qp: *mut ibv_qp, flow: *mut ibv_flow_attr) -> Option<*mut ibv_flow> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:347:33 [INFO] [stdout] | [INFO] [stdout] 347 | let vcr = verbs_get_ctx_op!((*qp).context, ibv_create_flow); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 347 | let vcr = verbs_get_ctx_op!((*qp).context, ibv_create_flow); [INFO] [stdout] | ------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 347 | let vcr = verbs_get_ctx_op!((*qp).context, ibv_create_flow); [INFO] [stdout] | ------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 347 | let vcr = verbs_get_ctx_op!((*qp).context, ibv_create_flow); [INFO] [stdout] | ------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:350:14 [INFO] [stdout] | [INFO] [stdout] 350 | Some((*vctx).ibv_create_flow.unwrap()(qp, flow)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:350:14 [INFO] [stdout] | [INFO] [stdout] 350 | Some((*vctx).ibv_create_flow.unwrap()(qp, flow)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:352:9 [INFO] [stdout] | [INFO] [stdout] 352 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:352:10 [INFO] [stdout] | [INFO] [stdout] 352 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 359 | let vcr = verbs_get_ctx_op!((*flow_id).context, ibv_destroy_flow); [INFO] [stdout] | ------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:358:1 [INFO] [stdout] | [INFO] [stdout] 358 | pub unsafe fn ibv_destroy_flow(flow_id: *mut ibv_flow) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:359:33 [INFO] [stdout] | [INFO] [stdout] 359 | let vcr = verbs_get_ctx_op!((*flow_id).context, ibv_destroy_flow); [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 359 | let vcr = verbs_get_ctx_op!((*flow_id).context, ibv_destroy_flow); [INFO] [stdout] | ------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 359 | let vcr = verbs_get_ctx_op!((*flow_id).context, ibv_destroy_flow); [INFO] [stdout] | ------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 359 | let vcr = verbs_get_ctx_op!((*flow_id).context, ibv_destroy_flow); [INFO] [stdout] | ------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:362:9 [INFO] [stdout] | [INFO] [stdout] 362 | (*vctx).ibv_destroy_flow.unwrap()(flow_id) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:362:9 [INFO] [stdout] | [INFO] [stdout] 362 | (*vctx).ibv_destroy_flow.unwrap()(flow_id) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 373 | let vcr = verbs_get_ctx_op!(ctx, create_flow_action_esp); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:369:1 [INFO] [stdout] | [INFO] [stdout] 369 | / pub unsafe fn ibv_create_flow_action_esp( [INFO] [stdout] 370 | | ctx: *mut ibv_context, [INFO] [stdout] 371 | | esp: *mut ibv_flow_action_esp_attr, [INFO] [stdout] 372 | | ) -> Option<*mut ibv_flow_action> { [INFO] [stdout] | |_________________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 373 | let vcr = verbs_get_ctx_op!(ctx, create_flow_action_esp); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 373 | let vcr = verbs_get_ctx_op!(ctx, create_flow_action_esp); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 373 | let vcr = verbs_get_ctx_op!(ctx, create_flow_action_esp); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:376:14 [INFO] [stdout] | [INFO] [stdout] 376 | Some((*vctx).create_flow_action_esp.unwrap()(ctx, esp)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:376:14 [INFO] [stdout] | [INFO] [stdout] 376 | Some((*vctx).create_flow_action_esp.unwrap()(ctx, esp)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:378:10 [INFO] [stdout] | [INFO] [stdout] 378 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 388 | let vcr = verbs_get_ctx_op!((*action).context, modify_flow_action_esp); [INFO] [stdout] | ------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:384:1 [INFO] [stdout] | [INFO] [stdout] 384 | / pub unsafe fn ibv_modify_flow_action_esp( [INFO] [stdout] 385 | | action: *mut ibv_flow_action, [INFO] [stdout] 386 | | esp: *mut ibv_flow_action_esp_attr, [INFO] [stdout] 387 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:388:33 [INFO] [stdout] | [INFO] [stdout] 388 | let vcr = verbs_get_ctx_op!((*action).context, modify_flow_action_esp); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 388 | let vcr = verbs_get_ctx_op!((*action).context, modify_flow_action_esp); [INFO] [stdout] | ------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 388 | let vcr = verbs_get_ctx_op!((*action).context, modify_flow_action_esp); [INFO] [stdout] | ------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 388 | let vcr = verbs_get_ctx_op!((*action).context, modify_flow_action_esp); [INFO] [stdout] | ------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:391:9 [INFO] [stdout] | [INFO] [stdout] 391 | (*vctx).modify_flow_action_esp.unwrap()(action, esp) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:391:9 [INFO] [stdout] | [INFO] [stdout] 391 | (*vctx).modify_flow_action_esp.unwrap()(action, esp) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 399 | let vcr = verbs_get_ctx_op!((*action).context, destroy_flow_action); [INFO] [stdout] | --------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:398:1 [INFO] [stdout] | [INFO] [stdout] 398 | pub unsafe fn ibv_destroy_flow_action(action: *mut ibv_flow_action) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:399:33 [INFO] [stdout] | [INFO] [stdout] 399 | let vcr = verbs_get_ctx_op!((*action).context, destroy_flow_action); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 399 | let vcr = verbs_get_ctx_op!((*action).context, destroy_flow_action); [INFO] [stdout] | --------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 399 | let vcr = verbs_get_ctx_op!((*action).context, destroy_flow_action); [INFO] [stdout] | --------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 399 | let vcr = verbs_get_ctx_op!((*action).context, destroy_flow_action); [INFO] [stdout] | --------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:402:9 [INFO] [stdout] | [INFO] [stdout] 402 | (*vctx).destroy_flow_action.unwrap()(action) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:402:9 [INFO] [stdout] | [INFO] [stdout] 402 | (*vctx).destroy_flow_action.unwrap()(action) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 414 | let vcr = verbs_get_ctx_op!(context, open_xrcd); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:410:1 [INFO] [stdout] | [INFO] [stdout] 410 | / pub unsafe fn ibv_open_xrcd( [INFO] [stdout] 411 | | context: *mut ibv_context, [INFO] [stdout] 412 | | xrcd_init_attr: *mut ibv_xrcd_init_attr, [INFO] [stdout] 413 | | ) -> Option<*mut ibv_xrcd> { [INFO] [stdout] | |__________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 414 | let vcr = verbs_get_ctx_op!(context, open_xrcd); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 414 | let vcr = verbs_get_ctx_op!(context, open_xrcd); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 414 | let vcr = verbs_get_ctx_op!(context, open_xrcd); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:417:14 [INFO] [stdout] | [INFO] [stdout] 417 | Some((*vctx).open_xrcd.unwrap()(context, xrcd_init_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:417:14 [INFO] [stdout] | [INFO] [stdout] 417 | Some((*vctx).open_xrcd.unwrap()(context, xrcd_init_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:419:9 [INFO] [stdout] | [INFO] [stdout] 419 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:419:10 [INFO] [stdout] | [INFO] [stdout] 419 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:426:16 [INFO] [stdout] | [INFO] [stdout] 426 | let vctx = verbs_get_ctx((*xrcd).context); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:425:1 [INFO] [stdout] | [INFO] [stdout] 425 | pub unsafe fn ibv_close_xrcd(xrcd: *mut ibv_xrcd) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:426:30 [INFO] [stdout] | [INFO] [stdout] 426 | let vctx = verbs_get_ctx((*xrcd).context); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:428:5 [INFO] [stdout] | [INFO] [stdout] 428 | (*vctx.unwrap()).close_xrcd.unwrap()(xrcd) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:428:5 [INFO] [stdout] | [INFO] [stdout] 428 | (*vctx.unwrap()).close_xrcd.unwrap()(xrcd) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:445:9 [INFO] [stdout] | [INFO] [stdout] 445 | ibv_reg_mr(pd, addr, length, access as c_int) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:433:1 [INFO] [stdout] | [INFO] [stdout] 433 | / pub unsafe fn __ibv_reg_mr( [INFO] [stdout] 434 | | pd: *mut ibv_pd, [INFO] [stdout] 435 | | addr: *mut c_void, [INFO] [stdout] 436 | | length: usize, [INFO] [stdout] 437 | | access: c_uint, [INFO] [stdout] 438 | | is_access_const: c_int, [INFO] [stdout] 439 | | ) -> *mut ibv_mr { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr_iova2` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:447:9 [INFO] [stdout] | [INFO] [stdout] 447 | ibv_reg_mr_iova2(pd, addr, length, addr as u64, access) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr_iova` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:471:9 [INFO] [stdout] | [INFO] [stdout] 471 | ibv_reg_mr_iova(pd, addr, length, iova, access as c_int) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:458:1 [INFO] [stdout] | [INFO] [stdout] 458 | / pub unsafe fn __ibv_reg_mr_iova( [INFO] [stdout] 459 | | pd: *mut ibv_pd, [INFO] [stdout] 460 | | addr: *mut c_void, [INFO] [stdout] 461 | | length: usize, [INFO] [stdout] ... | [INFO] [stdout] 464 | | is_access_const: c_int, [INFO] [stdout] 465 | | ) -> *mut ibv_mr { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr_iova2` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:473:9 [INFO] [stdout] | [INFO] [stdout] 473 | ibv_reg_mr_iova2(pd, addr, length, iova, access) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:485:8 [INFO] [stdout] | [INFO] [stdout] 485 | if (*(*pd).context).ops.alloc_mw.is_some() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:484:1 [INFO] [stdout] | [INFO] [stdout] 484 | pub unsafe fn ibv_alloc_mw(pd: *mut ibv_pd, type_: ibv_mw_type::Type) -> Option<*mut ibv_mw> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:485:10 [INFO] [stdout] | [INFO] [stdout] 485 | if (*(*pd).context).ops.alloc_mw.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:486:14 [INFO] [stdout] | [INFO] [stdout] 486 | Some((*(*pd).context).ops.alloc_mw.unwrap()(pd, type_)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:486:14 [INFO] [stdout] | [INFO] [stdout] 486 | Some((*(*pd).context).ops.alloc_mw.unwrap()(pd, type_)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:486:16 [INFO] [stdout] | [INFO] [stdout] 486 | Some((*(*pd).context).ops.alloc_mw.unwrap()(pd, type_)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:488:9 [INFO] [stdout] | [INFO] [stdout] 488 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:488:10 [INFO] [stdout] | [INFO] [stdout] 488 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:495:5 [INFO] [stdout] | [INFO] [stdout] 495 | (*(*mw).context).ops.dealloc_mw.unwrap()(mw) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:494:1 [INFO] [stdout] | [INFO] [stdout] 494 | pub unsafe fn ibv_dealloc_mw(mw: *mut ibv_mw) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:495:5 [INFO] [stdout] | [INFO] [stdout] 495 | (*(*mw).context).ops.dealloc_mw.unwrap()(mw) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:495:7 [INFO] [stdout] | [INFO] [stdout] 495 | (*(*mw).context).ops.dealloc_mw.unwrap()(mw) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:509:8 [INFO] [stdout] | [INFO] [stdout] 509 | if (*mw).type_ != ibv_mw_type::IBV_MW_TYPE_1 { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:508:1 [INFO] [stdout] | [INFO] [stdout] 508 | pub unsafe fn ibv_bind_mw(qp: *mut ibv_qp, mw: *mut ibv_mw, mw_bind: *mut ibv_mw_bind) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:512:9 [INFO] [stdout] | [INFO] [stdout] 512 | (*(*mw).context).ops.bind_mw.unwrap()(qp, mw, mw_bind) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:512:9 [INFO] [stdout] | [INFO] [stdout] 512 | (*(*mw).context).ops.bind_mw.unwrap()(qp, mw, mw_bind) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:512:11 [INFO] [stdout] | [INFO] [stdout] 512 | (*(*mw).context).ops.bind_mw.unwrap()(qp, mw, mw_bind) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 524 | let vcr = verbs_get_ctx_op!((*pd).context, advise_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:517:1 [INFO] [stdout] | [INFO] [stdout] 517 | / pub unsafe fn ibv_advise_mr( [INFO] [stdout] 518 | | pd: *mut ibv_pd, [INFO] [stdout] 519 | | advice: ibv_advise_mr_advice, [INFO] [stdout] 520 | | flags: u32, [INFO] [stdout] 521 | | sg_list: *mut ibv_sge, [INFO] [stdout] 522 | | num_sge: u32, [INFO] [stdout] 523 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:524:33 [INFO] [stdout] | [INFO] [stdout] 524 | let vcr = verbs_get_ctx_op!((*pd).context, advise_mr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 524 | let vcr = verbs_get_ctx_op!((*pd).context, advise_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 524 | let vcr = verbs_get_ctx_op!((*pd).context, advise_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 524 | let vcr = verbs_get_ctx_op!((*pd).context, advise_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:527:9 [INFO] [stdout] | [INFO] [stdout] 527 | (*vctx).advise_mr.unwrap()(pd, advice, flags, sg_list, num_sge) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:527:9 [INFO] [stdout] | [INFO] [stdout] 527 | (*vctx).advise_mr.unwrap()(pd, advice, flags, sg_list, num_sge) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 539 | let vcr = verbs_get_ctx_op!(context, alloc_dm); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:535:1 [INFO] [stdout] | [INFO] [stdout] 535 | / pub unsafe fn ibv_alloc_dm( [INFO] [stdout] 536 | | context: *mut ibv_context, [INFO] [stdout] 537 | | attr: *mut ibv_alloc_dm_attr, [INFO] [stdout] 538 | | ) -> Option<*mut ibv_dm> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 539 | let vcr = verbs_get_ctx_op!(context, alloc_dm); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 539 | let vcr = verbs_get_ctx_op!(context, alloc_dm); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 539 | let vcr = verbs_get_ctx_op!(context, alloc_dm); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:542:14 [INFO] [stdout] | [INFO] [stdout] 542 | Some((*vctx).alloc_dm.unwrap()(context, attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:542:14 [INFO] [stdout] | [INFO] [stdout] 542 | Some((*vctx).alloc_dm.unwrap()(context, attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:544:9 [INFO] [stdout] | [INFO] [stdout] 544 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:544:10 [INFO] [stdout] | [INFO] [stdout] 544 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 551 | let vcr = verbs_get_ctx_op!((*dm).context, free_dm); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:550:1 [INFO] [stdout] | [INFO] [stdout] 550 | pub unsafe fn ibv_free_dm(dm: *mut ibv_dm) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:551:33 [INFO] [stdout] | [INFO] [stdout] 551 | let vcr = verbs_get_ctx_op!((*dm).context, free_dm); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 551 | let vcr = verbs_get_ctx_op!((*dm).context, free_dm); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 551 | let vcr = verbs_get_ctx_op!((*dm).context, free_dm); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 551 | let vcr = verbs_get_ctx_op!((*dm).context, free_dm); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:554:9 [INFO] [stdout] | [INFO] [stdout] 554 | (*vctx).free_dm.unwrap()(dm) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:554:9 [INFO] [stdout] | [INFO] [stdout] 554 | (*vctx).free_dm.unwrap()(dm) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:567:5 [INFO] [stdout] | [INFO] [stdout] 567 | (*dm).memcpy_to_dm.unwrap()(dm, dm_offset, host_addr, length) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:561:1 [INFO] [stdout] | [INFO] [stdout] 561 | / pub unsafe fn ibv_memcpy_to_dm( [INFO] [stdout] 562 | | dm: *mut ibv_dm, [INFO] [stdout] 563 | | dm_offset: u64, [INFO] [stdout] 564 | | host_addr: *const c_void, [INFO] [stdout] 565 | | length: usize, [INFO] [stdout] 566 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:567:5 [INFO] [stdout] | [INFO] [stdout] 567 | (*dm).memcpy_to_dm.unwrap()(dm, dm_offset, host_addr, length) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:577:5 [INFO] [stdout] | [INFO] [stdout] 577 | (*dm).memcpy_from_dm.unwrap()(host_addr, dm, dm_offset, length) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:571:1 [INFO] [stdout] | [INFO] [stdout] 571 | / pub unsafe fn ibv_memcpy_from_dm( [INFO] [stdout] 572 | | host_addr: *mut c_void, [INFO] [stdout] 573 | | dm: *mut ibv_dm, [INFO] [stdout] 574 | | dm_offset: u64, [INFO] [stdout] 575 | | length: usize, [INFO] [stdout] 576 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:577:5 [INFO] [stdout] | [INFO] [stdout] 577 | (*dm).memcpy_from_dm.unwrap()(host_addr, dm, dm_offset, length) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 582 | let vcr = verbs_get_ctx_op!((*pd).context, alloc_null_mr); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:581:1 [INFO] [stdout] | [INFO] [stdout] 581 | pub unsafe fn ibv_alloc_null_mr(pd: *mut ibv_pd) -> Option<*mut ibv_mr> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:582:33 [INFO] [stdout] | [INFO] [stdout] 582 | let vcr = verbs_get_ctx_op!((*pd).context, alloc_null_mr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 582 | let vcr = verbs_get_ctx_op!((*pd).context, alloc_null_mr); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 582 | let vcr = verbs_get_ctx_op!((*pd).context, alloc_null_mr); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 582 | let vcr = verbs_get_ctx_op!((*pd).context, alloc_null_mr); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:585:14 [INFO] [stdout] | [INFO] [stdout] 585 | Some((*vctx).alloc_null_mr.unwrap()(pd)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:585:14 [INFO] [stdout] | [INFO] [stdout] 585 | Some((*vctx).alloc_null_mr.unwrap()(pd)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:587:9 [INFO] [stdout] | [INFO] [stdout] 587 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:587:10 [INFO] [stdout] | [INFO] [stdout] 587 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 600 | let vcr = verbs_get_ctx_op!((*pd).context, reg_dm_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:593:1 [INFO] [stdout] | [INFO] [stdout] 593 | / pub unsafe fn ibv_reg_dm_mr( [INFO] [stdout] 594 | | pd: *mut ibv_pd, [INFO] [stdout] 595 | | dm: *mut ibv_dm, [INFO] [stdout] 596 | | dm_offset: u64, [INFO] [stdout] 597 | | length: usize, [INFO] [stdout] 598 | | access: u32, [INFO] [stdout] 599 | | ) -> Option<*mut ibv_mr> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:600:33 [INFO] [stdout] | [INFO] [stdout] 600 | let vcr = verbs_get_ctx_op!((*pd).context, reg_dm_mr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 600 | let vcr = verbs_get_ctx_op!((*pd).context, reg_dm_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 600 | let vcr = verbs_get_ctx_op!((*pd).context, reg_dm_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 600 | let vcr = verbs_get_ctx_op!((*pd).context, reg_dm_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:603:14 [INFO] [stdout] | [INFO] [stdout] 603 | Some((*vctx).reg_dm_mr.unwrap()( [INFO] [stdout] | ______________^ [INFO] [stdout] 604 | | pd, dm, dm_offset, length, access, [INFO] [stdout] 605 | | )) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:603:14 [INFO] [stdout] | [INFO] [stdout] 603 | Some((*vctx).reg_dm_mr.unwrap()( [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:607:9 [INFO] [stdout] | [INFO] [stdout] 607 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:607:10 [INFO] [stdout] | [INFO] [stdout] 607 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 618 | let vcr = verbs_get_ctx_op!(context, create_cq_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:614:1 [INFO] [stdout] | [INFO] [stdout] 614 | / pub unsafe fn ibv_create_cq_ex( [INFO] [stdout] 615 | | context: *mut ibv_context, [INFO] [stdout] 616 | | cq_attr: *mut ibv_cq_init_attr_ex, [INFO] [stdout] 617 | | ) -> Option<*mut ibv_cq_ex> { [INFO] [stdout] | |___________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 618 | let vcr = verbs_get_ctx_op!(context, create_cq_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 618 | let vcr = verbs_get_ctx_op!(context, create_cq_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 618 | let vcr = verbs_get_ctx_op!(context, create_cq_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:621:14 [INFO] [stdout] | [INFO] [stdout] 621 | Some((*vctx).create_cq_ex.unwrap()(context, cq_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:621:14 [INFO] [stdout] | [INFO] [stdout] 621 | Some((*vctx).create_cq_ex.unwrap()(context, cq_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:623:9 [INFO] [stdout] | [INFO] [stdout] 623 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:623:10 [INFO] [stdout] | [INFO] [stdout] 623 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:631:5 [INFO] [stdout] | [INFO] [stdout] 631 | (*(*cq).context).ops.poll_cq.unwrap()(cq, num_entries, wc) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:630:1 [INFO] [stdout] | [INFO] [stdout] 630 | pub unsafe fn ibv_poll_cq(cq: *mut ibv_cq, num_entries: i32, wc: *mut ibv_wc) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:631:5 [INFO] [stdout] | [INFO] [stdout] 631 | (*(*cq).context).ops.poll_cq.unwrap()(cq, num_entries, wc) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:631:7 [INFO] [stdout] | [INFO] [stdout] 631 | (*(*cq).context).ops.poll_cq.unwrap()(cq, num_entries, wc) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:636:5 [INFO] [stdout] | [INFO] [stdout] 636 | (*(*cq).context).ops.req_notify_cq.unwrap()(cq, solicited_only) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:635:1 [INFO] [stdout] | [INFO] [stdout] 635 | pub unsafe fn ibv_req_notify_cq(cq: *mut ibv_cq, solicited_only: i32) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:636:5 [INFO] [stdout] | [INFO] [stdout] 636 | (*(*cq).context).ops.req_notify_cq.unwrap()(cq, solicited_only) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:636:7 [INFO] [stdout] | [INFO] [stdout] 636 | (*(*cq).context).ops.req_notify_cq.unwrap()(cq, solicited_only) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 641 | let vcr = verbs_get_ctx_op!((*cq).context, modify_cq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:640:1 [INFO] [stdout] | [INFO] [stdout] 640 | pub unsafe fn ibv_modify_cq(cq: *mut ibv_cq, attr: *mut ibv_modify_cq_attr) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:641:33 [INFO] [stdout] | [INFO] [stdout] 641 | let vcr = verbs_get_ctx_op!((*cq).context, modify_cq); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 641 | let vcr = verbs_get_ctx_op!((*cq).context, modify_cq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 641 | let vcr = verbs_get_ctx_op!((*cq).context, modify_cq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 641 | let vcr = verbs_get_ctx_op!((*cq).context, modify_cq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:644:9 [INFO] [stdout] | [INFO] [stdout] 644 | (*vctx).modify_cq.unwrap()(cq, attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:644:9 [INFO] [stdout] | [INFO] [stdout] 644 | (*vctx).modify_cq.unwrap()(cq, attr) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:656:39 [INFO] [stdout] | [INFO] [stdout] 656 | let mask = ibv_srq_init_attr_mask((*srq_init_attr_ex).comp_mask); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:652:1 [INFO] [stdout] | [INFO] [stdout] 652 | / pub unsafe fn ibv_create_srq_ex( [INFO] [stdout] 653 | | context: *mut ibv_context, [INFO] [stdout] 654 | | srq_init_attr_ex: *mut ibv_srq_init_attr_ex, [INFO] [stdout] 655 | | ) -> Option<*mut ibv_srq> { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:657:44 [INFO] [stdout] | [INFO] [stdout] 657 | let mask_inv = ibv_srq_init_attr_mask(!(*srq_init_attr_ex).comp_mask); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:667:17 [INFO] [stdout] | [INFO] [stdout] 667 | || ((*srq_init_attr_ex).srq_type == ibv_srq_type::IBV_SRQT_BASIC)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_create_srq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:669:14 [INFO] [stdout] | [INFO] [stdout] 669 | Some(ibv_create_srq( [INFO] [stdout] | ______________^ [INFO] [stdout] 670 | | (*srq_init_attr_ex).pd, [INFO] [stdout] 671 | | srq_init_attr_ex as *mut ibv_srq_init_attr, [INFO] [stdout] 672 | | )) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:670:13 [INFO] [stdout] | [INFO] [stdout] 670 | (*srq_init_attr_ex).pd, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 674 | let vcr = verbs_get_ctx_op!(context, create_srq_ex); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 674 | let vcr = verbs_get_ctx_op!(context, create_srq_ex); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 674 | let vcr = verbs_get_ctx_op!(context, create_srq_ex); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 674 | let vcr = verbs_get_ctx_op!(context, create_srq_ex); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:677:18 [INFO] [stdout] | [INFO] [stdout] 677 | Some((*vctx).create_srq_ex.unwrap()(context, srq_init_attr_ex)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:677:18 [INFO] [stdout] | [INFO] [stdout] 677 | Some((*vctx).create_srq_ex.unwrap()(context, srq_init_attr_ex)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:679:13 [INFO] [stdout] | [INFO] [stdout] 679 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:679:14 [INFO] [stdout] | [INFO] [stdout] 679 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 687 | let vcr = verbs_get_ctx_op!((*srq).context, get_srq_num); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:686:1 [INFO] [stdout] | [INFO] [stdout] 686 | pub unsafe fn ibv_get_srq_num(srq: *mut ibv_srq, srq_num: *mut u32) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:687:33 [INFO] [stdout] | [INFO] [stdout] 687 | let vcr = verbs_get_ctx_op!((*srq).context, get_srq_num); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 687 | let vcr = verbs_get_ctx_op!((*srq).context, get_srq_num); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 687 | let vcr = verbs_get_ctx_op!((*srq).context, get_srq_num); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 687 | let vcr = verbs_get_ctx_op!((*srq).context, get_srq_num); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:690:9 [INFO] [stdout] | [INFO] [stdout] 690 | (*vctx).get_srq_num.unwrap()(srq, srq_num) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:690:9 [INFO] [stdout] | [INFO] [stdout] 690 | (*vctx).get_srq_num.unwrap()(srq, srq_num) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:702:5 [INFO] [stdout] | [INFO] [stdout] 702 | (*(*srq).context).ops.post_srq_recv.unwrap()(srq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:697:1 [INFO] [stdout] | [INFO] [stdout] 697 | / pub unsafe fn ibv_post_srq_recv( [INFO] [stdout] 698 | | srq: *mut ibv_srq, [INFO] [stdout] 699 | | recv_wr: *mut ibv_recv_wr, [INFO] [stdout] 700 | | bad_recv_wr: *mut *mut ibv_recv_wr, [INFO] [stdout] 701 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:702:5 [INFO] [stdout] | [INFO] [stdout] 702 | (*(*srq).context).ops.post_srq_recv.unwrap()(srq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:702:7 [INFO] [stdout] | [INFO] [stdout] 702 | (*(*srq).context).ops.post_srq_recv.unwrap()(srq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 711 | let vcr = verbs_get_ctx_op!((*srq).context, post_srq_ops); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:706:1 [INFO] [stdout] | [INFO] [stdout] 706 | / pub unsafe fn ibv_post_srq_ops( [INFO] [stdout] 707 | | srq: *mut ibv_srq, [INFO] [stdout] 708 | | op: *mut ibv_ops_wr, [INFO] [stdout] 709 | | bad_op: *mut *mut ibv_ops_wr, [INFO] [stdout] 710 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:711:33 [INFO] [stdout] | [INFO] [stdout] 711 | let vcr = verbs_get_ctx_op!((*srq).context, post_srq_ops); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 711 | let vcr = verbs_get_ctx_op!((*srq).context, post_srq_ops); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 711 | let vcr = verbs_get_ctx_op!((*srq).context, post_srq_ops); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 711 | let vcr = verbs_get_ctx_op!((*srq).context, post_srq_ops); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:714:9 [INFO] [stdout] | [INFO] [stdout] 714 | (*vctx).post_srq_ops.unwrap()(srq, op, bad_op) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:714:9 [INFO] [stdout] | [INFO] [stdout] 714 | (*vctx).post_srq_ops.unwrap()(srq, op, bad_op) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:716:9 [INFO] [stdout] | [INFO] [stdout] 716 | *bad_op = op; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:727:38 [INFO] [stdout] | [INFO] [stdout] 727 | let mask = ibv_qp_init_attr_mask((*qp_init_attr_ex).comp_mask); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:723:1 [INFO] [stdout] | [INFO] [stdout] 723 | / pub unsafe fn ibv_create_qp_ex( [INFO] [stdout] 724 | | context: *mut ibv_context, [INFO] [stdout] 725 | | qp_init_attr_ex: *mut ibv_qp_init_attr_ex, [INFO] [stdout] 726 | | ) -> Option<*mut ibv_qp> { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_create_qp` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:730:14 [INFO] [stdout] | [INFO] [stdout] 730 | Some(ibv_create_qp( [INFO] [stdout] | ______________^ [INFO] [stdout] 731 | | (*qp_init_attr_ex).pd, [INFO] [stdout] 732 | | qp_init_attr_ex as *mut ibv_qp_init_attr, [INFO] [stdout] 733 | | )) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:731:13 [INFO] [stdout] | [INFO] [stdout] 731 | (*qp_init_attr_ex).pd, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 735 | let vcr = verbs_get_ctx_op!(context, create_qp_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 735 | let vcr = verbs_get_ctx_op!(context, create_qp_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 735 | let vcr = verbs_get_ctx_op!(context, create_qp_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 735 | let vcr = verbs_get_ctx_op!(context, create_qp_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:738:18 [INFO] [stdout] | [INFO] [stdout] 738 | Some((*vctx).create_qp_ex.unwrap()(context, qp_init_attr_ex)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:738:18 [INFO] [stdout] | [INFO] [stdout] 738 | Some((*vctx).create_qp_ex.unwrap()(context, qp_init_attr_ex)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:740:13 [INFO] [stdout] | [INFO] [stdout] 740 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:740:14 [INFO] [stdout] | [INFO] [stdout] 740 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 752 | let vcr = verbs_get_ctx_op!(context, alloc_td); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:748:1 [INFO] [stdout] | [INFO] [stdout] 748 | / pub unsafe fn ibv_alloc_td( [INFO] [stdout] 749 | | context: *mut ibv_context, [INFO] [stdout] 750 | | init_attr: *mut ibv_td_init_attr, [INFO] [stdout] 751 | | ) -> Option<*mut ibv_td> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 752 | let vcr = verbs_get_ctx_op!(context, alloc_td); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 752 | let vcr = verbs_get_ctx_op!(context, alloc_td); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 752 | let vcr = verbs_get_ctx_op!(context, alloc_td); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:755:14 [INFO] [stdout] | [INFO] [stdout] 755 | Some((*vctx).alloc_td.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:755:14 [INFO] [stdout] | [INFO] [stdout] 755 | Some((*vctx).alloc_td.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:757:9 [INFO] [stdout] | [INFO] [stdout] 757 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:757:10 [INFO] [stdout] | [INFO] [stdout] 757 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 764 | let vcr = verbs_get_ctx_op!((*td).context, dealloc_td); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:763:1 [INFO] [stdout] | [INFO] [stdout] 763 | pub unsafe fn ibv_dealloc_td(td: *mut ibv_td) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:764:33 [INFO] [stdout] | [INFO] [stdout] 764 | let vcr = verbs_get_ctx_op!((*td).context, dealloc_td); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 764 | let vcr = verbs_get_ctx_op!((*td).context, dealloc_td); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 764 | let vcr = verbs_get_ctx_op!((*td).context, dealloc_td); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 764 | let vcr = verbs_get_ctx_op!((*td).context, dealloc_td); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:767:9 [INFO] [stdout] | [INFO] [stdout] 767 | (*vctx).dealloc_td.unwrap()(td) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:767:9 [INFO] [stdout] | [INFO] [stdout] 767 | (*vctx).dealloc_td.unwrap()(td) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 779 | let vcr = verbs_get_ctx_op!(context, alloc_parent_domain); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:775:1 [INFO] [stdout] | [INFO] [stdout] 775 | / pub unsafe fn ibv_alloc_parent_domain( [INFO] [stdout] 776 | | context: *mut ibv_context, [INFO] [stdout] 777 | | attr: *mut ibv_parent_domain_init_attr, [INFO] [stdout] 778 | | ) -> Option<*mut ibv_pd> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 779 | let vcr = verbs_get_ctx_op!(context, alloc_parent_domain); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 779 | let vcr = verbs_get_ctx_op!(context, alloc_parent_domain); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 779 | let vcr = verbs_get_ctx_op!(context, alloc_parent_domain); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:782:14 [INFO] [stdout] | [INFO] [stdout] 782 | Some((*vctx).alloc_parent_domain.unwrap()(context, attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:782:14 [INFO] [stdout] | [INFO] [stdout] 782 | Some((*vctx).alloc_parent_domain.unwrap()(context, attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:784:9 [INFO] [stdout] | [INFO] [stdout] 784 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:784:10 [INFO] [stdout] | [INFO] [stdout] 784 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 795 | let vcr = verbs_get_ctx_op!(context, query_rt_values); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:791:1 [INFO] [stdout] | [INFO] [stdout] 791 | / pub unsafe fn ibv_query_rt_values_ex( [INFO] [stdout] 792 | | context: *mut ibv_context, [INFO] [stdout] 793 | | values: *mut ibv_values_ex, [INFO] [stdout] 794 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 795 | let vcr = verbs_get_ctx_op!(context, query_rt_values); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 795 | let vcr = verbs_get_ctx_op!(context, query_rt_values); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 795 | let vcr = verbs_get_ctx_op!(context, query_rt_values); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:798:9 [INFO] [stdout] | [INFO] [stdout] 798 | (*vctx).query_rt_values.unwrap()(context, values) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:798:9 [INFO] [stdout] | [INFO] [stdout] 798 | (*vctx).query_rt_values.unwrap()(context, values) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 810 | let vcr = verbs_get_ctx_op!(context, query_device_ex); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:805:1 [INFO] [stdout] | [INFO] [stdout] 805 | / pub unsafe fn ibv_query_device_ex( [INFO] [stdout] 806 | | context: *mut ibv_context, [INFO] [stdout] 807 | | input: *const ibv_query_device_ex_input, [INFO] [stdout] 808 | | attr: *mut ibv_device_attr_ex, [INFO] [stdout] 809 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 810 | let vcr = verbs_get_ctx_op!(context, query_device_ex); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 810 | let vcr = verbs_get_ctx_op!(context, query_device_ex); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 810 | let vcr = verbs_get_ctx_op!(context, query_device_ex); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:813:19 [INFO] [stdout] | [INFO] [stdout] 813 | let ret = (*vctx).query_device_ex.unwrap()(context, input, attr, mem::size_of_val(&*attr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:813:19 [INFO] [stdout] | [INFO] [stdout] 813 | let ret = (*vctx).query_device_ex.unwrap()(context, input, attr, mem::size_of_val(&*attr)); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:813:92 [INFO] [stdout] | [INFO] [stdout] 813 | let ret = (*vctx).query_device_ex.unwrap()(context, input, attr, mem::size_of_val(&*attr)); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_query_device` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:820:5 [INFO] [stdout] | [INFO] [stdout] 820 | ibv_query_device(context, &mut (*attr).orig_attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:820:36 [INFO] [stdout] | [INFO] [stdout] 820 | ibv_query_device(context, &mut (*attr).orig_attr) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 829 | let vcr = verbs_get_ctx_op!(context, open_qp); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:825:1 [INFO] [stdout] | [INFO] [stdout] 825 | / pub unsafe fn ibv_open_qp( [INFO] [stdout] 826 | | context: *mut ibv_context, [INFO] [stdout] 827 | | qp_open_attr: *mut ibv_qp_open_attr, [INFO] [stdout] 828 | | ) -> Option<*mut ibv_qp> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 829 | let vcr = verbs_get_ctx_op!(context, open_qp); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 829 | let vcr = verbs_get_ctx_op!(context, open_qp); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 829 | let vcr = verbs_get_ctx_op!(context, open_qp); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:832:14 [INFO] [stdout] | [INFO] [stdout] 832 | Some((*vctx).open_qp.unwrap()(context, qp_open_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:832:14 [INFO] [stdout] | [INFO] [stdout] 832 | Some((*vctx).open_qp.unwrap()(context, qp_open_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:834:9 [INFO] [stdout] | [INFO] [stdout] 834 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:834:10 [INFO] [stdout] | [INFO] [stdout] 834 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 844 | let vcr = verbs_get_ctx_op!((*qp).context, modify_qp_rate_limit); [INFO] [stdout] | ------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:840:1 [INFO] [stdout] | [INFO] [stdout] 840 | / pub unsafe fn ibv_modify_qp_rate_limit( [INFO] [stdout] 841 | | qp: *mut ibv_qp, [INFO] [stdout] 842 | | attr: *mut ibv_qp_rate_limit_attr, [INFO] [stdout] 843 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:844:33 [INFO] [stdout] | [INFO] [stdout] 844 | let vcr = verbs_get_ctx_op!((*qp).context, modify_qp_rate_limit); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 844 | let vcr = verbs_get_ctx_op!((*qp).context, modify_qp_rate_limit); [INFO] [stdout] | ------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 844 | let vcr = verbs_get_ctx_op!((*qp).context, modify_qp_rate_limit); [INFO] [stdout] | ------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 844 | let vcr = verbs_get_ctx_op!((*qp).context, modify_qp_rate_limit); [INFO] [stdout] | ------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:847:9 [INFO] [stdout] | [INFO] [stdout] 847 | (*vctx).modify_qp_rate_limit.unwrap()(qp, attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:847:9 [INFO] [stdout] | [INFO] [stdout] 847 | (*vctx).modify_qp_rate_limit.unwrap()(qp, attr) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 859 | let vcr = verbs_get_ctx_op!(context, create_wq); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:855:1 [INFO] [stdout] | [INFO] [stdout] 855 | / pub unsafe fn ibv_create_wq( [INFO] [stdout] 856 | | context: *mut ibv_context, [INFO] [stdout] 857 | | wq_init_attr: *mut ibv_wq_init_attr, [INFO] [stdout] 858 | | ) -> Option<*mut ibv_wq> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 859 | let vcr = verbs_get_ctx_op!(context, create_wq); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 859 | let vcr = verbs_get_ctx_op!(context, create_wq); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 859 | let vcr = verbs_get_ctx_op!(context, create_wq); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:862:18 [INFO] [stdout] | [INFO] [stdout] 862 | let wq = (*vctx).create_wq.unwrap()(context, wq_init_attr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:862:18 [INFO] [stdout] | [INFO] [stdout] 862 | let wq = (*vctx).create_wq.unwrap()(context, wq_init_attr); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:864:13 [INFO] [stdout] | [INFO] [stdout] 864 | (*wq).events_completed = 0; [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::pthread_mutex_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:865:13 [INFO] [stdout] | [INFO] [stdout] 865 | / libc::pthread_mutex_init( [INFO] [stdout] 866 | | &mut (*wq).mutex, [INFO] [stdout] 867 | | ptr::null::() as *mut _, [INFO] [stdout] 868 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:866:22 [INFO] [stdout] | [INFO] [stdout] 866 | &mut (*wq).mutex, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::pthread_cond_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:869:13 [INFO] [stdout] | [INFO] [stdout] 869 | / libc::pthread_cond_init( [INFO] [stdout] 870 | | &mut (*wq).cond, [INFO] [stdout] 871 | | ptr::null::() as *mut _, [INFO] [stdout] 872 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:870:22 [INFO] [stdout] | [INFO] [stdout] 870 | &mut (*wq).cond, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:876:9 [INFO] [stdout] | [INFO] [stdout] 876 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:876:10 [INFO] [stdout] | [INFO] [stdout] 876 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 883 | let vcr = verbs_get_ctx_op!((*wq).context, modify_wq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:882:1 [INFO] [stdout] | [INFO] [stdout] 882 | pub unsafe fn ibv_modify_wq(wq: *mut ibv_wq, wq_attr: *mut ibv_wq_attr) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:883:33 [INFO] [stdout] | [INFO] [stdout] 883 | let vcr = verbs_get_ctx_op!((*wq).context, modify_wq); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 883 | let vcr = verbs_get_ctx_op!((*wq).context, modify_wq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 883 | let vcr = verbs_get_ctx_op!((*wq).context, modify_wq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 883 | let vcr = verbs_get_ctx_op!((*wq).context, modify_wq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:886:9 [INFO] [stdout] | [INFO] [stdout] 886 | (*vctx).modify_wq.unwrap()(wq, wq_attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:886:9 [INFO] [stdout] | [INFO] [stdout] 886 | (*vctx).modify_wq.unwrap()(wq, wq_attr) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 894 | let vcr = verbs_get_ctx_op!((*wq).context, destroy_wq); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:893:1 [INFO] [stdout] | [INFO] [stdout] 893 | pub unsafe fn ibv_destroy_wq(wq: *mut ibv_wq) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:894:33 [INFO] [stdout] | [INFO] [stdout] 894 | let vcr = verbs_get_ctx_op!((*wq).context, destroy_wq); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 894 | let vcr = verbs_get_ctx_op!((*wq).context, destroy_wq); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 894 | let vcr = verbs_get_ctx_op!((*wq).context, destroy_wq); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 894 | let vcr = verbs_get_ctx_op!((*wq).context, destroy_wq); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:897:9 [INFO] [stdout] | [INFO] [stdout] 897 | (*vctx).destroy_wq.unwrap()(wq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:897:9 [INFO] [stdout] | [INFO] [stdout] 897 | (*vctx).destroy_wq.unwrap()(wq) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 909 | let vcr = verbs_get_ctx_op!(context, create_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:905:1 [INFO] [stdout] | [INFO] [stdout] 905 | / pub unsafe fn ibv_create_rwq_ind_table( [INFO] [stdout] 906 | | context: *mut ibv_context, [INFO] [stdout] 907 | | init_attr: *mut ibv_rwq_ind_table_init_attr, [INFO] [stdout] 908 | | ) -> Option<*mut ibv_rwq_ind_table> { [INFO] [stdout] | |___________________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 909 | let vcr = verbs_get_ctx_op!(context, create_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 909 | let vcr = verbs_get_ctx_op!(context, create_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 909 | let vcr = verbs_get_ctx_op!(context, create_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:912:14 [INFO] [stdout] | [INFO] [stdout] 912 | Some((*vctx).create_rwq_ind_table.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:912:14 [INFO] [stdout] | [INFO] [stdout] 912 | Some((*vctx).create_rwq_ind_table.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:914:9 [INFO] [stdout] | [INFO] [stdout] 914 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:914:10 [INFO] [stdout] | [INFO] [stdout] 914 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 921 | let vcr = verbs_get_ctx_op!((*rwq_ind_table).context, destroy_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:920:1 [INFO] [stdout] | [INFO] [stdout] 920 | pub unsafe fn ibv_destroy_rwq_ind_table(rwq_ind_table: *mut ibv_rwq_ind_table) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:921:33 [INFO] [stdout] | [INFO] [stdout] 921 | let vcr = verbs_get_ctx_op!((*rwq_ind_table).context, destroy_rwq_ind_table); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 921 | let vcr = verbs_get_ctx_op!((*rwq_ind_table).context, destroy_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 921 | let vcr = verbs_get_ctx_op!((*rwq_ind_table).context, destroy_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 921 | let vcr = verbs_get_ctx_op!((*rwq_ind_table).context, destroy_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:924:9 [INFO] [stdout] | [INFO] [stdout] 924 | (*vctx).destroy_rwq_ind_table.unwrap()(rwq_ind_table) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:924:9 [INFO] [stdout] | [INFO] [stdout] 924 | (*vctx).destroy_rwq_ind_table.unwrap()(rwq_ind_table) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:938:5 [INFO] [stdout] | [INFO] [stdout] 938 | (*(*qp).context).ops.post_send.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:933:1 [INFO] [stdout] | [INFO] [stdout] 933 | / pub unsafe fn ibv_post_send( [INFO] [stdout] 934 | | qp: *mut ibv_qp, [INFO] [stdout] 935 | | wr: *mut ibv_send_wr, [INFO] [stdout] 936 | | bad_wr: *mut *mut ibv_send_wr, [INFO] [stdout] 937 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:938:5 [INFO] [stdout] | [INFO] [stdout] 938 | (*(*qp).context).ops.post_send.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:938:7 [INFO] [stdout] | [INFO] [stdout] 938 | (*(*qp).context).ops.post_send.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:947:5 [INFO] [stdout] | [INFO] [stdout] 947 | (*(*qp).context).ops.post_recv.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:942:1 [INFO] [stdout] | [INFO] [stdout] 942 | / pub unsafe fn ibv_post_recv( [INFO] [stdout] 943 | | qp: *mut ibv_qp, [INFO] [stdout] 944 | | wr: *mut ibv_recv_wr, [INFO] [stdout] 945 | | bad_wr: *mut *mut ibv_recv_wr, [INFO] [stdout] 946 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:947:5 [INFO] [stdout] | [INFO] [stdout] 947 | (*(*qp).context).ops.post_recv.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:947:7 [INFO] [stdout] | [INFO] [stdout] 947 | (*(*qp).context).ops.post_recv.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 961 | let vcr = verbs_get_ctx_op!(context, create_counters); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:957:1 [INFO] [stdout] | [INFO] [stdout] 957 | / pub unsafe fn ibv_create_counters( [INFO] [stdout] 958 | | context: *mut ibv_context, [INFO] [stdout] 959 | | init_attr: *mut ibv_counters_init_attr, [INFO] [stdout] 960 | | ) -> Option<*mut ibv_counters> { [INFO] [stdout] | |______________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 961 | let vcr = verbs_get_ctx_op!(context, create_counters); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 961 | let vcr = verbs_get_ctx_op!(context, create_counters); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 961 | let vcr = verbs_get_ctx_op!(context, create_counters); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:964:14 [INFO] [stdout] | [INFO] [stdout] 964 | Some((*vctx).create_counters.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:964:14 [INFO] [stdout] | [INFO] [stdout] 964 | Some((*vctx).create_counters.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:966:9 [INFO] [stdout] | [INFO] [stdout] 966 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:966:10 [INFO] [stdout] | [INFO] [stdout] 966 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 973 | let vcr = verbs_get_ctx_op!((*counters).context, destroy_counters); [INFO] [stdout] | -------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:972:1 [INFO] [stdout] | [INFO] [stdout] 972 | pub unsafe fn ibv_destroy_counters(counters: *mut ibv_counters) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:973:33 [INFO] [stdout] | [INFO] [stdout] 973 | let vcr = verbs_get_ctx_op!((*counters).context, destroy_counters); [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 973 | let vcr = verbs_get_ctx_op!((*counters).context, destroy_counters); [INFO] [stdout] | -------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 973 | let vcr = verbs_get_ctx_op!((*counters).context, destroy_counters); [INFO] [stdout] | -------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 973 | let vcr = verbs_get_ctx_op!((*counters).context, destroy_counters); [INFO] [stdout] | -------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:976:9 [INFO] [stdout] | [INFO] [stdout] 976 | (*vctx).destroy_counters.unwrap()(counters) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:976:9 [INFO] [stdout] | [INFO] [stdout] 976 | (*vctx).destroy_counters.unwrap()(counters) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 988 | let vcr = verbs_get_ctx_op!((*counters).context, attach_counters_point_flow); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:983:1 [INFO] [stdout] | [INFO] [stdout] 983 | / pub unsafe fn ibv_attach_counters_point_flow( [INFO] [stdout] 984 | | counters: *mut ibv_counters, [INFO] [stdout] 985 | | attr: *mut ibv_counter_attach_attr, [INFO] [stdout] 986 | | flow: *mut ibv_flow, [INFO] [stdout] 987 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:988:33 [INFO] [stdout] | [INFO] [stdout] 988 | let vcr = verbs_get_ctx_op!((*counters).context, attach_counters_point_flow); [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 988 | let vcr = verbs_get_ctx_op!((*counters).context, attach_counters_point_flow); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 988 | let vcr = verbs_get_ctx_op!((*counters).context, attach_counters_point_flow); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 988 | let vcr = verbs_get_ctx_op!((*counters).context, attach_counters_point_flow); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:991:9 [INFO] [stdout] | [INFO] [stdout] 991 | (*vctx).attach_counters_point_flow.unwrap()(counters, attr, flow) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:991:9 [INFO] [stdout] | [INFO] [stdout] 991 | (*vctx).attach_counters_point_flow.unwrap()(counters, attr, flow) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1004 | let vcr = verbs_get_ctx_op!((*counters).context, read_counters); [INFO] [stdout] | ----------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:998:1 [INFO] [stdout] | [INFO] [stdout] 998 | / pub unsafe fn ibv_read_counters( [INFO] [stdout] 999 | | counters: *mut ibv_counters, [INFO] [stdout] 1000 | | counters_value: *mut u64, [INFO] [stdout] 1001 | | ncounters: u32, [INFO] [stdout] 1002 | | flags: u32, [INFO] [stdout] 1003 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1004:33 [INFO] [stdout] | [INFO] [stdout] 1004 | let vcr = verbs_get_ctx_op!((*counters).context, read_counters); [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 1004 | let vcr = verbs_get_ctx_op!((*counters).context, read_counters); [INFO] [stdout] | ----------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 1004 | let vcr = verbs_get_ctx_op!((*counters).context, read_counters); [INFO] [stdout] | ----------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 1004 | let vcr = verbs_get_ctx_op!((*counters).context, read_counters); [INFO] [stdout] | ----------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1007:9 [INFO] [stdout] | [INFO] [stdout] 1007 | (*vctx).read_counters.unwrap()(counters, counters_value, ncounters, flags) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1007:9 [INFO] [stdout] | [INFO] [stdout] 1007 | (*vctx).read_counters.unwrap()(counters, counters_value, ncounters, flags) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1030:6 [INFO] [stdout] | [INFO] [stdout] 1030 | &id.route.addr.src_addr_union.src_addr [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1029:1 [INFO] [stdout] | [INFO] [stdout] 1029 | pub unsafe fn rdma_get_local_addr(id: &rdma_cm_id) -> &libc::sockaddr { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1035:6 [INFO] [stdout] | [INFO] [stdout] 1035 | &id.route.addr.dst_addr_union.dst_addr [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1034:1 [INFO] [stdout] | [INFO] [stdout] 1034 | pub unsafe fn rdma_get_peer_addr(id: &rdma_cm_id) -> &libc::sockaddr { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1043:9 [INFO] [stdout] | [INFO] [stdout] 1043 | *libc::__errno_location() = ret; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1041:1 [INFO] [stdout] | [INFO] [stdout] 1041 | pub unsafe fn rdma_seterrno(ret: c_int) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1043:10 [INFO] [stdout] | [INFO] [stdout] 1043 | *libc::__errno_location() = ret; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1052:5 [INFO] [stdout] | [INFO] [stdout] 1052 | / ibv_reg_mr( [INFO] [stdout] 1053 | | (*id).pd, [INFO] [stdout] 1054 | | addr, [INFO] [stdout] 1055 | | length, [INFO] [stdout] 1056 | | ibv_access_flags::IBV_ACCESS_LOCAL_WRITE.0 as c_int, [INFO] [stdout] 1057 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1051:1 [INFO] [stdout] | [INFO] [stdout] 1051 | pub unsafe fn rdma_reg_msgs(id: *mut rdma_cm_id, addr: *mut c_void, length: usize) -> *mut ibv_mr { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1053:9 [INFO] [stdout] | [INFO] [stdout] 1053 | (*id).pd, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1062:5 [INFO] [stdout] | [INFO] [stdout] 1062 | / ibv_reg_mr( [INFO] [stdout] 1063 | | (*id).pd, [INFO] [stdout] 1064 | | addr, [INFO] [stdout] 1065 | | length, [INFO] [stdout] 1066 | | (ibv_access_flags::IBV_ACCESS_LOCAL_WRITE | ibv_access_flags::IBV_ACCESS_REMOTE_READ).0 [INFO] [stdout] 1067 | | as c_int, [INFO] [stdout] 1068 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1061:1 [INFO] [stdout] | [INFO] [stdout] 1061 | pub unsafe fn rdma_reg_read(id: *mut rdma_cm_id, addr: *mut c_void, length: usize) -> *mut ibv_mr { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1063:9 [INFO] [stdout] | [INFO] [stdout] 1063 | (*id).pd, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1073:5 [INFO] [stdout] | [INFO] [stdout] 1073 | / ibv_reg_mr( [INFO] [stdout] 1074 | | (*id).pd, [INFO] [stdout] 1075 | | addr, [INFO] [stdout] 1076 | | length, [INFO] [stdout] 1077 | | (ibv_access_flags::IBV_ACCESS_LOCAL_WRITE | ibv_access_flags::IBV_ACCESS_REMOTE_WRITE).0 [INFO] [stdout] 1078 | | as c_int, [INFO] [stdout] 1079 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1072:1 [INFO] [stdout] | [INFO] [stdout] 1072 | pub unsafe fn rdma_reg_write(id: *mut rdma_cm_id, addr: *mut c_void, length: usize) -> *mut ibv_mr { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1074:9 [INFO] [stdout] | [INFO] [stdout] 1074 | (*id).pd, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1084:5 [INFO] [stdout] | [INFO] [stdout] 1084 | rdma_seterrno(ibv_dereg_mr(mr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1083:1 [INFO] [stdout] | [INFO] [stdout] 1083 | pub unsafe fn rdma_dereg_mr(mr: *mut ibv_mr) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_dereg_mr` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1084:19 [INFO] [stdout] | [INFO] [stdout] 1084 | rdma_seterrno(ibv_dereg_mr(mr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1102:8 [INFO] [stdout] | [INFO] [stdout] 1102 | if (*id).srq as usize != 0 { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1088:1 [INFO] [stdout] | [INFO] [stdout] 1088 | / pub unsafe fn rdma_post_recvv( [INFO] [stdout] 1089 | | id: *mut rdma_cm_id, [INFO] [stdout] 1090 | | context: *mut c_void, [INFO] [stdout] 1091 | | sgl: *mut ibv_sge, [INFO] [stdout] 1092 | | nsge: c_int, [INFO] [stdout] 1093 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1103:9 [INFO] [stdout] | [INFO] [stdout] 1103 | rdma_seterrno(ibv_post_srq_recv((*id).srq, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_srq_recv` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1103:23 [INFO] [stdout] | [INFO] [stdout] 1103 | rdma_seterrno(ibv_post_srq_recv((*id).srq, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1103:41 [INFO] [stdout] | [INFO] [stdout] 1103 | rdma_seterrno(ibv_post_srq_recv((*id).srq, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1105:9 [INFO] [stdout] | [INFO] [stdout] 1105 | rdma_seterrno(ibv_post_recv((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_recv` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1105:23 [INFO] [stdout] | [INFO] [stdout] 1105 | rdma_seterrno(ibv_post_recv((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1105:37 [INFO] [stdout] | [INFO] [stdout] 1105 | rdma_seterrno(ibv_post_recv((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::zeroed` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1117:18 [INFO] [stdout] | [INFO] [stdout] 1117 | let mut wr = std::mem::zeroed::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1110:1 [INFO] [stdout] | [INFO] [stdout] 1110 | / pub unsafe fn rdma_post_sendv( [INFO] [stdout] 1111 | | id: *mut rdma_cm_id, [INFO] [stdout] 1112 | | context: *mut c_void, [INFO] [stdout] 1113 | | sgl: *mut ibv_sge, [INFO] [stdout] 1114 | | nsge: c_int, [INFO] [stdout] 1115 | | flags: c_int, [INFO] [stdout] 1116 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1126:5 [INFO] [stdout] | [INFO] [stdout] 1126 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_send` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1126:19 [INFO] [stdout] | [INFO] [stdout] 1126 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1126:33 [INFO] [stdout] | [INFO] [stdout] 1126 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::zeroed` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1139:18 [INFO] [stdout] | [INFO] [stdout] 1139 | let mut wr = std::mem::zeroed::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1130:1 [INFO] [stdout] | [INFO] [stdout] 1130 | / pub unsafe fn rdma_post_readv( [INFO] [stdout] 1131 | | id: *mut rdma_cm_id, [INFO] [stdout] 1132 | | context: *mut c_void, [INFO] [stdout] 1133 | | sgl: *mut ibv_sge, [INFO] [stdout] ... | [INFO] [stdout] 1137 | | rkey: u32, [INFO] [stdout] 1138 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1151:5 [INFO] [stdout] | [INFO] [stdout] 1151 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_send` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1151:19 [INFO] [stdout] | [INFO] [stdout] 1151 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1151:33 [INFO] [stdout] | [INFO] [stdout] 1151 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::zeroed` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1164:18 [INFO] [stdout] | [INFO] [stdout] 1164 | let mut wr = std::mem::zeroed::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1155:1 [INFO] [stdout] | [INFO] [stdout] 1155 | / pub unsafe fn rdma_post_writev( [INFO] [stdout] 1156 | | id: *mut rdma_cm_id, [INFO] [stdout] 1157 | | context: *mut c_void, [INFO] [stdout] 1158 | | sgl: *mut ibv_sge, [INFO] [stdout] ... | [INFO] [stdout] 1162 | | rkey: u32, [INFO] [stdout] 1163 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1176:5 [INFO] [stdout] | [INFO] [stdout] 1176 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_send` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1176:19 [INFO] [stdout] | [INFO] [stdout] 1176 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1176:33 [INFO] [stdout] | [INFO] [stdout] 1176 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1188:17 [INFO] [stdout] | [INFO] [stdout] 1188 | addr >= (*mr).addr && (addr as usize + length <= (*mr).addr as usize + (*mr).length), [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1180:1 [INFO] [stdout] | [INFO] [stdout] 1180 | / pub unsafe fn rdma_post_recv( [INFO] [stdout] 1181 | | id: *mut rdma_cm_id, [INFO] [stdout] 1182 | | context: *mut c_void, [INFO] [stdout] 1183 | | addr: *mut c_void, [INFO] [stdout] 1184 | | length: usize, [INFO] [stdout] 1185 | | mr: *mut ibv_mr, [INFO] [stdout] 1186 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1188:58 [INFO] [stdout] | [INFO] [stdout] 1188 | addr >= (*mr).addr && (addr as usize + length <= (*mr).addr as usize + (*mr).length), [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1188:80 [INFO] [stdout] | [INFO] [stdout] 1188 | addr >= (*mr).addr && (addr as usize + length <= (*mr).addr as usize + (*mr).length), [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1196:15 [INFO] [stdout] | [INFO] [stdout] 1196 | lkey: (*mr).lkey, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_post_recvv` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1199:5 [INFO] [stdout] | [INFO] [stdout] 1199 | rdma_post_recvv(id, context, &mut sge, nsge) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1214:34 [INFO] [stdout] | [INFO] [stdout] 1214 | lkey: if !mr.is_null() { (*mr).lkey } else { 0 }, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1203:1 [INFO] [stdout] | [INFO] [stdout] 1203 | / pub unsafe fn rdma_post_send( [INFO] [stdout] 1204 | | id: *mut rdma_cm_id, [INFO] [stdout] 1205 | | context: *mut c_void, [INFO] [stdout] 1206 | | addr: *mut c_void, [INFO] [stdout] ... | [INFO] [stdout] 1209 | | flags: c_int, [INFO] [stdout] 1210 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_post_sendv` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1217:5 [INFO] [stdout] | [INFO] [stdout] 1217 | rdma_post_sendv(id, context, &mut sge, nsge, flags) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1234:15 [INFO] [stdout] | [INFO] [stdout] 1234 | lkey: (*mr).lkey, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1221:1 [INFO] [stdout] | [INFO] [stdout] 1221 | / pub unsafe fn rdma_post_read( [INFO] [stdout] 1222 | | id: *mut rdma_cm_id, [INFO] [stdout] 1223 | | context: *mut c_void, [INFO] [stdout] 1224 | | addr: *mut c_void, [INFO] [stdout] ... | [INFO] [stdout] 1229 | | rkey: u32, [INFO] [stdout] 1230 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_post_readv` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1237:5 [INFO] [stdout] | [INFO] [stdout] 1237 | rdma_post_readv(id, context, &mut sge, nsge, flags, remote_addr, rkey) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1254:34 [INFO] [stdout] | [INFO] [stdout] 1254 | lkey: if !mr.is_null() { (*mr).lkey } else { 0 }, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1241:1 [INFO] [stdout] | [INFO] [stdout] 1241 | / pub unsafe fn rdma_post_write( [INFO] [stdout] 1242 | | id: *mut rdma_cm_id, [INFO] [stdout] 1243 | | context: *mut c_void, [INFO] [stdout] 1244 | | addr: *mut c_void, [INFO] [stdout] ... | [INFO] [stdout] 1249 | | rkey: u32, [INFO] [stdout] 1250 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_post_writev` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1257:5 [INFO] [stdout] | [INFO] [stdout] 1257 | rdma_post_writev(id, context, &mut sge, nsge, flags, remote_addr, rkey) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1274:34 [INFO] [stdout] | [INFO] [stdout] 1274 | lkey: if !mr.is_null() { (*mr).lkey } else { 0 }, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1261:1 [INFO] [stdout] | [INFO] [stdout] 1261 | / pub unsafe fn rdma_post_ud_send( [INFO] [stdout] 1262 | | id: *mut rdma_cm_id, [INFO] [stdout] 1263 | | context: *mut c_void, [INFO] [stdout] 1264 | | addr: *mut c_void, [INFO] [stdout] ... | [INFO] [stdout] 1269 | | remote_qpn: u32, [INFO] [stdout] 1270 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::zeroed` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1277:18 [INFO] [stdout] | [INFO] [stdout] 1277 | let mut wr = std::mem::zeroed::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1293:5 [INFO] [stdout] | [INFO] [stdout] 1293 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_send` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1293:19 [INFO] [stdout] | [INFO] [stdout] 1293 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1293:33 [INFO] [stdout] | [INFO] [stdout] 1293 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_poll_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1306:15 [INFO] [stdout] | [INFO] [stdout] 1306 | ret = ibv_poll_cq((*id).send_cq, num_entries, wc); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1297:1 [INFO] [stdout] | [INFO] [stdout] 1297 | pub unsafe fn rdma_get_send_comp(id: *mut rdma_cm_id, wc: *mut ibv_wc) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1306:27 [INFO] [stdout] | [INFO] [stdout] 1306 | ret = ibv_poll_cq((*id).send_cq, num_entries, wc); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_req_notify_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1310:15 [INFO] [stdout] | [INFO] [stdout] 1310 | ret = ibv_req_notify_cq((*id).send_cq, solicited_only); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1310:33 [INFO] [stdout] | [INFO] [stdout] 1310 | ret = ibv_req_notify_cq((*id).send_cq, solicited_only); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1312:20 [INFO] [stdout] | [INFO] [stdout] 1312 | return rdma_seterrno(ret); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_poll_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1314:15 [INFO] [stdout] | [INFO] [stdout] 1314 | ret = ibv_poll_cq((*id).send_cq, num_entries, wc); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1314:27 [INFO] [stdout] | [INFO] [stdout] 1314 | ret = ibv_poll_cq((*id).send_cq, num_entries, wc); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_get_cq_event` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1318:15 [INFO] [stdout] | [INFO] [stdout] 1318 | ret = ibv_get_cq_event((*id).send_cq_channel, &mut cq, &mut context); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1318:32 [INFO] [stdout] | [INFO] [stdout] 1318 | ret = ibv_get_cq_event((*id).send_cq_channel, &mut cq, &mut context); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1323:23 [INFO] [stdout] | [INFO] [stdout] 1323 | assert!(cq == (*id).send_cq && context as *mut rdma_cm_id == id); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_ack_cq_events` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1324:9 [INFO] [stdout] | [INFO] [stdout] 1324 | ibv_ack_cq_events((*id).send_cq, nevents); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1324:27 [INFO] [stdout] | [INFO] [stdout] 1324 | ibv_ack_cq_events((*id).send_cq, nevents); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1327:9 [INFO] [stdout] | [INFO] [stdout] 1327 | rdma_seterrno(ret) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_poll_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1342:15 [INFO] [stdout] | [INFO] [stdout] 1342 | ret = ibv_poll_cq((*id).recv_cq, num_entries, wc); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1334:1 [INFO] [stdout] | [INFO] [stdout] 1334 | pub unsafe fn rdma_get_recv_comp(id: *mut rdma_cm_id, wc: *mut ibv_wc) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1342:27 [INFO] [stdout] | [INFO] [stdout] 1342 | ret = ibv_poll_cq((*id).recv_cq, num_entries, wc); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_req_notify_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1346:15 [INFO] [stdout] | [INFO] [stdout] 1346 | ret = ibv_req_notify_cq((*id).recv_cq, solicited_only); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1346:33 [INFO] [stdout] | [INFO] [stdout] 1346 | ret = ibv_req_notify_cq((*id).recv_cq, solicited_only); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1348:20 [INFO] [stdout] | [INFO] [stdout] 1348 | return rdma_seterrno(ret); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_poll_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1350:15 [INFO] [stdout] | [INFO] [stdout] 1350 | ret = ibv_poll_cq((*id).recv_cq, num_entries, wc); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1350:27 [INFO] [stdout] | [INFO] [stdout] 1350 | ret = ibv_poll_cq((*id).recv_cq, num_entries, wc); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_get_cq_event` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1354:15 [INFO] [stdout] | [INFO] [stdout] 1354 | ret = ibv_get_cq_event((*id).recv_cq_channel, &mut cq, &mut context); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1354:32 [INFO] [stdout] | [INFO] [stdout] 1354 | ret = ibv_get_cq_event((*id).recv_cq_channel, &mut cq, &mut context); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1359:23 [INFO] [stdout] | [INFO] [stdout] 1359 | assert!(cq == (*id).recv_cq && context as *mut rdma_cm_id == id); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_ack_cq_events` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1360:9 [INFO] [stdout] | [INFO] [stdout] 1360 | ibv_ack_cq_events((*id).recv_cq, nevents); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1360:27 [INFO] [stdout] | [INFO] [stdout] 1360 | ibv_ack_cq_events((*id).recv_cq, nevents); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1363:9 [INFO] [stdout] | [INFO] [stdout] 1363 | rdma_seterrno(ret) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 582 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating examples/server.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `rdma_mummy_sys` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/opcode.rs [INFO] [stderr] * src/verbs.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/opcode.rs:5:10 [INFO] [stderr] | [INFO] [stderr] 5 | ($transport: expr_2021, $op : expr_2021 ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/opcode.rs:5:33 [INFO] [stderr] | [INFO] [stderr] 5 | ($transport: expr_2021, $op : expr_2021 ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/verbs.rs:254:6 [INFO] [stderr] | [INFO] [stderr] 254 | ($ptr:expr_2021, $container:path, $field:ident) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/verbs.rs:272:6 [INFO] [stderr] | [INFO] [stderr] 272 | ($vcr:expr_2021, $field:ident) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: aborting due to 4 previous errors [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:2042:1 [INFO] [stdout] | [INFO] [stdout] 2042 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 2043 | | pub fn ibv_wc_status_str( [INFO] [stdout] 2044 | | status: ibv_wc_status::Type, [INFO] [stdout] 2045 | | ) -> *const ::std::os::raw::c_char; [INFO] [stdout] 2046 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:2680:1 [INFO] [stdout] | [INFO] [stdout] 2680 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 2681 | | pub fn ibv_rate_to_mult(rate: ibv_rate::Type) -> ::std::os::raw::c_int; [INFO] [stdout] 2682 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:2683:1 [INFO] [stdout] | [INFO] [stdout] 2683 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 2684 | | pub fn ibv_rate_to_mbps(rate: ibv_rate::Type) -> ::std::os::raw::c_int; [INFO] [stdout] 2685 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:4191:1 [INFO] [stdout] | [INFO] [stdout] 4191 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 4192 | | pub fn ibv_wr_opcode_str( [INFO] [stdout] 4193 | | opcode: ibv_wr_opcode::Type, [INFO] [stdout] 4194 | | ) -> *const ::std::os::raw::c_char; [INFO] [stdout] 4195 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:5311:1 [INFO] [stdout] | [INFO] [stdout] 5311 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 5312 | | pub fn ibv_qp_to_qp_ex(qp: *mut ibv_qp) -> *mut ibv_qp_ex; [INFO] [stdout] 5313 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8392:1 [INFO] [stdout] | [INFO] [stdout] 8392 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8393 | | pub fn ibv_get_device_list( [INFO] [stdout] 8394 | | num_devices: *mut ::std::os::raw::c_int, [INFO] [stdout] 8395 | | ) -> *mut *mut ibv_device; [INFO] [stdout] 8396 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8397:1 [INFO] [stdout] | [INFO] [stdout] 8397 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8398 | | pub fn ibv_free_device_list(list: *mut *mut ibv_device); [INFO] [stdout] 8399 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8400:1 [INFO] [stdout] | [INFO] [stdout] 8400 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8401 | | pub fn ibv_get_device_name(device: *mut ibv_device) -> *const ::std::os::raw::c_char; [INFO] [stdout] 8402 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8403:1 [INFO] [stdout] | [INFO] [stdout] 8403 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8404 | | pub fn ibv_get_device_index(device: *mut ibv_device) -> ::std::os::raw::c_int; [INFO] [stdout] 8405 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8406:1 [INFO] [stdout] | [INFO] [stdout] 8406 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8407 | | pub fn ibv_get_device_guid(device: *mut ibv_device) -> __be64; [INFO] [stdout] 8408 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8409:1 [INFO] [stdout] | [INFO] [stdout] 8409 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8410 | | pub fn ibv_open_device(device: *mut ibv_device) -> *mut ibv_context; [INFO] [stdout] 8411 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8412:1 [INFO] [stdout] | [INFO] [stdout] 8412 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8413 | | pub fn ibv_close_device(context: *mut ibv_context) -> ::std::os::raw::c_int; [INFO] [stdout] 8414 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8415:1 [INFO] [stdout] | [INFO] [stdout] 8415 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8416 | | pub fn ibv_import_device(cmd_fd: ::std::os::raw::c_int) -> *mut ibv_context; [INFO] [stdout] 8417 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8418:1 [INFO] [stdout] | [INFO] [stdout] 8418 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8419 | | pub fn ibv_import_pd(context: *mut ibv_context, pd_handle: u32) -> *mut ibv_pd; [INFO] [stdout] 8420 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8421:1 [INFO] [stdout] | [INFO] [stdout] 8421 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8422 | | pub fn ibv_unimport_pd(pd: *mut ibv_pd); [INFO] [stdout] 8423 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8424:1 [INFO] [stdout] | [INFO] [stdout] 8424 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8425 | | pub fn ibv_import_mr(pd: *mut ibv_pd, mr_handle: u32) -> *mut ibv_mr; [INFO] [stdout] 8426 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8427:1 [INFO] [stdout] | [INFO] [stdout] 8427 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8428 | | pub fn ibv_unimport_mr(mr: *mut ibv_mr); [INFO] [stdout] 8429 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8430:1 [INFO] [stdout] | [INFO] [stdout] 8430 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8431 | | pub fn ibv_import_dm(context: *mut ibv_context, dm_handle: u32) -> *mut ibv_dm; [INFO] [stdout] 8432 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8433:1 [INFO] [stdout] | [INFO] [stdout] 8433 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8434 | | pub fn ibv_unimport_dm(dm: *mut ibv_dm); [INFO] [stdout] 8435 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8436:1 [INFO] [stdout] | [INFO] [stdout] 8436 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8437 | | pub fn ibv_get_async_event( [INFO] [stdout] 8438 | | context: *mut ibv_context, [INFO] [stdout] 8439 | | event: *mut ibv_async_event, [INFO] [stdout] 8440 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8441 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8442:1 [INFO] [stdout] | [INFO] [stdout] 8442 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8443 | | pub fn ibv_ack_async_event(event: *mut ibv_async_event); [INFO] [stdout] 8444 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8445:1 [INFO] [stdout] | [INFO] [stdout] 8445 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8446 | | pub fn ibv_query_device( [INFO] [stdout] 8447 | | context: *mut ibv_context, [INFO] [stdout] 8448 | | device_attr: *mut ibv_device_attr, [INFO] [stdout] 8449 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8450 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8451:1 [INFO] [stdout] | [INFO] [stdout] 8451 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8452 | | pub fn ibv_query_port( [INFO] [stdout] 8453 | | context: *mut ibv_context, [INFO] [stdout] 8454 | | port_num: u8, [INFO] [stdout] 8455 | | port_attr: *mut _compat_ibv_port_attr, [INFO] [stdout] 8456 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8457 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8458:1 [INFO] [stdout] | [INFO] [stdout] 8458 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8459 | | pub fn ibv_query_gid( [INFO] [stdout] 8460 | | context: *mut ibv_context, [INFO] [stdout] 8461 | | port_num: u8, [INFO] [stdout] ... | [INFO] [stdout] 8464 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8465 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8466:1 [INFO] [stdout] | [INFO] [stdout] 8466 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8467 | | pub fn _ibv_query_gid_ex( [INFO] [stdout] 8468 | | context: *mut ibv_context, [INFO] [stdout] 8469 | | port_num: u32, [INFO] [stdout] ... | [INFO] [stdout] 8474 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8475 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8476:1 [INFO] [stdout] | [INFO] [stdout] 8476 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8477 | | pub fn _ibv_query_gid_table( [INFO] [stdout] 8478 | | context: *mut ibv_context, [INFO] [stdout] 8479 | | entries: *mut ibv_gid_entry, [INFO] [stdout] ... | [INFO] [stdout] 8483 | | ) -> isize; [INFO] [stdout] 8484 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8485:1 [INFO] [stdout] | [INFO] [stdout] 8485 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8486 | | pub fn ibv_query_pkey( [INFO] [stdout] 8487 | | context: *mut ibv_context, [INFO] [stdout] 8488 | | port_num: u8, [INFO] [stdout] ... | [INFO] [stdout] 8491 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8492 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8493:1 [INFO] [stdout] | [INFO] [stdout] 8493 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8494 | | pub fn ibv_get_pkey_index( [INFO] [stdout] 8495 | | context: *mut ibv_context, [INFO] [stdout] 8496 | | port_num: u8, [INFO] [stdout] 8497 | | pkey: __be16, [INFO] [stdout] 8498 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8499 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8500:1 [INFO] [stdout] | [INFO] [stdout] 8500 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8501 | | pub fn ibv_alloc_pd(context: *mut ibv_context) -> *mut ibv_pd; [INFO] [stdout] 8502 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8503:1 [INFO] [stdout] | [INFO] [stdout] 8503 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8504 | | pub fn ibv_dealloc_pd(pd: *mut ibv_pd) -> ::std::os::raw::c_int; [INFO] [stdout] 8505 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8506:1 [INFO] [stdout] | [INFO] [stdout] 8506 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8507 | | pub fn ibv_reg_mr_iova2( [INFO] [stdout] 8508 | | pd: *mut ibv_pd, [INFO] [stdout] 8509 | | addr: *mut ::std::os::raw::c_void, [INFO] [stdout] ... | [INFO] [stdout] 8513 | | ) -> *mut ibv_mr; [INFO] [stdout] 8514 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8515:1 [INFO] [stdout] | [INFO] [stdout] 8515 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8516 | | pub fn ibv_reg_mr( [INFO] [stdout] 8517 | | pd: *mut ibv_pd, [INFO] [stdout] 8518 | | addr: *mut ::std::os::raw::c_void, [INFO] [stdout] ... | [INFO] [stdout] 8521 | | ) -> *mut ibv_mr; [INFO] [stdout] 8522 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8523:1 [INFO] [stdout] | [INFO] [stdout] 8523 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8524 | | pub fn ibv_reg_mr_iova( [INFO] [stdout] 8525 | | pd: *mut ibv_pd, [INFO] [stdout] 8526 | | addr: *mut ::std::os::raw::c_void, [INFO] [stdout] ... | [INFO] [stdout] 8530 | | ) -> *mut ibv_mr; [INFO] [stdout] 8531 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8532:1 [INFO] [stdout] | [INFO] [stdout] 8532 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8533 | | pub fn ibv_reg_dmabuf_mr( [INFO] [stdout] 8534 | | pd: *mut ibv_pd, [INFO] [stdout] 8535 | | offset: u64, [INFO] [stdout] ... | [INFO] [stdout] 8540 | | ) -> *mut ibv_mr; [INFO] [stdout] 8541 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8550:1 [INFO] [stdout] | [INFO] [stdout] 8550 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8551 | | pub fn ibv_rereg_mr( [INFO] [stdout] 8552 | | mr: *mut ibv_mr, [INFO] [stdout] 8553 | | flags: ::std::os::raw::c_int, [INFO] [stdout] ... | [INFO] [stdout] 8558 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8559 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8560:1 [INFO] [stdout] | [INFO] [stdout] 8560 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8561 | | pub fn ibv_dereg_mr(mr: *mut ibv_mr) -> ::std::os::raw::c_int; [INFO] [stdout] 8562 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8563:1 [INFO] [stdout] | [INFO] [stdout] 8563 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8564 | | pub fn ibv_create_comp_channel(context: *mut ibv_context) -> *mut ibv_comp_channel; [INFO] [stdout] 8565 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8566:1 [INFO] [stdout] | [INFO] [stdout] 8566 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8567 | | pub fn ibv_destroy_comp_channel( [INFO] [stdout] 8568 | | channel: *mut ibv_comp_channel, [INFO] [stdout] 8569 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8570 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8571:1 [INFO] [stdout] | [INFO] [stdout] 8571 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8572 | | pub fn ibv_create_cq( [INFO] [stdout] 8573 | | context: *mut ibv_context, [INFO] [stdout] 8574 | | cqe: ::std::os::raw::c_int, [INFO] [stdout] ... | [INFO] [stdout] 8578 | | ) -> *mut ibv_cq; [INFO] [stdout] 8579 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8580:1 [INFO] [stdout] | [INFO] [stdout] 8580 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8581 | | pub fn ibv_resize_cq( [INFO] [stdout] 8582 | | cq: *mut ibv_cq, [INFO] [stdout] 8583 | | cqe: ::std::os::raw::c_int, [INFO] [stdout] 8584 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8585 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8586:1 [INFO] [stdout] | [INFO] [stdout] 8586 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8587 | | pub fn ibv_destroy_cq(cq: *mut ibv_cq) -> ::std::os::raw::c_int; [INFO] [stdout] 8588 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8589:1 [INFO] [stdout] | [INFO] [stdout] 8589 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8590 | | pub fn ibv_get_cq_event( [INFO] [stdout] 8591 | | channel: *mut ibv_comp_channel, [INFO] [stdout] 8592 | | cq: *mut *mut ibv_cq, [INFO] [stdout] 8593 | | cq_context: *mut *mut ::std::os::raw::c_void, [INFO] [stdout] 8594 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8595 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8596:1 [INFO] [stdout] | [INFO] [stdout] 8596 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8597 | | pub fn ibv_ack_cq_events(cq: *mut ibv_cq, nevents: ::std::os::raw::c_uint); [INFO] [stdout] 8598 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8599:1 [INFO] [stdout] | [INFO] [stdout] 8599 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8600 | | pub fn ibv_create_srq( [INFO] [stdout] 8601 | | pd: *mut ibv_pd, [INFO] [stdout] 8602 | | srq_init_attr: *mut ibv_srq_init_attr, [INFO] [stdout] 8603 | | ) -> *mut ibv_srq; [INFO] [stdout] 8604 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8605:1 [INFO] [stdout] | [INFO] [stdout] 8605 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8606 | | pub fn ibv_modify_srq( [INFO] [stdout] 8607 | | srq: *mut ibv_srq, [INFO] [stdout] 8608 | | srq_attr: *mut ibv_srq_attr, [INFO] [stdout] 8609 | | srq_attr_mask: ::std::os::raw::c_int, [INFO] [stdout] 8610 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8611 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8612:1 [INFO] [stdout] | [INFO] [stdout] 8612 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8613 | | pub fn ibv_query_srq( [INFO] [stdout] 8614 | | srq: *mut ibv_srq, [INFO] [stdout] 8615 | | srq_attr: *mut ibv_srq_attr, [INFO] [stdout] 8616 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8617 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8618:1 [INFO] [stdout] | [INFO] [stdout] 8618 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8619 | | pub fn ibv_destroy_srq(srq: *mut ibv_srq) -> ::std::os::raw::c_int; [INFO] [stdout] 8620 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8621:1 [INFO] [stdout] | [INFO] [stdout] 8621 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8622 | | pub fn ibv_create_qp( [INFO] [stdout] 8623 | | pd: *mut ibv_pd, [INFO] [stdout] 8624 | | qp_init_attr: *mut ibv_qp_init_attr, [INFO] [stdout] 8625 | | ) -> *mut ibv_qp; [INFO] [stdout] 8626 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8627:1 [INFO] [stdout] | [INFO] [stdout] 8627 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8628 | | pub fn ibv_modify_qp( [INFO] [stdout] 8629 | | qp: *mut ibv_qp, [INFO] [stdout] 8630 | | attr: *mut ibv_qp_attr, [INFO] [stdout] 8631 | | attr_mask: ::std::os::raw::c_int, [INFO] [stdout] 8632 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8633 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8634:1 [INFO] [stdout] | [INFO] [stdout] 8634 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8635 | | pub fn ibv_query_qp_data_in_order( [INFO] [stdout] 8636 | | qp: *mut ibv_qp, [INFO] [stdout] 8637 | | op: ibv_wr_opcode::Type, [INFO] [stdout] 8638 | | flags: u32, [INFO] [stdout] 8639 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8640 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8641:1 [INFO] [stdout] | [INFO] [stdout] 8641 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8642 | | pub fn ibv_query_qp( [INFO] [stdout] 8643 | | qp: *mut ibv_qp, [INFO] [stdout] 8644 | | attr: *mut ibv_qp_attr, [INFO] [stdout] ... | [INFO] [stdout] 8647 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8648 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8649:1 [INFO] [stdout] | [INFO] [stdout] 8649 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8650 | | pub fn ibv_destroy_qp(qp: *mut ibv_qp) -> ::std::os::raw::c_int; [INFO] [stdout] 8651 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8652:1 [INFO] [stdout] | [INFO] [stdout] 8652 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8653 | | pub fn ibv_create_ah(pd: *mut ibv_pd, attr: *mut ibv_ah_attr) -> *mut ibv_ah; [INFO] [stdout] 8654 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8655:1 [INFO] [stdout] | [INFO] [stdout] 8655 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8656 | | pub fn ibv_init_ah_from_wc( [INFO] [stdout] 8657 | | context: *mut ibv_context, [INFO] [stdout] 8658 | | port_num: u8, [INFO] [stdout] ... | [INFO] [stdout] 8662 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8663 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8664:1 [INFO] [stdout] | [INFO] [stdout] 8664 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8665 | | pub fn ibv_create_ah_from_wc( [INFO] [stdout] 8666 | | pd: *mut ibv_pd, [INFO] [stdout] 8667 | | wc: *mut ibv_wc, [INFO] [stdout] ... | [INFO] [stdout] 8670 | | ) -> *mut ibv_ah; [INFO] [stdout] 8671 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8672:1 [INFO] [stdout] | [INFO] [stdout] 8672 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8673 | | pub fn ibv_destroy_ah(ah: *mut ibv_ah) -> ::std::os::raw::c_int; [INFO] [stdout] 8674 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8675:1 [INFO] [stdout] | [INFO] [stdout] 8675 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8676 | | pub fn ibv_attach_mcast( [INFO] [stdout] 8677 | | qp: *mut ibv_qp, [INFO] [stdout] 8678 | | gid: *const ibv_gid, [INFO] [stdout] 8679 | | lid: u16, [INFO] [stdout] 8680 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8681 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8682:1 [INFO] [stdout] | [INFO] [stdout] 8682 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8683 | | pub fn ibv_detach_mcast( [INFO] [stdout] 8684 | | qp: *mut ibv_qp, [INFO] [stdout] 8685 | | gid: *const ibv_gid, [INFO] [stdout] 8686 | | lid: u16, [INFO] [stdout] 8687 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8688 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8689:1 [INFO] [stdout] | [INFO] [stdout] 8689 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8690 | | pub fn ibv_fork_init() -> ::std::os::raw::c_int; [INFO] [stdout] 8691 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8692:1 [INFO] [stdout] | [INFO] [stdout] 8692 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8693 | | pub fn ibv_is_fork_initialized() -> ibv_fork_status; [INFO] [stdout] 8694 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8695:1 [INFO] [stdout] | [INFO] [stdout] 8695 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8696 | | pub fn ibv_node_type_str( [INFO] [stdout] 8697 | | node_type: ibv_node_type::Type, [INFO] [stdout] 8698 | | ) -> *const ::std::os::raw::c_char; [INFO] [stdout] 8699 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8700:1 [INFO] [stdout] | [INFO] [stdout] 8700 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8701 | | pub fn ibv_port_state_str( [INFO] [stdout] 8702 | | port_state: ibv_port_state::Type, [INFO] [stdout] 8703 | | ) -> *const ::std::os::raw::c_char; [INFO] [stdout] 8704 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8705:1 [INFO] [stdout] | [INFO] [stdout] 8705 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8706 | | pub fn ibv_event_type_str(event: ibv_event_type) -> *const ::std::os::raw::c_char; [INFO] [stdout] 8707 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8708:1 [INFO] [stdout] | [INFO] [stdout] 8708 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8709 | | pub fn ibv_resolve_eth_l2_from_gid( [INFO] [stdout] 8710 | | context: *mut ibv_context, [INFO] [stdout] 8711 | | attr: *mut ibv_ah_attr, [INFO] [stdout] ... | [INFO] [stdout] 8714 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8715 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8716:1 [INFO] [stdout] | [INFO] [stdout] 8716 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8717 | | pub fn ibv_set_ece(qp: *mut ibv_qp, ece: *mut ibv_ece) -> ::std::os::raw::c_int; [INFO] [stdout] 8718 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8719:1 [INFO] [stdout] | [INFO] [stdout] 8719 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8720 | | pub fn ibv_query_ece(qp: *mut ibv_qp, ece: *mut ibv_ece) -> ::std::os::raw::c_int; [INFO] [stdout] 8721 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8725:1 [INFO] [stdout] | [INFO] [stdout] 8725 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8726 | | pub fn ibv_get_sysfs_path() -> *const ::std::os::raw::c_char; [INFO] [stdout] 8727 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8728:1 [INFO] [stdout] | [INFO] [stdout] 8728 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8729 | | pub fn ibv_read_sysfs_file( [INFO] [stdout] 8730 | | dir: *const ::std::os::raw::c_char, [INFO] [stdout] 8731 | | file: *const ::std::os::raw::c_char, [INFO] [stdout] ... | [INFO] [stdout] 8734 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8735 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:8736:1 [INFO] [stdout] | [INFO] [stdout] 8736 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 8737 | | pub fn ibv_query_gid_type( [INFO] [stdout] 8738 | | context: *mut ibv_context, [INFO] [stdout] 8739 | | port_num: u8, [INFO] [stdout] ... | [INFO] [stdout] 8742 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 8743 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9873:1 [INFO] [stdout] | [INFO] [stdout] 9873 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9874 | | pub fn rdma_create_event_channel() -> *mut rdma_event_channel; [INFO] [stdout] 9875 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9876:1 [INFO] [stdout] | [INFO] [stdout] 9876 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9877 | | pub fn rdma_destroy_event_channel(channel: *mut rdma_event_channel); [INFO] [stdout] 9878 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9879:1 [INFO] [stdout] | [INFO] [stdout] 9879 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9880 | | pub fn rdma_create_id( [INFO] [stdout] 9881 | | channel: *mut rdma_event_channel, [INFO] [stdout] 9882 | | id: *mut *mut rdma_cm_id, [INFO] [stdout] ... | [INFO] [stdout] 9885 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9886 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9887:1 [INFO] [stdout] | [INFO] [stdout] 9887 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9888 | | pub fn rdma_create_ep( [INFO] [stdout] 9889 | | id: *mut *mut rdma_cm_id, [INFO] [stdout] 9890 | | res: *mut rdma_addrinfo, [INFO] [stdout] ... | [INFO] [stdout] 9893 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9894 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9895:1 [INFO] [stdout] | [INFO] [stdout] 9895 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9896 | | pub fn rdma_destroy_ep(id: *mut rdma_cm_id); [INFO] [stdout] 9897 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9898:1 [INFO] [stdout] | [INFO] [stdout] 9898 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9899 | | pub fn rdma_destroy_id(id: *mut rdma_cm_id) -> ::std::os::raw::c_int; [INFO] [stdout] 9900 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9901:1 [INFO] [stdout] | [INFO] [stdout] 9901 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9902 | | pub fn rdma_bind_addr( [INFO] [stdout] 9903 | | id: *mut rdma_cm_id, [INFO] [stdout] 9904 | | addr: *mut sockaddr, [INFO] [stdout] 9905 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9906 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9907:1 [INFO] [stdout] | [INFO] [stdout] 9907 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9908 | | pub fn rdma_resolve_addr( [INFO] [stdout] 9909 | | id: *mut rdma_cm_id, [INFO] [stdout] 9910 | | src_addr: *mut sockaddr, [INFO] [stdout] ... | [INFO] [stdout] 9913 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9914 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9915:1 [INFO] [stdout] | [INFO] [stdout] 9915 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9916 | | pub fn rdma_resolve_route( [INFO] [stdout] 9917 | | id: *mut rdma_cm_id, [INFO] [stdout] 9918 | | timeout_ms: ::std::os::raw::c_int, [INFO] [stdout] 9919 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9920 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9921:1 [INFO] [stdout] | [INFO] [stdout] 9921 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9922 | | pub fn rdma_create_qp( [INFO] [stdout] 9923 | | id: *mut rdma_cm_id, [INFO] [stdout] 9924 | | pd: *mut ibv_pd, [INFO] [stdout] 9925 | | qp_init_attr: *mut ibv_qp_init_attr, [INFO] [stdout] 9926 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9927 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9928:1 [INFO] [stdout] | [INFO] [stdout] 9928 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9929 | | pub fn rdma_create_qp_ex( [INFO] [stdout] 9930 | | id: *mut rdma_cm_id, [INFO] [stdout] 9931 | | qp_init_attr: *mut ibv_qp_init_attr_ex, [INFO] [stdout] 9932 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9933 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9934:1 [INFO] [stdout] | [INFO] [stdout] 9934 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9935 | | pub fn rdma_destroy_qp(id: *mut rdma_cm_id); [INFO] [stdout] 9936 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9937:1 [INFO] [stdout] | [INFO] [stdout] 9937 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9938 | | pub fn rdma_connect( [INFO] [stdout] 9939 | | id: *mut rdma_cm_id, [INFO] [stdout] 9940 | | conn_param: *mut rdma_conn_param, [INFO] [stdout] 9941 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9942 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9943:1 [INFO] [stdout] | [INFO] [stdout] 9943 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9944 | | pub fn rdma_establish(id: *mut rdma_cm_id) -> ::std::os::raw::c_int; [INFO] [stdout] 9945 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9946:1 [INFO] [stdout] | [INFO] [stdout] 9946 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9947 | | pub fn rdma_listen( [INFO] [stdout] 9948 | | id: *mut rdma_cm_id, [INFO] [stdout] 9949 | | backlog: ::std::os::raw::c_int, [INFO] [stdout] 9950 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9951 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9952:1 [INFO] [stdout] | [INFO] [stdout] 9952 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9953 | | pub fn rdma_get_request( [INFO] [stdout] 9954 | | listen: *mut rdma_cm_id, [INFO] [stdout] 9955 | | id: *mut *mut rdma_cm_id, [INFO] [stdout] 9956 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9957 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9958:1 [INFO] [stdout] | [INFO] [stdout] 9958 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9959 | | pub fn rdma_accept( [INFO] [stdout] 9960 | | id: *mut rdma_cm_id, [INFO] [stdout] 9961 | | conn_param: *mut rdma_conn_param, [INFO] [stdout] 9962 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9963 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9964:1 [INFO] [stdout] | [INFO] [stdout] 9964 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9965 | | pub fn rdma_reject( [INFO] [stdout] 9966 | | id: *mut rdma_cm_id, [INFO] [stdout] 9967 | | private_data: *const ::std::os::raw::c_void, [INFO] [stdout] 9968 | | private_data_len: u8, [INFO] [stdout] 9969 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9970 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9971:1 [INFO] [stdout] | [INFO] [stdout] 9971 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9972 | | pub fn rdma_reject_ece( [INFO] [stdout] 9973 | | id: *mut rdma_cm_id, [INFO] [stdout] 9974 | | private_data: *const ::std::os::raw::c_void, [INFO] [stdout] 9975 | | private_data_len: u8, [INFO] [stdout] 9976 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9977 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9978:1 [INFO] [stdout] | [INFO] [stdout] 9978 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9979 | | pub fn rdma_notify( [INFO] [stdout] 9980 | | id: *mut rdma_cm_id, [INFO] [stdout] 9981 | | event: ibv_event_type, [INFO] [stdout] 9982 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9983 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9984:1 [INFO] [stdout] | [INFO] [stdout] 9984 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9985 | | pub fn rdma_disconnect(id: *mut rdma_cm_id) -> ::std::os::raw::c_int; [INFO] [stdout] 9986 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9987:1 [INFO] [stdout] | [INFO] [stdout] 9987 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9988 | | pub fn rdma_join_multicast( [INFO] [stdout] 9989 | | id: *mut rdma_cm_id, [INFO] [stdout] 9990 | | addr: *mut sockaddr, [INFO] [stdout] 9991 | | context: *mut ::std::os::raw::c_void, [INFO] [stdout] 9992 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9993 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:9994:1 [INFO] [stdout] | [INFO] [stdout] 9994 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 9995 | | pub fn rdma_leave_multicast( [INFO] [stdout] 9996 | | id: *mut rdma_cm_id, [INFO] [stdout] 9997 | | addr: *mut sockaddr, [INFO] [stdout] 9998 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 9999 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10000:1 [INFO] [stdout] | [INFO] [stdout] 10000 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10001 | | pub fn rdma_join_multicast_ex( [INFO] [stdout] 10002 | | id: *mut rdma_cm_id, [INFO] [stdout] 10003 | | mc_join_attr: *mut rdma_cm_join_mc_attr_ex, [INFO] [stdout] 10004 | | context: *mut ::std::os::raw::c_void, [INFO] [stdout] 10005 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 10006 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10007:1 [INFO] [stdout] | [INFO] [stdout] 10007 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10008 | | pub fn rdma_get_cm_event( [INFO] [stdout] 10009 | | channel: *mut rdma_event_channel, [INFO] [stdout] 10010 | | event: *mut *mut rdma_cm_event, [INFO] [stdout] 10011 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 10012 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10013:1 [INFO] [stdout] | [INFO] [stdout] 10013 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10014 | | pub fn rdma_ack_cm_event(event: *mut rdma_cm_event) -> ::std::os::raw::c_int; [INFO] [stdout] 10015 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10016:1 [INFO] [stdout] | [INFO] [stdout] 10016 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10017 | | pub fn rdma_get_src_port(id: *mut rdma_cm_id) -> __be16; [INFO] [stdout] 10018 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10019:1 [INFO] [stdout] | [INFO] [stdout] 10019 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10020 | | pub fn rdma_get_dst_port(id: *mut rdma_cm_id) -> __be16; [INFO] [stdout] 10021 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10022:1 [INFO] [stdout] | [INFO] [stdout] 10022 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10023 | | pub fn rdma_get_devices( [INFO] [stdout] 10024 | | num_devices: *mut ::std::os::raw::c_int, [INFO] [stdout] 10025 | | ) -> *mut *mut ibv_context; [INFO] [stdout] 10026 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10027:1 [INFO] [stdout] | [INFO] [stdout] 10027 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10028 | | pub fn rdma_free_devices(list: *mut *mut ibv_context); [INFO] [stdout] 10029 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10030:1 [INFO] [stdout] | [INFO] [stdout] 10030 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10031 | | pub fn rdma_event_str( [INFO] [stdout] 10032 | | event: rdma_cm_event_type::Type, [INFO] [stdout] 10033 | | ) -> *const ::std::os::raw::c_char; [INFO] [stdout] 10034 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-mummy-sys-30400fe63990a36a/out/bindings.rs:10035:1 [INFO] [stdout] | [INFO] [stdout] 10035 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 10036 | | pub fn rdma_set_option( [INFO] [stdout] 10037 | | id: *mut rdma_cm_id, [INFO] [stdout] 10038 | | level: ::std::os::raw::c_int, [INFO] [stdout] ... | [INFO] [stdout] 10042 | | ) -> ::std::os::raw::c_int; [INFO] [stdout] 10043 | | } [WARN] too many lines in the log, truncating it